News Items

  • news

    Visible to the public "Pernicious Permissions: How Kubernetes Cryptomining Became an AWS Cloud Data Heist"

    A vulnerable Kubernetes container and weak permissions enabled an adversary to transform an opportunistic cryptojacking attack into a widespread invasion impacting intellectual property and sensitive data. The attack, dubbed "SCARLETEEL" by the cloud security company Sysdig, began with a threat actor exploiting a Kubernetes cluster, using an internal service to obtain temporary credentials, and then using those credentials to enumerate other Elastic Compute Cloud (EC2) services that had been deployed in the infrastructure of the targeted company. Ultimately, the company, which was not identified in the incident report, limited the scope of permissions for the stolen identity, therefore neutralizing the attack. Michael Clark, head of security research at Sysdig, notes that companies must be cautious when setting the controls that enable cloud resources to work with one another. The sophisticated cyberattack also demonstrates that cybercriminals are increasingly attacking cloud infrastructure. In the past, threat actors focused on rudimentary interactions with cloud services, such as the deployment of cryptojacking software. However, cloud-focused attacks are becoming more prevalent as threat actors gain a better understanding of the vulnerabilities introduced by businesses. This article continues to discuss the SCARLETEEL attack on a company's Amazon Web Services (AWS) account.

    Dark Reading reports "Pernicious Permissions: How Kubernetes Cryptomining Became an AWS Cloud Data Heist"

  • news

    Visible to the public "BlackLotus Becomes First UEFI Bootkit Malware to Bypass Secure Boot on Windows 11"

    BlackLotus, a stealthy Unified Extensible Firmware Interface (UEFI) bootkit, is the first publicly known malware that can circumvent Secure Boot protections, making it a major cyber threat. According to a report by ESET, this bootkit can operate on Windows 11 systems with UEFI Secure Boot enabled. UEFI bootkits are launched in the system firmware and provide complete control over the operating system boot process, allowing the disabling of OS-level security features and the execution of arbitrary payloads with elevated privileges during startup. The 80-kilobyte, Assembly, and C-based robust and persistent toolkit is sold for $5,000 (plus $200 per new version). In addition, geofencing capabilities prevent infection of computers in Armenia, Belarus, Kazakhstan, Moldova, Romania, Russia, and Ukraine. This article continues to discuss the BlackLotus UEFI bootkit.

    THN reports "BlackLotus Becomes First UEFI Bootkit Malware to Bypass Secure Boot on Windows 11"

  • news

    Visible to the public "Clemson University Joins Nation's Frontline Defense against Cyberattacks on the Transportation System"

    Clemson University is opening a National Center where researchers will develop new methods to bolster the transportation system security against cyberattacks. The new National Center for Transportation Cybersecurity and Resilience (TraCR) will receive a five-year grant of $20 million from the US Department of Transportation. Researchers are working to develop software and hardware that will serve as impenetrable cyber defense. Connecting cars wirelessly to each other and to the roadway infrastructure can reduce traffic congestion, accidents, fuel consumption, pollution, and social disparities. However, it also exposes the transportation system to cyber threats from hackers, criminal gangs, terrorists, and other malicious actors. With each car and piece of infrastructure that connects to the Internet, there is the potential to steal data, breach privacy, demand a ransom, deliver false information, or even bring down an entire system. The new center will place Clemson University at the frontline of the nation's defense against major infrastructure threats. Benedict College, Florida International University, Morgan State University, Purdue University, South Carolina State University, the University of Alabama, the University of California, Santa Cruz, and the University of Texas at Dallas are partner institutions. The center's researchers plan to examine multiple modes of transportation, from cars, trucks, and bicycles to passenger rail, maritime transport, and pipelines. Researchers will create an adaptive and resilient platform to help detect threats and defend against attacks that hackers have not yet invented. The team will also delve into quantum computing, looking at how to evaluate threats from quantum computers and how such computers can be used to defend against cyberattacks. This article continues to discuss the new National Center for TraCR at Clemson University, which will develop software and hardware to combat cyberattacks on the nation's transportation systems.

    Clemson University reports "Clemson University Joins Nation's Frontline Defense against Cyberattacks on the Transportation System"

  • news

    Visible to the public "How ChatGPT Can Help Cybersecurity Pros Beat Attacks"

    There has been much discussion about how hackers might benefit from ChatGPT, the OpenAI-trained Artificial Intelligence (AI) chatbot, but it is important to also examine how cybersecurity experts can use this tool. In 2022, the Large Language Model (LLM) emerged onto the scene, amassing 1 million users in the first five days after its release. The security community and hackers have shown much interest in this AI technology. From writing malware code to generating an endless stream of phishing campaigns, many now consider ChatGPT a cyber actor's ideal platform. However, the question stills remain as to how this tool may help the good guys. As the volume and complexity of cyberattacks increase, AI is already supporting understaffed security teams in mitigating threats. AI technologies such as Machine Learning (ML) and Natural Language Processing (NLP) deliver actionable insights that cut through the noise by curating threat intelligence from various research sources, blogs, and news articles. This significantly decreases response times. Meanwhile, cognitive security blends the benefits of AI and human intelligence. Cognitive computing is a sophisticated form of AI that uses ML algorithms and deep-learning networks. These systems grow stronger and more intelligent with time. This article continues to discuss ChatGPT and its potential place in cybersecurity.

    Security Intelligence reports "How ChatGPT Can Help Cybersecurity Pros Beat Attacks"

  • news

    Visible to the public "CISA Red Team Shares Key Findings to Improve Monitoring and Hardening of Networks"

    The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) has released a Cybersecurity Advisory (CSA) titled "CISA Red Team Shares Key Findings to Improve Monitoring and Hardening of Networks," describing a red team assessment of a large organization with a mature cyber posture that manages critical infrastructure. CISA's new CSA delves into the red team's tactics, techniques, and procedures (TTPs) as well as key findings for network defenders wanting to take proactive steps to decrease the threat posed by malicious cyber actors. As described in the CSA, the CISA red team gained persistent network access to the organization, moved laterally across numerous geographically separate facilities, and gained access to systems close to the organization's sensitive business systems. This advisory emphasizes the significance of early detection and ongoing monitoring of cyber assets. This article continues to discuss the CSA on CISA red team findings to help network defenders improve the monitoring and hardening of their networks.

    HSToday reports "CISA Red Team Shares Key Findings to Improve Monitoring and Hardening of Networks"

  • news

    Visible to the public "State-Sponsored Hackers Are Diversifying Tactics, Targeting Small Businesses"

    According to SonicWall's 2023 Cyber Threat Report, state-sponsored threat actors are shifting their attention toward small and midsize businesses (SMBs). While large companies, public services, and crucial national infrastructure have historically been the primary targets of state-sponsored threat actors, it is expected that in 2023, adversaries will diversify their tactics to target SMBs and a larger variety of victims. The report also indicated that the change towards targeting SMBs correlates with a 21 percent reduction in the overall volume of ransomware attacks. The findings are consistent with those of other cybersecurity companies, which have mostly concurred in their various threat reports that ransomware detections have decreased over the past year. Global malware attacks rose by 2 percent last year using over 400,000 unique variants, marking the first increase in this attack method since 2018. Internet of Things (IoT) malware and cryptojacking tactics increased by 87 percent and 43 percent, respectively, as threat actors adopted slower and stealthier techniques to conduct financially motivated cyberattacks. This article continues to discuss key findings shared in SonicWall's 2023 Cyber Threat Report.

    ITPro reports "State-Sponsored Hackers Are Diversifying Tactics, Targeting Small Businesses"

  • news

    Visible to the public "88 Percent of Organizations Have Suffered Cyber Breaches in the Last Two Years"

    Pentera surveyed 300 CIOs, CISOs, and security leaders from businesses in Europe and the US, revealing that a cyberattack had impacted 88 percent of organizations over the past two years. The Pentera study finds that this is the case despite companies employing an average of nearly 44 security solutions. While regulatory requirements first drove the need for penetration testing, the primary reasons for such testing today are security validation, potential damage assessment, and cyber insurance. With only 22 percent of respondents reporting compliance as their top reason for the activity, regulatory or executive obligations remain significant but are not the key driver of penetration testing. This article continues to discuss key findings from Pentera's survey of CIOs, CISOs, and security executives.

    BetaNews reports "88 Percent of Organizations Have Suffered Cyber Breaches in the Last Two Years"

  • news

    Visible to the public "US Gov. Agencies Have 30 Days to Remove TikTok, Canada Follows Suit"

    The White House has given federal agencies 30 days to remove TikTok from all government-issued devices following the December 2022 ban on the social media app. The announcement comes from Shalanda Young, director of the office of management and budget, who published a memorandum for executive departments and agencies on Monday. The message stated that all executive agencies and those contracted by them must delete any application from TikTok and its China-based parent company, ByteDance, within 30 days of the notice. Further, within 90 days, agencies must include in contracts that the video app cannot be used on devices and must cancel existing contracts that require the app's use. The 30-day deadline comes hours before Canada Prime Minister Justin Trudeau announced banning TikTok from all government-issued mobile devices.

    Infosecurity reports: "US Gov. Agencies Have 30 Days to Remove TikTok, Canada Follows Suit"

  • news

    Visible to the public "Vulnerabilities Being Exploited Faster Than Ever: Analysis"

    Security researchers at Rapid7 discovered that in 2022, the widespread exploitation of new vulnerabilities was down 15% over the previous year, zero-day attacks declined 52% from 2021, and there were 33% fewer vulnerabilities known to have been exploited as part of a ransomware attack. The researchers noted that, on the surface, it might appear that things were easier for security teams last year. That would be wrong. During their study, the researchers also found that the time from vulnerability disclosure to exploitation is decreasing. A large number of vulnerabilities are being exploited before security teams have any time to implement patches or other mitigations. To be precise, 56% of the vulnerabilities were exploited within seven days of public disclosure, a 12% increase over 2021 and an 87% increase over 2020. The researchers noted that resources for triaging and remediating vulnerabilities remain limited, and priorities can be misdirected. The researchers believe that there are three primary takeaways from their current research. The first is that widespread threats remain high, even though they are down from 66% in 2021 to 56% in 2022's dataset. The second takeaway is the complexity of the ransomware ecosystem and how that affects visibility and statistics. And the last takeaway is that ransomware groups are leveraging fewer new vulnerabilities than they did in 2021.

    SecurityWeek reports: "Vulnerabilities Being Exploited Faster Than Ever: Analysis"

  • news

    Visible to the public "Tech Manufacturers Are Leaving the Door Open for Chinese Hacking, Easterly Warns"

    Jen Easterly, the head of the US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA), recently talked about the cyber threats posed by China, warning of dire consequences if technology manufacturers fail to improve the security of their products. In a speech at Carnegie Mellon University (CMU), CISA Director Jen Easterly stated that the culture of rushing technology to market is dangerous to consumers and the nation. As technology has been incorporated into practically every aspect of our lives, we have come to assume that such technology is inherently harmful, Easterly remarked. Her remarks reflect those of multiple government officials in recent years. Easterly criticized manufacturers for releasing products with many flaws that would be unacceptable in any other critical field. The speech came as the Biden administration prepares to announce a National Cybersecurity Plan, which will include initiatives for bolstering cybersecurity protections across the nation, with a focus on critical infrastructure. Officials have also stated that the strategy will address coordination between the private sector and the government. This article continues to discuss key points made by Easterly in her recent speech at CMU.

    The Record reports "Tech Manufacturers Are Leaving the Door Open for Chinese Hacking, Easterly Warns"

  • news

    Visible to the public "London Honeypots Attacked 2000 Times Per Minute"

    Security experts are warning that remote workers in the UK capital are being bombarded with cyberattacks after recording 91 million threats over a 28-day period in January. Insurer Coalition set up a series of honeypots in a project with police non-profit the Cyber Resilience Centre for London in a bid to calculate the cyber threat level to organizations operating in the region. Coalition's UK security researcher, Simon Bell, stated that they use honeypots to learn about threat actors and their methods. Once the attack happens, one can see what vulnerabilities the cybercriminal is looking for and how they try to exploit them. Bell noted that in this exercise, their honeypots were given IP addresses that were identified as physical data centers in London. The study recorded 2000 attacks per minute targeting the honeypots, with 85% of them attempting to hijack remote desktop connections used by employees working outside the office. The attacks were traced back to 101,000 different threat actors, with Russia as the largest single source of attacks, followed by Bulgaria, Monaco, and Panama. However, Coalition quickly pointed out that many threat actors hide their true location using VPNs routed through other countries. Bell argued that the research showed how working from home has significantly widened the corporate attack surface.

    Infosecurity reports: "London Honeypots Attacked 2000 Times Per Minute"

  • news

    Visible to the public "Danish Parliament Urges to Remove TikTok Over Cybersecurity"

    The Danish parliament recently urged lawmakers and employees with the 179-member assembly against having TikTok on work phones as a cybersecurity measure. The popular video-sharing app, which is Chinese-owned, faces intensifying scrutiny from Europe and the U.S. over security and data privacy amid worries that TikTok could be used to promote pro-Beijing views or sweep up users' information. The assembly acted after an assessment from Denmark's Center for Cyber Security, which had said there was a risk of espionage. The agency is part of Denmark's foreign intelligence service. Earlier this month, the European Union's executive branch said it had temporarily banned TikTok from phones used by employees as a cybersecurity measure. The EU's action follows similar moves in the U.S., where more than half of the country's 50 states and Congress have banned TikTok from official government devices.

    The Associated Press reports: "Danish Parliament Urges to Remove TikTok Over Cybersecurity"

  • news

    Visible to the public "Are Our Pets Leaking Information About Us?"

    According to new research, pet and animal-related apps pose cybersecurity risks to their owners. Many pet owners may find the ability to track their cats and dogs appealing since it can bring peace of mind. However, enabling a third party to track their movements can be less appealing. Through the analysis of 40 popular Android apps for pets, computer scientists from Newcastle University and Royal Holloway, University of London, have uncovered a number of security and privacy problems. Several of these apps put their users at risk by disclosing their login credentials or location information. One of the issues revealed by the researchers was password weakness. They found three apps that had user login details visible in plain text within non-secure HTTP traffic. This means that anyone can look at the Internet traffic of an individual using one of these apps and obtain their login credentials. In addition to login information, two of the apps displayed user details that may allow cybercriminals to access their devices and launch an attack. The researchers identified the use of trackers as an additional area of concern. All apps except for four were discovered to include tracking software. The team also cautions that the privacy policies of the apps are poorly communicated to the user. Their study reveals that 21 apps track the user in some manner prior to the user's authorization, thus violating existing data protection regulations. This article continues findings from the research on the cybersecurity risks posed by pet and animal-related apps.

    Newcastle University reports "Are Our Pets Leaking Information About Us?"

  • news

    Visible to the public "PlugX Trojan Disguised as a Legitimate Windows Open-Source Tool in Recent Attacks"

    Researchers at Trend Micro discovered a new wave of attacks crafted to distribute the PlugX Remote Access Trojan (RAT) disguised as the open-source Windows debugger x32dbg. The legitimate tool enables the examination of kernel-mode and user-mode code, crash dumps, and CPU registers. The executable file x32dbg.exe that the researchers studied has a valid digital signature. Therefore, it is regarded as secure by some security programs. It enables threat actors to evade detection, maintain persistence, elevate privileges, and circumvent file execution constraints. When a digitally signed software application such as the x32dbg debugging tool is used, the RAT leverages DLL side-loading to load its own malicious payload. By altering registry entries and setting scheduled activities, attackers were able to maintain access even after a system restart. This article continues to discuss researchers' findings regarding a new wave of attacks distributing the PlugX RAT masked as a legitimate Windows debugger tool.

    Security Affairs reports "PlugX Trojan Disguised as a Legitimate Windows Open-Source Tool in Recent Attacks"

  • news

    Visible to the public "Threat Actors Getting Smarter as China-Linked Attacks Rise"

    According to CrowdStrike's annual Global Threat Report, adversaries have become more sophisticated and destructive in their cyberattacks. Malware activity has declined, indicating that threat actors are experimenting with alternative means of attack. Seventy-one percent of all detections were malware-free in 2022, up from 62 percent in 2021. This was in part due to the exploitation of valid credentials by adversaries to facilitate access and persistence in victim environments. CrowdStrike stated that the rate at which new vulnerabilities were disclosed and the speed at which adversaries were able to deploy exploits also played a role. Meanwhile, interactive intrusion campaigns or attacks that required a more 'hands-on' approach from cybercriminals surged by 50 percent, indicating that threat actors are increasingly seeking ways to circumvent automated detections. Another notable trend is decrease in the time it takes for an adversary to move laterally from one compromised host to another within the victim's environment or network of targeted computer systems. This reduced from 98 minutes in 2021 to 84 minutes the year prior, meaning that defenders were under increased pressure to detect and respond to an incursion. CrowdStrike, which monitors more than 200 adversaries, also reported an increase in "China-nexus" espionage. In the last year, threat actors associated with China attacked all 39 global industry sectors and 20 geographic regions. This article continues to discuss key findings from CrowdStrike's Global Threat Report.

    Cybernews reports "Threat Actors Getting Smarter as China-Linked Attacks Rise"

  • news

    Visible to the public "US Marshals Service Hit With Ransomware Attack"

    The United States Marshals Service (USMS) was recently hit with a ransomware attack. The incident occurred on February 17. According to a USMS spokesperson, shortly after the discovery, the USMS disconnected the affected system, and the Department of Justice initiated a forensic investigation. The affected system contains law enforcement sensitive information, including returns from legal process, administrative information, and personally identifiable information pertaining to subjects of USMS investigations, third parties, and certain USMS employees. The USMS did not mention who was behind the attack, nor did they say if they paid the ransom to unlock the affected system. The forensic investigation is currently still ongoing.

    ABC News reports: "US Marshals Service Hit With Ransomware Attack"

  • news

    Visible to the public "How the Ukraine War Opened a Fault Line in Cybercrime, Possibly Forever"

    The Russia-Ukraine conflict has impacted cyberspace on all levels, from nation-state Advanced Persistent Threats (APT) groups to low-level carders on Dark Web forums. A new report from Recorded Future details the numerous cyberspace repercussions of that event. Cybercrime activity has changed, allies have become foes, power structures have been restructured, and more. According to the Recorded Future report "Themes and Failures of Russia's War Against Ukraine," despite "compounding strategic and tactical failures," Moscow presumably remains focused on conquering Kiev, overturning the Ukrainian government, and scoring a decisive military triumph. Russia's offensive cyber operations have been unable to complement Russia's conventional military success and will likely turn to targeting civilian infrastructure in an effort to degrade Ukraine's morale. Russia's continued reliance on proxy groups to achieve its objectives in Ukraine while maintaining plausible deniability has shed additional light on the connections between Russian Intelligence Services (RIS) and non-state actors, as evidenced by Russia's direct, indirect, and tacit relationships with cybercriminal and hacktivist groups. This article continues to discuss key points from Recorded Future's report on the disruption of the cybercriminal ecosystem by Russia's war against Ukraine.

    Dark Reading reports "How the Ukraine War Opened a Fault Line in Cybercrime, Possibly Forever"

  • news

    Visible to the public "LastPass Breach: Hacker Accessed Corporate Vault by Compromising Senior Developer's Home PC"

    LastPass has disclosed additional details on the security incident relating to the compromise of its development environment in August 2022 and subsequent unauthorized access to the company's third-party cloud storage provider that held backups. The threat actor launched a coordinated second attack using information stolen during the first incident, information obtained from a third-party data breach, and a vulnerability in a third-party media software package. The list of data and secrets that have been stolen or compromised as a result of both attacks is long. The threat actor compromised a senior DevOps engineer's credentials by targeting the engineer's computer and using a vulnerable third-party media software package to remotely execute code. The actor implanted a keylogger that recorded the master password of the employee. Then, they gained access to the engineer's corporate LastPass vault. This article continues to discuss new information regarding the LastPass breach.

    Help Net Security reports "LastPass Breach: Hacker Accessed Corporate Vault by Compromising Senior Developer's Home PC"

  • news

    Visible to the public "New Exfiltrator-22 Post-exploitation Kit Linked to LockBit Ransomware"

    Exfiltrator-22 is a new post-exploitation framework being promoted by threat actors to spread ransomware across corporate networks while evading detection. According to threat analysts at CYFIRMA, this new framework was developed by former LockBit 3.0 affiliates with expertise in anti-analysis and defense evasion, offering a powerful solution for a monthly price. Exfiltrator-22 is priced between $1,000 per month and $5,000 for lifetime access, with ongoing updates and support included. The framework's buyers are provided with an admin panel hosted by a Virtual Private Server (VPS) from which they could control the malware and issue commands to compromised systems. On November 27, 2022, the first version of the Exfiltrator-22 framework was discovered in the wild. About ten days later, its makers created a Telegram channel to advertise the framework to other cybercriminals. By the end of the year, threat actors had disclosed additional features that helped mask traffic on hacked devices, indicating that the framework was actively being developed. In January 2023, its authors deemed the framework to be 87 percent complete, and subscription prices were released, allowing interested users to purchase access to the tool. The threat actors uploaded two videos on YouTube on February 10, 2023, demonstrating Exfiltrator-22's lateral movement and ransomware-spreading capabilities. This article continues to discuss the Exfiltrator-22 framework being promoted by threat actors.

    Bleeping Computer reports "New Exfiltrator-22 Post-exploitation Kit Linked to LockBit Ransomware"

  • news

    Visible to the public "CISA Issues Warning on Active Exploitation of ZK Java Web Framework Vulnerability"

    Based on evidence of active exploitation, the US Cybersecurity and Infrastructure Security Agency (CISA) has added a high-severity flaw impacting the ZK Framework to its Known Exploited Vulnerabilities (KEV) catalog. This vulnerability, tracked as CVE-2022-36537, affects ZK Framework versions 9.6.1, 9.6.0.1, 9.5.1.3, 9.0.1.2, and 8.6.4.1, and enables threat actors to retrieve sensitive data via carefully crafted requests. CISA stated that the ZK Framework is an open-source Java framework. Therefore, this vulnerability can affect various products, including ConnectWise R1Soft Server Backup Manager. In May 2022, the flaw was patched in versions 9.6.2, 9.6.0.2, 9.5.1.4, 9.0.1.3, and 8.6.4.2. As Huntress showed in an October 2022 proof-of-concept (PoC), the vulnerability could be exploited to bypass authentication, upload a backdoored JDBC database driver to achieve code execution, and launch ransomware on vulnerable endpoints. This article continues to discuss CISA's warning of the active exploitation of ZK Framework vulnerability.

    THN reports "CISA Issues Warning on Active Exploitation of ZK Java Web Framework Vulnerability"

  • news

    Visible to the public "Mobile Banking Trojans Surge, Doubling in Volume"

    According to researchers at Kaspersky, mobile malware developers were busy in 2022, flooding the cybercrime landscape with twice the number of banking trojans than the year before. The researchers stated that nearly 200,000 new mobile banking Trojans emerged in 2022, a 100% increase from the year before and the biggest acceleration of mobile malware development seen in the last six years. In total, the firm detected 1.6 million installers for mobile malware within its telemetry during the year. That's actually a decline in threat activity (down from 3.5 million in 2021 and 5.7 million in 2020), even as malware creation surges ahead. The researchers stated that this drastic increase in banking Trojan development signifies that cybercriminals are targeting mobile users and are increasingly more interested in stealing financial data and actively investing in the creation of new malware. Banking Trojans are built to steal mobile bank account credentials or e-payment details, but they can often be repurposed for other kinds of data theft or used to install additional malware. The researchers noted that while unofficial app stores pose the greatest potential for encountering a banking Trojan, Google Play has been repeatedly populated with "downloaders for banking trojan families, such as Sharkbot, Anatsa/Teaban, Octo/Coper, and Xenomorph, all disguised as utilities."

    Dark Reading reports: "Mobile Banking Trojans Surge, Doubling in Volume"

  • news

    Visible to the public "QNAP Offering $20,000 Rewards via New Bug Bounty Program"

    Taiwan-based QNAP Systems has recently announced that it is offering rewards of up to $20,000 for vulnerabilities reported through its newly launched bug bounty program. QNAP, which is known for its network-attached storage (NAS) and professional network video recorder (NVR) solutions, also makes various types of networking equipment. According to the company, security researchers interested in joining their program can hunt for vulnerabilities in their applications, cloud services, and operating systems. Rewards of up to $20,000 are offered for operating system vulnerabilities, while for applications and cloud services, researchers can earn a maximum of $10,000 and $5,000, respectively. The company stated that submitted reports may qualify for a reward if they do not describe previously reported security defects, if the researcher has not publicly shared details about the flaw, and if the described issue can be replicated and validated by QNAP's security team. The company also noted that higher bounties may be awarded for clear, well-written reports that also include detailed instructions and proof-of-concept (PoC) code, along with suggestions on how the bug should be fixed. The company stated that the reward is determined by the complexity of successfully exploiting the vulnerability, the potential exposure, and the percentage of impacted users and systems. According to QNAP, while only released applications, cloud services, and operating systems are within the program's scope, rewards may be paid out for critical vulnerabilities that are out-of-scope.

    SecurityWeek reports: "QNAP Offering $20,000 Rewards via New Bug Bounty Program"

  • news

    Visible to the public "TREBUCHET: A High-Powered Processor for Cutting-Edge Encryption"

    Fully Homomorphic Encryption (FHE) enables algorithms to do direct computations on encrypted data. Usually, sensitive data is encrypted, and it must be decrypted before it can be used for any form of analysis or computing. The analysis or computation is conducted while the sensitive data is in an unencrypted state, and then the data is re-encrypted. Matthew French, Research Director at USC Viterbi's Information Sciences Institute (ISI), says that the problem with these schemes is that there is inevitably a breakdown in the process, and someone can snoop on the unencrypted processing, or someone can forget to re-encrypt the data. In the past decade, breakthrough advances in algorithms have enabled FHE, which eliminates the need to decrypt and re-encrypt data, resulting in a far more secure system, according to French. However, FHE requires substantially more computational power to accomplish tasks equivalent to those that are not encrypted. FHE requires around 100,000 times more processing than conventional techniques, so FHE must decrease the computation gap in order to be useful. French and his colleagues took on the challenge with their co-processor, TREBUCHET, which addresses this by developing custom computer hardware to accelerate FHE processing with the aim of achieving ten times the speed of traditional processing. TREBUCHET was created for the Data Protection in Virtual Environments (DPRIVE) Program of the Defense Advanced Research Projects Agency (DARPA). There are both private research facilities and academic institutions on the team. This article continues to dicuss the concept of FHE and the TREBUCHET solution.

    USC Viterbi reports "TREBUCHET: A High-Powered Processor for Cutting-Edge Encryption"

  • news

    Visible to the public "Media Giant News Corp Discloses New Details of Data Breach"

    Media giant News Corp has recently disclosed new details about a data breach discovered last year and attributed to a state-sponsored threat actor. In early 2022, News Corp revealed that hackers had managed to steal corporate data from its systems but claimed that financial and customer information was not compromised. The incident was discovered in January 2022, and cybersecurity firm Mandiant was called to assist with the investigation. The company said at the time that the attack had been tied to a foreign government, and Mandiant clarified that it appeared to be the work of a Chinese group. The cyberattack hit News Corp headquarters, news operations in the UK, and News Corp-owned businesses such as The Wall Street Journal, Dow Jones, and New York Post. The media giant last week started sending out data breach notices to individuals whose data may have been compromised. The notice reveals that the hackers gained access to a business email and document storage system used by several News Corp businesses. The attackers accessed business documents and emails between February 2020 and January 2022. The company noted that the compromised information came from a "limited number" of personnel accounts on the affected system. Some personal information may have been obtained by the attackers, including name, date of birth, Social Security number, passport number, driver's license number, financial account information, health insurance details, and medical information. The company noted that not every type of information was compromised in each individual's case.

    SecurityWeek reports: "Media Giant News Corp Discloses New Details of Data Breach"

  • news

    Visible to the public "Governments Targeted by Discord-Based Threat Campaign"

    According to security researchers at Menlo Security, an unknown threat actor is targeting APAC and North American governments with info-stealing malware and ransomware. The researchers noted that the group's attacks begin with a phishing email containing a malicious Discord link, which points to a password-protected zip file. That, in turn, contains a .NET malware downloader known as PureCrypter. The researchers stated that the loader will try to download a secondary payload from the group's command and control (C2) infrastructure, which is a compromised domain belonging to a non-profit. Among the malicious payloads observed by the researchers in this campaign are various info-stealers and ransomware variants: Redline Stealer, AgentTesla, Eternity, Blackmoon, and Philadelphia ransomware. In the sample analyzed by the researchers, PureCrypter attempts to download AgentTesla, an advanced backdoor designed to steal browser-based passwords, as well as take screen captures and log keystrokes. The researchers stated that in their investigation, they found that AgentTesla establishes a connection to an FTP server where it stores the stolen victim's credentials. The FTP server appears to have been taken over, and the leaked credentials for the domain were found online, thus suggesting that the threat actors used these credentials to gain access to the server. The researchers noted that the FTP server was also seen in a campaign using OneNote to deliver malware. Attackers have been sending phishing emails with links to malicious OneNote files that can download additional malware or steal information from the victim's device. Altogether, the researchers found 106 files using said FTP server.

    Infosecurity reports: "Governments Targeted by Discord-Based Threat Campaign"

  • news

    Visible to the public "Can AI Really Be Protected from Text-Based Attacks?"

    Microsoft's Bing Chat, an Artificial Intelligence (AI)-powered chatbot co-developed with OpenAI, was not available for long before users devised ways to break it. Users got it to declare love, threaten harm, and more by providing carefully crafted inputs. The question is whether or not AI can ever be protected from these malicious prompts. It was triggered by malicious prompt engineering, or when an AI, such as Bing Chat, that uses text-based instructions or prompts to do tasks, is deceived by adversarial prompts. Bing Chat was not designed to write neo-Nazi propaganda, but because it was trained on enormous volumes of material from the Internet, it is prone to sliding into undesirable patterns. Adam Hyland, a Ph.D. student in the Human Centered Design and Engineering program at the University of Washington, compared prompt engineering to an escalation of privilege attack. In a privilege escalation attack, a hacker gains access to resources, such as memory, typically restricted to them because an audit did not capture all possible exploits. According to Hyland, the behavior of Large Language Models (LLMs) such as Bing Chat is not well understood. The interaction being exploited is the LLM's response to text input. The models are designed to continue text sequences. An LLM such as Bing Chat or ChatGPT generates the expected response based on the data provided by the designer and the user's prompt string. Some of the prompts resemble social engineering hacks, as if one were attempting to mislead a human into divulging their secrets. This article continues to discuss the protection of AI from text-based attacks.

    TechCrunch reports "Can AI Really Be Protected from Text-Based Attacks?"

  • news

    Visible to the public "Researchers Looking Into Cybersecurity of Canada's Power, IoT Sectors"

    Researchers at a Quebec university are looking into how prepared power utilities are for cyberattacks, as well as the security of wireless industrial Internet-connected devices. Ottawa recently announced that it gave the University of Sherbrooke the second half of just under $2 million for the study. One project is evaluating the resiliency of Hydro Sherbrooke, a medium-sized power distributor, in the context of Industry 4.0, specifically its ability to detect new threats. Industry 4.0 refers to the incorporation of new technologies such as Internet of Things (IoT) devices, cloud computing, and Artificial Intelligence (AI) into a company's production centers and general operations. The second project analyzes the security of industrial IoT devices with 5G connectivity and edge computing. It involves exploring the applications of the devices in agriculture, water management, and building management. Bell Canada, VMware, Honeywell, and the cities of Sherbrooke and Magog, Quebec, are partners in this study. Lessons learned from both projects will be shared with the power, telecommunications, and Information Technology (IT) manufacturing industries. This article continues to discuss the new projects investigating the readiness of power utilities to face cyberattacks and the security of wireless industrial Internet-connected devices.

    IT World Canada reports "Researchers Looking Into Cybersecurity of Canada's Power, IoT Sectors"

  • news

    Visible to the public Pub Crawl #71


    Pub_Crawl_web.jpgPub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers.

  • news

    Visible to the public "Possible New Lazarus Group Backdoor Found"

    Researchers discovered a new payload delivered by the Wslink malware downloader and believe it is part of the toolset maintained and deployed by the Lazarus Group, which is associated with North Korea. ESET researchers found the Wslink loader in 2021, which has a few unique features, the most notable of which is its ability to run as a server rather than a client. Wslink, like other loaders, allows the actors who deploy it to download and install additional malware or tools onto a compromised machine. The researchers were unable to find the payload that Wslink delivered when ESET examined the loader, but they recently discovered one, which they dubbed WinorDLL64. The payload was discovered on a small number of victim machines in locations previously targeted by the Lazarus Group, including Europe and North America. There are also some code commonalities between WinorDLL and other samples used by the Lazarus Group, such as Bankshot and GhostSecret. The ESET researchers discovered several behavioral parallels with known Lazarus Group tools, but they were not certain that WinorDLL was used by the gang. This article continues to discuss the new payload delivered by the Wslink malware downloader, possibly part of the cache of tools maintained and deployed by the Lazarus Group.

    Decipher reports "Possible New Lazarus Group Backdoor Found"

  • news

    Visible to the public "Investment Scams Drive $9bn in Fraud in 2022"

    According to new data from the FTC, Americans lost $8.8bn to fraud last year, with investment scams ($3.8bn) being the biggest money-maker for fraudsters. The FTC stated that investment fraud had surged by over 100% from 2021 when the figure stood at $1.8bn. "Impoter scams" was second place on the FTC list, which garnered $2.8bn, up slightly from 2021 figures of $2.4bn. Imposter scams include calls, texts, or emails where a victim is contacted out of the blue by a scammer pretending to be someone else and socially engineered into handing over their personal and financial information or paying the fraudster directly. The FTC noted that losses to business imposters were particularly high, climbing from $453m in 2021 to $660m in 2022. Overall, the FTC's Consumer Sentinel Network received 5.2 million reports in 2022. Identity theft reports were most common, followed by notification of imposter scams and then problems with credit bureaus and info furnishers. A total of 2.4 million fraud reports were filed with the FTC in 2022, a quarter (26%) of which involved financial losses. The agency said the $8.8bn figure works out to a median loss of $650 per victim. However, the FTC noted that it is much higher ($1400) for scams carried out over the phone, highlighting the danger of vishing calls, tech support scams, and other tactics designed to trick recipients. The FTC found that younger people reported losing money more often to fraudsters than their elders: 43% of 20-29-year-olds did so, versus 23% of 70-79-year-olds. However, when the latter group did suffer a loss, it was far greater, $1000, versus $548 for the younger group. The median loss for those aged 80+ was even higher still, at $1674.

    Infosecurity reports: "Investment Scams Drive $9bn in Fraud in 2022"

  • news

    Visible to the public "Intel Paid Out Over $4.1 Million via Bug Bounty Program Since 2017"

    Intel has reported recently that it has paid out more than $4.1 million through its bug bounty program since its creation in 2017. Intel noted that, on average, between 2018 and 2021, they paid $800,000 through its bug bounty program each year for vulnerabilities discovered in the company's products. In 2022, it awarded $935,000. Intel says a total of 243 vulnerabilities were reported in 2022, roughly the same as in the previous three years. Intel noted that more than half of the 2022 vulnerabilities were found internally by them, and 90 security flaws, representing 37% of the total, were reported via its bug bounty program. The company engaged 151 researchers last year, more than double compared to the previous three years. Intel stated that most of the vulnerabilities were discovered in Intel software, processors, and network communications products. Only two issues were assigned a "critical" severity rating, but 79 were classified as having "high" severity. Intel has helped create a hardware common weakness enumeration (CWE) list, and 19 of the hardware vulnerabilities addressed last year were assigned to 13 hardware CWEs.

    SecurityWeek reports: "Intel Paid Out Over $4.1 Million via Bug Bounty Program Since 2017"

  • news

    Visible to the public "Firms Who Pay Ransom Subsidise 10 New Attacks: Report"

    During a new study, security researchers at Trend Micro found that just 10% of ransomware victims pay their extorters, but those who do are effectively funding 6-10 new attacks. The researchers noted that those who did decide to pay the ransom usually did so quickly to avoid severe disruption to their infrastructure and services. Over half of the victims who paid the ransom paid the threat actors within 20 days. The researchers stated that given the low number of victims who pay, threat actors are generally forced to demand more money per compromise. The researchers indicated that it is essential to remember that paying the ransom only drives up the overall incident cost for victims. During the study, the researchers also found that over the past two years, ransomware monetization activities have been lowest in January and from July to August. The researchers noted that these times are potentially the best periods for network defenders to rebuild infrastructure or take vacations.

    Infosecurity reports: "Firms Who Pay Ransom Subsidise 10 New Attacks: Report"

  • news

    Visible to the public "Hackers Could Try to Take over a Military Aircraft; Can a Cyber Shuffle Stop Them?"

    Many aircraft, spacecraft, and weapons systems contain an onboard computer network referred to as military standard 1553, sometimes known as MIL-STD-1553 or just 1553. The network is a tried-and-true protocol for enabling communications between systems such as radar, flight controls, and the heads-up display. According to Chris Jenkins, a Sandia cybersecurity scientist, securing these networks against a cyberattack is a national security issue. He said that if a hacker took control of 1553 mid-flight, the pilot would lose control of critical aircraft systems. Several researchers across the US are developing protections for systems that use the MIL-STD-1553 protocol. Chris and his Sandia team recently collaborated with Purdue University researchers in West Lafayette, Indiana, to test an idea that could protect these critical networks. Their findings, which were recently published in the scientific journal IEEE Transactions on Dependable and Secure Computing, show that when used correctly, a technique known in the cybersecurity realm as Moving Target Defense (MTD) can effectively secure MIL-STD-1553 networks against a Machine Learning (ML) algorithm. This article continues to discuss the collaborative work on a moving target defense that makes a computer network commonly used on many aircraft, spacecraft, and weapons systems less vulnerable to cyberattacks.

    Sandia National Laboratories reports "Hackers Could Try to Take over a Military Aircraft; Can a Cyber Shuffle Stop Them?"

  • news

    Visible to the public "61 Percent of Americans Rely on Free Antivirus Programs"

    According to a new report on the antivirus industry from Security.org, nearly three-quarters of Americans strongly believe computers require antivirus to protect their devices, and 61 percent rely on free solutions such as Microsoft Defender. The percentage of people who choose free solutions has remained stable, falling by only one point since 2021. Just 8 percent of free antivirus users had encountered a breakthrough virus in the last year, compared to 10 percent of paying users. An estimated 33 million households pay for antivirus software. Several paid programs are delivered in Internet security suites that include extra features to improve Internet security, such as Virtual Private Networks (VPNs), password managers, and secure browsers. According to the report, which is based on a survey of more than 1,000 people in the US, 7 percent of people will be in the market for antivirus software in the next six months, amounting to an estimated 16 million Americans, indicating that this is still a large market despite the popularity of free solutions. The study's authors concluded that antivirus programs remain a dominant protection solution for American computer users. Yet, there has been a progressive shift toward using proprietary security products instead of paid security products. This article continues to discuss findings from the new report on the antivirus market.

    BetaNews reports "61 Percent of Americans Rely on Free Antivirus Programs"

  • news

    Visible to the public "Hacked Russian Radio Stations Broadcast Fake Air Raid Warnings"

    Radio stations in multiple Russian cities were recently hacked to broadcast fake air raid warnings. Air raid alerts were heard in Belgorod, Kazan, Novosibirsk, Penza, Magnitogorsk, Ufa, Voronezh, Nizhny Novgorod, Tyumen, Izhevsk, and other cities, according to the Russian state news agency RIA Novosti. Radio stations, including Relax FM, Funny FM, Business FM, Like FM, Comedy FM, Romantika, Avtoradio, Radio Energy, and Children's Radio, were hacked. According to RIA Novosti, many stations are owned by Gazprom Media. The Russian Ministry of Emergency Situations verified the hack in a Telegram post, but provided no other details or attribution. This is not the first time hackers have infiltrated Russian radio stations or breached other Russian systems. For example, a hacker took over Kommersant FM radio in June 2022, blasting the Ukrainian anthem and anti-war songs. As a result, the company briefly discontinued its air programming for a few hours. This article continues to discuss the recent hacking of Russian radio stations to broadcast fake air raid warnings.

    Cybernews "Hacked Russian Radio Stations Broadcast Fake Air Raid Warnings"

  • news

    Visible to the public "11 Countries Take Part in Military Cyberwarfare Exercise"

    The biggest military cyberwarfare exercise in Western Europe recently took place in Estonia. A total of 34 teams from 11 countries took part in a live-fire cyber battle. Countries such as the US, UK, Japan, India, Italy, Estonia, Ukraine, Ghana, Kenya, and Oman were represented by 750 experts at the Defence Cyber Marvel 2 (DCM2) exercise. Many of them participated remotely. The seven-day event was led by the British Army and tested participants' responses to common and complex cyber scenarios, including attacks on networks and industrial control systems (ICS). One scenario simulated in NATO's CR154 cyber range involved attacks on uncrewed robotic systems, a tactic used by Russia to disrupt Ukrainian cyberspace in the early days of its invasion. The participating teams competed against each other and were judged based on their speed in identifying and responding to cyber threats. A team from Italy was declared the winner, followed by teams representing Estonia and the UK.

    SecurityWeek reports: "11 Countries Take Part in Military Cyberwarfare Exercise"

  • news

    Visible to the public "Popular IBM File Transfer Tool Vulnerable to Cyberattacks, CISA Says"

    According to the US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA), the IBM Aspera Faspex file transfer tool, which many large organizations use, has a critical vulnerability that hackers are actively exploiting. CISA added the flaw, tracked as CVE-2022-47986, to its list of Known Exploited Vulnerabilities (KEV) catalog, along with two other vulnerabilities impacting the Mitel business communication platform. According to the agency, the IBM vulnerability poses significant risks to the federal enterprise. Bud Broomhead, CEO of the cybersecurity company Viakoo, highlighted that Aspera is so popular that it received an Emmy in 2014 for enabling faster media production workflows by allowing companies to exchange massive video files quickly. For many years, Aspera was the go-to solution for any organization transferring massive datasets, such as genomics and biomedical research, media production, military signals intelligence, or financial services. According to Broomhead, the vulnerability is simple to exploit and allows a remote attacker to conduct activities on a device without needing to circumvent network authentication processes. A search using the Internet scanning tool Shodan found 138 exposed Aspera Faspex instances. This article continues to discuss the IBM Aspera Faspex file transfer tool's vulnerability to cyberattacks.

    The Record reports "Popular IBM File Transfer Tool Vulnerable to Cyberattacks, CISA Says"

  • news

    Visible to the public "Salad Shortages Reported Following Ransomware Attack on Agricultural Giant Dole"

    A ransomware attack on the agricultural giant Dole forced the shutdown of production facilities in the US, resulting in salad shortages. The ransomware attack's form was not disclosed, and no ransomware gang has claimed responsibility for the attack. Officially, Dole claims that the impact of the attack on its operations was minimal, but that is not what the company told stores when the ransomware attack first hit. According to CNN, citing a Dole memo provided to retailers on February 10, a temporary closure of production plants resulted in a halt in food shipments to grocery shops. With operations disrupted and delivery halted, there have been multiple reports of lettuce and salad shortages on grocery shelves. Morten Gammelgaard, co-founder of ransomware protection company BullWall A/S, pointed out that the Dole ransomware attack demonstrates how the just-in-time nature of food supply chains makes companies especially vulnerable to financially driven cyberattacks such as ransomware. This article continues to discuss the impact of the Dole ransomware attack.

    SiliconANGLE reports "Salad Shortages Reported Following Ransomware Attack on Agricultural Giant Dole"

  • news

    Visible to the public "Microsoft Announces Automatic BEC, Ransomware Attack Disruption Capabilities"

    Microsoft announced last year that its enterprise protection suite, Microsoft 365 Defender, will include automatic attack disruption capabilities. It has now been announced that these capabilities will help companies disrupt Business Email Compromise (BEC) attacks and human-operated ransomware attacks. A quick defensive response to cyberattacks is becoming increasingly important for companies. According to IBM Security's X-Force team, the average time to complete a ransomware attack has decreased from two months to less than four days, and the rate at which attackers target employees using compromised email accounts and existing email threads has doubled. Ideally, all organizations would have the appropriate technology in place, as well as a well-staffed Security Operations Center (SOC) that can detect the first signals of an attack. However, SOC analysts are bombarded with alerts, navigating through false positives, and frequently missing critical signs. Several security providers believe that automation is the solution. This article continues to discuss Microsoft's announcement of automatic BEC and ransomware attack disruption capabilities, as well as the need to improve reaction speed to disrupt attacks.

    Help Net Security reports "Microsoft Announces Automatic BEC, Ransomware Attack Disruption Capabilities"

  • news

    Visible to the public "Student Medical Records Exposed After LAUSD Breach"

    On February 22, the education news site The 74 Million reported that the hacker group Vice Society had posted hundreds of psychiatric evaluations of special education students in the Los Angeles Unified School District (LAUSD). The leaked data is said to contain personal information such as names, diagnoses, family immigration status, and information on physical and sexual abuse. When a hospital system allows such information to become public, it faces fines and other consequences under the Health Insurance Portability and Accountability Act (HIPAA). However, when a school exposes such information, the breach is covered by the Family Educational Rights and Privacy Act (FERPA), which means individual parents are responsible for filing complaints. This article continues to discuss the exposure of student medical records due to an LAUSD breach.

    Dark Reading reports "Student Medical Records Exposed After LAUSD Breach"

  • news

    Visible to the public "TELUS Investigating Leak of Stolen Source Code, Employee Data"

    TELUS, Canada's second-largest telecommunications company, is investigating a possible data breach after a threat actor released samples of what seems to be employee data online. The threat actor uploaded screenshots of the company's private source code repositories and payroll records. TELUS has found no evidence of corporate or retail customer data theft thus far and is continuing to monitor the potential problem. On February 17, a threat actor advertised what they claimed to be TELUS' employee list on a data breach forum, which included names and email addresses. The same threat actor had published another forum post by February 21, this time offering to sell TELUS' private GitHub repositories, source code, and payroll records. The seller also claims that the stolen source code contains the company's "sim-swap-api," which could allow attackers to conduct SIM swap attacks. This article continues to discuss TELUS investigating the sale of alleged stolen source code and employee information.

    Bleeping Computer reports "TELUS Investigating Leak of Stolen Source Code, Employee Data"

  • news

    Visible to the public "Even Top-Ranked Android Apps in Google Play Store Provide Misleading Data Safety Labels"

    An analysis of data safety labels for Android apps available on the Google Play Store revealed major loopholes that allow apps to present misleading or incorrect information. The Mozilla Foundation conducted the study as part of its "Privacy Not Included" initiative, which compared the privacy policies and labels of the 20 most popular paid apps and the 20 most popular free apps on the app store. It discovered that the labels were inaccurate or misleading in around 80 percent of the apps analyzed, based on differences between the apps' privacy policies and the information apps self-reported on Google's Data safety form. According to Mozilla, the apps are not self-reporting accurately enough to provide the public with significant confidence about the safety and privacy of their data, and users are being made to feel these apps are doing a better job preserving their privacy than they are. This article continues to discuss discrepancies between Google Play Store's data safety labels and privacy policies of nearly 80 percent of the reviewed apps.

    THN reports "Even Top-Ranked Android Apps in Google Play Store Provide Misleading Data Safety Labels"

  • news

    Visible to the public "Public Safety Organizations are Unprepared for Cyberattacks"

    Cyberattacks on public safety organizations have become common. However, according to a recent Verizon survey of these organizations, only a few believe they are "very prepared" for cyberattacks. This study overlaps with Resecurity research citing an increase in malicious activity targeting law enforcement organizations during the second quarter of 2022. Any incident has the potential to affect the welfare and public safety of different communities. It remains a challenge to determine how to strengthen security while working with limited public funds. According to the Verizon survey, less than half of respondents say their organization is at least partially prepared for a cyberattack. Just 15 percent feel "very prepared" overall. Law enforcement agencies appear to be more confident in their security. In case of a cyberattack, 58 percent of police departments believe they are somewhat prepared, while 20 percent believe they are very prepared. Emergency Medical Services (EMS) departments had the lowest sentiment, with only 12 percent feeling very prepared. Resecurity researchers revealed that malicious actors were hacking law enforcement email accounts in the second quarter of 2022. A recent trend among hackers is issuing fake subpoenas and Emergency Data Requests (EDRs) to organizations in order to steal sensitive information. In May 2022, a large New York EMS provider faced a ransomware attack that exposed the personal information of over 300,000 patients. The cybercriminals behind the incident stole files and encrypted systems before threatening to disclose the information unless a ransom was paid. Fire services are also susceptible to cyberattacks, as threat actors allegedly stole department paychecks from a South Carolina fire department in September 2022. This article continues to discuss public safety organizations being unprepared for cyberattacks and examples of incidents faced by such organizations.

    Security Intelligence reports "Public Safety Organizations are Unprepared for Cyberattacks"

  • news

    Visible to the public "Open Source Flaws Found in 84% of Codebases"

    According to researchers at Synopsys, more than four out of five (84%) codebases contain at least one known open source vulnerability. The researchers noted that this is almost a 4% increase compared to last year. The researchers also found that there was a 163% growth in the edtech sector's adoption of open source, followed by the aerospace, aviation, automotive, transportation, and logistics sectors (97%) and manufacturing and robotics (74%). The researchers stated that the key to managing open source risk at the speed of modern development is maintaining complete visibility of application contents. By building this visibility into the application lifecycle, businesses can arm themselves with the information needed to make informed, timely decisions regarding risk resolution. The researchers also found that high-risk flaws over the last five years have grown substantially since 2019, particularly in the retail and e-commerce sectors (557%). Further, Synopsys found that 31% of codebases rely on open source with no discernible license or with customized licenses, a 55% increase from last year. The researchers also found that 91% of the audited codebases contained outdated versions of open source components. The researchers noted that organizations leveraging any type of third-party software should rightfully assume that it includes open source.

    Infosecurity reports: "Open Source Flaws Found in 84% of Codebases"

  • news

    Visible to the public "Largely Undetected Malware Family Targets Pirated macOS Applications"

    Jamf security researchers have detailed a family of malware that infects pirated macOS applications and mines cryptocurrency. The malware uses XMRig, an open-source command-line cryptocurrency mining tool. Researchers first discovered XMRig in a pirated copy of Apple's Final Cut Pro video editing software. At the time of discovery, no security vendors on VirusTotal, a free service that analyzes files and URLs for viruses, worms, trojans, and other forms of hostile content, detected the sample as malicious. Later, it was reported that some vendors had detected the malware in January. However, some of the maliciously altered apps remain unidentified. A malicious version of Final Cut Pro is not very alarming on its own, but the researchers discovered that the malware was using the Invisible Internet Project (I2P) for communication. I2P is a private network layer that anonymizes traffic, which makes it a less conspicuous alternative to Tor. The researchers traced related malware and identified a reference to a similar instance reported by Trend Micro at the beginning of February, a pirated edition of Adobe Photoshop for Mac. In their search for more examples of malware using I2P, the researchers traced and identified a reference to a similar example reported by Trend Micro in early February, a pirated version of Adobe Photoshop for Mac. Both malicious versions of Final Cut Pro and Photoshop were traced back to the same individual with a lengthy history of sharing pirated software. This article continues to discuss the malware family that infects pirated macOS applications to mine cryptocurrency.

    SiliconANGLE reports "Largely Undetected Malware Family Targets Pirated macOS Applications"

  • news

    Visible to the public "How Digital Twins Could Protect Manufacturers From Cyberattacks"

    Digital twins, which are detailed virtual copies of physical objects, are paving the way for better products in healthcare, aerospace, and other industries. A new study suggests that cybersecurity may also fit perfectly into the digital twin portfolio. As robots and other production equipment become increasingly remotely accessible, new cyberattack entry points are introduced. Therefore, a team of researchers from the National Institute of Standards and Technology (NIST) and the University of Michigan developed a cybersecurity framework that combines digital twin technology with Machine Learning (ML) and human skills to flag cyberattack indicators. NIST and the University of Michigan demonstrated the feasibility of their technique in a paper published in IEEE Transactions on Automation Science and Engineering by detecting cyberattacks directed at a 3D printer in their lab. In addition, they emphasize that the framework is applicable to various manufacturing technologies. This article continues to discuss the new strategy for detecting cyberattacks on manufacturing systems, which involves using Artificial Intelligence (AI) to monitor a digital twin and is fed real-time data from the physical system.

    NIST reports "How Digital Twins Could Protect Manufacturers From Cyberattacks"

  • news

    Visible to the public "TikTok Banned From EU Commission Phones Over Cybersecurity"

    The European Union's executive branch said Thursday that it has temporarily banned TikTok from phones used by employees as a cybersecurity measure, reflecting widening worries from Western officials over the Chinese-owned video-sharing app. The European Commission's Corporate Management Board suspended the use of TikTok on devices issued to staff or personal devices that staff use for work. TikTok faces intensifying scrutiny from Europe and the U.S. over security and data privacy amid worries that the hugely popular app could be used to promote pro-Beijing views or sweep up users' information. The EU's action follows similar moves in the U.S., where more than half of the states and Congress have banned TikTok from official government devices. A Commission spokesperson declined to say whether something specific triggered the suspension or what's needed to get it lifted. EU representatives stated that staffers would be required to delete TikTok from private devices that they use for professional business by March 15 but did not provide any details on how that would be enforced.

    SecurityWeek reports: "TikTok Banned From EU Commission Phones Over Cybersecurity"

  • news

    Visible to the public "The Number of Devices Infected by the MyloBot Botnet Is Rapidly Increasing"

    The MyloBot botnet has been in operation since 2017 and was first detailed in 2018 by the cybersecurity firm Deep Instinct. MyloBot is described as an evasive Windows botnet that employs sophisticated anti-analysis methods. The first sample of the bot consisted of three stages. Since November 2018, researchers at BitSight have been sinkholing the botnet. In 2018, the proxy sample of the botnet featured a large number of hardcoded DGA domains, allowing researchers to monitor nearly any bot. Beginning in 2020, a maximum of 250,000 unique infected machines per day were identified by researchers. Due to the absence of hardcoded DGA domains in the most recent version of the botnet, which debuted in early 2022, analysts were unable to reach an accurate estimate of the number of infected devices. The analysts then began monitoring MyloBot downloader domains to observe the progress of the botnet. They discovered a connection between the MyloBot and the residential proxy service BHProxies, which suggests that the infected machines are being used by the latter. According to researchers, the botnet is rapidly growing, noting that it has infected thousands of devices globally. This article continues to discuss the growth of the MyloBot botnet.

    Security Affairs reports "The Number of Devices Infected by the MyloBot Botnet Is Rapidly Increasing"

  • news

    Visible to the public "New S1deload Malware Hijacking Users' Social Media Accounts and Mining Cryptocurrency"

    An active malware campaign has been targeting Facebook and YouTube users through a new information stealer aimed at taking over accounts and exploiting system resources for cryptocurrency mining. Bitdefender dubbed the malware S1deload Stealer due to its use of DLL side-loading techniques to bypass security measures and execute its malicious components. Once infected, S1deload Stealer steals user credentials, mimics human behavior to artificially boost videos and other content engagement, evaluates the value of individual accounts, mines for BEAM cryptocurrency, and distributes the malicious link to the user's followers. The ultimate goal of the campaign is to seize control of users' Facebook and YouTube accounts and rent out access to increase the number of views and likes for shared videos and posts. It is suspected that more than 600 unique users were affected during the six-month period between July and December 2022. Most infections have been found in Canada, Romania, Turkey, France, Bangladesh, Mexico, and Peru. This article continues to discuss findings regarding the S1deload Stealer malware campaign.

    THN reports "New S1deload Malware Hijacking Users' Social Media Accounts and Mining Cryptocurrency"

  • news

    Visible to the public "Russian Accused of Developing NLBrute Malware Extradited to US"

    A Russian national accused of developing a piece of malware named NLBrute has recently been extradited to the United States from the Eastern European country of Georgia. The suspect, Dariy Pankov, aka dpxaker, was extradited from Georgia in October 2022, and he appeared before a US judge this week. It is unclear for how long he had been in Georgia before being detained, but more than 100,000 Russians reportedly fled to the neighboring country last year, often in an effort to avoid being drafted into Russia's armed forces as the country wages its war against Ukraine. According to the Department of Justice (DoJ), Pankov has been charged with computer fraud, conspiracy, and access device fraud and faces up to 47 years in prison. The man will remain in custody during his trial. The DoJ stated that Pankov made at least $350,000 from cybercrime activities between 2016 and 2019. He is believed to have developed and sold NLBrute, a tool that has been widely used by cybercriminals to obtain credentials. The tool is designed for brute-forcing RDP credentials, and at one point, it was used in tandem with a botnet in an effort to distribute the brute-forcing process. The DoJ noted that Pankov used the malware to obtain login credentials for tens of thousands of computers worldwide and offered to sell 35,000 credentials on a cybercrime forum. Two law firms in Florida are mentioned as victims in the indictment, but they have not been named. In addition to the Pankov extradition, the DoJ announced this week that two men from Maryland have been sentenced to a combined 14 years in prison for laundering money as part of a business email compromise (BEC) scheme.

    SecurityWeek reports: "Russian Accused of Developing NLBrute Malware Extradited to US"