News Items

  • news

    Visible to the public "UNESCO Calls on All Governments to Implement Global Ethical Framework without Delay"

    The United Nations Educational, Scientific and Cultural Organization's (UNESCO) Recommendation on the Ethics of Artificial Intelligence is the first global framework for the ethical use of Artificial Intelligence (AI). It urges nations to maximize AI's benefits and minimize its risks. The guide covers values and principles, as well as policy proposals for all relevant areas. UNESCO is concerned about many of the ethical challenges posed by these advances, including the right to privacy, the security of personal data, and more. More than 40 countries in all parts of the world are currently collaborating with UNESCO to establish AI checks and balances at the national level. UNESCO encourages all nations to join the campaign it is driving to develop an ethical AI. This article continues to discuss UNESCO's Recommendation on the Ethics of Artificial Intelligence.

    UNESCO reports "UNESCO Calls on All Governments to Implement Global Ethical Framework without Delay"

  • news

    Visible to the public "Making Internet of Things More Secure"

    Internet of Things (IoT) devices have become prevalent due to wearable fitness trackers, automotive key fobs, and smart home devices. Most of the information flow via IoT devices is vulnerable to attacks, as IoT security has not kept pace with technological advancements. Shantanu Chakrabartty, the Clifford W. Murphy Professor in the Preston M. Green Department of Electrical & Systems Engineering, and Mustafizur Rahman, a doctoral student in his lab, developed a prototype method to improve the security of these communications by using a Synchronized Pseudo-Random-Number Generator (SPRNG). The solution could be used to verify and authenticate secure IoT transactions. Chakrabartty and Rahman created a prototype synchronized self-powered timer array that is secure against manipulation, snooping, and side-channel attacks by using quantum-mechanical electron tunneling. They used Fowler-Nordheim (FN) quantum tunneling, in which electrons leap over a triangle barrier and alter its shape in the process. Chakrabartty stated that FN tunneling provides a far simpler and more energy-efficient link than existing methods that are too complex for computer modeling. Since it is self-powered, it is secure against attacks. This article continues to discuss the prototype method developed to better secure communications using an SPRNG.

    Washington University in St. Louis reports "Making Internet of Things More Secure"

  • news

    Visible to the public "FDA Protects Medical Devices Against Cyber-Threats With New Measures"

    The US Food and Drug Administration (FDA) staff has recently published new guidelines to strengthen the cybersecurity levels of internet-connected products used by hospitals and healthcare providers. According to the FDA, applicants seeking approval for new medical devices must submit a plan designed to "monitor, identify and address" possible cybersecurity issues associated with them. Further, applicants will also need to outline a process to provide "reasonable assurance" that the device in question is protected with regular security updates and patches, including for critical situations. Finally, they will be expected to provide the FDA with "a software bill of materials," which should include commercial, open-source, and off-the-shelf software components.

    Infosecurity reports: "FDA Protects Medical Devices Against Cyber-Threats With New Measures"

  • news

    Visible to the public "Ukrainian Police Bust Multimillion-Dollar Phishing Gang"

    Ukrainian cyber police have recently disrupted a prolific phishing gang it claims made 160 million hryvnias ($4.3m) from victims across Europe. The Cyber Police of Ukraine claimed in a notice yesterday that over 30 locations were searched as part of the raids, including the homes of the accused, vehicles, and call centers. According to the police, mobile phones, SIM cards, and computer equipment were seized in the crackdown. The group is said to have created over 100 phishing sites offering heavily discounted goods which lured victims into attempting to purchase them. Once the phishers had victims' card details, they would use them for follow-on fraud. The police noted that scammers were also employed in two call centers in Vinnytsia and Lviv and were tasked with convincing shoppers to complete their purchases on the fake sites. The police claimed to have identified over 1000 victims in the Czech Republic, Poland, France, Spain, Portugal, and other European countries. The operation was carried out in cooperation with police officers from the Czech Republic. The police stated that two arrests were made in Ukraine of the suspected ringleaders, and another 10 individuals were detained in unnamed European countries. The suspected group leaders face charges under Part 4 of Art. 190 (fraud) and Part 1 of Art. 255 (creation, management, and participation in a criminal organization) of the Criminal Code of Ukraine. They could face up to 12 years in jail as a result.

    Infosecurity reports: "Ukrainian Police Bust Multimillion-Dollar Phishing Gang"

  • news

    Visible to the public "The Foundation of a Holistic Identity Security Strategy"

    CyberArk reports that only 9 percent of organizations use an agile, holistic, and mature strategy to securing identities across their hybrid and multi-cloud environments. The data-driven model identifies 9 percent of organizations as having the most developed and holistic identity security strategies. These organizations have a holistic approach to integrating identity security measures, are agile, and have a "fail fast, learn faster" mindset even in the face of a successful cyberattack. However, 42 percent of all respondents' identity security programs are immature and lack the core tools and integrations necessary to mitigate identity-related risk. This identity security deficiency results from an expanding attack surface, the complexity of Information Technology (IT), and other organizational challenges. This article continues to discuss key findings from CyberArk's survey that explores trends in identity security adoption.

    Help Net Security reports "The Foundation of a Holistic Identity Security Strategy"

  • news

    Visible to the public "Organizations Consider Self-Insurance to Manage Risk"

    As the market for cybersecurity insurance evolves, Lloyd's of London plans to exclude the majority of nation-state attacks from its coverage policies. In response to these changes, companies are reevaluating their cyber insurance plans. While Lloyd's decision does not explicitly exclude all nation-state or nation-inspired cyber incidents, it clarifies several coverage parameters. If organizations want to understand the risks that cyber insurance cannot handle, they must determine which policies provide the best value and coverage and investigate other risk treatment plans. Self-insurance may help businesses to better customize their insurance coverage and expenses. This article continues to discuss the opportunities and risks in self-insurance, improving security as an insurance strategy, and broader changes in the cyber insurance market.

    Dark Reading reports "Organizations Consider Self-Insurance to Manage Risk"

  • news

    Visible to the public "Winter Vivern Hackers Exploit Zimbra Flaw to Steal NATO Emails"

    Since February 2023, a Russian hacker group tracked as TA473, also known as Winter Vivern, has exploited vulnerabilities in unpatched Zimbra endpoints to steal the emails of NATO officials, governments, military personnel, and diplomats. Sentinel Labs reported on a new Winter Vivern campaign aimed at spreading malware masquerading as a virus scanner by mimicking European agencies battling cybercrime. Proofpoint has released new research detailing how the threat actors exploit CVE-2022-27926 on Zimbra Collaboration servers to gain access to the communications of NATO-aligned organizations and individuals. Winter Vivern attacks begin with the threat actor using the Acunetix tool vulnerability scanner to check for unpatched webmail platforms. Then, the hackers send a phishing email from an address spoofed to appear as though it is from a person or organization with which the target is familiar. The emails contain a link that exploits CVE-2022-27926 in the victim's compromised Zimbra infrastructure to inject additional JavaScript payloads into the webpage. These payloads are then used to collect usernames, passwords, and tokens from cookies sent by a compromised Zimbra endpoint. This article continues to discuss Winter Vivern hackers' exploitation of vulnerabilities in unpatched Zimbra endpoints.

    Bleeping Computer reports "Winter Vivern Hackers Exploit Zimbra Flaw to Steal NATO Emails"

  • news

    Visible to the public "Chinese RedGolf Group Targeting Windows and Linux Systems with KEYPLUG Backdoor"

    RedGolf, a Chinese state-sponsored threat group, has been linked to the use of KEYPLUG, a custom Windows and Linux backdoor. According to Recorded Future, RedGolf is a prolific Chinese state-sponsored threat actor group that has likely been targeting various companies globally for many years. The group has demonstrated the ability to weaponize newly discovered vulnerabilities such as Log4Shell and ProxyLogon quickly. It has a history of creating and deploying various custom malware families. The threat actors' use of KEYPLUG was disclosed for the first time in March 2022 by Mandiant in attacks against multiple US state government networks between May 2021 and February 2022. In October 2022, Malwarebytes detailed a different wave of attacks targeting Sri Lankan government entities in early August that used a novel implant named DBoxAgent to deliver KEYPLUG. According to Recorded Future, Winnti, also known as APT41, Barium, Bronze Atlas, or Wicked Panda, closely overlaps with RedGolf in each of these campaigns. This article continues to discuss findings regarding the RedGolf group.

    THN reports "Chinese RedGolf Group Targeting Windows and Linux Systems with KEYPLUG Backdoor"

  • news

    Visible to the public Pub Crawl #72


    Pub_Crawl_web.jpgPub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers.

  • news

    Visible to the public "Over 70% of Employees Keep Work Passwords on Personal Devices"

    Security researchers at SlashNext have discovered that roughly four out of five employees (71%) store sensitive work passwords on their personal phones, and 66% use their personal texting apps for work. The researchers also found that 95% of security leaders are increasingly concerned about phishing attacks via private messaging apps. The researchers stated that with the widespread use of personal mobile devices in the workplace, it is increasingly difficult for employers to ensure the security of sensitive information. In 2022, the researchers saw that the use of personal devices and personal apps was the direct cause of many high-profile corporate breaches. The researchers noted that this is a trend that will surely continue, as employees often use corporate and personal devices for work, effectively doubling the attack surface for cybercriminals. The researchers also found during their study that a majority (89%) of IT and security leaders acknowledged legal concerns about having access to employees' private data. According to roughly four out of five employers (81%), the solution to most of the issues above is providing employees with a separate phone just for work.

    Infosecurity reports: "Over 70% of Employees Keep Work Passwords on Personal Devices"

  • news

    Visible to the public "Microsoft Cloud Vulnerability Led to Bing Search Hijacking, Exposure of Office 365 Data"

    According to cybersecurity researchers at Wiz, a misconfiguration in Azure Active Directory (AAD) that exposed applications to unauthorized access could have led to a Bing[.]com takeover. Microsoft's AAD, a cloud-based identity and access management (IAM) service, is typically used as the authentication mechanism for Azure App Services and Azure Functions applications. The service supports different types of account access, including multi-tenant, where any user belonging to any Azure tenant can issue an OAuth token for them unless proper restrictions are in place. For multi-tenant applications, developers are responsible for checking a user's original tenant and enforcing access policies to prevent unauthorized logins, but the researchers discovered that more than 25% of the multi-tenant apps accessible from the internet lack proper validation. The researchers noted that the issue exists because it is not evident to developers that they are responsible for validating user identity, leading to configuration and validation mistakes. The researchers stated that Microsoft's own applications fell into the same category. One of these apps was Bing Trivia, a Microsoft application that provided access to a content management system (CMS) linked to Bing[.]com and which allowed the researchers to control results on Microsoft's search engine. The researchers call the attack "BingBang." The researchers noted that a malicious actor landing on the Bing Trivia app page could have tampered with any search term and launched misinformation campaigns, as well as phished and impersonated other websites. While digging deeper, the researchers discovered that Bing and Office 365 were connected and that they could add a cross-site scripting (XSS) payload to Bing[.]com, which allowed them to compromise the Office 365 token of any user. This provided them with access to a user's Office 365 data, including emails, Teams messages, calendar entries, and SharePoint and OneDrive files. The researchers stated that a malicious actor with the same access could've hijacked the most popular search results with the same payload and leaked the sensitive data of millions of users. Other internal Microsoft applications also impacted by the misconfiguration included Mag News, Centralized Notification Service (CNS) API, Contact Center, PoliCheck, Power Automate Blog, and the file management system COSMOS. Microsoft addressed the initial Bing issue on January 31, the same day that the researchers reported it. The tech giant patched the vulnerable applications in late February and issued a $40,000 bug bounty reward this week.

    SecurityWeek reports: "Microsoft Cloud Vulnerability Led to Bing Search Hijacking, Exposure of Office 365 Data"

  • news

    Visible to the public "500k Impacted by Data Breach at Debt Buyer NCB"

    National accounts receivable management company and debt buyer NCB Management Services has recently started informing roughly 500,000 individuals that their personal information was compromised in a data breach. The company stated that an unauthorized party compromised some of its systems on February 1 and "gained access to Bank of America credit card accounts information." The incident was discovered on February 4, and the data theft was confirmed on March 8. Exposed personal information, the company says, includes names, addresses, phone numbers, email addresses, birth dates, driver's license numbers, Social Security numbers, and employment positions. Financial information such as pay amounts, credit card numbers, routing numbers, account numbers and balances, and/or account statuses were also stolen. According to the company, the impacted credit card accounts had already been closed when the cyberattack occurred. The incident did not involve the compromise of Bank of America systems. The company also says it is unaware of the potentially accessed information being distributed or used maliciously. NCB did not share information on the type of cyberattack it suffered, but its description of the incident suggests that it engaged in communication with the attackers, which implies that a ransom demand might have been made.

    SecurityWeek reports: "500k Impacted by Data Breach at Debt Buyer NCB"

  • news

    Visible to the public "Volume of HTTPS Phishing Sites Surges 56% Annually"

    Security experts at OpenText have warned that websites displaying a padlock in the browser should be treated with caution after revealing a sharp increase in phishing sites using HTTPS. During the study, researchers analyzed data collected from 95 million endpoints and sensors, as well as third-party databases and other resources. The researchers found that the share of phishing sites detected using HTTPS increased from 32% in 2021 to over 49% last year, a rise of nearly 56%. The researchers noted that many users incorrectly believe that HTTPS sites are "secure" and that the padlock displayed in the browser is evidence that the site is legitimate. Attackers are well aware of this popular perception, so they register domains, acquire certificates, and establish malicious websites using these certificates. The researchers stated that it appears that domain registrars and certificate-issuing authorities are becoming less effective at preventing fraudsters from obtaining and using legitimate certificates to enhance their phishing success rates. The researchers claimed the ratio of HTTPS to regular HTTP sites increased in 2022. The researchers noted that while the April spike in phishing activity was accompanied by a corresponding drop in HTTPS usage, the October and November increases in phishing activity also saw the year's highest HTTPS adoption rates. This may indicate that during the course of the year, attackers recognized the value in playing on users' perception of HTTPS URLs as secure and started to rely on these URLs over HTTP URLs during periods of peak phishing activity.

    Infosecurity reports: "Volume of HTTPS Phishing Sites Surges 56% Annually"

  • news

    Visible to the public "SafeMoon 'Burn' Bug Abused to Drain $8.9 Million from Liquidity Pool"

    The SafeMoon token liquidity pool lost $8.9 million following a hacker's exploitation of a new 'burn' smart contract function that artificially raised the price, allowing the actor to sell SafeMoon at a significantly higher price. Liquidity pools in Decentralized Finance (DeFi) platforms are large deposits of cryptocurrency that facilitate trading, provide market liquidity, and enable exchanges to operate without borrowing from a third party. John Karony, the CEO of SafeMoon, confirmed that the attack took place on March 28, affecting the SFM:BNB liquidity pool but not the platform's exchange. The blockchain security company PeckShield revealed additional information about the vulnerability exploited by the hacker to steal almost $9 million. According to PeckShield, a recent update included a new SafeMoon smart contract function that burns tokens. However, the function was inadvertently made accessible to the public, allowing anybody to execute it as they chose. Previously, Karony said that this system would only be used in emergencies, such as when the liquidity pool encounters risks with malicious smart contracts, excessive slippage, and more. The hacker used the function to burn large amounts of SafeMoon tokens, causing the token's price to skyrocket. This article continues to discuss the heist against SafeMoon carried out by a hacker.

    Bleeping Computer reports "SafeMoon 'Burn' Bug Abused to Drain $8.9 Million from Liquidity Pool"

  • news

    Visible to the public "AlienFox Malware Targets API Keys and Secrets from AWS, Google, and Microsoft Cloud Services"

    AlienFox, a new toolset enabling threat actors to harvest credentials from Application Programming Interface (API) keys and secrets from popular cloud service providers, is being distributed on Telegram. Alex Delamotte, a security researcher at SentinelOne, stated that the distribution of AlienFox indicates a trend toward attacking minimal cloud services unsuitable for cryptocurrency mining in order to enable and develop follow-up attacks. The cybersecurity company described the malware as highly modular and continually evolving to accommodate new features and improved performance. AlienFox's primary use is to identify misconfigured hosts using scanning platforms such as LeakIX and SecurityTrails, and then use the toolkit's scripts to extract credentials from configuration files on vulnerable servers. It involves scanning for vulnerable servers associated with web frameworks such as Laravel, Drupal, Joomla, Magento, Opencart, Prestashop, and WordPress. This article continues to discuss researchers' findings and observations regarding the AlienFox toolset.

    THN reports "AlienFox Malware Targets API Keys and Secrets from AWS, Google, and Microsoft Cloud Services"

  • news

    Visible to the public "3CX Customers Targeted via Trojanized Desktop App"

    Several cybersecurity companies have warned that the official Windows desktop app for the widely used 3CX softphone solution has been trojanized by malicious actors suspected to be state-sponsored. 3CX is Private Automatic Branch Exchange (PABX) software that supports Voice over Internet Protocol (VoIP). It provides video conferencing and live chat features. 3CX has app versions for Windows, macOS, Linux, Android, and iOS, as well as a Chrome extension and a Progressive Web App (PWA) version, allowing the software to be accessed via any web browser. 3CX CISO Pierre Jourdan confirmed that the Windows version of the 3CX client app had been injected with malware, advising users to temporarily uninstall the app and use the PWA version until a clean version can be released. Researchers from Trend Micro and Crowdstrike revealed that macOS versions of the 3CX desktop app have also been compromised. It is still unclear when the trojanized versions began to be served to customers, but it is known that 3CX customers reported receiving threat alerts from SentinelOne as early as March 22. This article continues to discuss 3CX's legitimate apps being switched with trojanized ones.

    Help Net Security reports "3CX Customers Targeted via Trojanized Desktop App"

  • news

    Visible to the public "Patch Now: Cybercriminals Set Sights on Critical IBM File Transfer Bug"

    There is a critical bug in IBM's popular Aspera Faspex file transfer stack that enables the execution of arbitrary code. This bug is attracting an increasing number of cybercriminals, including ransomware gangs, as organizations fail to patch it. Rapid7 researchers emphasized that the vulnerability is being exploited in the wild months after IBM provided a fix for it, stating that one of its clients was recently compromised by the flaw, tracked as CVE-2022-47986. As a result, researchers noted that immediate action is required. IBM Aspera Faspex is a cloud-based file exchange application that uses the Fast Adaptive and Secure Protocol (FASP) to enable organizations to transfer files at a faster rate than is possible via normal TCP-based connections. According to Enlyft, large organizations such as Red Hat and the University of California use the Aspera service, which is so highly praised that it has received an Emmy. The vulnerability is in Faspex version 4.4.2 Patch Level 1 and carries a CVSS severity rating of 9.8 out of 10. An attacker could remotely deploy their own code on any system running Faspex by sending a carefully crafted obsolete Application Programming Interface (API) call. This article continues to discuss the potential exploitation and impact of the vulnerability with a 9.8 CVSS rating in IBM's widely deployed Aspera Faspex offering.

    Dark Reading reports "Patch Now: Cybercriminals Set Sights on Critical IBM File Transfer Bug"

  • news

    Visible to the public "Companies Struggle to Protect against Insider Risks"

    Even though over 70 percent of companies claim to have an Insider Risk Management (IRM) program, a new report from Code42 Software found that data loss incidents increased by 32 percent among the same organizations. Based on a survey of 700 cybersecurity leaders, cybersecurity managers, and cybersecurity practitioners in the US, 71 percent expect increased data loss due to insider incidents during the next 12 months. Data loss caused by insiders is not new, but it has become increasingly complicated. Past Data Exposure Report (DER) research from Code42 Software focused on the primary causes of insider risks, such as workforce turnover and cloud adoption. According to Joe Payne, president and CEO of Code42 Software, the company's objective this year was to learn about the specific challenges security teams encounter while developing and managing insider risk programs. The report emphasizes that detection and response to insider incidents have become more difficult. Payne urges companies to reevaluate their approach to insider risks to ensure the effectiveness of technology and programs and foster cultures in which employees make safer data decisions. This article continues to discuss key findings from Code42 Software's DER regarding insider risks.

    BetaNews reports "Companies Struggle to Protect against Insider Risks"

  • news

    Visible to the public "Google TAG Shares Details about Exploit Chains Used to Install Commercial Spyware"

    Google's Threat Analysis Group (TAG) released information regarding two different attack campaigns involving the exploitation of multiple zero-day flaws against Android, iOS, and Chrome. According to researchers, both campaigns were limited and highly targeted. The threat actors responsible for the attacks used both zero-day and n-day exploits. The exploit chains installed commercial spyware and malicious apps on targets' devices. In November 2022, researchers discovered the first campaign. The exploit chains found by TAG researchers affected Android and iOS, and were distributed to users via SMS-sent bit.ly links. The campaign targeted users in Italy, Malaysia, and Kazakhstan. Victims are initially sent to pages hosting exploits for either Android or iOS. Then they are redirected to legitimate websites such as the official website for BRT, an Italian shipping and logistics company, or a Malaysian news website. These campaigns demonstrate the continued success of the commercial spyware industry. TAG researchers find that even smaller surveillance vendors have access to zero-day vulnerabilities, and vendors who stockpile and use zero-day vulnerabilities secretly, pose a significant threat to the Internet. These campaigns also suggest that surveillance vendors are sharing exploits and methods, further increasing the proliferation of destructive hacking tools. This article continues to discuss the exploit chains discovered targeting Android, iOS, and Chrome to install commercial spyware.

    Security Affairs reports "Google TAG Shares Details about Exploit Chains Used to Install Commercial Spyware"

  • news

    Visible to the public "Attacks Targeting APIs Increased By 400% in Last Six Months"

    Security researchers at Salt Security have discovered that attacks targeting application programming interfaces (APIs) have increased by 400% in the last six months. The researchers also found that 80% of these attacks happened over authenticated APIs. During their study, the researchers surveyed 400 security professionals and API developers. Of the respondents, "94% of them have experienced security problems in production APIs over the past year, with 17% having experienced an API-related breach." Due to the impact of such security issues, nearly half (48%) of respondents said that API security had become a C-level discussion within their organization. The researchers stated that the rapid increase in attacks, in addition to the data provided by their survey respondents, reflects a growing understanding in the C-suite about the importance of purpose-built API security to reduce business risk. According to the researchers, API use substantially contributes to businesses' digital transformation. During the study, the researchers also found that API management has also become a significant business issue, with more than half of respondents (59%) saying they had to slow the rollout of new applications because of API security concerns. Only 23% said their existing security approaches were very effective at preventing API attacks. According to the researchers, 90% of investigations undertaken by Salt Labs uncovered API security vulnerabilities, and 50% of those discovered should be considered critical.

    Infosecurity reports: "Attacks Targeting APIs Increased By 400% in Last Six Months"

  • news

    Visible to the public "Clop Ransomware Group Exploits GoAnywhere MFT Flaw"

    The ransomware gang known as Clop has been observed exploiting a pre-authentication command injection vulnerability (CVE-2023-0669) in Fortra's file transfer solution GoAnywhere MFT. The high-severity vulnerability has a CVSS:3.1 score of 7.2 and was exploited against several companies in the US and elsewhere. Security researchers at CloudSEK stated that the flaw derives from a deserialization bug that can be exploited by sending a post request to the endpoint. The researchers warned that a Metasploit module is also available to take advantage of the vulnerability. The exploit for this CVE was available a day before the patch (7.1.2) was released on February 7, 2023. The researchers stated that many vulnerable admin panels of GoAnywhere were found to be indexed on Shodan (a search engine for internet-connected devices) running on port 8000. The researchers clarified that only the GoAnywhere administrative interface was vulnerable to the exploit used by the Clop ransomware group and not the web client interface used by most people. Still, threat actors could search for web client interfaces on the internet and then try to find admin panels on the same IP. The researchers stated that Shodan search results indicate that thousands of web panels for GoAnywhere are exposed on the web. Of these thousands, around 94 of them are running on port 8000 or port 8001, where the admin panel is located. In order to obtain remote code execution, only a post request needs to be made to the vulnerable endpoint. The researchers stated that to mitigate the impact of this vulnerability, companies should update their machines to the latest GoAnywhere version as well as stop exposing port 8000 (the internet location of the GoAnywhere MFT admin panel). Admin user accounts should also be reviewed for suspicious activity such as unrecognized usernames, accounts created by unknown "systems," suspicious timing of account creation, and disabled or non-existent super users creating accounts.

    Infosecurity reports: "Clop Ransomware Group Exploits GoAnywhere MFT Flaw"

  • news

    Visible to the public Spotlight on Lablet Research #40 - Reasoning about Accidental and Malicious Misuse via Formal Methods

    Spotlight on Lablet Research #40 -

    Reasoning about Accidental and Malicious Misuse via Formal Methods

  • news

    Visible to the public SoS Musings #71 - Security and Privacy for Blind and Low-Vision People

    SoS Musings #71 -

    Security and Privacy for Blind and Low-Vision People

  • news

    Visible to the public Cybersecurity Snapshots #40 - Trigona Ransomware

    Cybersecurity Snapshots #40 -

    Trigona Ransomware

  • news

    Visible to the public Cyber Scene #78 - U.S. on China’s TikTok: Tempus Fugit

    Cyber Scene #78 -

    U.S. on China's TikTok: Tempus Fugit

  • news

    Visible to the public "Just 1% of Cloud Permissions Are Actively Used"

    According to security researchers at Microsoft, a surge in workload identities, super admins, and "over-permissioning" is driving increased cyber risk for organizations running cloud infrastructure. The researchers calculated that over 40,000 permissions could be granted across the major cloud platforms and that over half of these are high-risk. Permissions refer to the authorization given to users or machines that enable them to access specific resources. The researchers noted that, unfortunately, a lack of visibility and control over these authorizations could be exposing organizations to the risk of cloud security breaches and misuse. The researchers found that user and workload identities are using just 1% of permissions granted for their day-to-day job functions. More than half (50%) of identities are defined as "Super Identities," meaning they have access to all permissions and all resources. Over 60% of all identities are inactive. The researchers noted that given that Super Identities can create and modify service configuration settings, add or remove identities, and access or delete data, it is concerning that less than 2% of permissions granted to these are actually used. The researchers stated that it is machine rather than human identities where some of the biggest risks lie. The number of cloud-based workload identities, including apps, VMs, scripts, containers, and services, has increased "exponentially," and these now outnumber human identities 10 to 1. The average percentage of inactive workload identities (80%) has doubled since 2021, and less than 5% of permissions granted are used by workload identities. The researchers stated that closing the permissions gap and reducing the risk of permission misuse requires organizations to implement the principle of least privilege. The researchers noted that this must occur consistently to all human and workload identities across multi-cloud environments. Organizations can achieve this at a cloud scale by adopting a Cloud Infrastructure Entitlement Management (CIEM) solution to continuously discover, remediate and monitor the activity of every unique user and workload identity across multi-cloud.

    Infosecurity reports: "Just 1% of Cloud Permissions Are Actively Used"

  • news

    Visible to the public "Researchers Identify 6 Challenges Humans Face with Artificial Intelligence"

    Ozlem Garibay, an assistant professor in the University of Central Florida's (UCF) Department of Industrial Engineering and Management Systems, and 26 other international experts who have diverse backgrounds in Artificial Intelligence (AI) technology have conducted a study that identifies the challenges that humans must overcome to ensure the reliability, security, trustworthiness, and compatibility of AI with human values. The study titled "Six Human-Centered Artificial Intelligence Grand Challenges" covers privacy, design, governance and oversight, and human-AI interaction. For example, in regard to the challenge of privacy, the researchers suggest that the collection, use, and distribution of data in AI systems should be carefully studied to preserve people's privacy and prevent malicious use against individuals or groups. Garibay explains that these challenges are a call to action for the scientific community to develop and adopt technologies that prioritize and benefit people. This article continues to discuss the six challenges humans must overcome to enhance the relationship with AI and to ensure its use is reliable, secure, trustworthy, and compatible.

    The University of Central Florida reports "Researchers Identify 6 Challenges Humans Face with Artificial Intelligence"

  • news

    Visible to the public "Casino Giant Crown Resorts Investigating Ransomware Group’s Data Theft Claims"

    Australian casino giant Crown Resorts recently confirmed that the Cl0p ransomware group contacted them to claim they had stolen data as part of the GoAnywhere attack. The incident occurred in late January when a zero-day vulnerability in Fortra's GoAnywhere managed file transfer (MFT) software was exploited to access files belonging to Fortra customers. The exploitation of the bug tracked as CVE-2023-0669 and patched in early February was attributed to a Russian-speaking threat actor associated with the Cl0p ransomware, which recently started adding the names of alleged victims to its Tor-based leak site. The Cl0p ransomware operators have claimed the theft of data from roughly 130 organizations that used GoAnywhere, with some of them already confirming potential impact. The company stated that no customer data had been compromised, and their business operations were unaffected. They noted that they would provide relevant updates as necessary.

    SecurityWeek reports: "Casino Giant Crown Resorts Investigating Ransomware Group's Data Theft Claims"

  • news

    Visible to the public "Trojanized Tor Browser Installers Spreading Crypto-Stealing Clipper Malware"

    Since September 2022, trojanized installers for the Tor anonymity browser have been used to target users in Russia and Eastern Europe with clipper malware aimed at stealing cryptocurrencies. According to researchers, clipboard injectors can remain silent for years, with no network activity or other indications of their presence, until the day when they replace a cryptocurrency wallet address. Clipper malware is evasive because its malicious processes are not activated unless the clipboard data fulfills certain requirements. It is not immediately apparent how the installers are distributed. However, since the Tor Project's website has faced blockades in Russia in recent years, torrent downloads or the use of an unknown third-party source has increased. Regardless of the distribution method used, the installer simultaneously runs the legitimate executable and launches the clipper payload that is designed to monitor the clipboard content. This article continues to discuss the spread of cryptocurrency-stealing malware via trojanized installers for the Tor anonymity browser.

    THN reports "Trojanized Tor Browser Installers Spreading Crypto-Stealing Clipper Malware"

  • news

    Visible to the public "Ignoring Network Automation Is a Ticking Time Bomb for Security"

    According to BackBox, Information Technology (IT) professionals are frustrated by the increase in network update velocity and tech stack sprawl, the lack of support from leadership, and disagreements and concerns regarding methods of resolving network issues. When managed manually, network and security device updates are time-consuming and prone to human error, despite their importance. Ninety-two percent of network security and operations professionals cite an inability to keep up with network updates. In addition, 98 percent concur that network automation will enable their team to focus on more impactful tasks. Ninety-six percent of respondents believe that scaling is impossible without network automation. While 61 percent of organizations only upgrade network and security devices quarterly or less, 48 percent of respondents claim their company has not implemented or invested in network automation, leaving them vulnerable to security breaches and other major problems. This article continues to discuss key findings from BackBox's research on network operations and security.

    Help Net Security reports "Ignoring Network Automation Is a Ticking Time Bomb for Security"

  • news

    Visible to the public "WiFi Protocol Flaw Allows Attackers to Hijack Network Traffic"

    Cybersecurity researchers have found a security vulnerability in the design of the IEEE 802.11 WiFi protocol standard that could allow attackers to deceive access points into leaking network frames in plaintext form. WiFi frames are data containers composed of a header, data payload, and trailer containing information such as the source and destination MAC address, control, and management data. These frames are ordered in queues and are sent in a controlled way to prevent collisions and optimize data exchange performance by monitoring the busy/idle conditions of the receiving points. The researchers discovered that queued/buffered frames are inadequately protected against adversaries, who can manipulate data transmission as well as carry out client spoofing, frame redirection, and capturing. According to the technical paper published by Domien Schepers and Aanjhan Ranganathan of Northeastern University, and Mathy Vanhoef of imec-DistriNet, KU Leuven, their attacks have a wide-reaching impact because they affect a variety of devices and operating systems, including Linux, FreeBSD, iOS, and Android, and can be used to hijack TCP connections or intercept client and web traffic. This article continues to discuss the security flaw in the design of the IEEE 802.11 WiFi protocol standard.

    Bleeping Computer reports "WiFi Protocol Flaw Allows Attackers to Hijack Network Traffic"

  • news

    Visible to the public "NullMixer Polymorphic Malware Variant Infects 8K Targets in Just a Month"

    A new version of the NullMixer dropper incorporates polymorphic loaders from Dark Web Malware-as-a-Service (MaaS) and Pay-Per-Install (PPI) providers. It is being used to target organizations in North America, Italy, and France. The malware, which is a known threat, often installs a suite of downloaders, banking Trojans, stealers, and spyware on victims' computers in a single operation. According to a NullMixer analysis conducted by Security Affairs, further improvements make the threat considerably more dangerous because the malware can now adapt to any environment it infects. The analysis also describes how threat actors have used Search Engine Optimization (SEO) poisoning and malicious video tutorials to trick Information Technology (IT) staff into installing the new malware. The newly updated NullMixer malware has gained initial access to over 8,000 endpoints in just one month, stealing data to sell to brokers on underground marketplaces. This article continues to discuss the new NullMixer polymorphic malware variant.

    Dark Reading reports "NullMixer Polymorphic Malware Variant Infects 8K Targets in Just a Month"

  • news

    Visible to the public "France Bans TikTok, Other 'Fun' Apps From Government Devices"

    The French government has recently announced plans to ban "recreational" apps, including TikTok, Netflix, Instagram, Candy Crush, and Twitter, from officials' devices. The move will be monitored by the National Cybersecurity Agency of France (ANSII) and is expected to affect roughly 2.5 million government officials. Civil Service Minister Stanislas Guerini stated that recreational applications do not deliver sufficient levels of cybersecurity and data protection to be deployed on the administration's digital tools. Guerini noted that these applications may therefore constitute a risk to the data protection of these administrations and their public officials. At the same time, the minister clarified that exceptions to the rule might be put in place for "institutional communications" purposes. The decision comes amid a streak of governments worldwide banning TikTok from government devices. The French government's decision to ban TikTok from government devices comes two months after France fined the social media company $5.4m for failing to provide users with enough information on the purpose of cookies on its site.

    Infosecurity reports: "France Bans TikTok, Other 'Fun' Apps From Government Devices"

  • news

    Visible to the public "How Repeated Questions Could Put You at Risk of Cybercrime"

    A new study conducted by researchers at the University of East Anglia's School of Psychology demonstrates how simple repetition can cause individuals to overshare, exposing themselves to the risk of identity theft and cybercrime. The research team suggests that a better understanding of why people divulge personal information could help in the development of solutions to the problem. Personal data is continuously getting mined, from online newspaper subscriptions to customer surveys. However, there are potential costs and security risks for consumers who share their personal information. The research team asked for a variety of personal information from 27 study participants, including their height, weight, phone number, and views on immigration, abortion, and politics. Then the participants ordered the questions from least to most intrusive and were asked how much of their personal information they would "sell" to be made available on a purpose-built website for two weeks. They were again asked how much information they would sell for even more money. Their information would appear for another two weeks. In a second, larger online study, 132 individuals were asked how much information they would sell at two different times, in addition to various personality questions. The first study showed that asking for actual personal information boosted information disclosed when it was requested again. This impact was mirrored in the second study, which found no change in people's related privacy concerns. People alter their behavior but not their opinions. This indicates that simple repetition can cause people to overshare. This article continues to discuss the new study on people over-disclosing their personal information due to repetition.

    The University of East Anglia reports "How Repeated Questions Could Put You at Risk of Cybercrime"

  • news

    Visible to the public "iOS Security Update Patches Exploited Vulnerability in Older iPhones"

    Apple recently announced fresh security updates for macOS and iOS, including patches that address an exploited vulnerability in older iPhone models. The issue tracked as CVE-2023-23529 was initially addressed as a zero-day in mid-February, with the release of iOS and iPadOS 16.3.1 and macOS Ventura 13.2.1. Apple credited an anonymous researcher for reporting the bug. Impacting WebKit, the flaw can lead to arbitrary code execution during the processing of maliciously crafted web content and was addressed with improved checks. According to Apple, they are aware of a report that this issue may have been actively exploited. Patches for this vulnerability are included in iOS 15.7.4 and iPadOS 15.7.4, which are now rolling out to all iPhone 6s and iPhone 7 models, first-generation iPhone SE, iPad Air 2, fourth-gen iPad mini, and seventh-gen iPod touch. Apple noted that the security update contains fixes for a total of 16 vulnerabilities that could lead to information leaks, memory write, arbitrary code execution, VPN server spoofing, and to the use of sensitive user data to perform certain actions. This week, Apple also released security updates for the latest-generation iPhone and iPad models to address a total of 33 vulnerabilities. Rolling out as iOS 16.4 and iPadOS 16.4, the platform updates also bring several user-experience enhancements. Nearly 60 vulnerabilities were addressed with the release of macOS Ventura 13.3 this week. macOS Monterey 12.6.4 and Big Sur 11.7.5 were released with patches for over 25 vulnerabilities each. Apple also patched two vulnerabilities with the release of Safari 16.4, which is now available for macOS Big Sur and macOS Monterey users. Security updates are also available for tvOS and watchOS, as well as for Studio Display firmware for macOS Ventura.

    SecurityWeek reports: "iOS Security Update Patches Exploited Vulnerability in Older iPhones"

  • news

    Visible to the public "Four Years Behind Bars for Prolific BEC Scammer"

    A Nigerian man has recently been handed a four-year jail sentence for his role in a multinational criminal gang that scammed countless individuals and businesses over several years. Solomon Ekunke Okpe, 31, of Lagos, worked with others on business email compromise (BEC), work-from-home, check-cashing, romance, and credit card scams designed to cause losses in excess of $1m. After being arrested in Malaysia and extradited to Arizona after a two-year legal battle, Okpe pleaded guilty in December 2022 to conspiracy to commit wire, bank, and mail fraud. According to the FBI, the BEC schemes typically started with a phishing attack to hijack user inboxes. The gang would then email companies doing business with the victim, requesting payments to new bank accounts under its control. The work-from-home scams required the group to pose as online employers on job websites, using fictitious monikers. They would then hire individuals for legitimate-seeming jobs, which were actually a front for more fraudulent activity, including the creation of bank and payment accounts, transferring or withdrawing money from accounts, and cashing or depositing counterfeit checks. The FBI stated that Okpe and his co-conspirators also carried out romance scams by creating fake accounts on dating websites, engaging romantically with their victims, then tricking them into either transferring their funds overseas and/or receiving money from wire-transfer scams. Okpe stole tens of thousands of dollars from some victims, according to the Department of Justice (DoJ). One co-conspirator, Johnson Uke Obogo, was extradited from the UK and sentenced on March 20 to one year and one day in prison for his role in the fraud operation. The fraud schemes ran from December 2011 to January 2017.

    Infosecurity reports: "Four Years Behind Bars for Prolific BEC Scammer"

  • news

    Visible to the public "Toyota Scrambles to Patch Customer Data Leak"

    Toyota Italy leaked sensitive information for over one-and-a-half years, until March of this year. It revealed secrets for its Salesforce Marketing Cloud and Mapbox Application Programming Interfaces (APIs). On February 14, the Cybernews research team found an environment file (.env) hosted on the official Toyota Italy website. By abusing the exposed data, threat actors could access phone numbers, email addresses, customer tracking information, push notification contents, and more. These credentials could further be misused to send fraudulent SMS messages and emails, change and launch marketing campaigns, develop automation scripts, edit information associated with the Salesforce Marketing Cloud, and even send push alerts to Toyota's customers. This article continues to discuss the Toyota customer data leak, the potential impact this leak could have on the company's customers, and Toyota's response to the leak.

    Cybernews reports "Toyota Scrambles to Patch Customer Data Leak"

  • news

    Visible to the public "Exchange Online to Block Emails from Vulnerable On-Prem Servers"

    Microsoft is implementing a new security feature for Exchange Online that will automatically start throttling and eventually block all emails sent from "persistently vulnerable Exchange servers" 90 days after the admins are pinged to secure them. These are Exchange servers in on-premises or hybrid environments running end-of-life software or that have not been patched against known security vulnerabilities. According to the Exchange Team, any Exchange server that has reached end-of-life, such as Exchange 2007, Exchange 2010, and soon Exchange 2013, is unpatched for known vulnerabilities. For example, Exchange 2016 and Exchange 2019 servers that are behind on security updates are regarded as continuously vulnerable. Microsoft says this new Exchange Online "transport-based enforcement system" has three primary functions: reporting, throttling, and blocking. The new system's primary goal is to help Exchange admins identify unpatched or unsupported on-premises Exchange servers, so they can update or patch them before they evolve into security risks. However, it will also be capable of throttling and eventually blocking emails from Exchange servers that have not been fixed prior to reaching Exchange Online mailboxes. This new enforcement system will only impact servers running Exchange Server 2007 using OnPremises connectors to send mail in order to enable fine-tuning before expanding to all Exchange versions. This article continues to discuss the new Exchange Online security feature.

    Bleeping Computer reports "Exchange Online to Block Emails from Vulnerable On-Prem Servers"

  • news

    Visible to the public "Biden Administration Limits Commercial Spyware Use in Federal Government"

    President Joe Biden has signed an executive order prohibiting federal agencies from using commercial spyware that poses a security risk to the US or has already been abused by foreign actors. The executive order, which has been in the works for months, aims to address a growing number of incidents of spyware abuse abroad and reports of it being used inappropriately to target US officials, government systems, and citizens. The directive is the first in a series of actions the White House has taken to deal with the proliferation of virtual spyware. The spyware industry has grown as more companies develop ways to secretly infiltrate people's devices and sell those tools to governments globally. This article continues to discuss the Biden administration's limitation of commercial spyware use in the federal government.

    The Record reports "Biden Administration Limits Commercial Spyware Use in Federal Government"

  • news

    Visible to the public "Balancing Security Risks and Innovation Potential of Shadow IT Teams"

    Shadow Information Technology (IT) teams, also known as rogue IT teams, have become more prevalent in recent years because of the rise of cloud-based apps and remote work. This has led to operational stress and security risks within many companies. According to Capterra, 58 percent of small and midsize businesses (SMBs) have experienced high-impact shadow IT efforts. Half of SMBs believe shadow IT teams are most typically formed because employees lack understanding about the process for purchasing new technology. This is closely followed by the view that the IT department is excessively slow or cumbersome, cited by 41 percent of SMBs, and the creation of an incubator team without the IT department's awareness, cited by 37 percent of SMBs. Shadow IT initiatives lead to risks and consequences for businesses. For example, 89 percent of SMBs note unfavorable financial effects from past shadow IT efforts at their organization, such as paying fines and replacing the developed software. In addition, 76 percent of SMBs say the shadow IT effort poses a moderate to severe threat to the cybersecurity of their organization. This article continues to discuss key findings shared by Capterra regarding shadow IT efforts.

    Help Net Security reports "Balancing Security Risks and Innovation Potential of Shadow IT Teams"

  • news

    Visible to the public "Twitter's Source Code Leak on GitHub a Potential Cyber Nightmare"

    Based on a DMCA Takedown request filed on March 24, some of Twitter's proprietary source code had been publicly accessible on GitHub for nearly three months. On March 24, GitHub honored a Twitter employee's request to remove "proprietary source code for Twitter's platform and internal tools." The code had been published in a repository named "PublicSpace," by an individual with the username "FreeSpeechEnthusiast." The leaked code was in four folders. Although inaccessible as of March 24, some folder names such as "auth" and "aws-dal-reg-svc" seem to give insight into what they contained. According to Ars Technica, FreeSpeechEnthusiast joined GitHub on January 3 and committed the leaked code on the same day, meaning that the code was accessible to the public in its entirety for nearly three months. For Twitter and other companies, source code leaks can be a more significant problem for cybersecurity than copyright infringement. This article continues to discuss the leak of Twitter's source code, how enterprise code leaks happen, and why such leaks are a major problem for cybersecurity.

    Dark Reading reports "Twitter's Source Code Leak on GitHub a Potential Cyber Nightmare"

  • news

    Visible to the public "Stealthy DBatLoader Malware Loader Spreading Remcos RAT and Formbook in Europe"

    A new phishing campaign is targeting European entities to distribute Remcos RAT and Formbook using DBatLoader, a malware loader. According to Zscaler researchers, the malware payload is delivered through WordPress websites with authorized SSL certificates, which is a common tactic used by threat actors to circumvent detection engines. The findings expand upon a report published by SentinelOne last month that highlighted phishing emails with malicious attachments masquerading as financial documents in order to initiate the infection chain. Some of the file formats used to deliver the DBatLoader payload involve the use of obfuscated HTML files with many layers and OneNote attachments. As a result of Microsoft's decision to block macros by default in files downloaded from the Internet, there has been a rise in the use of OneNote files as an initial vector for spreading malware. DBatLoader, also known as ModiLoader and NatsoLoader, is a Delphi-based malware capable of distributing follow-on payloads through cloud services such as Google Drive and Microsoft OneDrive, and adopting image steganography to bypass detection engines. This article continues to discuss the DBatLoader malware loader being used to distribute Remcos RAT and Formbook.

    THN reports "Stealthy DBatLoader Malware Loader Spreading Remcos RAT and Formbook in Europe"

  • news

    Visible to the public "Diffusion Models Can Be Contaminated with Backdoors, Study Finds"

    In the past year, interest has increased in generative Artificial Intelligence (AI) - deep learning models that can generate text, images, and other forms of content. However, like with every technological breakthrough, generative AI poses new security threats. Researchers from IBM, Taiwan's National Tsing Hua University, and the Chinese University of Hong Kong have demonstrated in a new study that malicious actors can implant backdoors in diffusion models with minimum resources. Diffusion is the Machine Learning (ML) architecture used by DALL-E 2 and open-source text-to-image models such as Stable Diffusion. The attack, dubbed BadDiffusion, illustrates the broader security problems of generative AI, which is progressively being integrated into various applications. In a BadDiffusion attack, an adversary modifies the training data and diffusion processes to make the model sensitive to a hidden trigger. When the trained model is presented with the trigger pattern, it generates the desired output intended by the attacker. For example, an attacker can use the backdoor to evade any content restrictions that developers may have implemented for diffusion models. This article continues to discuss the BadDiffusion attack and the researchers' exploration of various methods to detect and remove backdoors from diffusion models.

    VB reports "Diffusion Models Can Be Contaminated with Backdoors, Study Finds"

  • news

    Visible to the public "CyLab Researchers Earn NSF CAREER Awards"

    Three researchers at CyLab, Carnegie Mellon University's security and privacy institute, recently received National Science Foundation (NSF) Faculty Early Career Development Program (CAREER) awards. Wenting Zheng, an assistant professor in the Computer Science Department (CSD), will develop a framework for automating Multiparty Computation (MPC), a cryptographic technique that enables organizations to perform complex computations on joint data sets without disclosing sensitive inputs to other parties. Dimitrios Skarlatos, an assistant professor in the CSD, will design and develop a scalable, heterogeneous, and secure virtual memory abstraction for today's data center computing. Assistant professor at the Human-Computer Interaction Institute (HCII) Sauvik Das will create and evaluate adversarial Machine Learning (ML) anti-surveillance methods against automated online identity recognition. This article continues to discuss the work of the three CyLab researchers supported through NSF CAREER awards.

    CyLab reports "CyLab Researchers Earn NSF CAREER Awards"

  • news

    Visible to the public "Indian Police Charge Gang With Stealing 168M Citizens' Data"

    Six members of an alleged criminal gang that sold the personal information of 168 million Indian individuals, including defense personnel and government employees, were apprehended by the Indian police. The criminal gang operated under three front companies: Data Mart Infotech, Global Data Arts, and MS Digital Grow. The Cyberabad Metropolitan Police stated that the criminals engaged with buyers on business listing websites such as Justdial. Stephen Raveendra, the Cyberabad Metropolitan Police Commissioner, told reporters that the gang stole from government and private entities, including the armed services. The stolen data contained names, email addresses, phone numbers, home addresses, and other information compiled from previous data breaches. They sold information in over 140 different categories. The criminal group stole the personal information of 11 million clients of large banks, such as the State Bank of India, ICICI Bank, Bank of Baroda, and Axis Bank. Police revealed that the suspects also stole the personal information of 34,000 Delhi state government employees and 250,000 armed forces members. This article continues to discuss the Indian police charging six members of an alleged criminal gang that sold personal data belonging to 168 million Indian citizens and the potential impact of this data exposure.

    DataBreachToday reports "Indian Police Charge Gang With Stealing 168M Citizens' Data"

  • news

    Visible to the public "UK Crime Fighters Wrangle 'Several Thousand' Potential Cyber Criminals in DDoS-For-Hire Honeypot"

    After falling for a UK law enforcement honeypot operation, thousands of suspected cybercriminals have revealed their identities. The National Crime Agency (NCA) of the UK created a fake Distributed Denial-of-Service (DDoS)-for-hire website that prompted a large number of people to enter information that will be used to investigate them. Throughout the operation, multiple fake websites claiming to offer cybercriminal services were developed. The operation was part of a global effort by law enforcement to crack down on cybercriminals launching DDoS attacks against online businesses and users. During the operation, the NCA reported that "several thousand" individuals visited the websites and provided personal information in order to gain access to criminal services. Investigators disclosed that prospective consumers' information had been compiled and would be used to target cybercriminals. According to an NCA statement, all the NCA-operated websites have been designed to appear as if they provide the tools and services that enable cybercriminals to conduct these attacks. DDoS-for-hire services, also known as booter services, allow users to set up accounts and coordinate DDoS attacks in a matter of minutes. In the past, these attacks have shown to be very effective against companies, critical national infrastructure, and public services. This article continues to discuss the recent crackdown on DDoS-for-hire services.

    ITPro reports "UK Crime Fighters Wrangle 'Several Thousand' Potential Cyber Criminals in DDoS-For-Hire Honeypot"

  • news

    Visible to the public "Three Variants of IcedID Malware Discovered"

    Security researchers at Proofpoint have discovered three new variants of the banking Trojan known as IcedID in the wild, featuring a common code base but with several key differences. The first variant is the most commonly observed in the wild and was first discovered in 2017. This standard variant contains an initial loader that contacts a Loader command and control (C2) server and downloads a DLL Loader, which then delivers the IcedID bot. The researchers noted that the IcedID Lite variant was discovered by them in November 2022 as part of an Emotet campaign by TA542. It contains a static URL to download a "Bot Pack" file with a static name which results in the IcedID Lite DLL Loader, and then delivers the Forked version of IcedID Bot, leaving out the web injects and back connect functionality that would typically be used for banking fraud. The researchers stated that the third variant observed by the team was discovered in a series of seven campaigns in February 2023. This variant was distributed by TA581 and one unattributed threat activity cluster, which acted as initial access facilitators. The researchers noted that the campaigns used a variety of email attachments, such as Microsoft OneNote attachments, and somewhat rare to see .URL attachments, which led to the Forked variant of IcedID. According to the security researchers, the IcedID Forked Loader observed in February 2023 is more similar to the Standard IcedID Loader as it contacts a Loader C2 server to fetch both the DLL loader and the bot. That DLL loader has similar artifacts to the Lite Loader and also loads the Forked IcedID Bot. According to Proofpoint, the new variants hint that considerable effort is going into the future of IcedID and its codebase.

    Infosecurity reports: "Three Variants of IcedID Malware Discovered"

  • news

    Visible to the public "Cyberattacks on the High Seas? Norwegian Sailors, Researchers Sound a Warning"

    Researchers with a seafaring background at the Norwegian University of Science and Technology (NTNU) warn that cyberattacks on ships could have severe real-world consequences. Erlend Erstad, a Ph.D. candidate at NTNU, did not know of any reported safety accidents at this time. However, he cautioned that "unexplainable" incidents have occurred that have not yet been traced to a cyberattack or technical flaw. Erstad noted that there are unreported incidents in the industry because ship owners and charterers have not had proper reporting mechanisms until recently. According to Erstad, sailors have handled cyber issues similarly to other technical issues. At the turn of the century, cyberattacks on industrial systems, including nuclear enrichment facilities in Iran and several sections of the Ukrainian power grid, have demonstrated that digital interference can have a direct physical impact. Currently, there have been no publicly recognized hacks that have had a comparable impact on a ship, but cyberattacks on other shipping-related systems are well-known in the industry and marine academia. The researchers warn that this lack of public awareness does not mean that the risks do not exist. They want to raise awareness of these risks among seafarers and equip them with how to respond to such an attack. As Erstad explained, doing so raises the bar for attackers enough that these publicly available vulnerabilities do not harm shipping. This article continues to discuss cyberattacks on ships and what must be done to prevent such attacks.

    The Record reports "Cyberattacks on the High Seas? Norwegian Sailors, Researchers Sound a Warning"

  • news

    Visible to the public "Protecting AI Models from 'Data Poisoning'"

    Training data sets for deep-learning models include billions of Internet-crawled data samples. Inherent in the arrangement is trust, which looks to be increasingly threatened by a type of cyberattack known as "data poisoning." In this attack, data gathered for deep-learning training is poisoned with malicious information. A team of computer scientists from ETH Zurich, Google, Nvidia, and Robust Intelligence has demonstrated two model data poisoning attacks. So far, they have discovered no evidence that these attacks have been carried out. However, they do recommend certain protections that could make it more difficult to manipulate data sets. According to the authors, these attacks are simple and applicable today, requiring minimal technical knowledge. For only $60, they could have poisoned 0.01 percent of the LAION-400M or COYO-700M data sets. One of the paper's coauthors, Florian Tramer, an assistant professor at ETH Zurich, explains that such poisoning attacks would enable malicious actors to manipulate data sets to, for example, exacerbate racist, sexist, or other biases, or embed a backdoor in the model to control its behavior after training. The large Machine Learning (ML) models being trained today, such as ChatGPT, Stable Diffusion, and Midjourney, require so much data to train that the current method of obtaining data for these models only consists of scraping a large portion of the Internet, according to Tramer. This makes maintaining any level of quality control extremely difficult. This article continues to discuss the team's demonstration of two possible poisoning attacks on 10 popular data sets, including LAION, FaceScrub, and COYO.

    IEEE Spectrum reports "Protecting AI Models from 'Data Poisoning'"

  • news

    Visible to the public "Grim Criminal Abuse of ChatGPT is Coming, Europol Warns"

    Europol recently warned that criminals are set to take advantage of artificial intelligence like ChatGPT to commit fraud and other cybercrimes. Created by US startup OpenAI, ChatGPT appeared in November and was quickly seized upon by users amazed at its ability to answer difficult questions clearly, write sonnets or code, and even pass exams. Europol noted that the potential exploitation of these types of AI systems by criminals provides a grim outlook. Europol's new "Innovation Lab" looked at the use of chatbots as a whole but focused on ChatGPT during a series of workshops as it is the highest-profile and most widely used. Europol found that criminals could use ChatGPT to "speed up the research process significantly" in areas they know nothing about. This could include drafting text to commit fraud or give information on "how to break into a home, to terrorism, cybercrime, and child sex abuse." The chatbot's ability to impersonate speech styles made it particularly effective for phishing, in which users are tempted to click on fake email links that then try to steal their data. Europol noted that ChatGPT's ability to quickly produce authentic-sounding text makes it "ideal for propaganda and disinformation purposes, as it allows users to generate and spread messages reflecting a specific narrative with relatively little effort." ChatGPT can also be used to write computer code, especially for non-technically minded criminals. An early study by US-Israeli cyber threat intel company Check Point Research (CPR) showed how the chatbot can be used to infiltrate online systems by creating phishing emails. Europol noted that while ChatGPT had safeguards, including content moderation, which will not answer questions that have been classified as harmful or biased, these could be circumvented with clever prompts.

    SecurityWeek reports: "Grim Criminal Abuse of ChatGPT is Coming, Europol Warns"