News Items

  • news

    Visible to the public "Lionsgate Streaming Platform with 37M Subscribers Leaks User Data"

    According to research conducted by Cybernews, the entertainment industry giant Lionsgate leaked users' IP addresses and details about the content they have viewed on its movie-streaming platform. Researchers discovered that the movie-streaming platform Lionsgate Play had exposed user data via an open ElasticSearch instance. They found 20GB of unsecured server logs containing nearly 30 million entries, the oldest of which was from May 2022. The logs exposed subscribers' IP addresses together with information on their devices, operating system, and web browser. Logs also revealed the platform's usage data, which is commonly used for analytics and performance tracking. URLs found in logs contained the titles and IDs of the content that users watched, as well as their search queries. Researchers also discovered unidentified hashes with logged HTTP GET requests, records of client requests usually used to get data from a web server. Malicious actors can use the combination of IP addresses and device information to launch targeted attacks on users and deliver malicious payloads to their devices. This article continues to discuss the leak of user data by the video-streaming platform Lionsgate Play.

    Cybernews reports "Lionsgate Streaming Platform with 37M Subscribers Leaks User Data"

  • news

    Visible to the public "Google Flags Apps Made by Popular Chinese E-Commerce Giant as Malware"

    Google has identified multiple apps developed by a Chinese e-commerce giant as malware, informing users who have installed them and suspending the company's official app. Several Chinese security researchers have recently accused Pinduoduo, a rising e-commerce powerhouse with around 800 million active users, of creating Android apps containing malware designed to monitor users. Google has effectively configured Google Play Protect, its Android security mechanism, to prevent users from installing these malicious apps. Google is also warning those who have already installed the apps, urging them to uninstall them. According to an anonymous security researcher, their analysis also revealed that the apps exploited multiple zero-day flaws to hack users. This article continues to discuss Google flagging several apps made by the Chinese e-commerce giant Pinduoduo.

    TechCrunch reports "Google Flags Apps Made by Popular Chinese E-Commerce Giant as Malware"

  • news

    Visible to the public "Associates in Dermatology Responds to Data Breach"

    Associates in Dermatology (AID), a healthcare provider with offices in New Albany and Clarksville, is notifying community members of a data breach issue. Recently the provider announced in a news release that Virtual Private Network (VPN) Solutions faced a ransomware issue that could potentially affect patients of the dermatology clinic. The company provides electronic health record management software for the provider. The data breach occurred around October 31, 2021, leading to a forensic investigation. The investigation concluded in January of this year. VPN "identified files pertaining to AID that potentially contained sensitive information." The company said that on March 10, 2023, AID determined that the compromised files may have also contained personally identifiable information. AID is working to identify all the specific individuals and the type of data that was impacted by VPN's breach in order to provide sufficient notice. AID has no reason to believe that any individual's information has been misused as a result of this event. AID said that compromised data may include patients' names, addresses, Social Security numbers, dates of birth, medical conditions, treatments, diagnoses, test results, health insurance policy numbers, subscriber identification numbers, and health plan beneficiary numbers. The data that VPN identified as compromised varied with each individual.

    Yahoo News reports: "Associates in Dermatology Responds to Data Breach"

  • news

    Visible to the public "Google Pixel Vulnerability Allows Recovery of Cropped Screenshots"

    Reverse engineers Simon Aarons and David Buchanan have discovered a vulnerability lurking in Google's Pixel phones for five years that allows for the recovery of an original, unedited screenshot from the cropped version of the image. Referred to as aCropalypse and tracked as CVE-2023-21036, the issue resides in Markup, the image-editing application on Pixel devices. Markup fails to properly truncate edited images, making the cropped data recoverable. The reverse engineers stated that the bug has existed since 2018 and that it was the result of a code change that Markup did not adhere to. Specifically, when switching from Android 9 to Android 10, the parseMode() function was modified to overwrite a file with a truncated one if the argument "wt" was passed to it. Previously, the argument "w" was needed for the same operation. The engineers noted that because Markup's behavior was not changed and it continued to use the argument "w," while it did crop the image, it did not tell the OS to overwrite the original with the smaller version, resulting in the truncated data being left at the end of the file instead. The engineers explained that the end result is that the image file is opened without the O_TRUNC flag so that when the cropped image is written, the original image is not truncated. If the new image file is smaller, the end of the original is left behind. The researchers also point out that the change from "w" to "wt" was only documented in 2021, when a bug report was submitted. Google addressed the vulnerability with the March 2023 security update for Pixel devices, which patches more than 120 bugs, aside from the issues resolved with the March 2023 Android update.

    SecurityWeek reports: "Google Pixel Vulnerability Allows Recovery of Cropped Screenshots"

  • news

    Visible to the public "Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant"

    Security researchers at Mandiant have analyzed the zero-day vulnerabilities disclosed in 2022 and found that over a dozen of them were used in attacks believed to have been carried out by cyberespionage groups. The researchers noted that the cybersecurity community cannot reach an agreement on the definition of a zero-day vulnerability. Some define as zero-day as any vulnerability whose details are made public before a patch is released, while others only assign a zero-day classification to flaws that were actually exploited in attacks before a fix was made available. The researchers stated that only vulnerabilities that were exploited in the wild before a patch was released were included in their zero-day analysis. According to the researchers, 55 zero-day vulnerabilities came to light last year. While this is a significant drop from the 81 discovered in 2021, it's still more than in any other previous year. The researchers noted that many of the zero-days found last year were not publicly attributed to a known threat actor. Of the ones that were attributed, 13 were linked to cyberespionage groups, including seven believed to have been exploited by Chinese state-sponsored groups. Chinese hackers targeted vulnerabilities such as CVE-2022-30190 (the Windows flaw known as Follina), CVE-2022-42475, and CVE-2022-41328 (Fortinet product vulnerabilities). The researchers stated that two of the zero-days attributed to state-sponsored threat actors were linked to North Korea, and two were tied to Russia. Three vulnerabilities were exploited by commercial spyware vendors such as Candiru and Variston. One flaw was seen being exploited by both China and Russia and spyware vendors as well. The researchers stated that four of the zero-days spotted in 2022 were likely exploited by financially motivated threat actors, including CVE-2022-29499 (by Lorenz ransomware), and CVE-2022-41091 and CVE-2022-44698 (by Magniber ransomware). Of the 55 zero-days that emerged in 2022, 18 impacted Microsoft products, 10 impacted Google products, and 9 were found in Apple products. Other affected vendors included Fortinet, Mozilla, Sophos, Trend Micro, Zimbra, Adobe, Atlassian, Cisco, Mitel, SolarWinds, Zoho, QNAP, and Citrix. As for product types, 19 flaws impacted desktop operating systems, followed by browsers (11), security, IT, and network management products (10), and mobile operating systems (6).

    SecurityWeek reports: "Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant"

  • news

    Visible to the public "Detecting Manipulations in Microchips"

    In addition to manipulating software, attackers can also tamper with hardware. Therefore, a team from Ruhr University Bochum (RUB), Germany, and the Max Planck Institute for Security and Privacy (MPI-SP) is developing techniques to detect such tampering. They are exploring detection methods for hardware Trojans. Electronic chips are embedded in many objects, and they are often designed by companies that do not operate their own production facilities. Instead, the construction plans are sent to highly specialized chip factories to be made. The designs of the chips may be modified in the factories just before production, compromising their security. In extreme instances, such hardware Trojans could enable an attacker to instantly disable parts of the telecommunications infrastructure at the touch of a button. Using an algorithm, the researchers compared construction plans for chips to electron microscope images of actual chips and looked for differences. There were deviations in 37 out of 40 cases. The researchers made all images of the chips available online for free, together with the design data and the analysis algorithms, so that other research teams could use the data to conduct more studies. This article continues to discuss the study on hardware Trojan detection.

    Ruhr University Bochum reports "Detecting Manipulations in Microchips"

  • news

    Visible to the public "What Do CEOs Really Think about Cyber Risk? First-Of-Its-Kind Study Reveals All"

    Through 37 in-depth interviews with global CEOs, a team of researchers from the University of Oxford and ISTARI revealed the emotions and challenges associated with effectively managing cyber risk. They have shared the findings of their joint CEO Report on Cyber Resilience, which applies a top-management perspective to cybersecurity risks and emphasizes CEOs' critical role in establishing cyber resilience. It presents insights from one-hour face-to-face interviews with American, Asian, and European CEOs whose companies' average annual revenue is $12 billion, with an average of 40,000 employees. Nine CEOs had led their organization through a severe cyberattack. Under anonymity, the CEOs discussed their feelings, frustrations, and regrets regarding cyber threats and security. The CEOs admitted that they are formally accountable for cybersecurity to regulators, shareholders, and their boards. However, most (72 percent) reported being uncomfortable about making cybersecurity-related decisions, often prompting them to delegate responsibility for and understanding of cybersecurity to their technology teams, which can compromise resilience. All interviewed CEOs stated that they feel accountable for cybersecurity, but a parallel ISTARI survey of CISOs revealed that two European (50 percent) and nearly a third of US (30 percent) CISOs did not believe that their CEOs feel accountable. According to the research, this perception gap is partially due to the notion of accountability. CEOs should view themselves as co-responsible with their CISO for cyber resilience, rather than as solely responsible. This article continues to discuss findings from interviews with global CEOs regarding what they think about cyber risk as well as the mindsets CEOs need to lead cyber-resilient businesses.

    The University of Oxford reports "What Do CEOs Really Think about Cyber Risk? First-Of-Its-Kind Study Reveals All"

  • news

    Visible to the public "NCSC Launches Two New Tools for Small Businesses"

    The UK's leading cybersecurity agency has recently launched two new services designed to help small businesses to enhance their cyber risk management more effectively. The National Cyber Security Agency (NCSC) announced a Cyber Action Plan, a questionnaire for small organizations and individuals/families, which delivers a free personalized security to-do list depending on the answers it receives. The GCHQ-run agency's second new service is Check Your Cyber Security. Accessible via the action plan, it can be used by non-technical employees to find and fix a small range of security issues in their organization. The NCSC noted that a handful of simple online checks are run to identify common vulnerabilities in public-facing IT systems, including web browsers, IP addresses, websites, and email inboxes. The idea is for the NCSC to help less well-resourced organizations get the security basics right to deter opportunistic cybercriminals. The new services are certainly needed. According to a government report last year, nearly two-fifths (38%) of small businesses in the UK suffered a "cyber incident" over the previous 12 months.

    Infosecurity reports: "NCSC Launches Two New Tools for Small Businesses"

  • news

    Visible to the public "Hackers Target .NET Developers with Malicious NuGet Packages"

    Threat actors are delivering cryptocurrency stealers to .NET developers via the NuGet repository and impersonating multiple legitimate packages through typosquatting. According to JFrog security researchers Natan Nehorai and Brian Moussalli, who identified this ongoing campaign, three of the malicious NuGet packages have been downloaded more than 150,000 times in a month. It is possible that a large number of .NET developers had their systems compromised, but the massive number of downloads could indicate that the attackers were attempting to legitimize their malicious NuGet packages. When creating their NuGet repository profiles, the threat actors used typosquatting to mimic Microsoft software developers working on the NuGet .NET package manager. The malware installed on compromised systems can be used to steal cryptocurrency by exfiltrating the victims' cryptocurrency wallets using Discord webhooks, extracting and executing malicious code from Electron archives, and auto-updating by querying the command-and-control (C2) server under the control of the attacker. This article continues to discuss threat actors targeting and infecting .NET developers with cryptocurrency stealers through the NuGet repository and impersonating legitimate packages via typosquatting.

    Bleeping Computer reports "Hackers Target .NET Developers with Malicious NuGet Packages"

  • news

    Visible to the public "Ferrari Data Breach: Client Data Exposed"

    The Italian luxury sports car maker Ferrari has experienced a data breach and stated that a threat actor recently contacted it with a ransom demand about some client contact information, but it will not pay the ransom. Although there is a ransom demand, ransomware deployment on the company's systems is not mentioned. The client message addressed to possibly affected clients and signed by Ferrari CEO Benedetto Vigna claims that the breach has had no effect on the company's operational functions. Unidentified attackers have gained access to a limited number of systems within the company's Information Technology (IT) environment, and certain client information, including names, addresses, email addresses, and telephone numbers, has been compromised, according to Vigna. This article continues to discuss the Ferrari data breach.

    Help Net Security reports "Ferrari Data Breach: Client Data Exposed"

  • news

    Visible to the public "New ShellBot DDoS Malware Variants Targeting Poorly Managed Linux Servers"

    As part of a new campaign, poorly managed Linux SSH servers are being targeted with several forms of malware called ShellBot. AhnLab Security Emergency Response Center (ASEC) explained that ShellBot, also known as PerlBot, is a Distributed Denial-of-Service (DDoS) bot malware written in Perl that uses the Internet Relay Chat (IRC) protocol to connect with the command-and-control (C2) server. ShellBot is installed on servers with weak passwords after threat actors use scanner malware to detect systems with SSH port 22 open. Using a list of known SSH credentials, a dictionary attack is initiated to breach the server and install the payload, after which the IRC protocol is used to communicate with a remote server. This includes the ability to receive commands that enable ShellBot to execute DDoS attacks and exfiltrate gathered data. ASEC reported identifying three different ShellBot variants. This article continues to discuss the new ShellBot DDoS malware variants targeting Linux SSH servers.

    THN reports "New ShellBot DDoS Malware Variants Targeting Poorly Managed Linux Servers"

  • news

    Visible to the public "Mirai Hackers Use Golang to Create a Bigger, Badder DDoS Botnet"

    Former Mirai hackers have launched a new botnet, HinataBot, which can wreak significantly more damage but requires far fewer resources to operate. Mirai is one of the most notorious botnets in the world. It has been around since the mid-2010s, using Internet of Things (IoT) devices such as routers and cameras to carry out Distributed Denial-of-Service (DDoS) attacks by bombarding targets with large volumes of traffic. Some of its most significant attacks were against the French technology company OVH, the government of Liberia, and DNS provider Dyn, an attack that affected numerous websites, including Twitter, Reddit, GitHub, and CNN. According to a report published on March 16 by Akamai researchers, HinataBot has only been in development since mid-January. However, initial tests indicate that it is orders of magnitude more powerful than its predecessor, exceeding 3 Tbit/s traffic flows despite this. This article continues to discuss researchers' findings regarding HinataBot and why hackers are choosing Golang.

    Dark Reading reports "Mirai Hackers Use Golang to Create a Bigger, Badder DDoS Botnet"

  • news

    Visible to the public "GPS Is Critical to Modern Life. It's Also Vulnerable, and This Researcher Is Out to Fix That."

    The Global Positioning System (GPS) is inexpensive and easy to use because a device only needs to receive and interpret signals, not transmit, respond, or authenticate them. However, what makes GPS valuable also makes it so vulnerable, says Aanjhan Ranganathan, a professor at the Khoury College of Computer Sciences. Ranganathan received the National Science Foundation (NSF) Career Award for his research on GPS. Ranganathan explained that GPS is especially vulnerable to attacks due to its reliance on unsecured signals transmitted from satellites 20,000 kilometers above. By the time the signals reach the ground, they are already weak. $20 worth of equipment can render GPS devices incapable of receiving any signal. Alternatively, $100 worth of equipment can transmit signals that appear to originate from GPS satellites. This is known as "spoofing," in which a malicious actor fakes the source of a signal. Ranganathan tricked a drone into thinking it was somewhere it was not by spoofing the signals it was receiving. As he manipulated the GPS inputs, the drone drifted laterally to keep "standing still." The controller displayed no movement since the drone believed it was maintaining its position. Ranganathan successfully co-opted the drone without hacking it, bypassing its security protocols. The effects of spoofing are subtle and extensive. A malicious state could interfere with airplanes attempting to land, delaying flights. A cyber terrorist could steal military drones by making them land behind enemy lines. Due to the reliance of current timekeeping on GPS, a determined hacker could cost a bank billions of dollars by manipulating the timing of stock trades. This article continues to discuss the vulnerability of GPS to attacks and Ranganathan's research aimed at addressing this vulnerability.

    Northeastern University reports "GPS Is Critical to Modern Life. It's Also Vulnerable, and This Researcher Is Out to Fix That."

  • news

    Visible to the public "Pro-Russia Hackers Are Increasingly Targeting Hospitals, Researchers Warn"

    Since November 2022, cybersecurity researchers have observed the pro-Russia hacking group known as Killnet launching a growing number of Distributed Denial-of-Service (DDoS) attacks against healthcare organizations. Killnet launched in February 2022 following Russia's invasion of Ukraine and has spent most of the past year executing DDoS attacks against governments and companies worldwide. Although the attacks are primarily a nuisance, rendering websites inaccessible for roughly an hour in most cases, they have prompted much concern within the US government, especially when they target critical infrastructure such as airports and hospitals. In recent months, the Killnet group has prioritized healthcare organizations' websites, starting a campaign targeting hospitals in over 25 states. The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) reported that less than half of these DDoS attacks effectively took the websites offline. Amir Dahan and Syed Pasha of the Microsoft Azure Network Security Team recently presented an analysis of DDoS attacks against healthcare organizations. The analysis revealed that from November 18, 2022, to February 17, 2023, they monitored every attack, noting a rise from 10 to 20 per day in November to 40 to 60 per day in February. This article continues to discuss the pro-Russia hacking group Killnet increasingly targeting hospitals.

    The Record reports "Pro-Russia Hackers Are Increasingly Targeting Hospitals, Researchers Warn"

  • news

    Visible to the public "Play Ransomware Gang Hit Dutch Shipping Firm Royal Dirkzwager"

    The Play ransomware group has targeted Royal Dirkzwager, a Dutch company specializing in optimizing shipping processes and managing maritime and logistic information flows. The ransomware group added the company to its Tor data leak site and announced that it stole personal data, employee IDs, passports, contracts, and other information. The group posted a 5 GB archive as evidence of the attack, threatening to leak the entire dump if the company does not pay the demanded ransom. Royal Dirkzwager CEO Joan Blaas stated that the ransomware attack had no effect on the company's operations but confirmed that the malicious actors stole critical information from the organization's infrastructure. The company informed the Dutch Data Protection Authority and said it is negotiating with the ransomware gang. Since July 2022, the Play ransomware gang has been active, targeting the City of Oakland, the Cloud services company Rackspace, and more. Cybercrime groups consider the shipping industry a lucrative target. In January, around 1,000 vessels were affected by a ransomware attack on DNV, one of the largest maritime software providers. This article continues to discuss the Play ransomware attack against the Dutch maritime logistics company Royal Dirkzwager and the targeting of the shipping industry by cybercriminals.

    Security Affairs reports "Play Ransomware Gang Hit Dutch Shipping Firm Royal Dirkzwager"

  • news

    Visible to the public "NSA Hires Record Number of People with Disabilities, Undertakes Accommodation Initiatives"

    In 2022, the National Security Agency (NSA) made more progress in creating and maintaining a diverse workforce critical to achieving its foreign signals intelligence and cybersecurity missions. In 2022, a record 15.6 percent of new hires self-identified as a person with a disability. Recently, the People with Disabilities Employee Resource Group (PWD ERG) worked with the Cybersecurity Directorate (CSD) to conduct a panel discussion on methods to increase accessibility in order to retain the finest and brightest employees to support the NSA's goal. A representative from the Office of Physical Security stated that in recent years, medical devices have become increasingly intelligent, posing a security challenge that the team is working to solve. They are actively collaborating with medical device users, the PWD ERG, the Research Directorate, and technical subject matter experts from across the NSA to identify and implement new mitigations while providing the greatest possible accommodation for affiliates relying on such devices. This article continues to discuss the NSA hiring a record number of people with disabilities to help fulfill foreign signals intelligence and cybersecurity missions.

    NSA reports "NSA Hires Record Number of People with Disabilities, Undertakes Accommodation Initiatives"

  • news

    Visible to the public "Watch Out: Tax Crooks Are Phishing for Your W-2 Form"

    January through April is tax season in the US, during which businesses and employees fill in W-2 forms for the Internal Revenue Service (IRS). Threat actors try to steal the W-2 forms, which legitimate employees use. According to the IRS' Information Sharing and Analysis Center (ISAC), the number of reports of suspicious activity related to tax refunds quadrupled to eight million in 2022 compared to 2021. Kevin Kirkwood, the deputy CISO at LogRhythm and a cybersecurity expert, emphasizes that malicious actors exploit tax season to launch spear-phishing attacks with a single target in mind: the W-2 form. Kirkwood explains that stealing W-2 forms can be profitable since cybercriminals can use them to file fake tax returns and receive reimbursement for payments they never made. Criminals often impersonate a company's chief executive or other trustworthy employees in these attacks. The article continues to discuss what a tax-season phishing campaign looks like, as well as what businesses and employees should look out for to avoid falling victim to such attacks.

    Cybernews reports "Watch Out: Tax Crooks Are Phishing for Your W-2 Form"

  • news

    Visible to the public "Millions Stolen in Hack at Cryptocurrency ATM Manufacturer General Bytes"

    Cryptocurrency ATM manufacturer General Bytes recently disclosed a security incident that resulted in the theft of millions of dollars worth of funds. The company said that the attackers exploited a vulnerability in the master service interface that Bitcoin ATMs use to upload videos, which allowed them to upload a JavaScript script and execute it with user privileges. The company noted that the attacker scanned the Digital Ocean cloud hosting IP address space and identified running CAS services on ports 7741, including the General Bytes Cloud service and other GB ATM operators running their servers on Digital Ocean. The code execution provided the attackers with access to the database and access to API keys for accessing funds in hot wallets and exchanges. The attackers were then able to transfer funds from hot wallets, steal account usernames and password hashes, and disable two-factor authentication. The company noted that the attackers gained the "ability to access terminal event logs and scan for any instance where customers scanned private key at the ATM," information that was logged by older versions of ATM software. The crypto ATM maker released a CAS security fix and urged customers to consider all user passwords and API keys to exchanges and hot wallets as being compromised and to change them. While General Bytes did not share information on the number of impacted ATM operators and users, transaction logs show that the attackers stole roughly $1.5 million in Bitcoin (around 56 BTC) from roughly 15 operators. Funds were stolen in dozens of other cryptocurrencies as well. The company said that, despite several security audits conducted since 2021, the vulnerability exploited in this attack was not identified prior to the incident.

    SecurityWeek reports: "Millions Stolen in Hack at Cryptocurrency ATM Manufacturer General Bytes"

  • news

    Visible to the public "Scam Robocalls Forecast to Cost $58bn This Year"

    According to security researchers at Juniper Research, the cost of fraudulent robocalls to victims will increase 9% from 2022 to reach $58bn globally this year. The researchers noted that auto-dialing software that delivers pre-recorded messages is widely available and used by both legitimate marketers and scammers. The researchers warned that fraudsters will continue to outwit attempts to mitigate their efforts, driving robocall scam losses to $70bn globally by 2027. The researchers stated that efforts to combat these scams include STIR/SHAKEN, a US industry initiative designed to tackle the caller ID spoofing used by many scammers to hide their true identities. North America is the region most impacted by fraudulent robocalls, set to account for over half of all losses in 2023. The researchers noted that STIR/SHAKEN has done some good, reducing growth in robocall fraud-related losses in North America by an estimated 85% between 2022 and 2023. The researchers are forecasting a decline in losses in the region for the first time by 2025 and urged stakeholders outside North America to adopt their own version of the framework and initiatives to stop call forwarding and other typical fraudulent call tactics. The researchers added that brand authentication technology could play a key role over the coming years in tackling robocall fraud by enabling users to definitively verify the authenticity of a brand on their smartphone screen before picking up.

    Infosecurity reports: "Scam Robocalls Forecast to Cost $58bn This Year"

  • news

    Visible to the public "Is Your Cybersecurity Strategy Falling Victim to These 6 Common Pitfalls?"

    Research conducted by the National Institute of Standards and Technology (NIST) reveals misconceptions that can impact security professionals as well as offers potential solutions. A recent report by NIST computer scientist Julie Haney highlights a pervasive problem in computer security, which is that many security professionals harbor misconceptions about non-technical users of Information Technology (IT) that can increase the risk of cybersecurity breaches. These problems include inefficient communication with such users and insufficient incorporation of user feedback regarding the usability of security systems. According to Haney, cybersecurity specialists are knowledgeable, devoted people who offer a major service in cyber threat defense. However, while having the best of intentions, their community's reliance on technology to solve security problems may prevent them from appropriately considering the human factor, which plays a significant part in achieving effective, usable security. The human element encompasses the individual and social factors influencing security adoption, including perceptions of security tools. A security tool or strategy may be effective in theory, but the risk level can rise if users perceive it as an obstacle and attempt to evade it. Eighty-two percent of breaches in 2021 involved human error, and 53 percent of US government cyber incidents in 2020 resulted from employees violating acceptable usage policies or falling victim to email attacks. Haney's new paper, "Users Are Not Stupid: Six Cyber Security Pitfalls Overturned," aims to help the security and user communities work together in reducing cyber threats. This article continues to discuss the six pitfalls that threaten security professionals, along with potential solutions.

    NIST reports "Is Your Cybersecurity Strategy Falling Victim to These 6 Common Pitfalls?"

  • news

    Visible to the public "New York Man Arrested for Running BreachForums Cybercrime Website"

    A New York man accused of running the popular cybercrime forum BreachForums has recently been arrested and charged. He is believed to be Pompompurin, an individual whose online moniker was mentioned in several high-profile hacking stories in the past years. The suspect is 21-year-old Conor Brian Fitzpatrick of Peekskill, New York. According to court documents filed last week, he was arrested on March 15 on conspiracy to commit access device fraud (i.e., hacking) charges. A testimony from an FBI agent revealed that when he was arrested, Fitzpatrick admitted to using the Pompompurin moniker online and being the owner and administrator of BreachForums. BreachForums, also known as Breached, was launched in 2022, just as the RaidForums cybercrime marketplace was taken down as part of a global law enforcement operation. Pompompurin created BreachForums as an alternative to RaidForums. BreachForums was hosted on the surface web, with much of the information on the site being accessible to anyone. The website is currently inaccessible. Before it went offline, one of the forum's other administrators posted a message saying that he had the access necessary to protect the site's infrastructure and users. He claimed that he had restricted Pompompurin's account to prevent unauthorized administrator actions and that he had been keeping an eye out for any suspicious activity. Many BreachForums users expressed concerns that their information may have been obtained by law enforcement. Before it was taken offline, the forum had over 330,000 members, 47,000 threads, and nearly one million posts. BreachForums was used in the past months to announce several high-profile cyberattacks, including the recent DC Health Link breach, which involved the sensitive personal data of members of the US House and Senate getting compromised.

    SecurityWeek reports: "New York Man Arrested for Running BreachForums Cybercrime Website"

  • news

    Visible to the public "Uncovering the Unheard: Researchers Reveal Inaudible Remote Cyber-Attacks on Voice Assistant Devices"

    Guenevere Chen, an associate professor at the University of Texas at San Antonio, has recently published a paper that demonstrates a novel inaudible voice Trojan attack to exploit vulnerabilities contained by smart device microphones and voice assistants, such as Siri, Google Assistant, Alexa or Amazon's Echo, and Microsoft Cortana. The paper also provides defense mechanisms for users. The Near-Ultrasound Inaudible Trojan (NUIT) was developed to explore how hackers exploit speakers and attack voice assistants remotely and secretly over the Internet. Chen, her doctoral student Qi Xia, and Shouhuai Xu, a computer science professor at UCCS, used NUIT to attack various smart devices, including smartphones and smart home devices. The findings of their demonstrations indicate that NUIT is capable of maliciously controlling the voice interfaces of widely used technology products. Chen highlighted that social engineering is the most common method used by hackers to access devices. Attackers lure targets into installing malicious apps, browsing malicious websites, or listening to malicious audio files. For example, a person's smart device becomes vulnerable when they view a malicious YouTube video containing NUIT audio or video attacks. Signals can secretly attack the microphone on the same device or infiltrate the microphone through speakers from other devices such as laptops, car audio systems, and smart home devices. When hackers gain unauthorized access to a device, they can send inaudible action commands to reduce a device's volume and prevent a voice assistant's response from being heard by the user before launching additional attacks. This article continues to discuss the demonstrated NUIT attack.

    The University of Texas at San Antonio reports "Uncovering the Unheard: Researchers Reveal Inaudible Remote Cyber-Attacks on Voice Assistant Devices"

  • news

    Visible to the public "NBA Notifying Individuals of Data Breach at Mailing Services Provider"

    The National Basketball Association (NBA) recently notified individuals that their personal data was stolen in a data breach at a third-party service provider. The NBA stated that the incident resulted in the theft of names and email addresses, with no other types of personal information impacted. The NBA noted that they had no indication that their systems or any additional information had been affected. The league cautioned the notification email recipients that the stolen information could be used in phishing and social engineering attacks and encouraged them to remain vigilant towards any suspicious correspondence that may appear to come from the NBA or partner entities. The NBA did not name the impacted service provider and has shared no information on the type of cyberattack they suffered or the number of impacted individuals.

    SecurityWeek reports: "NBA Notifying Individuals of Data Breach at Mailing Services Provider"

  • news

    Visible to the public "Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm"

    Sustainable energy giant Hitachi Energy has recently blamed a data breach affecting employees on the exploitation of a recently disclosed zero-day vulnerability in Fortra's GoAnywhere managed file transfer (MFT) software. Hitachi Energy said the Cl0p ransomware gang targeted the GoAnywhere product and may have gained unauthorized access to employee data in some countries. The company noted that upon learning of this event, they took immediate action and initiated their own investigation, disconnected the third-party system, and engaged forensic IT experts to help them analyze the nature and scope of the attack. Employees who may be affected have been informed. The company noted that they have notified applicable data privacy, security, and law enforcement authorities and continue cooperating with the relevant stakeholders. The company stated that it had found no evidence that its network operations and customer data had been compromised. Hitachi Energy has its global headquarters in Switzerland. The company serves organizations in the utility, industrial, and infrastructure sectors across 140 countries and employs roughly 40,000 people. The vulnerability exploited in the attack is CVE-2023-0669, a remote code execution flaw whose existence was disclosed by Fortra on February 1 after attacks exploiting it were detected. A patch was released a week later.

    SecurityWeek reports: "Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm"

  • news

    Visible to the public "Mispadu Banking Trojan Targets Latin America: 90,000+ Credentials Stolen"

    Mispadu, a banking Trojan, has been linked to several spam campaigns aimed at Bolivia, Chile, Mexico, Peru, and Portugal with the goal of stealing credentials and distributing other payloads. The activity, which began in August 2022, is ongoing, according to a report released by Ocelot Team from the Latin American cybersecurity company Metabase Q. Mispadu, also known as URSA, was first described by ESET in November 2019, detailing its capabilities to steal money and credentials and function as a backdoor by taking screenshots and recording keystrokes. Researchers Fernando Garca and Dan Regalado said that one of Mispadu's primary strategies is to compromise legitimate websites, searching for vulnerable versions of WordPress in order to turn them into their command-and-control (C2) server and spread the malware. The threat actors filter out countries they do not wish to infect and drop different types of malware based on the country infected. It is also similar to other banking Trojans that target the region, such as Grandoreiro, Javali, and Lampion. This article continues to discuss researchers' findings regarding the Mispadu banking Trojan.

    THN reports "Mispadu Banking Trojan Targets Latin America: 90,000+ Credentials Stolen"

  • news

    Visible to the public "How to Protect Online Privacy in the Age of Pixel Trackers"

    Tracking pixels, such as the Meta and TikTok pixels, are widely used by online businesses to track the preferences and behaviors of website visitors, but they are not without risk. Although pixel technology has existed for years, privacy regulations such as the California Consumer Privacy Act (CCPA) and General Data Protection Regulation (GDPR) have created new, much tighter requirements, making the practice of data harvesting via a tracking pixel controversial. Tracking pixels on a website makes website owners data controllers responsible for any data breaches they may cause, thus making pixel security a major business priority. A tracking pixel is a small, transparent image or piece of code inserted within an HTML page. The user's web browser downloads the HTML code and shows the website, which contains the tracking pixel, when the user visits the website. The pixel is typically hosted on a separate server from the website, allowing the server to collect information on the user's activity and preferences, generally without their awareness. A tracking pixel is invisible to users, yet it collects behavioral data that marketers can use to enhance retargeting campaigns, deliver more relevant ads, improve website experiences, and more. This article continues to discuss tracking pixels, the risks associated with them, and the consequences of poor pixel security.

    Help Net Security reports "How to Protect Online Privacy in the Age of Pixel Trackers"

  • news

    Visible to the public "Emotet Malware Now Distributed in Microsoft OneNote Files to Evade Defenses"

    The Emotet malware is now being delivered through Microsoft OneNote email attachments in an attempt to circumvent Microsoft's security measures and infect more systems. Emotet is a malware botnet that was previously spread using Microsoft Word and Excel attachments containing malicious macros. The Emotet malware will be installed on the device if the user opens the attachment and enables macros. Once loaded, the malware will steal email addresses and content for future spam attacks. Furthermore, it will download other payloads that enable initial access to the enterprise network. This access is used to launch cyberattacks on the organization, such as ransomware attacks, data theft, cyber espionage, and extortion. As expected, the threat actors have begun spreading the Emotet malware via infected Microsoft OneNote attachments. These attachments are distributed in reply-chain emails that pose as guides, how-tos, invoices, and other documents. This article continues to discuss the distribution of Emotet malware using Microsoft OneNote email attachments.

    Bleeping Computer reports "Emotet Malware Now Distributed in Microsoft OneNote Files to Evade Defenses"

  • news

    Visible to the public "Meta Proposes Revamped Approach to Online Kill Chain Frameworks"

    Meta researchers Ben Nimmo and Eric Hutchins have proposed a new framework approach for addressing online threats, which uses a shared model for identifying, describing, comparing, and disrupting the different phases of an attack chain. Their new "Online Operations Kill Chain" is based on the notion that all online attacks share similar phases. To conduct any online campaign, an attacker would want at least an IP address, an email address, or a cell phone number for authentication, and the ability to hide their assets. Later in the attack chain, the threat actor would require the ability to gather intelligence, test target defenses, execute the actual attack, evade detection, and remain persistent. Using a shared taxonomy and vocabulary to identify and explain each of these phases can help defenders better understand an emerging attack, allowing them to seek out opportunities to stop it more quickly. Nimmo and Hutchins stated in a new white paper on their kill chain that it will also enable them to analyze many operations over a significantly larger variety of threats than was previously conceivable in order to identify common trends and operational flaws. They emphasized that it will allow investigative teams in the industry, civic society, and government to share and compare their knowledge of operations and threat actors using a common taxonomy. The Online Operations Kill Chain from Meta divides an online threat operation into ten phases. This article continues to discuss the approach to online kill chain frameworks proposed by Meta researchers.

    Dark Reading reports "Meta Proposes Revamped Approach to Online Kill Chain Frameworks"

  • news

    Visible to the public "ChatGPT Could Make Phishing More Sophisticated"

    As the new version of the Artificial Intelligence (AI)-driven chatbot tool ChatGPT recently rolled out, experts have reiterated their greatest cybersecurity concern, which is that the technology will be used to compose more sophisticated phishing emails, thus increasing the vulnerability of government systems to attacks. OpenAI revealed GPT-4, the newest version of its AI technology, and demonstrated its ability to draft lawsuits, pass different standardized exams, and analyze uploaded text and photos. According to the company, this latest version of the technology offers greater "steerability," allowing users to prescribe their AI's style and task rather than being limited to a classic ChatGPT personality with set language and tone. This improvement could allow hackers to create more effective phishing emails, especially those that appear to be from certain individuals and are sent to many of their contacts. In response, government agencies are encouraged to increase phishing training for employees and adopt AI-driven cybersecurity solutions. The chief product officer of the cybersecurity software company Ivanti, Srinivas Mukkamala, stated that governments should be "proactive" in responding to AI-driven threats by decreasing their attack surface, given the exponential growth of the problem. National intelligence officials are also concerned about the threat posed by AI-driven attacks. In its 2023 Annual Threat Assessment released, the Office of the Director of National Intelligence warned that new technologies, such as AI, are being developed and implemented faster than companies and governments can shape norms, protect privacy, and prevent damaging effects. This article continues to discuss the new version of ChatGPT that offers greater steerability to users and how this advancement could bolster cyberattacks.

    GCN reports "ChatGPT Could Make Phishing More Sophisticated"

  • news

    Visible to the public "Threat Actors Turn To QR Codes and Other Creative Techniques as Macros Are Blocked"

    According to new research from HP Wolf Security, the blocking of macros by default in Microsoft Office has prompted threat actors to be more creative with their attacks. As a result, there have been increases in the delivery of malware via PDFs and ZIP files, as well as a rise in 'scan scams' using QR codes to trick users into opening links on mobile devices. Malware distributors such as Emotet have been observed attempting to bypass Office's stricter macro policy by using increasingly effective social engineering tactics. According to Alex Holland, senior malware analyst with HP Wolf Security's threat research team, the increase in scan scams, malvertising, archives, and PDF malware shows that attackers will always find a way to deliver malware. Therefore, users are advised to be wary of emails and websites that urge them to scan QR codes and provide sensitive information, as well as PDF files that include links to password-protected archives. Since October 2022, QR code scam campaigns have been observed by HP almost every day. They trick users into scanning QR codes from their computers with their mobile devices, possibly to exploit more inadequate phishing protection and detection on such devices. The QR codes then direct users to malicious websites requesting credit card information. Examples include phishing campaigns posing as parcel delivery companies asking for payment. In addition, there has been a 38 percent increase in malicious PDF attachments. Newer attacks avoid web gateway scanners by using embedded images that link to encrypted malicious ZIP files. The PDF instructions contain a password that the user is tricked into entering to unpack a ZIP file, which then deploys QakBot or IcedID malware to gain unauthorized access to systems. This article continues to discuss some methods that threat actors are using to work around Office's stricter macro policy.

    BetaNews reports "Threat Actors Turn To QR Codes and Other Creative Techniques as Macros Are Blocked"

  • news

    Visible to the public "Connected Vehicles and Cybersecurity--A New Frontier of Risk"

    Connected and Automated Vehicles (CAVs) could change how people view transportation and mobility. CAVs may provide numerous advantages, including enhanced service accessibility, reduced travel burdens, and safer transportation systems. Many of these benefits are currently feasible with partial vehicle automation, and they may increase as advanced automation continues to develop. However, CAVs also present new chances for cyberattacks to compromise vehicle security. If these risks are not addressed as new CAVs and technologies emerge, they could undermine many of the potential benefits of CAV adoption. Some methods of vehicle compromise may be more difficult to detect, particularly if the attack results in small alterations to the vehicle's driving behavior. Such attacks could be delivered via malicious software updates to automated or partially automated vehicles and remain undiscovered for long periods of time. Even minor shifts in driving behavior could cause major disturbances to the transportation network. Subtle changes can cause traffic congestion, excessive fuel use, and more. For example, if such an attack were deployed on all vehicles of a certain make and model, even slightly more aggressive driving may create a network-wide rise in delays, fuel consumption, and emissions without a visible source of the problem. Different types of cyberattacks could compromise CAVs. They can be classified as infrastructure-based, communication-based, or sensor-based. This article continues to discuss the risk of cyberattacks faced by CAVs.

    The University of Minnesota reports "Connected Vehicles and Cybersecurity--A New Frontier of Risk"

  • news

    Visible to the public "Streamlining Microelectronics Security and Testing"

    The Joint University Microelectronics Program (JUMP 2.0) was established by the Semiconductor Research Corporation (SRC) in response to the rapid evolution of the semiconductor industry. The coalition is composed of universities, industry partners, and the Defense Advanced Research Projects Agency (DARPA). According to DARPA, JUMP 2.0 includes research centers focusing on several semiconductor-related technical challenges. Penn State leads one of these research centers, the Center for Heterogeneous Integration of Micro Electronic Systems (CHIMES). With the center, 14 universities, including Arizona State University (ASU), will collaborate to improve future microelectronics capabilities. CHIMES Director Madhavan Swaminathan says that exceptional growth requires new and transformative logic, memory, and interconnect technologies to combat the inevitable slowdown of the traditional dimensional scaling of semiconductors. Ira A. Fulton Schools of Engineering Fulton Professor of Microelectronics Krishnendu Chakrabarty leads ASU's contributions to the center, focusing on electrical testing and security. The focus of Chakrabarty's research will be on test and security functions in 3D integration, which involves vertically connecting semiconductor devices, and heterogeneous integration that combines semiconductors manufactured in multiple locations into a single device. In addition, to ease security concerns, CHIMES researchers will examine methods for preventing the exposure of stolen intellectual property to adversaries and for deterring hardware Trojans. A hardware Trojan is an adversary's act of physical sabotage that causes a computer chip to malfunction. This article continues to discuss the efforts to streamline microelectronics security and testing.

    Arizona State University reports "Streamlining Microelectronics Security and Testing"

  • news

    Visible to the public "SpikeGPT: Researcher Releases Code for Largest-Ever Spiking Neural Network for Language Generation"

    Language generators such as ChatGPT are growing more popular for their ability to transform how humans engage with Artificial Intelligence (AI) and search engines. However, these algorithms are computationally expensive to run and rely on maintenance from a small number of organizations to prevent downtime. Therefore, Jason Eshraghian, an assistant professor of electrical and computer engineering at UC Santa Cruz developed a new model for language generation that addresses both of these problems. Language models use modern deep learning techniques known as neural networks. Eshraghian uses an alternative algorithm called a spiking neural network (SNN) to power a language model. Recently, he and two students released the open-source code for SpikeGPT, the largest language-generating SNN, which uses 22 times less energy than a similar deep learning model. The use of SNNs for language generation can have significant effects on accessibility, data security, and other factors. SpikeGPT provides advantages for data security and privacy. With the language generator on a local device, data put into the systems are more secure and protected from potential data-harvesting enterprises. This article continues to discuss the research, development, and benefits of SpikeGPT.

    The University of California Santa Cruz reports "SpikeGPT: Researcher Releases Code for Largest-Ever Spiking Neural Network for Language Generation"

  • news

    Visible to the public "Nation-State Hackers Using Malicious USB Drives in Attacks in Africa, Asia and Oceania"

    Hackers are using USB drives containing a strain of malware typically used by the Chinese government to target people in Mongolia, Papua New Guinea, Ghana, Zimbabwe, and Nigeria. Sophos researchers discovered the targeting of government organizations in Southeast Asia by USB drives containing the PlugX malware. This malware was developed in 2008 by Chinese government hackers known as Mustang Panda. The attack, which is described as "retro" due to its use of USB drives, was discovered thousands of miles away in Africa. The most recent cluster of USB worm activity is traversing three continents. Gabor Szappanos, threat research director at Sophos, stated that removable media is not normally considered 'mobile' when compared to Internet-based attacks, but this technique has shown to be effective in this part of the world. The malware and USB technique are designed partly to steal data from air-gapped networks. When delivered, the malware communicates with an IP address previously associated with Mustang Panda actors. The PlugX malware copies the contents of a victim's recycle bin and their device's hard drive. It collects files with the extensions .doc, .docx, .xls, .xlsx, .ppt, .pptx, and.pdf. The researchers explained that USB-based malware was significantly more prevalent a decade ago, when hackers could infiltrate a company by simply leaving thumb drives in parking lots. This article continues to discuss the use of malicious USB drives to spread PlugX malware in Africa, Asia, and Oceania.

    The Record reports "Nation-State Hackers Using Malicious USB Drives in Attacks in Africa, Asia and Oceania"

  • news

    Visible to the public "Under the Promise of Early Success, CISA Expands its Beta Mobile App Vetting Service"

    Mobile devices are essential to day-to-day operations, and their increasing use in government provides more than convenience. However, this connectivity has also widened the threat landscape, leaving the government vulnerable to malicious apps that could compromise the security of its systems. The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) is expanding access to the Mobile App Vetting (MAV) service for this reason. On February 8, 2023, CISA granted MAV an Authorization to Operate (ATO), recognizing the service's critical role in countering a growing risk of mobile app vulnerabilities to Federal Civilian Executive Branch (FCEB) agencies. In the following months, many agencies will experience MAV's capabilities for the first time. A few early adopters are already well-versed in its utility. Early in 2022, when Customs and Border Protection (CBP) needed an improved app-vetting ability to bolster its mobile security, it turned to MAV to meet its requirements. CBP currently uses MAV to vet its library of mobile apps for security vulnerabilities before deployment on the component's smartphones and tablets. CBP launched vetting efforts for a third-party COVID-19 contact-tracing app. MAV was able to identify flaws inherent to the iOS version of the app. This discovery forced CBP to cancel the deployment of the app, thereby protecting the security and integrity of its mobile devices. This article continues to discuss CISA's expansion of its MAV service.

    CISA reports "Under the Promise of Early Success, CISA Expands its Beta Mobile App Vetting Service"

  • news

    Visible to the public "US Government Warns Organizations of LockBit 3.0 Ransomware Attacks"

    The Federal Bureau of Investigation (FBI), the Cybersecurity and Information Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) recently issued an alert on the LockBit 3.0 ransomware operation. Since January 2020, LockBit has functioned based on the ransomware-as-a-service (RaaS) model, targeting a broad range of businesses and critical infrastructure entities and using a variety of tactics, techniques, and procedures (TTPs). LockBit 3.0, also referred to as LockBit Black, has a more modular architecture compared to its previous variants, and supports various arguments that modify its behavior after deployment. The alert noted that to hinder analysis and detection, LockBit 3.0 installers are encrypted and can only be executed if a password is supplied. The FBI, CISA, and MS-ISAC explain in the joint advisory that the malware also supports specific arguments for lateral movement, can reboot systems in Safe Mode, and performs a language check at runtime to avoid infecting systems that use specific language settings, such as Arabic (Syria), Romanian (Moldova), Tatar (Russia), and others. The advisory noted that initial access is obtained via remote desktop protocol (RDP) compromise, drive-by attacks, phishing, compromised credentials, and the exploitation of vulnerabilities in public-facing applications.

    SecurityWeek reports: "US Government Warns Organizations of LockBit 3.0 Ransomware Attacks"

  • news

    Visible to the public "The Most Visited Websites in Spain Do Not Comply Correctly with Privacy Laws and Track Their Users"

    A small percentage of the 500 most visited websites in Spain comply with the General Data Protection Regulation (GDPR). This is one of the findings of a study conducted by researchers from the Universitat Oberta de Catalunya (UOC), the University of Girona, and the Center for Cybersecurity Research of Catalonia (CYBERCAT). Automated methods were used to analyze web-tracking techniques and compliance with Internet privacy regulations. In addition to the improper and non-consensual use of cookies, these analysis algorithms revealed web-tracking techniques that the typical user is unfamiliar with, such as web beacons and technologies based on the browser's digital fingerprint. The significance of this research extends beyond the analysis results to the algorithms used to examine compliance with online privacy laws. Due to the massive amount of pages and platforms on the Internet, it is necessary to use automation, as manually examining each case would be impossible. In addition, some web-tracking techniques are difficult to detect because there are no visible indicators of their presence. In order to overcome these obstacles, the researchers devised a proprietary system consisting of four algorithms and a measure called "Websites Degree of Confidence" to evaluate the condition of regulatory compliance. The Consent Inspector Algorithm (CIA) collects clear images of cookie banners and detects buttons that should enable users to modify the use of these tracking elements. The Website Evidence Collector (WEC) collects information on the various web-tracking mechanisms used by each website. Based on the data provided by the WEC, the Cookies Detector Algorithm (CDA) classifies the cookies that websites use in browsers without user consent. In addition to extracting web beacons detected by the WEC, the Web Beacons Detection Algorithm (BDA) identifies browser fingerprinting techniques. This article continues to discuss the widespread non-compliance with privacy laws and the new algorithms used to analyze compliance with the GDPR.

    Universitat Oberta de Catalunya reports "The Most Visited Websites in Spain Do Not Comply Correctly with Privacy Laws and Track Their Users"

  • news

    Visible to the public "DNS Data Shows One in 10 Organizations Have Malware Traffic on Their Networks"

    During every quarter last year, between 10% and 16% of organizations had DNS traffic originating on their networks towards command-and-control (C2) servers associated with known botnets and various other malware threats, according to a new report by security researchers at Akamai. The researchers noted that more than a quarter of that traffic went to servers belonging to initial access brokers, attackers who sell access into corporate networks to other cybercriminals. Akamai operates a large DNS infrastructure for its global CDN and other cloud and security services and is able to observe up to seven trillion DNS requests per day. Since DNS queries attempt to resolve the IP address of a domain name, Akamai can map requests that originate from corporate networks or home users to known malicious domains, including those that host phishing pages, serve malware, or are used for C2. According to the data, between 9% and 13% of all devices seen by Akamai making DNS requests every quarter tried to reach a malware-serving domain. Between 4% and 6% tried to resolve known phishing domains, and between 0.7% and 1% tried to resolve C2 domains. The researchers stated that based on their DNS data, they saw that more than 30% of analyzed organizations with malicious C2 traffic are in the manufacturing sector. In addition, companies in the business services (15%), high technology (14%), and commerce (12%) verticals have been impacted. The top two verticals in their DNS data (manufacturing and business services) also resonate with the top industries hit by Conti ransomware.

    CSO reports: "DNS Data Shows One in 10 Organizations Have Malware Traffic on Their Networks"

  • news

    Visible to the public "Smart City Tech Can Enhance Life with Data Privacy Protections"

    Smart city technologies offer to improve urban living by expanding residents' access to government services, while tackling various societal challenges, such as managing traffic congestion, lowering carbon emissions, improving public health outcomes, and providing affordable housing. A smart city initiative may include Internet-connected sensors, mobile apps, public Wi-Fi access, high-speed communications networks, utility meters, and cameras, all of which collect large amounts of potentially sensitive data about residents and then process the data using analytics tools and algorithms. However, concerns about protecting privacy and public trust may counterbalance the benefits of smart city technologies. Covington & Burling LLP, a global law firm based in Washington, DC, has released a new white paper in collaboration with Mcity that identifies some of the privacy concerns raised by smart cities, including government surveillance and data security. The paper suggests a set of principles to be considered while building and deploying smart city technologies, such as cybersecurity resilience, privacy by design, and trusted data sharing. This article continues to discuss the new white paper on privacy frameworks for smart cities.

    The University of Michigan reports "Smart City Tech Can Enhance Life with Data Privacy Protections"

  • news

    Visible to the public "Russian Military Preparing New Destructive Attacks: Microsoft"

    According to Microsoft, Russia is readying another destructive cyber assault on Ukraine and could expand its targets to include organizations outside the country supplying Kyiv. Microsoft stated that Sandworm, a unit linked to the Russian military intelligence agency GRU, is preparing to follow its Foxblade and Caddywiper efforts last year with new wiper malware. Microsoft noted that as of late 2022, the threat actor might also have been testing additional ransomware-style capabilities that could be used in destructive attacks on organizations outside Ukraine that serve key functions in Ukraine's supply lines. The company added that the Prestige ransomware operation against a Polish firm in late 2022 provides a precedent for such attacks. Both Prestige and a separate variant, "Sullivan," have been linked to Sandworm. Microsoft claimed that the attacks using these malware types may have been attempts to test the reaction of Ukraine's allies to a targeted destructive attack outside Ukraine. In a similar way to NotPetya, ransomware is used as a cover for what is actually a destructive attack. Microsoft said it had observed Russian threat activity against organizations in at least 17 European countries and some in the Americas between January and mid-February this year. Microsoft argued that while these actions are most likely intended to boost intelligence collection against organizations providing political and material support to Ukraine, they could also if directed, inform destructive operations. Russian operatives are also stoking fears that Moldova could be next in line for invasion, with the government there even accusing Moscow of plotting to overthrow the current pro-EU administration. Microsoft warned that a "hack-and-leak" operation targeting Moldovan politicians is also aimed at sowing distrust between Europeans and their governments.

    Infosecurity reports: "Russian Military Preparing New Destructive Attacks: Microsoft"

  • news

    Visible to the public "Magniber Ransomware Group Exploiting Microsoft Zero-Day"

    A financially motivated hacking group exploited a now-patched zero-day Windows operating system vulnerability to distribute ransomware. The Google Threat Analysis Group linked the malicious campaign to the Magniber ransomware group, which began exploiting the zero-day before Microsoft released a patch for it. Tracked as CVE-2023-24880, the flaw is a moderately severe, affecting Microsoft's anti-phishing and anti-malware component, SmartScreen Security. This component is in Microsoft's endpoint protection service in Windows and Microsoft Edge. Magniber delivers Microsoft Software Installer (MSI) files, signing them with an invalid signature. Upon execution, the file causes an error in the application, bypassing Microsoft's warning against processing untrusted files downloaded from the Internet. Since the beginning of 2023, Google has seen over 100,000 downloads of malicious MSI files, most of which were downloaded by devices in Europe. This is a shift in focus for Magniber, which had previously targeted victims in South Korea and Taiwan. Before its most recent campaign, Magniber exploited CVE-2022-44698, a SmartScreen bypass flaw. According to HP threat researchers who discovered the campaign, the hackers used JavaScript files instead of MSI files. This article continues to discuss the Magniber ransomware group and its exploitation of a now-patched Windows zero-day vulnerability.

    DataBreachToday reports "Magniber Ransomware Group Exploiting Microsoft Zero-Day"

  • news

    Visible to the public "Vishing Campaign Targets Social Security Administration"

    Security experts at Armorblox have warned of a new hybrid phishing campaign impersonating the Social Security Administration (SSA), which tries to trick recipients into calling a criminal call center. Armorblox claimed that it blocked the scam emails for at least 160,000 customers. The researchers noted that the malicious messages are timed to coincide with tax season. The email subject line, "Due to erroneous and suspicious activities," is designed to create enough anxiety and urgency for the recipient to open the message. The researchers stated that other social engineering techniques include using the recipient's legitimate email address at the start of the message in order to personalize it and adding a customized sender name: "Social Security Administration-2521." The researchers noted that the email itself informs the user their Social Security Number account has been suspended due to suspicious activity. Those who open the attached PDF are presented with a letter confirming the same information, spoofed to appear as if written on SSA letterhead. The researchers explained that with a Social Security Administration logo within the upper-left corner as well as used at the watermark, the letter of suspension provides little to no explanation of the reason behind the decision to terminate the SSN account. The bluntness of the letter includes a "wish you the best in your future endeavors" sign-off and a telephone number for any questions recipients wished to be addressed. The letter includes a case number, signature of the acting commissioner, email reference ID, customer service contact number, and the physical address of the SSA to add further legitimacy to the scam. The researchers stated that the main action the bad actor aimed to facilitate through this email attack was for recipients to call the customer service number included. Although Armorblox didn't call the number in question, it's likely that malicious call center operatives would be waiting to harvest more personal and financial information from victims to use in identity fraud and other scams.

    Infosecurity report: "Vishing Campaign Targets Social Security Administration"

  • news

    Visible to the public "Samsung, Vivo, Google Phones Open to Remote Compromise without User Interaction"

    Vulnerabilities in Samsung's Exynos chipsets could allow attackers to remotely compromise some Samsung Galaxy, Vivo, and Google Pixel phones without user interaction. Google Project Zero researchers suspect that, with limited additional research and development, skilled attackers could quickly develop a functional exploit to compromise impacted devices remotely and silently. Therefore, they chose to go public before the end of their typical 90-day non-disclosure deadline and provide mitigation suggestions to help users protect themselves until fixes are available. Researchers discovered a total of 18 flaws impacting a variety of Samsung Exynos chipsets. This article continues to discuss the vulnerabilities affecting Samsung's Exynos chipsets that could enable attackers to remotely compromise certain Samsung Galaxy, Vivo, and Google Pixel mobile phones without the need for user interaction, as well as how users can mitigate the risk of a remote compromise.

    Help Net Security reports "Samsung, Vivo, Google Phones Open to Remote Compromise without User Interaction"

  • news

    Visible to the public "Conti-Based Ransomware 'MeowCorp' Gets Free Decryptor"

    A free decryptor has been released for a modified variant of the Conti ransomware that could help hundreds of victims recover their files. The decryptor works on data encrypted with a strain of the ransomware that appeared after Conti's source code was leaked in March 2022. Researchers discovered the leak on a forum where threat actors had published a cache of 258 private keys from a modified version of the Conti ransomware. The variant was used in attacks against private and public organizations by a ransomware group that researchers track as "MeowCorp." According to ransomware researcher Amigo-A, the threat actors posted the data on a Russian-speaking forum in February 2022, along with a link to an archive containing decryption keys, decryptor executables, and decryptor source code. The keys were discovered to be related to a Conti variant that was identified in December 2022. This article continues to discuss the release of a free decryptor for the Conti-based MeowCorp ransomware.

    Bleeping Computer reports "Conti-Based Ransomware 'MeowCorp' Gets Free Decryptor"

  • news

    Visible to the public "New GoLang-Based HinataBot Exploiting Router and Server Flaws for DDoS Attacks"

    HinataBot, a new GoLang-based botnet, has been found exploiting known vulnerabilities to compromise routers and servers and use them to launch Distributed Denial-of-Service (DDoS) attacks. Akamai stated that the malware binaries appear to have been named after a character from the popular anime series Naruto, with file name structures such as 'Hinata-OS>-Architecture>.' The exploitation of exposed Hadoop YARN servers and security flaws in Realtek SDK devices and Huawei HG533 routers are among the tactics used to spread the malware. Unpatched vulnerabilities and weak credentials have been low-hanging fruit, as they are an easy, well-documented entry point that does not require sophisticated social engineering techniques. The threat actors behind HinataBot have been active since at least December 2022, with the attacks initially using a generic Go-based Mirai variant before moving to their own custom malware on January 11, 2023. This article continues to discuss the new HinataBot botnet.

    THN reports "New GoLang-Based HinataBot Exploiting Router and Server Flaws for DDoS Attacks"

  • news

    Visible to the public "BianLian Ransomware Pivots From Encryption to Pure Data-Theft Extortion"

    The BianLian ransomware group is expanding its operations and evolving as a business, compromising computers more quickly. According to researchers, in attacks that have claimed at least 116 victims, it is also abandoning encryption for pure data-theft extortion tactics. BianLian, which was first discovered in July of 2022, has not strayed significantly from the tactic of delivering a custom go-based backdoor once it has infiltrated a network. Researchers from Redacted noted that the malware's functionality has remained largely unchanged with a few minor adjustments. However, the speed with which the group's command-and-control (C2) server delivers the backdoor has increased, and the group has shifted its focus from ransoming encrypted files to data-leak extortion to extract payments from victims. BianLian has learned that they do not need to encrypt victim networks in order to receive payment, according to Adam Flatley, vice president of intelligence at Redacted. He says that this turn toward data-leak extortion is dangerous since it allows the gang to take more time to customize threats to specific victims and create greater pressure to pay ransoms. This article continues to discuss the BianLian ransomware group continuing to mature as a thriving cybercriminal business.

    Dark Reading reports "BianLian Ransomware Pivots From Encryption to Pure Data-Theft Extortion"

  • news

    Visible to the public "Michigan College Cancels Classes, Events Because of ‘Cybersecurity Incident’"

    A cybersecurity incident has caused Lansing Community College to suspend classes, events, and other activities for Thursday, March 16th, and Friday, March 17th. The college made the announcement on March 15th and said that the cancelations were "in response to an ongoing cybersecurity incident" but gave few other details about the problem. The college noted that they do not know everything yet, and communication is going to be very challenging once the network is disconnected. The college asked that college employees not work, with the exception of the police department, IT, payroll, incident management, facilities, and academy and aviation personnel. They also advised that people affiliated with the college not "attempt to come to campus or use any LCC equipment." College officials said they are working with the FBI, the college's cyber insurance response team, and the state police Michigan Cyber Command Center to investigate and resolve the situation. The college stated that they currently have no indication that employee or student personal or financial information has been compromised.

    M Live reports: "Michigan College Cancels Classes, Events Because of 'Cybersecurity Incident'"

  • news

    Visible to the public "UK Joins US, Canada, Others in Banning TikTok From Government Devices"

    The UK government has recently announced plans to ban the Chinese-owned social media app TikTok from all government devices. The Chancellor of the Duchy of Lancaster, Oliver Dowden, confirmed the plans earlier today after Cabinet Office Ministers ordered a security review of the app. Dowden stated that upon installation, the TikTok app requires users to give permission to access data stored on the device. According to the UK government, this data, which includes contacts, user content, and geolocation coordinates, is collected and held by the company. Dowden said the government and its international partners are concerned about how this data may be used. Dowden clarified the ban does not extend to personal devices for government employees, ministers, or the general public. Further, exceptions for using TikTok on government devices are currently being developed for specific work purposes, such as enforcement roles or online harm investigations.

    Infosecurity reports: "UK Joins US, Canada, Others in Banning TikTok From Government Devices"

  • news

    Visible to the public "ChipMixer Crypto Laundromat Shut Down By German, US Authorities"

    The cryptocurrency mixer known as ChipMixer has recently been targeted by a joint investigation led by German and US authorities with the support of Europol, Belgium, Poland, and Switzerland. The anti-money-laundering operation took down ChipMixer infrastructure and seized four servers, 7TB of data, and 1909.4 Bitcoins (roughly $47.3m) in 55 transactions. The authorities noted that most of the seized funds had connections with dark web markets, stolen crypto assets, ransomware groups, illicit goods trafficking, and procurement of child sexual exploitation material. According to Europol ChipMixer, an unlicensed cryptocurrency mixer set up in mid-2017 specialized in mixing or cutting trails related to virtual currency assets. Europol noted that the software developed by ChipMixer obfuscated the blockchain trail of the funds. Cyber-criminals aiming at laundering illegal proceeds used the infrastructure to turn deposited funds into "chips" that were mixed and anonymized. At the end of the process, the "cleaned" crypto can easily be exchanged into other cryptocurrencies or directly into FIAT currency through ATM or bank accounts. Because of these features, Europol confirmed that several ransomware actors, including Zeppelin, SunCrypt, Mamba, Dharma, and Lockbit, have leveraged ChipMixer to launder ransom payments they had received.

    Infosecurity reports: "ChipMixer Crypto Laundromat Shut Down By German, US Authorities"

  • news

    Visible to the public "Data Breach at Independent Living Systems Impacts 4 Million Individuals"

    Florida-based health services company Independent Living Systems (ILS) has recently started sending out notification letters to more than 4 million individuals to inform them of a data breach impacting their personal and medical information. Founded in 2001, ILS has 10 offices across the US and provides managed care organizations and providers with clinical and third-party administrative services. The company serves over 4.2 million individuals. The company discovered the data breach on July 5, 2022, when some of its systems became inaccessible. Its investigation into the incident revealed that an unauthorized party had access to certain systems for roughly a week between June 30 and July 5. During that period, some information stored on the ILS network was acquired by the unauthorized actor, and other information was accessible and potentially viewed. The company stated that on January 17, it learned that the personally identifiable information (PII) and protected health information (PHI) of its members was compromised during the attack. The types of impacted information include names, addresses, birth dates, driver's license details, IDs, Social Security numbers, financial account information, medical record numbers, diagnosis information, health insurance information, mental or physical treatment, and other health information.

    SecurityWeek reports: "Data Breach at Independent Living Systems Impacts 4 Million Individuals"