News Items

  • news

    Visible to the public "Passkeys Unlock a New Era for Authentication"

    Many people consider computer passwords inconvenient and insecure. Cybercriminals continue cracking and abusing them to perform malicious activities. Industry estimates reveal that almost 80 percent of all breaches involve passwords. Even the most advanced multifactor authentication (MFA) cannot solve the underlying issue. Highly determined cybercriminals have used social engineering to gain access to accounts. According to Chester Wisniewski, CTO of Applied Research at Sophos, there is a potential to move forward through more advanced passkey technology. Passkeys eliminate passwords, and even though they do not provide a silver bullet solution to cyberattacks, they provide a much more convenient and secure framework for navigating the digital world. Rik Turner, principal analyst at Omdia, points out that passkey technology is the most effective way to make computers safer. Over the next few years, the prevalence of passkeys is expected to increase. Passkeys will likely become the de facto standard for both businesses and consumers, according to Turner. Although it may solve the age-old issue of creating, maintaining, and changing inherently insecure passwords, the technology may change the overall cybersecurity environment. If passkeys grow more prevalent, attackers may seek methods to take data from browsers and devices after the authentication process is complete. According to Turner, there may also be an emphasis on post-authorization. Wisniewski suggests that cookie theft, a rising problem that enables hackers to impersonate users, could grow. Turner notes that a potential disadvantage of passkeys is that, at least for the time being, they cannot be automatically transferred across devices on different platforms. This article continues to discuss experts' insights on passkey adoption, its advantages, and potential downsides.

    CACM reports "Passkeys Unlock a New Era for Authentication"

  • news

    Visible to the public "Power On: New Testing Instrument"

    Researchers at the University of Nevada, Reno, are working to strengthen power grids' resilience, stability, and cybersecurity. They may soon have a new tool for protecting energy supplies. This tool consists of large-scale digital simulators for cyber-physical energy systems. These simulations can be used to test processes and hardware that could protect the power grid against cyberattacks and natural disasters. Associate Professor of Electrical and Biomedical Engineering Mohamed Ben-Idris and his collaborators recently received a grant from the National Science Foundation (NSF) to acquire a real-time digital simulator and set up a large-scale testbed. This new testbed's potential users include university researchers, students, and their industry partners. Faculty and students working on cyber-physical energy systems, which are intelligent systems that add new capabilities to energy systems through the integration of communication, computation, information, and control, will be able to test solutions for power-grid issues in a virtual environment prior to implementing them in the real world. Researchers will use the large-scale digital simulator for various studies, including developing components required for secure information exchange. This article continues to discuss the new testing tool, considered the only one of its kind in Nevada, that enables the expansion of research into power grids, including cybersecurity-related studies.

    The University of Nevada, Reno reports "Power On: New Testing Instrument"

  • news

    Visible to the public "Hackers Used Fortra Zero-Day to Steal Sales Data from Cloud Management Giant Rubrik"

    Rubrik, the leader in cloud data management, has revealed that hackers attacked the company by exploiting a flaw in a popular file transfer tool. The Clop ransomware group, which has been exploiting a flaw in Fortra's GoAnywhere Managed File Transfer product, recently added Rubrik to its list of victims. According to a spokesperson for the company, a third-party assessment indicates that the hackers did not gain access to any client data protected by Rubrik. Instead, using the widely publicized zero-day vulnerability affecting GoAnywhere, the hackers gained access to one of Rubrik's non-production Information Technology (IT) testing environments. The attack affected mostly internal sales data, including customer and partner names, business contacts, and a small number of distributor purchase orders. The third-party security firm examining the incident reported that no sensitive personal information, such as Social Security numbers, financial account numbers, or credit card numbers, was exposed on the compromised systems. Rubrik CISO Michael Mestrovich stated that over 100 companies are being actively exploited via the GoAnywhere flaw. File-sharing services, such as GoAnywhere MFT, are prime targets for nation-states and criminal hackers due to the sensitive information they may hold and their widespread adoption by businesses. This article continues to discuss the exploitation of the Fortra zero-day by hackers to steal data from the cloud data management giant Rubrik.

    The Record reports "Hackers Used Fortra Zero-Day to Steal Sales Data from Cloud Management Giant Rubrik"

  • news

    Visible to the public "Hoxhunt ChatGPT / Cybersecurity Research Reveals: Humans 1, AI 0"

    Hoxhunt, the industry leader in behavior change software for cybersecurity, has issued a report analyzing the effectiveness of ChatGPT-generated phishing attempts. The study compared the success rate of simulated phishing attacks developed by human social engineers and those created by Artificial Intelligence (AI) Large Language Models (LLMs). While the potential for ChatGPT to be used for harmful phishing activities continues to captivate everyone's interest, Hoxhunt's research demonstrates that human social engineers continue to surpass AI when it comes to persuading users to click on dangerous links. The study found that professional red teamers generated a 4.2 percent click rate compared to ChatGPT's 2.9 percent click rate among an email user demographic sample. Sixty-nine percent of the time, humans outperformed AI at deceiving other humans. This article continues to discuss the effectiveness of ChatGPT-generated phishing attacks.

    PR Newswire reports "Hoxhunt ChatGPT / Cybersecurity Research Reveals: Humans 1, AI 0"

  • news

    Visible to the public "Over 700 Million Credentials Exposed and 22 Million Devices Infected in 2022"

    SpyCloud's latest Identity Exposure Report reveals that its researchers retrieved 721.5 million exposed credentials from the criminal underworld and discovered over 22 million unique devices infected with malware in the last year. Around 50 percent of the exposed credentials recovered by SpyCloud came from botnets, which are often used to deploy information-stealing malware. Such malware enables cybercriminals to steal valid passwords, cookies, auto-fill data, and other important information for use in targeted attacks. According to Trevor Hilligoss, director of security research at SpyCloud, the widespread use of infostealers is a dangerous trend because it opens the door for malicious actors, such as Initial Access Brokers (IABs), who sell malware logs containing accurate authentication data to ransomware syndicates and other criminals. Information-stealing malware variants have been found to be simple, inexpensive, and scalable, fostering a robust underground economy with an "anything-as-a-service" model to facilitate cybercrime. This broker/operator relationship is a profitable business with a low cost of entry. Additionally, researchers recaptured nearly 22 billion device and session cookies that could grant cybercriminals access to sensitive data by allowing them to circumvent multifactor authentication (MFA) and hijack an active session. This article continues to discuss key findings shared in SpyCloud's Identity Exposure Report.

    BetaNews reports "Over 700 Million Credentials Exposed and 22 Million Devices Infected in 2022"

  • news

    Visible to the public "YoroTrooper Group Targets European, CIS Countries in Cyberespionage Campaigns"

    During the past nine months, a previously unknown Russian-speaking threat actor has launched cyber espionage campaigns against government, energy, and international organizations in Azerbaijan, Kyrgyzstan, Tajikistan, as well as European nations. The campaigns involve various commodity and custom malware tools. Researchers from Cisco Talos have identified the group behind the campaigns as YoroTrooper. According to Cisco Talos, the YoroTrooper campaigns have been running since at least June 2022. The threat actor uses phishing as the initial attack vector and customizes the emails and attachments for each target company by establishing typosquatting or lookalike domains. YoroTrooper has compromised Turkmenistan and Azerbaijan embassies and stole credentials from at least one European health care agency account. In its campaigns, the gang uses Remote Access Trojans (RATs) and information-stealing malware, but it also has custom Python implants. Researchers have determined that YoroTrooper is a separate entity with its own operations, despite having some overlaps and connections with existing attack groups, such as the PoetRAT gang. This article continues to discuss researchers' findings and observations regarding the YoroTrooper group.

    Decipher reports "YoroTrooper Group Targets European, CIS Countries in Cyberespionage Campaigns"

  • news

    Visible to the public "FakeCalls Android Malware Targets Financial Firms in South Korea"

    Security researchers at Check Point Research have spotted a new Android vishing (voice phishing) malware tool targeting victims in South Korea by impersonating 20 leading financial institutions in the region. Dubbed "FakeCalls," the malware baits victims with fake loans, requesting them to confirm their credit card numbers, which are then stolen. The researchers stated that FakeCalls malware possesses the functionality of a Swiss army knife, able not only to conduct its primary aim but also to extract private data from the victim's device. The researchers discovered over "2500 samples of the FakeCalls malware in a combination of mimicked financial organizations and implemented evasion techniques." Further, the researchers said the malware developers made extra efforts to protect their malware from antivirus programs, implementing several unique evasion techniques not previously observed in the wild. The researchers stated that the malware developers took special care with the technical aspects of their creation and implemented several unique and effective anti-analysis techniques. In addition, they devised mechanisms for the disguised resolution of the command-and-control servers behind the operations. The security researchers warned that the techniques used by FakeCalls could be reused in other applications targeting other markets around the world.

    Infosecurity reports: "FakeCalls Android Malware Targets Financial Firms in South Korea"

  • news

    Visible to the public "Russian Cyberspies Abuse EU Information Exchange Systems in Government Attacks"

    Security researchers at BlackBerry have observed Russia-linked cyberespionage group APT29 abusing two legitimate information exchange systems used by European countries. APT29 is a Russian advanced persistent threat (APT) actor mainly focused on cyber espionage. The group, believed to be sponsored by the Russian Foreign Intelligence Service (SVR), is also tracked as Cozy Bear, the Dukes, Nobelium, and Yttrium. The researchers stated that as part of a recently observed campaign aimed at EU governments, the group was seen sending phishing emails with a malicious document attached, using the Polish Foreign Minister's recent visit to the US as a lure. Another lure abuses multiple legitimate systems, including LegisWrite and eTrustEx, two official services used for information and data sharing among the governments of European countries. The researchers noted that LegisWrite is an editing program that allows secure document creation, revision, and exchange between governments within the European Union. The researchers stated that the fact that LegisWrite is used in the malicious lure indicates that the threat actor behind this lure is specifically targeting state organizations within the European Union. The malicious document includes a link leading to an HTML file hosted on a compromised online library website based in El Salvador. The file is APT29's malicious dropper named RootSaw and EnvyScout, which relies on HTML smuggling to deploy an IMG or ISO file on the victim's system. The researchers noted that in this campaign, an ISO file was dropped from the compromised domain. The image contains two files, a link (.lnk) file to run specified command line arguments and a DLL library. When run, the DLL achieves persistence via a newly created registry key and proceeds to collect information about the target system and send it to its command-and-control (C&C) server. The researchers noted that APT29 abuses the API of a commonly used note-taking application called Notion for C&C, which allows it to disguise its traffic as benign. According to BlackBerry, the APT removed all metadata from the link file to avoid leaking any information related to its operations systems.

    SecurityWeek reports: "Russian Cyberspies Abuse EU Information Exchange Systems in Government Attacks"

  • news

    Visible to the public "DEV-1101 Updates Open Source Phishing Kit"

    The threat actor known as DEV-1101 has been spotted by security researchers at Microsoft, developing and advertising a new adversary-in-the-middle (AiTM) open source phishing kit. The researchers noted that the threat actor group began offering their AiTM phishing kit in 2022 and, since then, has made several enhancements to their kit. These include the capability to manage campaigns from mobile devices and evasion features like the bypass of CAPTCHA pages. The researchers noted that the DEV-1101 kit is written in NodeJS with PHP reverse-proxy capabilities, automated setup, and detection evasion through an antibot database. It also features phishing management activity via Telegram bots, as well as several ready-made phishing pages impersonating services like Microsoft. On June 12, 2022, DEV-1101 announced that the kit would be open source with a $100 monthly licensing fee. The actor also provided links to additional Telegram channels and a now-defunct GitHub page. The researchers noted that months later, DEV-1101 then upgraded the kit again to include the ability to manage servers through a Telegram bot instead of cPanel. DEV-1101 increased its tool's price multiple times due to the rapid growth of its user base from July through December 2022. The researchers noted that as of right now, DEV-1101 offers their tool for $300, with VIP licenses at $1,000. Legacy users were permitted to continue purchasing licenses at $200 before January 1, 2023. The researchers stated that they observed several threat actors conducting large-scale phishing campaigns (millions of phishing emails per day) using the tool offered by DEV-1101.

    Infosecurity reports: "DEV-1101 Updates Open Source Phishing Kit"

  • news

    Visible to the public "This is What Happens When Your Phone is Spying on You"

    According to a team of computer scientists from New York and San Diego, smartphone spyware apps that allow people to spy on each other are difficult to notice and detect, and easily leak the sensitive personal information they collect. Spyware apps are often used by abusers to secretly spy on a spouse or partner, despite being advertised as tools for monitoring children and employees. These apps require little technical expertise as they provide clear installation instructions and only need temporary access to the victim's device. After installation, they secretly record the victim's device activities, including text messages, emails, photos, and calls. The apps also enable abusers to remotely access this information via a web interface. Between September 2020 and May 2021, the number of devices containing spyware apps rose by 63 percent. Enze Liu, a Ph.D. student in computer science at the University of California, San Diego, and their colleagues conducted an in-depth technical analysis of 14 of the most popular spyware apps for Android phones. They discovered that spyware apps use various approaches to secretly record data. One app was found to use an invisible browser capable of streaming live video from the device's camera to a spyware server. The apps can also record phone calls using the device's microphone, sometimes activating the device's speaker to capture conversations. Several apps also take advantage of smartphone accessibility features designed to read what appears on the screen to vision-impaired users. These features effectively enable spyware to record keystrokes. The team also discovered a number of techniques used by the spyware apps to hide on the target's device. This article continues to discuss the findings from the study "No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps."

    UC San Diego Today reports "This is What Happens When Your Phone is Spying on You"

  • news

    Visible to the public "NSA Releases Recommendations for Maturing Identity, Credential, and Access Management in Zero Trust"

    The National Security Agency (NSA) has released a Cybersecurity Information Sheet (CSI) titled "Advancing Zero Trust Maturity throughout the User Pillar" to help system operators in maturing their Identity, Credential, and Access Management (ICAM) capabilities to effectively combat certain cyber threat techniques. Due to immature ICAM capabilities of national security, critical infrastructure, and Defense Industrial Base (DIB) systems, cyberattacks are on the rise. The zero trust model limits access to only what is required and expects that a security breach will occur or has already occurred. NSA is helping Department of Defense (DOD) customers with zero trust framework integration within National Security System (NSS), DOD, and DIB environments. Additional direction will help organize, guide, and simplify the incorporation of zero trust principles and designs into enterprise networks. In order to reach a mature zero trust framework, systems must integrate and harmonize the capabilities associated with seven pillars, including users, devices, data, application/workload, network/environments, visibility and analytics, and automation and orchestration. This article continues to discuss NSA's release of recommendations for maturing ICAM capabilities for zero trust.

    NSA reports "NSA Releases Recommendations for Maturing Identity, Credential, and Access Management in Zero Trust"

  • news

    Visible to the public "Phishing Campaigns Use SVB Collapse to Harvest Crypto"

    Security researchers at Proofpoint have uncovered several new phishing campaigns using the collapse of Silicon Valley Bank (SVB) as a lure to steal cryptocurrency. The researchers stated that they spotted lures related to USD Coin (USDC), a digital stablecoin tied to the dollar, that was impacted by the SVB collapse. This campaign used messages that impersonated several cryptocurrency brands, which were sent via malicious SendGrid accounts and containing SendGrid URLs. The URLs redirected to several different domains that asked the victim to claim their crypto/redeem to USD. The researchers noted that clicking the button would try to open a DeFi URL, so the victim would need to have a DeFi handler installed, such as MetaMask wallet. The victim would then be lured to install a smart contract that would transfer the contents of the victim's wallet to the attacker. P2P payments tech firm Circle, which was exposed by the failure of SVB, announced that USDC would remain redeemable at a 1:1 rate with the dollar, sparking additional phishing campaigns. Researchers at Cyble spotted several phishing sites impersonating Circle promoting the 1:1 deal. Some request users scan a QR code to proceed, which results in their crypto wallet being compromised.

    Infosecurity reports: "Phishing Campaigns Use SVB Collapse to Harvest Crypto"

  • news

    Visible to the public "Key Aerospace Player Leaks Sensitive Data"

    According to research conducted by Cybernews, the top aviation company Safran Group left itself vulnerable to cyberattacks for over a year, thus highlighting the vulnerability of major aviation companies to being targeted by threat actors. The Cybernews research team recently revealed that the global aviation company headquartered in France, which is also the eighth largest aerospace supplier in the world, was leaking critical data because of a misconfiguration of its systems. Safran Group and Airbus, the second largest aerospace company in the world after Boeing, work together to make aerospace equipment. Safran Group is also involved in the development of cutting-edge technology outside of the aviation industry, such as James Webb Telescope modules. The aviation company also builds surface-to-air defense systems and missiles. Researchers discovered a publicly accessible environment file used by the beta version of the open-source video-calling application Jitsi Meet. The Cybernews team suspects that the file was available to the public for about a year and a half, putting Safran Group at risk of possible attacks. The exposed data includes the Laravel app key, JSON Web Token (JWT) key, MySQL credentials, and Simple Mail Transfer Protocol (SMTP) credentials for the "no-reply" email. This article continues to discuss the top aviation company Safran Group leaking sensitive data and the potential impact of this leak.

    Cybernews reports "Key Aerospace Player Leaks Sensitive Data"

  • news

    Visible to the public "First Known Dero Cryptojacking Operation Seen Targeting Kubernetes"

    The first known cryptojacking operation mining the Dero cryptocurrency has been observed targeting vulnerable Kubernetes container orchestrator infrastructure with exposed Application Programming Interfaces (APIs). Dero is a privacy coin advertised as a Monero alternative with stronger anonymity protection. Dero promises faster and greater monetary mining returns than Monero and other cryptocurrencies, which is why it has attracted the interest of threat actors. In a recent report by CrowdStrike, researchers detail how the ongoing campaign was found in February 2023, when monitoring customer Kubernetes clusters revealed strange behavior. According to the researchers, the attacks begin with threat actors scanning exposed, vulnerable Kubernetes clusters with "anonymous-auth=true" authentication settings, providing anonymous access to the Kubernetes API. After getting access to the API, the threat actors will deploy a DaemonSet named "proxy-api" that enables the attackers to simultaneously engage the resources of all nodes in the cluster and mine Dero with the available resources. The installed miners will be added to a Dero mining pool, where each participant contributes hashing power and receives a share of any earnings. Analysts at Crowdstrike have observed no purpose on the part of the threat actors to move laterally, disrupt cluster operations, steal data, or do additional damage. Therefore, the campaign appears to be purely financially motivated. This article continues to discuss the Dero cryptojacking operation.

    Bleeping Computer reports "First Known Dero Cryptojacking Operation Seen Targeting Kubernetes"

  • news

    Visible to the public "Data Loss Prevention Company Hacked by Tick Cyberespionage Group"

    ESET researchers have discovered that a Data Loss Prevention (DLP) company in East Asia has been compromised. During the intrusion, the attackers launched at least three malware families, compromising both the company's internal update servers and third-party tools. This resulted in the subsequent compromise of two customers of the company. ESET attributes with high confidence the campaign to the Tick Advanced Persistent Threat (APT) group. Based on Tick's profile, cyber espionage was most likely the purpose of the attack. The DLP company's customer base includes government and military groups, making it an attractive target for an APT group. The attackers compromised the DLP company's internal update servers to deliver malware within the software developer's network, and trojanized installers of legitimate third-party tools used by the company, resulting in the execution of malware on the computers of the company's customers, according to ESET researcher Facundo Muoz, who discovered Tick's latest operation. During the attack, the malicious actors deployed ShadowPy, a previously undocumented downloader, as well as the Netboy backdoor, also known as Invader, and the Ghostdown downloader. This article continues to discuss the compromise of DLP company by the Tick cyber espionage group.

    Help Net Security reports "Data Loss Prevention Company Hacked by Tick Cyberespionage Group"

  • news

    Visible to the public "Microsoft Zero-Day Bugs Allow Security Feature Bypass"

    Two zero-day vulnerabilities need to be patched immediately, one in Microsoft Outlook's authentication mechanism and another discovered to be a Mark-of-the-Web (MOTW) bypass. Automox researchers advised enterprises to patch these vulnerabilities within 24 hours, as they are being exploited in the wild. In addition, several of the vulnerabilities addressed in the March update enable Remote Code Execution (RCE), making them a patching priority. Vendors reported slightly varying estimates of the total number of new severe vulnerabilities in Microsoft's March update, presumably because of differences in what they counted. For example, Trend Micro's Zero-Day Initiative (ZDI) determined that six of the vulnerabilities in Microsoft's March update were critical, whereas Tenable and Action1 estimated nine. One of the zero-day vulnerabilities is a critical privilege escalation flaw, tracked as CVE-2023-23397, in Microsoft Outlook, which allows an attacker to access the victim's Net-NTLMv2 challenge-response authentication hash and then impersonate the user. An attacker could exploit the vulnerability by sending a specially crafted email that Outlook gets and processes before the user views it in the Preview Pane. This article continues to discuss the actively exploited bugs in Microsoft Outlook and the MOTW feature.

    Dark Reading reports "Microsoft Zero-Day Bugs Allow Security Feature Bypass"

  • news

    Visible to the public "GoBruteforcer: New Golang-Based Malware Breaches Web Servers Via Brute-Force Attacks"

    GoBruteforcer, a new Golang-based malware, has been discovered targeting web servers running phpMyAdmin, MySQL, FTP, and Postgres in an attempt to recruit them into a botnet. During the attack, GoBruteforcer used a Classless Inter-Domain Routing (CIDR) block to scan the network, and it targeted all IP addresses within the CIDR range, according to researchers from Palo Alto Networks Unit 42. Instead of using a single IP address as a target, the threat actor used CIDR block scanning to gain access to a wide variety of target hosts on multiple IPs within a network. GoBruteforcer is primarily meant to target Unix-like platforms with x86, x64, and ARM architectures, aiming to gain access using a brute-force attack using a list of hard-coded credentials. If the attack is successful, an Internet Relay Chat (IRC) bot is launched on the victim server to initiate communications with an actor-controlled server. GoBruteforcer uses a PHP web shell already installed on the victim server to get further information about the targeted network. This article continues to discuss findings regarding the new Golang-based malware GoBruteforcer.

    THN reports "GoBruteforcer: New Golang-Based Malware Breaches Web Servers Via Brute-Force Attacks"

  • news

    Visible to the public "Ransomware Group Claims Theft of Valuable SpaceX Data From Contractor"

    The LockBit ransomware group recently claimed to have stolen valuable SpaceX files after breaching the systems of piece part production company Maximum Industries. The Texas-based Maximum Industries specializes in waterjet, laser cutting, and CNC machining services and advertises itself as a contract manufacturing facility. The hackers claim Elon Musk's rocket and spacecraft maker SpaceX uses Maximum Industries services. They also claim that on Maximum Industries' systems, they found roughly 3,000 "drawings certified by space-x engineers," which they plan on selling through an auction. While Maximum Industries may have been hacked, it's not uncommon for cybercrime groups to make exaggerated claims regarding the impact of their attacks or the value of the data they have obtained. The LockBit ransomware operation was launched in 2019 and has been evolving ever since. The cybercriminals believed to be operating out of Russia exploit unpatched vulnerabilities, rely on insiders or acquire access from specialized groups to gain access to victim systems. Once they have access, they collect valuable data, after which they deploy file-encrypting malware.

    SecurityWeek reports: "Ransomware Group Claims Theft of Valuable SpaceX Data From Contractor"

  • news

    Visible to the public "MI5 Launches New Agency to Tackle State-Backed Attacks"

    A new security agency began its job of protecting the UK from state-sponsored and terrorist threats recently. The National Protective Security Authority (NPSA) was created as part of a major new review of government defense spending known as the Integrated Review Refresh. The NPSA will operate out of security service MI5 and absorb and extend the responsibilities of the Centre for the Protection of National Infrastructure, acknowledging the fact that state and terrorist threats are aimed not only at critical infrastructure (CNI) providers. The NPSA will work with existing agencies, the National Cyber Security Centre (NCSC) and the National Counter Terrorism Security Office (NaCTSO), to provide defensive advice to UK organizations targeted with cyber and other threats. In the digital sphere, this could range from cyber espionage and IP theft to disruptive or destructive cyberattacks. According to the security minister, Tom Tugendhat, the NPSA will play a crucial role in helping businesses and universities better protect themselves and maintain their competitive advantage.

    Infosecurity reports: "MI5 Launches New Agency to Tackle State-Backed Attacks"

  • news

    Visible to the public "CISA Program Warns Critical Infrastructure Organizations Vulnerable to Ransomware Attacks"

    The US Cybersecurity and Infrastructure Security Agency (CISA) has recently launched a pilot program to warn critical infrastructure organizations if their systems contain vulnerabilities that may be exploited in ransomware attacks. The new Ransomware Vulnerability Warning Pilot (RVWP), which kicked off on January 30, is meant to help those organizations that might be unaware that a vulnerability targeted by ransomware groups is lurking in their networks. According to CISA, when such a security defect is identified, CISA's regional cybersecurity personnel notify the impacted entity via phone or email so that the issue can be resolved before it's exploited. CISA noted that the RVWP uses "existing authorities and technology" to proactively discover information systems affected by flaws known to be exploited in ransomware attacks. The agency stated that it accomplishes this work by leveraging its existing services, data sources, technologies, and authorities, including CISA's Cyber Hygiene Vulnerability Scanning service and the Administrative Subpoena Authority granted to CISA under Section 2209 of the Homeland Security Act of 2002. CISA stated that as per the Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA), critical infrastructure entities are required to report cyberattacks and ransom payments. CIRCIA also mandates that CISA proactively identifies systems vulnerable to ransomware attacks. CISA noted that the notifications sent to vulnerable entities will include details about the vulnerable system, including manufacturer and model, the IP address in use, how the vulnerability was detected, and guidance on how to address the issue. CISA stated that receiving a notification through CISA RVWP is not indicative of a compromise. However, it does indicate you are at risk, and the information system requires immediate remediation. CISA noted that the notified entities are not required to comply with the provided recommendations.

    SecurityWeek reports: "CISA Program Warns Critical Infrastructure Organizations Vulnerable to Ransomware Attacks"

  • news

    Visible to the public "Ring Denies Falling Victim to Ransomware Attack"

    In response to a cybercrime group's claim, home security firm Ring announced that it has no evidence that it has fallen victim to a ransomware attack. Founded in 2013 and acquired by Amazon in 2018, Ring started with a smart doorbell and later expanded its portfolio with an alarm system and other smart home security products. On Monday, the cybergang behind the Alphv ransomware added an entry to their leaks site claiming they breached Ring and threatened to release data supposedly stolen from the company. The entry does not provide details on the amount or type of data that might have been compromised. Also tracked as BlackCat and Noberus and written in the Rust programming language, the Alphv ransomware family was first seen in November 2021. Its operators are likely linked to the previously known cybercrime ring behind the Darkside/Blackmatter ransomware.

    SecurityWeek reports: "Ring Denies Falling Victim to Ransomware Attack"

  • news

    Visible to the public "LA Housing Authority Suffers Year-Long Breach"

    The Housing Authority of the City of Los Angeles (HACLA) has recently issued a public notice outlining the impact of a ransomware breach first reported at the start of this year. The public agency, which claims to hold the largest stock of affordable housing in the city, acknowledged a "cyber-event that resulted in disruption to its systems" at the start of January 2023. The ransomware group LockBit claimed that it had stolen and would publish over 15TB of files from the authority. In a fresh update, HACLA has now confirmed it discovered encrypted files in its IT environment on December 31, 2022. The forensic investigation determined there was unauthorized access to certain servers between January 15, 2022, through December 31, 2022. The HACLA noted that after undertaking a "comprehensive review" of all its data, it finally determined on February 13, 2023, that the impacted systems contained personal information. While the specific data elements vary for each potentially affected individual, the scope of information potentially involved includes an individual's name, Social Security number, date of birth, passport number, driver's license number or state identification number, tax identification number, military identification number, government issued identification number, credit/debit card number, financial account number, health insurance information, and medical information. The housing agency has informed the relevant authorities and the individuals impacted by the incident.

    Infosecurity reports: "LA Housing Authority Suffers Year-Long Breach"

  • news

    Visible to the public "Students Play Crucial Role in Making Cybersecurity Impact"

    Local governments, K-12 schools, and rural hospitals seeking to improve their cybersecurity are collaborating with University of Georgia (UGA) students to gain a more thorough understanding of their organization's preparedness for cyberattacks. Through CyberArch, UGA is tackling the cybersecurity concerns of Georgia's communities and businesses by helping them to increase their awareness of cyber threats and strengthen their cyber preparedness and response efforts. Working in teams of four, student interns conduct a cybersecurity risk review using a set of assessment questions, then visit a site visit before preparing a final report with recommendations to improve the organization's cybersecurity posture. Mark Lupo, a senior public service associate at UGA's Carl Vinson Institute of Government and UGA CyberArch coordinator, explains that the program focuses on the city and county government, K-12 school system, and rural hospital sectors due to their higher profiles, vulnerability, and limited financial resources. According to recent research by the International City/County Management Association (ICMA), cybercriminals target local governments because of insufficient cybersecurity implementations, typically due to financial constraints. This article continues to discuss the CyberArch program aimed at addressing security challenges for Georgia's communities and businesses.

    The University of Georgia reports "Students Play Crucial Role in Making Cybersecurity Impact"

  • news

    Visible to the public "The BCI Cyber Resilience Report 2023"

    BCI's latest Cyber Resilience Report, sponsored by Daisy, explores the levels of disruption and cyber resilience arrangements across organizations, as well as the reporting and role of senior executives in developing cyber resilience strategies. Although 74 percent of respondents reported an increase in cyberattacks over the last 12 months, most organizations rated the impact of these attacks as small to medium. A growing number of companies are taking proactive measures to lessen the impact of cyberattacks. The report proves taking a more proactive approach to cybersecurity results in fewer negative effects on organizations. Several organizations are using dedicated technologies to boost the likelihood of an early warning and a quicker, more efficient response. Regarding their most recent cyber incident, 39.9 percent of respondents were alerted by a Security Information Event Management (SIEM) system, whereas 35.2 percent received an antivirus or End Detection and Response (EDR) alert. Using these tools typically results in the detection of an attack before business effects are recorded. However, 14.5 percent of organizations realized a cyberattack was occurring as a result of a system failure, which runs the risk of customer impacts and reputational damage while also forcing the organization to have a more reactive, slower response. This article continues to discuss key findings from BCI's 2023 Cyber Resilience Report.

    Continuity Central reports "The BCI Cyber Resilience Report 2023"

  • news

    Visible to the public "Crooks Taunt Prestigious School by Leaking Student Names"

    Bishop Luffa School, a British secondary school operated by the Church of England, had student information exposed due to a possible ransomware attack by the Medusa group. Local media reports indicate that the organization's systems have been offline since March 9. Although the school did not mention the cause of the security breach, ransomware is the likely culprit. The Medusa ransomware gang has listed Bishop Luffa School on its dark web blog, a website used by the group to showcase its latest victims. The threat actors also included samples of data allegedly stolen from the school containing the students' names and surnames and the faculty members' personal information. The entry on Medusa's blog containing the school's details reveals that the gang demanded $100,000 to remove the stolen data. However, the ransom demand could be significantly different from what the cybercriminals have made public. Last month, the Medusa ransomware gang joined the ranks of the most active ransomware groups, having begun operations at the tail end of last year. This article continues to discuss the British secondary school potentially being a victim of the Medusa ransomware gang and the growing activity of this cybercriminal group.

    Cybernews reports "Crooks Taunt Prestigious School by Leaking Student Names"

  • news

    Visible to the public "New Bills Look To Help Small Water Systems Tap Cybersecurity Help"

    Water is crucial to life for communities across the US, but water systems are facing increasingly complex threats, including cyberattacks. Therefore, House and Senate lawmakers have introduced a pair of bills aimed at bolstering the cybersecurity of clean water and wastewater utilities. The Water System Threat Preparedness and Resilience Act plans to make it simpler for utilities to get information regarding potential cyberattacks or natural disasters that could have a significant impact on operations. The legislation plans to accomplish this by helping small utilities join the Water Information Sharing and Analysis Center (WaterISAC) through a proposed Environmental Protection Agency grant program. WaterISAC, a nonprofit organization founded in 2002 and governed by a board of directors composed of water and wastewater utility managers and state drinking water administrators, delivers critical infrastructure threat intelligence to members. This article continues to discuss the Water System Threat Preparedness and Resilience Act.

    GCN reports "New Bills Look To Help Small Water Systems Tap Cybersecurity Help"

  • news

    Visible to the public "Death Registry System in Hawaii Had Data Breach, Health Department Says"

    After a cyberattack in January allowed hackers limited access to Hawaii's death registry, the Hawaii Department of Health is sending out breach notification letters. Officials cautioned that although the hackers did not access death certificates, newly bereaved family members should stay watchful regarding any unresolved matters, such as accounts, estates, life insurance claims, and Social Security survivor benefits. On January 23, the cybersecurity company Mandiant alerted various state departments that the credentials for an external medical death certifier account connected to the state Electronic Death Registry System (EDRS) had been sold on the dark web. Even though the department quickly disabled the external account, a February investigation revealed that a hacker obtained around 3,400 death records. According to the department, the dates of death on these documents ranged from 1998 to 2023, with 90 percent occurring in 2014 or before. Death certificates, which are necessary for settling financial and legal matters, are generated separately from death records. The death records include the decedent's name, Social Security number, address, gender, date of birth, date of death, place of death, and reason for death. This article continues to discuss the breach of Hawaii's EDRS.

    The Record reports "Death Registry System in Hawaii Had Data Breach, Health Department Says"

  • news

    Visible to the public "93 Percent of Organizations Suffer Business Email Compromise Attacks"

    The threat of Business Email Compromise (BEC) is growing as the number of BEC attacks is predicted to surpass the number of phishing attacks significantly. According to a new report from the cloud email security platform IRONSCALES, more than 93 percent of organizations have encountered one or more types of BEC attacks within the previous 12 months, with 62 percent encountering three or more attack variants. In addition, 43.3 percent of respondents from major organizations expect an increase in BEC attacks over the next 12 months. The report also reveals that finance employees and C-level executives are the two groups most commonly targeted by BEC attacks. About half of all groups report daily, weekly, or monthly BEC attacks. The most typical types of BEC attacks are fake invoices, data theft, and account takeover. In the past 12 months, one in five companies has experienced these types of attacks. Two in three organizations have seen three or more types of BEC attacks in this time, with data theft attacks occurring most frequently. This article continues to discuss key findings from IRONSCALES' new report on BEC attacks.

    BetaNews reports "93 Percent of Organizations Suffer Business Email Compromise Attacks"

  • news

    Visible to the public "Cybercrime Losses Exceeded $10 Billion in 2022: FBI"

    According to the Internet Crime Complaint Center (IC3), the FBI received more than 800,000 cybercrime-related complaints in 2022, with losses totaling over $10 billion. Recently the IC3 published their 2022 Internet Crime Report showing that while the number of complaints was smaller compared to 2021, losses increased from $6.9 billion to $10.3 billion. In the past five years, the FBI received a total of 3.26 million complaints for $27.6 billion in losses. According to the IC3, the top five types of cyber-related crimes in 2022 were phishing (300k complaints), personal data breach (58k complaints), non-payment/non-delivery scams (51k), extortion (39k), and tech support scams (32k). More than 21,000 complaints were related to business email compromise (BEC) attacks, with $2.7 billion in losses. According to the IC3, their Recovery Asset Team (RAT) has managed to help many victims of BEC attacks recover their funds. In 2022, investment scams exceeded BEC in terms of losses, with $3.31 billion reported, which was a 127% increase compared to 2021. A significant chunk of the total was blamed on cryptocurrency investment fraud, which increased from $907 million in 2021 to $2.57 billion in 2022. As for ransomware attacks, the FBI received more than 2,300 complaints last year, with adjusted losses reaching more than $34 million. Over 800 of these complaints came from organizations across 14 of the 16 critical infrastructure sectors. The IC3 noted that the most targeted, with over 100 incidents each, were the healthcare, critical manufacturing, government facilities, and IT sectors. The ransomware operations most commonly seen targeting critical infrastructure were LockBit, BlackCat, and Hive. According to the report, call center fraud, which includes tech support and government impersonation scams, had 44,000 victims, with losses exceeding $1 million.

    SecurityWeek reports: "Cybercrime Losses Exceeded $10 Billion in 2022: FBI"

  • news

    Visible to the public "CISA and Girl Scouts of the USA Strengthen Collaboration to Bring More Young Women into Cybersecurity"

    The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) and Girl Scouts of the USA (GSUSA) have announced a new Memorandum of Understanding (MOU) that formalizes their collaboration to close the gender gap in cybersecurity. According to a recent Women in CyberSecurity (WiCyS) and Cybersecurity Ventures report, women make up only 25 percent of the global cybersecurity workforce, while women compose 51 percent of the population. Without women pursuing cybersecurity careers, the field is missing out on a massive portion of the population's talent pool. In order to address this gap, it is essential that young girls develop an interest in cybersecurity as early as elementary school. CISA and GSUSA have a history of collaboration. In 2017, CISA provided collaboration and guided the development of GSUSA's 18 cybersecurity badges. Girl Scouts have earned over 315,000 cybersecurity badges in less than five years. In addition, in 2021, the Department of Homeland Security (DHS) and CISA teamed up with CYBER.ORG and GSUSA to create the 2021 Girl Scout Cyber Awareness Challenge in an effort to cultivate the next generation of diverse cybersecurity talent and increase the nation's cyber resilience. This article continues to discuss CISA and GSUSA strengthening the collaboration aimed at increasing cybersecurity interest among young women and bridging the gender gap in cybersecurity.

    CISA reports "CISA and Girl Scouts of the USA Strengthen Collaboration to Bring More Young Women into Cybersecurity"

  • news

    Visible to the public "Euler Loses Nearly $200 Million to Flash Loan Attack"

    London, UK-based De-Fi platform company Euler has recently lost a reported $196 million to a flash loan attack. A flash loan is an instant unsecured loan controlled by smart contracts. It allows a "borrower to obtain collateral, use that collateral for its purposes, and return the collateral to its source, provided it all occurs within a single transaction." It consequently relies on a sequence of complex conditions. The concept was pioneered in 2020 by the Ethereum lending platform Aave. Details of this attack are not yet clear. Euler stated that it appears that the attacker used flash loans to borrow from the De-Fi protocols Aave and Balancer and deposited the money with Euler. The attacker then borrowed ten times the amount it had deposited with Euler. Euler noted that the precise means, or vulnerability, by which the attacker could break the smart contract and keep the borrowings is unclear. Nor is it entirely clear whether the attack has finished or whether it is still in process and more losses will be revealed. Euler was founded in September 2020.

    SecurityWeek reports: "Euler Loses Nearly $200 Million to Flash Loan Attack"

  • news

    Visible to the public "Blackbaud Settles $3m Charge Over Ransomware Attack"

    Cloud software provider Blackbaud has recently agreed to pay $3m to settle charges over regulatory filings it made following a major 2020 ransomware attack. The South Carolina-based firm, which sells software to non-profits, schools, and other "social good" organizations, said at the time that it discovered and contained the May 2020 attack, but threat actors managed to steal sensitive data belonging to customers. Blackbaud paid their extorters and stated at the time that they had no reason to believe the stolen data was or will be misused, or will be disseminated, or otherwise made available publicly. However, the SEC's order published late last week claimed that a quarterly report Blackbaud filed in August 2020 omitted details about the scope of the attack. The firm had said the risk of donor information being taken by the hackers was "hypothetical." The SEC stated that, in reality, Blackbaud tech and customer service staff knew that donor bank account details and social security information had been stolen but didn't communicate this to senior management. The SEC ruled that this was down to a failure to properly maintain disclosure controls and procedures. David Hirsch, chief of the SEC Enforcement Division's Crypto Assets and Cyber Unit, stated that Blackbaud failed to disclose the full impact of a ransomware attack despite its personnel learning that their earlier public statements about the attack were erroneous. Hirsch noted that public companies have an obligation to provide their investors with accurate and timely material information and that Blackbaud failed to do so. The firm has agreed to cease and desist from committing violations of the Securities Act and Securities Exchange Act. In the end, the ransomware breach impacted over 13,000 customers, the SEC said.

    Infosecurity reports: "Blackbaud Settles $3m Charge Over Ransomware Attack"

  • news

    Visible to the public "Prometei Botnet Evolves and Infected +10,000 Systems since November 2022"

    According to researchers at Cisco Talos, the Prometei botnet has infected over 10,000 devices worldwide since November 2022. The structure of the cryptocurrency mining botnet is modular, and it uses different methods to infect devices and avoid detection. Cisco Talos first observed the Prometei botnet in July 2020. An analysis of artifacts uploaded to VirusTotal enabled analysts to conclude that the botnet may have been operational since at least May 2016. Researchers noted that the malware's developers implemented new modules and functionalities on a consistent basis. Cisco Talos confirms that the Prometei botnet continues to enhance its modules and demonstrate new capabilities as a result of recent changes. Some submodules of the execution chain were updated by the botnet operators in order to automate activities and make it more difficult to successfully apply forensic analysis techniques. Based on data gathered by sinkholing the Domain Generating Algorithm (DGA) domains for one week in February 2023, Cisco Talos estimates with high confidence that version 3 of the Prometei botnet is of medium size, with more than 10,000 infected devices worldwide. The most recent release includes previously undocumented features, including an alternate command-and-control (C2) DGA and a self-updating method. The new variant combines a version of the Apache Webserver with a web shell that is launched onto victim hosts. This article continues to discuss the new version of the Prometei botnet that has infected over 10,000 systems worldwide since November 2022.

    Security Affairs reports "Prometei Botnet Evolves and Infected +10,000 Systems since November 2022"

  • news

    Visible to the public "Zoll Medical Data Breach Impacts 1 Million Individuals"

    Medical technology developer Zoll Medical is notifying roughly one million individuals that their personal information might have been compromised in a recent data breach. The company develops and markets medical equipment and software for advanced emergency care, including cardiac monitoring, oxygen therapy, ventilation, data management, and more. The company identified the breach at the end of January when it discovered unusual activity on its internal network. The company stated that they determined that their information may have been affected on or about February 2, 2023. The company noted that its investigation into the incident is ongoing. According to Zoll, the compromised information included names, addresses, birth dates, and Social Security numbers. Zoll says it has no indication that the exposed information was misused. It's unclear what type of cyberattack Zoll fell victim to and whether ransomware was deployed on its systems.

    SecurityWeek reports: "Zoll Medical Data Breach Impacts 1 Million Individuals"

  • news

    Visible to the public "TSA Issues Additional Cybersecurity Rules for the Aviation Sector"

    The Transportation Security Administration (TSA) has issued a new cybersecurity amendment to the security programs of certain TSA-regulated airport and aircraft operators in the aviation industry. This amendment is part of the Department of Homeland Security's (DHS) efforts to strengthen the cybersecurity resilience of US critical infrastructure, and it follows collaboration with aviation partners. This emergency action is being taken by the TSA due to continuous cyber threats against US critical infrastructure, particularly the aviation industry. The new emergency amendment calls on impacted TSA-regulated entities to prepare an approved implementation plan that outlines the steps they are taking to enhance their cybersecurity resilience and prevent infrastructure disruption and degradation. In addition, they must proactively evaluate the effectiveness of these measures, which include developing policies and controls for network segmentation, creating access control measures, implementing policies and procedures for continuous monitoring and detection, and reducing the risk of exploitation of unpatched systems. This article continues to discuss the new cybersecurity amendment issued by the TSA to the security programs of certain TSA-regulated airport and aircraft operators.

    Help Net Security reports "TSA Issues Additional Cybersecurity Rules for the Aviation Sector"

  • news

    Visible to the public "And the Cyberattack Goes to ... Fans of Oscar-Nominated Films"

    The greater the popularity and critical acclaim of a pirated film, the greater the likelihood that it contains more infected files. A ReasonLabs research team analyzed data on film piracy from January 2022 until last month, focusing on some of the most well-known films from the previous year, all of which were nominees for awards at the 95th Academy Awards. The researchers discovered thousands of cases in which these highly nominated films masked cyber threats. The traps include spyware, Trojans, and malware. This past year, "Everything Everywhere All at Once," "Top Gun: Maverick," and "Avatar: The Way of Water," all of which were fan and critic favorites, were among the top films used to phish and draw victims. ReasonLabs discovered that the most prevalent threats in this year's pirated Oscar nominees were spyware personal document stealers, password stealers extensions, keyloggers, search hijacker extensions, and the Bat Worm. This article continues to discuss the rise in malicious files present in attempts to watch popular films for free.

    Dark Reading reports "And the Cyberattack Goes to ... Fans of Oscar-Nominated Films"

  • news

    Visible to the public "Warning: AI-generated YouTube Video Tutorials Spreading Infostealer Malware"

    Threat actors have been spotted using Artificial Intelligence (AI)-generated YouTube videos to spread Raccoon, RedLine, and other information stealer malware. Pavan Karthick M., a researcher at CloudSEK, explained that the videos lure users by posing as lessons on how to download cracked versions of licensed software such as Photoshop, Premiere Pro, Autodesk 3ds Max, AutoCAD, and more. In the same way that the ransomware ecosystem consists of core developers and affiliates who are responsible for identifying potential targets and executing the attacks, the information stealer ecosystem includes threat actors known as traffers who are recruited to spread the malware through various means. CloudSEK has observed a 200-300 percent month-over-month increase in the number of YouTube videos containing links to stealer malware in their descriptions. This article continues to discuss threat actors' use of AI-generated YouTube Videos to spread malware.

    THN reports "Warning: AI-generated YouTube Video Tutorials Spreading Infostealer Malware"

  • news

    Visible to the public "CASPER Attack Steals Data Using Air-Gapped Computer's Internal Speaker"

    Researchers at the School of Cyber Security at Korea University in Seoul have unveiled a new covert channel attack called CASPER that can leak data from air-gapped computers to a neighboring smartphone at a rate of 20bits/sec. The CASPER attack uses the target computer's internal speakers as a data transmission channel to transfer high-frequency audio that the human ear cannot detect, and convey binary or Morse code to a microphone up to 1.5m away. The receiving microphone may be in an attacker's pocket-recording smartphone or a laptop in the same room. Researchers in the past have devised similar attacks using external speakers. However, systems used in critical areas, such as government networks, energy infrastructure, and weapon control systems, that are air-gapped and network-isolated are unlikely to have external speakers. Internal speakers that offer audible feedback, such as boot-up noises, are still deemed necessary. Therefore, their prevalence makes them preferable targets. This article continues to discuss the new CASPER covert channel attack.

    Bleeping Computer reports "CASPER Attack Steals Data Using Air-Gapped Computer's Internal Speaker"

  • news

    Visible to the public "Serious Vulnerability Patched in Veeam Data Backup Solution"

    Veeam recently announced patches for a severe vulnerability in its Backup & Replication solution that could lead to the exposure of credentials. A backup solution for virtual environments, Veeam Backup & Replication, supports virtual machines running on Hyper-V, Nutanix AHV, and vSphere, as well as servers, workstations, and cloud-based workloads. The vulnerability is tracked as CVE-2023-27532 (CVSS score of 7.5) and allows an attacker to obtain the encrypted credentials that are stored in the configuration database. The company stated that the vulnerable process, Veeam.Backup.Service.exe (TCP 9401 by default), allows an unauthenticated user to request encrypted credentials. According to the company, successful exploitation of the security defect could provide attackers with access to the backup infrastructure hosts. All Veeam Backup & Replication versions are impacted by this issue. Patches were included in application versions 12 (build 12.0.0.1420 P20230223) and 11a (build 11.0.1.1261 P20230227). The company noted that new deployments installed using the ISO images dated February 23 (version 12) and February 27 (version 11) or later are not vulnerable. Users of older Veeam Backup & Replication versions are advised to update to a supported iteration as soon as possible.

    SecurityWeek reports: "Serious Vulnerability Patched in Veeam Data Backup Solution"

  • news

    Visible to the public "Researchers Take a Step Towards Turning Interactions That Normally Ruin Quantum Information into a Way of Protecting It"

    Researchers have discovered a method for predicting the behavior of many-body quantum systems that are coupled to their environment. The study demonstrates a method for protecting quantum information in quantum devices, which is essential for the practical use of quantum technology. In a study published in Physical Review Letters, researchers from Aalto University in Finland and IAS Tsinghua University in China describe a novel method for predicting the behavior of quantum systems, such as groups of particles, while they are connected to the outside world. Connecting a system, such as a quantum computer, to its environment typically results in decoherence and leaks, which destroy any knowledge about what is occurring inside the system. Now, researchers have created a method that transforms this dilemma into its solution. In the latest work, the researchers demonstrated that connecting a quantum device to an external system can be advantageous under certain conditions. When a quantum device possesses so-called non-Hermitian topology, it leads to protected quantum excitations whose resilience stems from the fact that they are open to the environment. These types of open quantum systems have the potential to give rise to innovative new tactics for quantum technologies that use external coupling to prevent information decoherence and leaks. This article continues to discuss the researchers' work toward turning interactions that typically ruin quantum information into a way of protecting it.

    Aalto University reports "Researchers Take a Step Towards Turning Interactions That Normally Ruin Quantum Information into a Way of Protecting It"

  • news

    Visible to the public "White House Allocates $3.1bn to Cybersecurity in New Budget"

    The White House has recently allocated a total of $3.1bn to cybersecurity infrastructure in its latest budget report. The document shows $145m of this figure will go toward making the Cybersecurity and Infrastructure Security Agency (CISA) more resilient and defensible. Of the remaining funds, $98m will be invested in implementing the Cyber Incident Reporting for Critical Infrastructure Act of 2021, and $425m will go towards improving CISA's internal cybersecurity and analytical capabilities. The document says that to protect against foreign adversaries and safeguard Federal systems that the American people rely on, the Budget bolsters cybersecurity by ensuring every agency is increasing the security of public services.

    Infosecurity reports: "White House Allocates $3.1bn to Cybersecurity in New Budget"

  • news

    Visible to the public "AT&T Vendor Data Breach Exposed 9 Million Customer Accounts"

    AT&T customer data was exposed in January through a third-party vendor that had been hacked. The company noted that the breach affected around nine million customer accounts. The breached data included basic personal information but no financial data or Social Security numbers. The data that AT&T had provided to the marketing vendor, which had been exposed, was mostly related to device upgrade eligibility. It included basic personal information like customer names, account numbers, phone numbers, and email addresses, as well as the number of lines on the account, devices used, and installment agreement information. AT&T noted that the exposed data didn't include Social Security numbers, credit card information, account passwords, or "other sensitive information." The data set was also several years old. AT&T said that its own systems were not breached and that it was notifying customers who had been affected.

    CNET reports: "AT&T Vendor Data Breach Exposed 9 Million Customer Accounts"

  • news

    Visible to the public "Cerebral Informing 3.1 Million Individuals of Inadvertent Data Exposure"

    Emotional health care provider Cerebral is informing over 3.1 million individuals that their protected health information (PHI) might have been inadvertently exposed via third party tracking technologies on its platforms. Cerebral noted that it has been using tracking technologies such as those provided by Facebook, Google, TikTok, and others since 2019 but disabled, reconfigured, or removed them after learning that some of the data shared with the third parties also included PHI. Cerebral stated that, additionally, the sharing of data with all subcontractors that did not meet all HIPAA requirements was promptly disabled. Before that, however, depending on factors such as individuals' use of Cerebral platforms, the nature of subcontracted services, and the configuration of the tracking technologies and data capturing platforms, various amounts of personal information were exposed to third parties. According to the company, for individuals creating a Cerebral account, the exposed information included names, phone numbers, email and IP addresses, birth dates, Cerebral client ID numbers, and other information. For individuals who also completed portions of Cerebral's online mental health self-assessment, details on the service, the assessment responses, and certain health information were also exposed. The company noted that in cases where the individuals also purchased a subscription plan from Cerebral, details on the selected plan, along with appointment dates, treatments, health insurance/pharmacy benefit information, other clinical information, and insurance co-pay amounts, were also exposed. According to the company, the exposed data did not include Social Security numbers, credit card data, or bank account information. The company stated that out of an abundance of caution, they are notifying anyone who fell into any of these categories, even if they did not become a Cerebral patient or provide any information beyond what was necessary to create a Cerebral account. Cerebral noted that, in addition to preventing the use of tracking technologies by blocking or deleting cookies in their browsers, the impacted individuals might want to reset their Cerebral account passwords and can adjust their privacy settings on Facebook, Google, and other online platforms.

    SecurityWeek reports: "Cerebral Informing 3.1 Million Individuals of Inadvertent Data Exposure"

  • news

    Visible to the public "Acronis Clarifies Hack Impact Following Data Leak"

    Swiss data protection firm Acronis has clarified that a single customer's account has been compromised after a hacker leaked gigabytes of information allegedly stolen from the company. On a popular cybercrime forum, a hacker recently announced that they were "leaking data of a cybersecurity company called Acronis," claiming that they hacked the company because they were bored and wanted to humiliate them. The hacker is the same one who recently offered to sell 160 Gb of data stolen from computer giant Acer. In the case of Acronis, the cybercriminal published a 12 Gb archive file allegedly containing certificate files, command logs, system configurations and information logs, filesystem archives, scripts, and backup configuration data. Acronis offers backup, disaster recovery, antivirus, and endpoint protection management solutions. After the incident came to light, the company clarified that the leaked data appears to come entirely from a single customer's account. The company noted that based on their investigation so far, the credentials used by a single specific customer to upload diagnostic data to Acronis support had been compromised. The company stated that they are working with that customer and have suspended account access as they try to resolve the issue. The company noted that no other system or credential had been affected. There is no evidence of any other successful attack, nor is there any data in the leak that is not in the folder of that one customer. Acronis has also separately clarified that none of its products are impacted by the breach.

    SecurityWeek reports: "Acronis Clarifies Hack Impact Following Data Leak"

  • news

    Visible to the public "Alleged Seller of NetWire RAT Arrested in Croatia"

    As part of a global law enforcement operation, federal authorities in Los Angeles successfully seized a domain used by cybercriminals to distribute the NetWire Remote Access Trojan (RAT). The NetWire RAT enabled cybercriminals to take control of infected computers and steal sensitive data from victims. Police arrested a Croatian national who was allegedly the website's administrator. The suspect pinpointed by Brian Krebs will be prosecuted by Croatian authorities. In addition, law enforcement in Switzerland confiscated the computer server hosting the NetWire RAT infrastructure. Although the website advertised NetWire as a legitimate business tool to maintain computer infrastructure, the affidavit states that NetWire is malware used for malicious purposes. The software was advertised on hacking forums, with many cybersecurity companies and government agencies having documented the NetWire RAT being used in criminal activity. This article continues to discuss the global law enforcement operation aimed at taking down the NetWire RAT.

    Help Net Security reports "Alleged Seller of NetWire RAT Arrested in Croatia"

  • news

    Visible to the public "Akamai Mitigates Record-Breaking 900Gbps DDoS Attack in Asia"

    Akamai mitigated the largest Distributed Denial-of-Service (DDoS) attack ever launched against a customer in the Asia-Pacific region. DDoS is an attack that delivers a high volume of garbage requests to a targeted server, therefore depleting its capacity and preventing legitimate users from accessing the websites, applications, or other online services it hosts. The record-breaking attack mitigated by Akamai peaked at 900.1 gigabits per second and 158.2 million packets per second on February 23, 2023. According to Akamai, the attack was powerful and brief, with its peak lasting approximately one minute, which is consistent with current patterns in DDoS attacks. The company handled the attack by redirecting garbage traffic to its scrubbing network, most of which ended up in centers in Hong Kong, Tokyo, So Paulo, Singapore, and Osaka. A scrubbing network is a DDoS mitigation technique that uses a distributed infrastructure with multiple strategically located centers to filter incoming traffic and delete unwanted requests from the target's network. This article continues to discuss the record-breaking DDoS attack recently mitigated by Akamai and other record-holding DDoS attacks.

    Bleeping Computer reports "Akamai Mitigates Record-Breaking 900Gbps DDoS Attack in Asia"

  • news

    Visible to the public "Xenomorph Android Banking Trojan Returns with a New and More Powerful Variant"

    ThreatFabric's most recent research reveals that a new variant of the Android banking Trojan known as Xenomorph has been seen in the wild. Hadoken Security Group, the threat actor behind the operation, dubbed the updated version "Xenomorph 3rd generation" since it includes additional features that allow it to conduct financial fraud seamlessly. This new version of the malware adds numerous new capabilities to an already feature-rich Android banker, including the introduction of an extensive runtime engine powered by Accessibility services, which actors use to implement a complete ATS framework, according to the security firm. A year ago, in February 2022, it was discovered that Xenomorph was targeting 56 European banks through dropper apps available on the Google Play Store. In contrast, the most recent version of the banker, which has a website promoting its capabilities, aims to target over 400 banking and financial institutions and various cryptocurrency wallets. This article continues to discuss findings regarding Xenomorph 3rd generation Trojan.

    THN reports "Xenomorph Android Banking Trojan Returns with a New and More Powerful Variant"

  • news

    Visible to the public "IceFire Ransomware Portends a Broader Shift From Windows to Linux"

    Hackers have launched the IceFire ransomware against Linux enterprise networks, a notable change for malware that was once exclusive to Windows. According to a report by SentinelOne, this may reflect an emerging trend. Recently, ransomware actors have increasingly targeted Linux systems in cyberattacks, which is significant because, compared to Windows, Linux is more difficult to launch ransomware against at scale, according to Alex Delamotte, security researcher at SentinelOne. IceFire, which was first discovered in March of last year, is a ransomware variant consistent with other Big-Game Hunting (BGH) ransomware families, according to Delamotte. BGH ransomware is characterized by double extortion, large company targeting, multiple persistence tactics, and log file deletion to evade analysis. IceFire was formerly restricted to Windows-based systems, but its most recent attacks have targeted Linux-based enterprise networks. This article continues to discuss the shift in OS targeting by the IceFire malware.

    Dark Reading reports "IceFire Ransomware Portends a Broader Shift From Windows to Linux"

  • news

    Visible to the public "5 Best Practices from Industry for Implementing a Zero Trust Architecture"

    Researchers at Carnegie Mellon University (CMU) have detailed five zero trust best practices. When considering going through a zero trust transformation, it is crucial to develop and maintain a comprehensive inventory of Data, Applications, Assets, and Services (DAAS) in accordance with the National Security Telecommunications Advisory Committee (NSTAC) and Department of Defense (DOD) Zero Trust Reference Architecture. This inventory helps companies understand their enterprise architecture baseline and the steps needed for zero trust transformation. Key components of establishing dynamic zero trust policies are inventory logging and auditing. In order to optimize maturity, organizations are advised to use automation, orchestration, and Application Programming Interfaces (APIs). Ideal zero trust maturity includes continuous identity validation, device monitoring and validation, encrypted traffic, and dynamic data policies. Without automation and APIs, it is much more difficult to effectively execute the recommended practices for implementing zero trust architecture. According to researchers, automation and APIs help with collecting and updating an inventory, auditing and logging, implementing security guardrails as part of governance and risk management, and using cloud and virtual solutions that need to communicate automatically with multiple other inventory components to function. This article continues to discuss best practices from the industry for implementing a zero trust architecture.

    Carnegie Mellon University reports "5 Best Practices from Industry for Implementing a Zero Trust Architecture"

  • news

    Visible to the public "SAFECOM and NCSWIC Release LLA and LLE: Are You Really Secure?"

    The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) is bringing attention to whether there is true security when using a Land Mobile Radio (LMR). Most Project 25 (P25) radio systems include built-in safeguards, but the availability of software key generators and other attack vectors used by threat actors call for the addition of new P25 features to ensure the security of P25 communications. Link Layer Security (LLS) features such as Link Layer Authentication (LLA) and Link Layer Encryption (LLE) have gained attention from manufacturers and users seeking to improve communications security over the years. The whitepaper titled "LLA and LLE: Are You Really Secure?" describes these features and their impact on safeguarding public safety communications, and presents a case study illustrating why these features should be used to provide added LMR system protections. This article continues to discuss the release of a whitepaper on LLA and LLE.

    CISA reports "SAFECOM and NCSWIC Release LLA and LLE: Are You Really Secure?"