News Items

  • news

    Visible to the public "Norway Seizes Millions in North Korean Crypto"

    Norwegian authorities have recently tracked and intercepted 60 million kroner ($5.9m) in cryptocurrency stolen last year by North Korean actors in the largest heist of its kind ever recorded. Norway's economic and environmental crime agency, Okokrim, claimed that the North Korean threat actors have been carrying out a massive money laundering operation ever since the March 2022 raid on Ronin Network. Vietnamese blockchain game developer Sky Mavis built Ronin Network to function as an Ethereum sidechain for its Axie Infinity game. Pyongyang-backed APT group Lazarus was able to breach the firm's network after an employee opened a malicious phishing email attachment. The hackers took an estimated $618m in cryptocurrency and hard cash in the world's biggest-ever cyber-heist. Okokrim's success comes a few months after investigators said they managed to seize $30m in funds stolen from Ronin. Okokrim stated that recently seized money will be returned to Sky Mavis so that it can reimburse some of its affected customers.

    Infosecurity reports: "Norway Seizes Millions in North Korean Crypto"

  • news

    Visible to the public "FBI 'Contains' Cyber-Incident on its Network"

    The FBI recently released a brief statement about a recent cyber-incident that occurred at one of its highest-profile field offices. The FBI claimed that the incident is now under control. The FBI stated that a malicious incident impacted part of its network used in investigations of images of child sexual exploitation. The FBI is currently working on gaining more information about the incident and does not have any further information at this time. This is not the first time hackers have targeted the bureau. In 2021, an official email address was reportedly compromised and used to spam at least 100,000 recipients.

    Infosecurity reports: "FBI 'Contains' Cyber-Incident on its Network"

  • news

    Visible to the public "Is Telegram the New Dark Web? Report Documents 'Cybercrime Ecosystem' on Messaging App"

    According to a new report from the cybercrime intelligence firm KELA, Telegram, a popular privacy-first messaging app, has become home to a "cybercrime ecosystem" similar to dark web forums. Cybercriminals are gathering on Telegram to plan the exchange of stolen personal data, facilitate ransomware payments, and more. Criminals are drawn to the messaging platform since it is simple to create new accounts without revealing any identifying information. Users can easily manage several accounts, signing up with foreign phone numbers that do not require having a SIM card or a major carrier. Although law enforcement has some visibility into user activity, identifying and tracking down a careful user is difficult. According to the report, several other encrypted chat apps have their own cybercrime ecosystems, including Discord, Jabber, Tox, and Wickr. However, none of these have anything near Telegram's core userbase or continuous rollout of new features. Some of these alternatives are also only popular in certain regions, such as Jabber, which is popular among Russian hackers. In addition, the alternatives lack the robust automatic translation that Telegram has. Researchers found that the Telegram cybercrime ecosystem is more focused on selling individual Personally Identifiable Information (PII) and login credentials than corporate secrets. Still, high-level database information does emerge for sale on occasion. For example, the database of an unnamed insurance company with 120 million subscribers was observed being sold for $360,000. This article continues to discuss Telegram becoming a major cybercrime ecosystem.

    CPO Magazine reports "Is Telegram the New Dark Web? Report Documents 'Cybercrime Ecosystem' on Messaging App"

  • news

    Visible to the public "35% More Patients Impacted by Healthcare Data Breaches in H2 2022"

    Healthcare data breaches had the most impact in the second quarter of 2022 compared to previous years, with a 35 percent rise in the number of patient records compromised, according to Crucial Insight's H2 2022 Healthcare Data Breach Report. Based on a review of breach data submitted to the HHS by healthcare organizations, the report discovered that victims of healthcare data breaches had 28.5 million records exposed in the second half of 2022, up from 21.1 million in 2019. Although the number of people affected by data breaches increased, the total number of breaches declined in 2022, resulting in a higher ratio of people affected per breach. In the second half of 2022, each breach affected about 91,028 patients, compared to only 61,246 in the first half of 2022. According to other health Information Technology (IT) vendors, most data breaches stemmed from hacking, which aligns with Crucial Insight's finding that hackers caused about 78 percent of healthcare data breaches. The percentage of hacking incidents rose from 61 percent in 2019 to 79 percent in 2022, while unauthorized access decreased from 27 percent in 2019 to 15 percent in 2022. Although hacking caused more breaches, the report found that unauthorized access exposes more records per breach. This article continues to discuss key findings from Critical Insight's H2 2022 Healthcare Data Breach Report.

    HealthITSecurity reports "35% More Patients Impacted by Healthcare Data Breaches in H2 2022"

  • news

    Visible to the public "Three Quarters of Vulnerabilities Currently Exploited by Ransomware Groups Were Discovered Before 2020"

    A new report from Cyber Security Works (CSW), Ivanti, Cyware, and Securin titled "2023 Spotlight Report: Ransomware Through the Lens of Threat and Vulnerability Management" highlights the need for an effective patch management approach. The report reveals that most vulnerabilities exploited by ransomware actors have been known for years. According to the study, more than 76 percent of the vulnerabilities still being exploited by ransomware groups were discovered between 2010 and 2019. The research highlighted 56 new vulnerabilities related to ransomware attacks out of 344 threats identified in 2022, representing a 19 percent year-over-year increase. The report also found that scanners are not picking up on all threats, since popular scanners did not detect 20 ransomware vulnerabilities. Advanced Persistent Threat (APT) groups are increasingly executing ransomware attacks, with CSW having reported over 50 APT groups using ransomware in attacks, which is an increase from 33 in 2020. Furthermore, the analysis discovered 57 ransomware-related vulnerabilities with low and medium-sized CVSS ratings associated with infamous ransomware families that can damage an organization and hinder business continuity. This article continues to discuss key findings from the new report on ransomware.

    Continuity Central reports "Three Quarters of Vulnerabilities Currently Exploited by Ransomware Groups Were Discovered Before 2020"

  • news

    Visible to the public "Data Leak Hits Thousands of NHS Workers"

    According to reports, an estimated 14,000 employees at a Liverpool NHS hospital trust have been informed that their data was leaked via email due to human error. Victims received an apology letter from the hospital trust's chief executive James Sumner. Sumner noted that a file containing sensitive payroll information was sent to hundreds of NHS managers and 24 external accounts. The spreadsheet file included a hidden tab that contained staff personal information. Sumner noted that while it was not visible to those receiving the email, it should not have been included in this spreadsheet. The information in this hidden tab included names, addresses, DOBs, NI numbers, gender, ethnicity, and salary. It did not include bank account details. Sumner reported that each of the 24 external recipients have been notified and confirmed the deletion of the file. Human error of this sort is a common cause of data leaks. According to Verizon, the "error" category accounted for 13% of breaches it analyzed last year. It contributed to a massive 82% of breaches that feature the "human element."

    Infosecurity reports: "Data Leak Hits Thousands of NHS Workers"

  • news

    Visible to the public "Hackers Earn $180,000 for ICS Exploits at Pwn2Own Miami 2023"

    White hat hackers recently received a total of $180,000 at the Pwn2Own Miami 2023 hacking contest for exploits targeting widely used industrial control system (ICS) products. At the ICS edition of Pwn2Own, hackers were invited to demonstrate exploits against OPC UA, data gateway, and edge products made by Aveva, Inductive Automation, ProSys, PTC, Softing Industrial Automation, Triangle MicroWorks, and Unified Automation. Prizes ranged between $5,000 and $40,000 per exploit chain, but none of the participants earned more than $20,000 for a single exploit. Researchers received $20,000 for remote code execution exploits targeting Triangle Microworks SCADA Data Gateway, Inductive Automation Ignition, and Softing EdgeAggregator Siemens. A majority of entries demonstrated DoS attacks and earned participants $5,000. The team from industrial cybersecurity firm Claroty was declared the winner, earning $98,500 for its exploits and an additional $25,000 representing the winner's bonus. Exploits earned participants nearly $155,000, excluding the winner's bonus. In comparison, at last year's ICS Pwn2Own, white hat hackers took home a total of $400,000 for more than two dozen unique exploits. Vulnerabilities demonstrated at Pwn2Own are reported to the vendors whose products they impact.

    SecurityWeek reports: "Hackers Earn $180,000 for ICS Exploits at Pwn2Own Miami 2023"

  • news

    Visible to the public "EU Cybersecurity Agency Warns Against Chinese APTs"

    According to the EU Agency for Cybersecurity (ENISA) and the Computer Emergency Response Team for the EU institutions, bodies, and agencies (CERT-EU), several Chinese state-sponsored threat groups have recently been observed targeting businesses and governments in the European Union. The advanced persistent threats (APTS) mentioned include APT27, APT30, APT31, Ke3chang, Gallium, and Mustang Panda. According to ENISA and CERT-EU, these threat actors present significant and ongoing threats to the European Union. Recent operations pursued by these actors focused mainly on information theft, primarily via establishing persistent footholds within the network infrastructure of organizations of strategic relevance. In July 2021, the EU urged Chinese authorities to take action against malicious cyber activities undertaken from their territory and linked to APT31.

    Infosecurity reports: "EU Cybersecurity Agency Warns Against Chinese APTs"

  • news

    Visible to the public "Cisco Issues Patch for Critical Vulnerability in Open-Source ClamAV Antivirus"

    Cisco has released a patch for a critical vulnerability found in its ClamAV open-source antivirus software. Cisco said that the issue, tracked as CVE-2023-2003, could enable Remote Code Execution on vulnerable devices and was given a "critical" rating of 9.8. It was discovered that the vulnerability impacts versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7. Cisco stated in an alert published on February 15 that the flaw impacted the ClamAV HFS+ file parser and could allow an "unauthenticated, remote attacker to execute arbitrary code" with the same privileges as the scanning process. According to the company, this vulnerability can also result in a Denial-of-Service (DoS) condition. This vulnerability stems from a missing buffer size check, which could lead to a heap buffer overflow write. An attacker could exploit this vulnerability by submitting a specially crafted HFS+ partition file for ClamAV to scan on a vulnerable system. This article continues to discuss the potential impact and exploitation of the critical vulnerability discovered in the open-source ClamAV antivirus software.

    ITPro reports "Cisco Issues Patch for Critical Vulnerability in Open-Source ClamAV Antivirus"

  • news

    Visible to the public "BEC Groups Launch Executive Impersonation Attacks in at Least 13 Languages"

    Researchers at Abnormal Security have identified two groups who are using executive impersonation to carry out Business Email Compromise (BEC) attacks in at least 13 different languages. The researchers noted that while attacking targets in multiple regions and using multiple languages are not new tactics, in the past, these operations were typically performed by sophisticated groups with large budgets and resources. Due to the rise of automated translation tools such as Google Translate, threat actors can translate emails into any language they need, with greater ease. Abnormal Security has discovered two groups: Midnight Hedgehog, which engages in payment fraud, and Mandarin Capybara, which conducts payroll diversion attacks. The two groups have launched BEC attack campaigns in Danish, Dutch, Estonian, French, German, Hungarian, Italian, Norwegian, Polish, Portuguese, Spanish, and Swedish. This article continues to discuss the growth in BEC attacks and the launch of BEC campaigns in multiple languages by Midnight Hedgehog and Mandarin Capybara.

    SC Media reports "BEC Groups Launch Executive Impersonation Attacks in at Least 13 Languages"

  • news

    Visible to the public "XIoT Vendors Get Serious About Security, Devote Resources to Protect Cyber-Physical Systems"

    According to Claroty, cyber-physical system vulnerabilities disclosed in the second half of 2022 decreased by 14 percent since reaching a peak in the same period in 2021, while vulnerabilities discovered by internal research and product security teams surged by 80 percent over the same time frame. These findings suggest that security researchers are positively impacting the strengthening of security for Extended Internet of Things (XIoT) devices, which include cyber-physical systems across industrial, healthcare, and commercial environments. The findings also indicate that XIoT vendors are focusing more resources on examining the security and safety of their products. Claroty's new report provides an analysis of vulnerabilities affecting the XIoT, including Operational Technology and Industrial Control Systems (OT/ICS), Internet of Medical Things (IoMT) devices, building management systems, and enterprise IoT devices. This article continues to discuss key findings from Claroty's State of XIoT Security Report.

    Help Net Security reports "XIoT Vendors Get Serious About Security, Devote Resources to Protect Cyber-Physical Systems"

  • news

    Visible to the public "Hackers Target Chinese Language Speakers With FatalRat Malware"

    According to researchers at ESET, Chinese-speaking users are being targeted by the FatalRAT malware, which is spread via fake websites of widely-used apps. The FatalRat malware was first discovered in August 2021. It can record keystrokes, change a victim's screen resolution, download and execute files, and steal or delete browser-stored data. The researchers have not yet attributed this campaign to any known hacker group, and the attackers' purpose also remains unclear. The threat actors behind the campaign could be stealing information such as web credentials to sell on underground forums or use in other malicious activities. Most attacks were detected between August 2022 and January 2023, with Taiwan, China, and Hong Kong as the primary targets. Malaysia, Japan, the Philippines, Thailand, Singapore, Indonesia, and Burma have also faced a small number of attacks. The malware was spread via phishing websites posing as popular apps, including Google Chrome, Firefox, Telegram, WhatsApp, Signal, and Skype. Some of the websites provided fake Chinese-language versions of software that is unavailable in China, such as Telegram. This article continues to discuss the FatalRAT malware campaign.

    The Record reports "Hackers Target Chinese Language Speakers With FatalRat Malware"

  • news

    Visible to the public "Atlassian: Leaked Data Stolen via Third-Party App"

    A threat group known as SiegedSec recently published a collection of employee and operations data allegedly stolen from the software workforce collaboration tool company Atlassian. Atlassian, which is known for its Trello, Jira, and Confluence brands, is assuring its customers that their data is secure, and has explained that a third-party app was compromised, exposing employee information such as names, emails, departments, and floor plans of parts of Atlassian offices in San Francisco, California, and Sydney, Australia. This article continues to discuss the SiegedSec threat group leaking data that Atlassian says was stolen from a third-party app used to coordinate in-office resources.

    Dark Reading reports "Atlassian: Leaked Data Stolen via Third-Party App"

  • news

    Visible to the public "Hackers Backdoor Microsoft IIS Servers With New Frebniis Malware"

    Hackers are launching a new malware named Frebniis on Microsoft's Internet Information Services (IIS), stealthily executing commands sent via web requests. Frebniis was found by Symantec's Threat Hunter Team, who revealed that an unidentified threat actor is using it against targets in Taiwan. Microsoft IIS is a web server software that serves as a web server and web app hosting platform for services such as Outlook on the Web for Microsoft Exchange. In the attacks observed by Symantec, hackers exploit an IIS feature called "Failed Request Event Buffering" (FREB), which is responsible for gathering request metadata (i.e., IP address, HTTP headers, and cookies). Its objective is to help server administrators troubleshoot unexpected HTTP status codes or request processing issues. The Frebniis malware injects malicious code into a certain function of a DLL file that controls FREB, allowing an attacker to intercept and monitor all HTTP POST requests sent to the ISS server. When the malware detects specific HTTP requests sent by an attacker, it parses the requests to identify which commands to execute on the server. This article continues to discuss findings regarding the new Frebniis malware.

    Bleeping Computer reports "Hackers Backdoor Microsoft IIS Servers With New Frebniis Malware"

  • news

    Visible to the public "New Mirai Botnet Variant 'V3G4' Exploiting 13 Flaws to Target Linux and IoT Devices"

    A new variant of the Mirai botnet has been discovered using multiple security flaws to spread to Linux and Internet of Things (IoT) devices. Discovered during the second part of 2022, the latest variant has been named V3G4 by Palo Alto Networks Unit 42, which identified three different campaigns likely carried out by the same threat actor. Once infected, the vulnerable devices would be fully controlled by the attackers and become part of the botnet, according to Unit 42 researchers. The threat actor is able to use these devices to execute additional attacks, including Distributed Denial-of-Service (DDoS) attacks. The adversary uses as many as 13 vulnerabilities that could result in Remote Code Execution (RCE) in targeting servers and networking devices running Linux. Atlassian Confluence Server and Data Center, DrayTek Vigor routers, Airspan AirSpot, Geutebruck IP cameras, and more, include the exploited vulnerabilities. This article continues to discuss the new Mirai botnet variant V3G4.

    THN reports "New Mirai Botnet Variant 'V3G4' Exploiting 13 Flaws to Target Linux and IoT Devices"

  • news

    Visible to the public "Cybersecurity Defenders Are Expanding Their AI Toolbox"

    Deep Reinforcement Learning (DRL) is a form of Artificial Intelligence (AI) that scientists have taken a significant step toward using to defend computer networks. DRL was effective in preventing adversaries from achieving their goals up to 95 percent of the time when confronted with sophisticated cyberattacks in a rigorous simulation environment. The result suggests a potential role for autonomous AI in proactive cyber defense. Researchers at the Department of Energy's (DOE) Pacific Northwest National Laboratory (PNNL) documented their findings in a research paper and presented them at a workshop on AI for Cybersecurity during the annual meeting of the Association for the Advancement of AI in Washington, DC. The development of a simulation platform for testing multistage attack scenarios involving different types of adversaries was the initial step. The creation of such a dynamic attack-defense simulation environment allows researchers to examine the effectiveness of various AI-based defense strategies in controlled test conditions. Such tools are necessary for assessing the performance of DRL algorithms. The method is becoming an effective decision-support tool for cybersecurity experts. It provides a defense agent that can learn, quickly adapt, and make decisions autonomously. Although other forms of AI are commonly used to detect intrusions or filter spam messages, DRL enhances defenders' ability to orchestrate sequential decision-making plans in their everyday confrontations with attackers. According to the researchers, DRL offers smarter cybersecurity, the ability to detect changes in the cyber landscape earlier, and the chance to take preventative measures against a cyberattack. This article continues to discuss the PNNL scientist's research on DRL for cyber system defense under dynamic adversarial uncertainties.

    Pacific Northwest National Laboratory reports "Cybersecurity Defenders Are Expanding Their AI Toolbox"

  • news

    Visible to the public "Abertay University Project Combats Growing Threat of Romance Fraud"

    A project conducted by researchers at Abertay University aims to combat one of the most destructive and costly types of cybercrime affecting thousands of individuals. The project involves using a tool to detect scammers who are using online dating platforms to trick people. This rising type of fraud, known as romance fraud, includes scammers luring their victims into false relationships to steal their money or personal information. Despite its rising prevalence, success has been slow in combating romance fraud, with most efforts focusing on awareness-raising initiatives that are difficult for people to implement in their own lives. In contrast, Abertay University's "Broken Hearts, Empty Accounts" project takes a technological approach, with a new program that picks up on subtle cues in online conversations and protects users from being scammed. This article continues to discuss romance fraud and the Abertay University project aimed at combating this form of cybercrime.

    Abertay University reports "Abertay University Project Combats Growing Threat of Romance Fraud"

  • news

    Visible to the public "Hackers Leverage PayPal to Send Malicious Invoices"

    Security researchers at Avanan, a Check Point company, found that threat actors have been leveraging the online payments system PayPal to send malicious invoices directly to users through the platform. The researchers noted that this is different from others attacks spoofing Paypal as this malicious invoice comes directly from PayPal. The researchers stated that the phishing email seen as part of the malicious campaign warned users that there had been fraud on the account and threatened a fine of $699.99 should the victim not take action. The researchers noted that the body of the email could alert some cautious users that the email was not authentic. First, the grammar and spelling are all over the place. Second, the phone number they list is not related to PayPal. The researchers stated that the general goal of the threat actors is to have victims call the number or follow up for more details. If a victim calls that number, now they have the person's cell phone number and can use it for more attacks. The threat actors will also try to scam the victim while on call with them. According to the researchers, the perks of using PayPal for threat actors are several, including the ability to send many invoices at a time and make them professional-looking. The researchers noted that an email that comes directly from PayPal will pass all SPF, DKIM, and DMARC checks.

    Infosecurity reports: "Hackers Leverage PayPal to Send Malicious Invoices"

  • news

    Visible to the public "Quarter of Crypto Tokens Linked to Pump-and-Dump"

    Security researchers at Chainalysis have discovered that almost a quarter (24%) of cryptocurrency tokens launched last year displayed the tell-tale signs of a pump-and-dump fraud scheme. Pump-and-dump schemes are common in traditional finance. Fraudsters typically promote assets they hold stocks in to other investors, rapidly driving up the price. When it reaches a certain point, they sell the over-valued shares at a profit, causing the price to plummet. The researchers noted that crypto tokens, tradeable digital assets built on another cryptocurrency's blockchain, are increasingly popular among the same scammers. The researchers explained that "this is largely due to the relative ease with which bad actors can launch a new token and establish an artificially high price and market capitalization for it 'on paper' by seeding the initial trade volume and controlling the circulating supply." The researchers noted that, additionally, teams launching new projects and tokens can remain anonymous, which makes it possible for serial offenders to carry out multiple pump-and-dump schemes. Chainalysis looked at the 1.1 million tokens launched last year on the Ethereum and BNB blockchains. Of the 40,521 tokens that did gain traction, 9902 (24%) saw a 90% price drop in the first week after launch, singling them out as pump-and-dump scams. The researchers stated that it seems like the same fraudsters were responsible for multiple scams last year. The most prolific individual launched 264 suspect tokens in 2022. The researchers said that in total, buyers not believed to be associated with the tokens' creators spent a total of $4.6bn worth of cryptocurrency acquiring some of the 9902 suspected pump-and-dump tokens they identified. The researchers estimate that the creators of these tokens made a total of $30m in profits from selling off their holdings before the tokens' value plummeted.

    Infosecurity reports: "Quarter of Crypto Tokens Linked to Pump-and-Dump"

  • news

    Visible to the public "Experts Warn of Surge in Multipurpose Malware"

    Security researchers at Picus Security have warned that a growing number of versatile malware variants are capable of performing multiple malicious actions across the cyber-kill chain. Picus Security compiled its Red Report 2023 by analyzing over 500,000 malware samples last year, identifying their tactics, techniques, and procedures (TTPs), and extracting over 5.3 million "actions." The vendor then mapped these actions to MITRE ATT&CK techniques. The researchers found that the average malware variant now leverages 11 TTPs or nine MITRE ATT&CK techniques. One-third (32%) uses more than 20 TTPs, and one in 10 leverages over 30 TTPs. The researchers noted that this "Swiss Army knife" malware can enable attackers to move through networks undetected at great speed, obtain credentials to access critical systems, and encrypt data. The researchers found that 40% of the most prevalent MITRE ATT&CK techniques they identified were used to help with lateral movement. These included tried-and-tested techniques such as Command and Scripting Interpreter and OS Credential Dumping and newer ones such as Remote Services, Remote System Discovery, and WMI. The researchers noted that the most common technique used was Command and Scripting Interpreter, which involves the abuse of legitimate interpreters such as PowerShell, AppleScript, and Unix shells to execute arbitrary commands. The researchers stated that this highlights how hackers favor legitimate existing tools in their attacks rather than custom-developed ones. The second most common technique used was OS Credential Dumping, which attackers use to hijack accounts and move laterally. Third, came Data Encrypted for Impact, which reveals the continued threat posed by ransomware.

    Infosecurity reports: "Experts Warn of Surge in Multipurpose Malware"

  • news

    Visible to the public "ESXiArgs Ransomware Has Infected Hundreds of New Targets in Europe, Researchers Say"

    According to data collected by the security research firm Censys, the ESXiArgs ransomware has recently targeted over 500 European organizations. Researchers at Censys have been updating a dashboard that monitors the ransomware campaign's spread daily. In the past few days, researchers have seen slightly more than 500 hosts that have been recently infected with ESXiArgs. France experienced 217 new incidents, compared to 137 in Germany, 28 in the Netherlands, 23 in the UK, and 19 in Ukraine. The analysis also reveals that the initial infections date back to October 12, 2022, before European cybersecurity officials began issuing warnings about the ransomware on February 2, 2023. This article continues to discuss the infection of over 500 new targets in Europe by the ESXiArgs ransomware and other findings regarding the malicious campaign.

    The Record reports "ESXiArgs Ransomware Has Infected Hundreds of New Targets in Europe, Researchers Say"

  • news

    Visible to the public "AI-Based Visual Editing Service Leaks User Images and Customer Data"

    Internet users have become increasingly fascinated with Artificial Intelligence (AI)-based tools such as ChatGPT and DALL-E, but few have likely considered the security consequences of contributing text or images to such programs. Cybernews researchers have found that Cutout.pro, an AI-based visual design platform headquartered in Hong Kong, exposed user-generated content through an unprotected ElasticSearch instance. With the help of an AI-based Application Programming Interface (API), Cutout.pro's services enable users to alter photos and create images. The functionality allows the integration of the company's services into third-party applications. According to the team, Cutout.pro exposed usernames and images made by customers with the company's tools. The instance also contained information regarding the number of user credits, a virtual in-service currency, as well as links to Amazon S3 buckets containing generated images. The exposed instance had about 22 million log entries that referenced usernames for individual users and business accounts, but this does not mean that the same number of users were exposed, as there were duplicate log entries. This article continues to discuss the exposure of data by the AI media manipulation service Cutout.pro.

    Cybernews reports "AI-Based Visual Editing Service Leaks User Images and Customer Data"

  • news

    Visible to the public "ChatGPT Subs In as Security Analyst, Hallucinates Only Occasionally"

    Experiments have demonstrated that ChatGPT, a popular Large Language Model (LLM), could help defenders in triaging potential security incidents and finding security flaws in code, even though the Artificial Intelligence (AI) model was not trained for such tasks. In an analysis of ChatGPT's value as an incident response tool, researchers determined that it could identify malicious processes running on compromised systems. The researchers infected a system with the Meterpreter and PowerShell Empire agents, assumed the role of an adversary, and then went through the system with a ChatGPT-powered scanner. The LLM identified two malicious processes running on the system and correctly disregarded 137 benign processes, potentially significantly decreasing overhead. This article continues to discuss the potential use of ChatGPT as a tool for incident response triage and software vulnerability discovery.

    Dark Reading reports "ChatGPT Subs In as Security Analyst, Hallucinates Only Occasionally"

  • news

    Visible to the public "High-Risk Users May Be Few, but the Threat They Pose Is Huge"

    According to research conducted by Elevate Security, about 10 percent of the workforce is composed of high-risk users, who are in every department and function of the business. In addition, the study uncovered multiple unexpected findings. For example, contractors are less likely to pose a high risk than employees, and simulated phishing is not a reliable indicator of who poses a high risk for real phishing attacks. This study debunks the idea that many traditional ways to decrease user risk rely on simulated phishing tests as the major determinant for detecting potentially risky individuals. Although they constitute a small portion of the population, high-risk users pose a significant threat to the organization. This article continues to discuss key findings from Elevate Security's research on high-risk users.

    Help Net Security reports "High-Risk Users May Be Few, but the Threat They Pose Is Huge"

  • news

    Visible to the public "Hackers Start Using Havoc Post-exploitation Framework in Attacks"

    According to security researchers, threat actors are now using Havoc, an open-source command-and-control (C2) framework, as an alternative to paid options such as Cobalt Strike and Brute Ratel. Havoc's cross-platform nature and ability to evade Microsoft Defender on Windows 11 devices via sleep obfuscation, return address stack spoofing, and indirect syscalls are among its features. Similar to previous exploitation kits, Havoc includes various modules that enable pen testers (and hackers) to execute commands, manage processes, download additional payloads, manipulate Windows tokens, and execute shellcode. This article continues to discuss threat actors switching to a new and open-source C2 framework known as Havoc as an alternative to paid options.

    Bleeping Computer reports "Hackers Start Using Havoc Post-exploitation Framework in Attacks"

  • news

    Visible to the public "Researchers Warn of Critical Security Bugs in Schneider Electric Modicon PLCs"

    Two new vulnerabilities affecting Schneider Electric Modicon Programmable Logic Controllers (PLCs) have been reported by security researchers at Forescout. These vulnerabilities could allow authentication bypass and Remote Code Execution (RCE). The vulnerabilities, tracked as CVE-2022-45788 and CVE-2022-45789, are part of a larger set of security vulnerabilities identified by Forescout as OT:ICEFALL. A successful attack using the vulnerabilities could allow an adversary to execute unauthorized code, cause a Denial-of-Service (DoS) condition, or disclose sensitive data. According to the cybersecurity firm, a threat actor can chain the vulnerabilities with known vulnerabilities from other vendors to achieve deep lateral movement in Operational Technology (OT) networks. This movement enables attackers to obtain deep access to Industrial Control Systems (ICS) and cross often-overlooked security perimeters, enabling them to carry out highly granular and covert manipulations and to circumvent functional and safety constraints. A proof-of-concept (PoC) cyber-physical attack revealed that the vulnerabilities could be exploited to evade safety guardrails and cause damage to a movable bridge's infrastructure. This article continues to discuss the new critical security flaws impacting Schneider Electric Modicon PLCs.

    THN reports "Researchers Warn of Critical Security Bugs in Schneider Electric Modicon PLCs"

  • news

    Visible to the public "Our Neurodata Can Reveal Our Most Private Selves. As Brain Implants Become Common, How Will It Be Protected?"

    Brain-Computer Interfaces (BCIs) offer regained mobility and, more recently, thought-to-text capabilities to millions of people living with paralysis, epilepsy, and neuromuscular conditions. Few implanted versions of the technology have been commercialized, but several companies are working to change that. BCIs will eventually enable individuals to perform various tasks with their minds. Implanted BCIs can provide rich access to brain signals, but there is no option to select which signals are shared. According to Christina Maher, a researcher at the University of Sydney, brain data is the most private information due to the conclusions that could be drawn about a person's identity and mental state. However, private BCI companies may not be required to inform users about which data is used to train algorithms or how the inputs are connected to interpretations that result in outputs. In Australia, strict data storage rules require that all BCI-related patient data be stored on secure servers in an anonymized form, thereby protecting patient privacy. Still, requirements outside of the context of research remain unclear. As with many industries where data protection is crucial, there is a risk of neurodata hacking in which cybercriminals access and exploit brain data. This article continues to discuss BCIs and the potential privacy and security risks associated with them.

    The Conversation reports "Our Neurodata Can Reveal Our Most Private Selves. As Brain Implants Become Common, How Will It Be Protected?"

  • news

    Visible to the public "Developing a Successful Cyber Resilience Framework"

    According to Alberto G. Alexander, Ph.D., cyber resilience combines information security, business continuity, and organizational resilience. He has described the components of an effective cyber resilience strategy and highlighted a cyber resilience framework's elements. Adverse cyber events have a negative impact on the availability, integrity, or confidentiality of networked Information Technology (IT) systems and the associated data and services. These incidents could be intentional, such as a cyberattack, or unintentional, like a software update failure. Humans, nature, or a combination of both may also cause adverse cyber events. The purpose of cyber resilience is to sustain the entity's ability to consistently deliver the desired outcome at all times. This requires doing so even when normal distribution systems have failed, such as during a crisis or a security breach. In addition, the idea of cyber resilience encompasses the ability to restore or recover regular delivery methods following such incidents, as well as the ability to continuously update or adapt these delivery mechanisms as risks and threats evolve. In the process of restoring delivery methods, backups and disaster recovery procedures are included. This article continues to discuss the elements of a successful cyber resilience strategy, the components of a cyber resilience framework, and the best cyber practices presented by Dr. Alberto G. Alexander.

    Continuity Central reports "Developing a Successful Cyber Resilience Framework"

  • news

    Visible to the public "An AI Flew a US Air Force Training Aircraft For Over 17 Hours"

    An artificial intelligence agent recently flew the Lockheed Martin VISTA X-62A training aircraft for over 17 hours. VISTA, which stands for Variable In-flight Simulation Test Aircraft, can use software to simulate the performance characteristics of other aircraft. On this occasion, it mimicked a human pilot instead. Lockheed stated that the flight took place during a testing period in December. Lockheed noted that this is the first time that AI has been engaged in such a way on a tactical aircraft. Lockheed stated that the aim is to use the platform to test aircraft designs that can be flown autonomously. US Air Force Test Pilot School (USAF TPS) director of research, Dr. M. Christopher Cotting, stated that "VISTA will allow us to parallelize the development and test of cutting-edge artificial intelligence techniques with new uncrewed vehicle designs." Cotting noted that this approach, combined with focused testing on new vehicle systems as they are produced, will rapidly mature autonomy for uncrewed platforms and allow us to deliver tactically relevant capability to our warfighters. The USAF recently upgraded the VISTA X-62A with Lockheed's Model Following Algorithm (MFA) and System for Autonomous Control of the Simulation (SACS). When integrated, these systems help VISTA carry out advanced flight tests that harness autonomy and AI.

    Engadget reports: "An AI Flew a US Air Force Training Aircraft For Over 17 Hours"

  • news

    Visible to the public "Chinese Threat Group Leaks Hacking Secrets in Failed Attack"

    Group-IB's analysis of an intercepted spear-phishing email provides further insight into the hacking techniques of the Chinese state-sponsored espionage threat actor known as Tonto Team. According to the security firm, a spear-phishing attempt against its own employees in July 2022 was made by the Chinese threat actor that historically targeted South Korea, Japan, Taiwan, and the US but has since expanded operations to include additional Asian and Eastern European nations. The US-China Economic and Security Review Commission's analysis found that Tonto Team is likely a unit of the People's Liberation Army, which in 2017, allegedly hacked multiple South Korean organizations involved in the deployment of an American anti-ballistic missile defense system. In 2021, the cybersecurity company ESET identified it as a participant in the wave of Chinese state-sponsored hackers exploiting vulnerabilities in Microsoft Exchange. During the summer, Malwarebytes discovered that the group was extending its eavesdropping operations against Russian government agencies. No single indicator prompted Group-1B to believe that Tonto Team was behind their phishing attempt, but evidence began to mount. Attached to the phishing email was a document containing metadata that revealed the default language to be "Chinese People's Republic of China." The attachment was a rich text format file created with the Royal Road RTF Weaponizer, a malware tool primarily used by Chinese Advanced Persistent Threat (APT) groups. This article continues to discuss findings regarding the Chinese state-sponsored espionage threat actor Tonto Team.

    DataBreachToday reports "Chinese Threat Group Leaks Hacking Secrets in Failed Attack"

  • news

    Visible to the public "Community Health Systems Data Breach Caused by GoAnywhere MFT Hack"

    Community Health Systems (CHS) is one of the leading healthcare providers in the US. CHS operates 79 acute-care hospitals and over 1,000 other care locations, including physician practices, urgent care centers, freestanding emergency departments, occupational medicine clinics, imaging centers, cancer centers, and ambulatory surgical centers. Threat actors used the zero-day vulnerability, tracked as CVE-2023-0669, in Fortra's GoAnywhere MFT secure file transfer platform to launch an attack against CHS. CHS was recently informed that its third-party provider Fortra had suffered a security breach, which compromised company data. An investigation into whether any CHS systems were compromised revealed that 1 million patients were affected. Researchers at the threat intelligence company Huntress shared the results of their investigation into the exploitation of GoAnywhere MFT and attributed the attacks to the TA505 threat actors. The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) added the GoAnywhere MFT vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog last week, requiring that federal agencies remediate it by March 3, 2023. This article continues to discuss the latest findings regarding the CHS data breach.

    Security Affairs reports "Community Health Systems Data Breach Caused by GoAnywhere MFT Hack"

  • news

    Visible to the public "SAS App and Website Hit as Attacks Target Swedish Firms"

    Scandinavian airline SAS was hit by a cyberattack yesterday that reportedly downed its website and app and may have leaked customer information for a brief time. Customers were urged to refrain from using the airline's mobile app as they may be served incorrect information. Some users were apparently logged into the wrong accounts and therefore had access to the personal details of other customers. The company's website was also reportedly down for a time. Customers claimed that they were also not able to buy plane tickets yesterday. It's unclear whether all of the reported issues have been resolved because the company has yet to share much information about the cyberattack or what impact the cyberattack has had on its operations. Threat actors also targeted several Scandinavian media companies yesterday, including Swedish TV channel svt. The DDoS attacks were claimed by a group describing itself as "Anonymous Sudan," who said they were retaliating against a recent incident of Quran burning near Turkey's embassy in Stockholm. Experts are claiming that the DDoS attack may be a Russian false-flag campaign designed to continue whipping up hatred towards Sweden in Muslim countries like Turkey.

    Infosecurity reports: "SAS App and Website Hit as Attacks Target Swedish Firms"

  • news

    Visible to the public "Malicious DDoS Attacks up by 150 Percent"

    Globally, the number of Distributed Denial-of-Service (DDoS) attacks increased by 150 percent in 2022 compared to the previous year, while the number of attacks in the Americas increased by 212 percent compared to 2021. The 2022 Global Threat Analysis Report published by Radware reveals that the frequency of DDoS attacks has increased significantly. In the fourth quarter of 2022, companies mitigated an average of 29.3 attacks per day, which is 3.5 times greater than the 8.4 attacks mitigated per day at the end of 2021. The overall volume of attacks recorded in 2022 was 4.44PB, an increase of 32 percent compared to 2021, with the Americas experiencing the most significant rise of 1100 percent. Although EMEA outpaced the Americas in terms of attack frequency, its total attack volume decreased by 44 percent in 2022 compared to the previous year. The largest attack recorded globally in 2022 was 1.46Tbps, which was 2.8 times larger than the biggest attack reported in 2021. The complexity of DDoS attacks has also increased. Typically, attackers choose diverse channels to amplify their impact and make attack prevention more difficult. In 2022, attacks above 1Gbps had an average of more than two different attack vectors, and attacks above 10Gbps were twice as complicated. Attacks above 100Gbps had, on average, over nine different attack vectors, with the most complex attacks involving 38 distinct vectors. This article continues to discuss key findings from Radware's 2022 Global Threat Analysis Report.

    BetaNews reports "Malicious DDoS Attacks up by 150 Percent"

  • news

    Visible to the public "Dozens of Vulnerabilities Patched in Intel Products"

    Intel recently announced patches for dozens of vulnerabilities across its product portfolio, including critical and high-severity issues. The most severe of these flaws is CVE-2021-39296 (CVSS score of 10), which impacts the Integrated Baseboard Management Controller (BMC) and OpenBMC firmware of several Intel platforms. Intel noted that the bug was identified in 2021 in the netipmid (IPMI lan+) interface and could allow an attacker to obtain root access to the BMC, bypassing authentication using crafted IPMI messages. Four other vulnerabilities were addressed in BMC, and OpenBMC firmware, including a high-severity, out-of-bounds read issue that could lead to denial-of-service (DoS). Intel has addressed these bugs with the release of Integrated BMC firmware versions 2.86, 2.09, and 2.78, and OpenBMC firmware versions 0.72, wht-1.01-61, and egs-0.91-179. The company noted that patches were also released for a high-severity privilege escalation defect in Xeon processors with SGX (CVE-2022-33196). Both BIOS and microcode updates that address this issue are now available. Intel also warned of a high-severity escalation of privilege issue (CVE-2022-21216) impacting Atom and Xeon processors and released microcode updates for Xeon to address CVE-2022-33972, an incorrect calculation bug that could lead to information disclosure. Intel also announced updates that resolve high-severity privilege escalation defects in the BIOS firmware and Trusted Execution Technology (TXT) Secure Initialization (SINIT) Authenticated Code Modules (ACM) of some processors. Updates were also released to resolve high-severity flaws in Driver Support Assistant (DSA) software and high and medium severity vulnerabilities in Battery Life Diagnostic Tool, oneAPI Toolkits, System Usage Report (SUR), Server Platform Services (SPS) firmware, and Quartus Prime Pro and Standard edition software. The company noted that various medium-severity vulnerabilities were also resolved in the FPGA SDK for OpenCL Quartus Prime Pro software, Integrated Sensor Solution, Media Software Development Kit (SDK), Trace Analyzer and Collector software, and Xe MAX drivers for Windows. Intel recommends that users update to the latest available firmware and software versions as soon as possible.

    SecurityWeek reports: "Dozens of Vulnerabilities Patched in Intel Products"

  • news

    Visible to the public "Tonga Is the Latest Pacific Island Nation Hit With Ransomware"

    A ransomware attack has targeted Tonga's state-owned telecommunications company. Tonga Communications Corporation (TCC), one of the country's two telecommunications companies, announced that the attack could slow down administrative operations. The ransomware attack encrypted and locked access to a part of TCC's system, but did not disrupt the delivery of voice and Internet services to users. However, it may slow down the connection of new users, the delivery of bills, and the management of consumer communications, according to the company. The Polynesian country consists of about 171 islands and has a population of around 100,000. TCC manages all fixed telephone lines and has a 70 percent market share in dial-up and broadband Internet. With over 300 employees, the company operates nearly half of the mobile phone services. According to cybersecurity researcher Dominic Alvieri, the Medusa ransomware group claimed responsibility for the attack on TCC. In a 2022 advisory, the US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA), warned that Medusa is based on a Ransomware-as-a-Service (RaaS) model and shares 60 percent of ransoms with affiliates while keeping the remaining 40 percent. Observed as recently as May 2022, MedusaLocker attackers mostly exploit Remote Desktop Protocol (RDP) vulnerabilities to gain access to victim networks. This article continues to discuss the ransomware attack faced by Tonga.

    The Record reports "Tonga Is the Latest Pacific Island Nation Hit With Ransomware"

  • news

    Visible to the public "India-Linked Group Used Telegram to Mastermind Cyberattacks Across Asia, Says Analyst"

    In 2021, SideWinder, also known as Hardcore Nationalist (HN2), targeted more than 60 organizations in Afghanistan, Bhutan, Myanmar, Nepal, and Sri Lanka, according to Group-IB. By a wide margin, government agencies were the most heavily attacked, with 44 targeted versus only four military organizations, while nearly half of the attacks were directed at targets in Nepal. Group-IB also noticed SideWinder using the popular messaging application Telegram to process data from targeted systems. According to Group-IB, due to its relative ease of use, the communication platform has gained popularity as a command-and-control (C2) center or base of operations among Advanced Persistent Threat (APT) groups and financially-motivated cybercriminals during the past year. SideWinder was also found to be improving its toolkit, with Group-IB identifying SideWinder.StealerPy as one of the tools. It is described as a Python-written information stealer that exfiltrates data stolen from the victim's computer. This article continues to discuss researchers' findings and observations regarding the SideWinder group.

    Cybernews reports "India-Linked Group Used Telegram to Mastermind Cyberattacks Across Asia, Says Analyst"

  • news

    Visible to the public "Hyundai, Kia Issue Software Security Fix to Deter TikTok Thefts"

    Kia and parent company Hyundai confirmed recently that the Korean automakers are releasing new anti-theft software at no cost to vehicle owners. According to the National Highway Traffic Safety Administration (NHTSA), the free software fix applies to millions of current vehicles currently lacking theft deterrents. Kia and Hyundai noted that the new anti-theft software is in response to an ongoing challenge on the social media platform TikTok, which encourages or dares people to steal certain makes and models of vehicles. People are being challenged to take the vehicles using a common USB cord. The vehicles most susceptible to that type of theft are Kia and Hyundai models from between 2010 and 2021. Thefts of those specific vehicles have increased dramatically over the last year in places such as Los Angeles and St. Petersburg, Fla. Kia and Hyundai stated that the new software will lengthen the alarm on certain cars from 30 seconds to a full minute. They also will require an ignition key in order to start the vehicles, which lack ignition immobilizers. Kia and Hyundai owners can call a toll-free number to schedule an appointment for their vehicles. The NHTSA stated that Hyundai will also provide its customers with a window sticker alerting would-be thieves that the vehicle is equipped with anti-theft protection. Hyundai will send the stickers and roll out software updates in a phased approach beginning later this month, with subsequent phases over the next several months.

    UPI News reports: "Hyundai, Kia Issue Software Security Fix to Deter TikTok Thefts"

  • news

    Visible to the public "High-Severity DLP Flaw Impacts Trellix for Windows"

    Trellix, the leading Data Loss Prevention (DLP) vendor, is urging customers to patch a high-severity vulnerability that allows local attackers to circumvent restrictions and exfiltrate sensitive data. The vulnerability, tracked as CVE-2023-0400, affects Windows versions of Trellix DLP (11.9.x) issued in August 2022. Customers should upgrade to Trellix for Windows 11.10.0, which mitigates the vulnerability. Security researchers warn that the flaw is not a straightforward upgrade, increasing the likelihood that security teams would overlook the fix. Trellix considers the flaw to be of "medium severity." However, the National Institute of Standards and Technology (NIST) gave it a high-severity rating. According to Trellix, the vulnerability can only be exploited during product installation. Trellix said that an adversary must be able to map a network drive to their local system in order to exploit this vulnerability. In addition, according to a description of the flaw by Trellix, the attacker would need permission to either access data already on the mapped drive or copy data to the mapped drive. This article continues to discuss the potential impact and exploitation of the DLP flaw that affects Trellix for Windows.

    SC Media reports "High-Severity DLP Flaw Impacts Trellix for Windows"

  • news

    Visible to the public "Vulnerabilities Open Korenix JetWave Industrial Networking Devices to Attack"

    CyberDanube researchers have discovered three vulnerabilities in various Korenix JetWave industrial access points and LTE cellular gateways that could enable attackers to disrupt their operation or use them as a foothold for future attacks. According to the researchers, if such a device serves as a key device in an industrial network or controls critical equipment via serial ports, an attacker can do more severe damage in the corresponding network. The vulnerabilities include two command injection flaws in the devices' web server and one Denial-of-service (DoS) flaw. Before executing an exploit for any of the three vulnerabilities, attackers must authenticate. This article continues to discuss the discovery, potential exploitation, and impact of the vulnerabilities found in a variety of Korenix JetWave industrial access points and LTE cellular gateways.

    Help Net Security reports "Vulnerabilities Open Korenix JetWave Industrial Networking Devices to Attack"

  • news

    Visible to the public "OT Network Security Myths Busted in a Pair of Hacks"

    Two recently released studies highlight the hidden dangers to physical operations in today's Operational Technology (OT) networks posed by wireless devices, cloud-based applications, and nested networks of Programmable Logic Controllers (PLCs), effectively disproving traditional insight regarding the security of network segmentation and third-party network connections. In one set of discoveries, a Forescout Technologies research team was able to circumvent safety and functional guardrails in an OT network and move laterally across different network segments at the lowest network levels. Researchers exploited two newly discovered Schneider Modicon M340 PLC vulnerabilities to compromise the PLC and escalate the attack. In another study, a team of researchers from the ICS security company Otorio discovered 38 vulnerabilities in products such as cellular routers from Sierra Wireless and InHand Networks, as well as a remote access server for machines from ETIC Telecom. Dozens of additional vulnerabilities are still in the disclosure process with affected companies and were not identified in the study. The vulnerabilities include two dozen Web interface bugs that could provide the attacker a direct line of access to OT networks. This article continues to discuss the findings from the two new studies that have highlighted cyber threats to physical operations in OT networks.

    Dark Reading reports "OT Network Security Myths Busted in a Pair of Hacks"

  • news

    Visible to the public "RedEyes Hackers Use New Malware to Steal Data From Windows, Phones"

    The APT37 threat group, also known as 'RedEyes' or 'ScarCruft,' targets individuals for intelligence collection using the new evasive malware called M2RAT and steganography. APT37 is a North Korean hacker group suspected to be government-supported. In 2022, the group was observed exploiting zero-day vulnerabilities in Internet Explorer and spreading a wide variety of malware to targeted entities and individuals. The threat actors attacked EU-based companies with a new version of their mobile backdoor dubbed 'Dolphin,' deployed a custom Remote Access Trojan (RAT) dubbed 'Konni,' and targeted US journalists with a highly-customizable malware dubbed 'Goldbackdoor.' In a new study published by the AhnLab Security Emergency Response Center (ASEC), researchers describe how APT37 is now applying a new M2RAT malware strain that uses a shared memory section for commands and data exfiltration. The malware also leaves very few operating traces on the affected system. This article continues to discuss the APT37 threat group's use of new evasive M2RAT malware.

    Bleeping Computer reports "RedEyes Hackers Use New Malware to Steal Data From Windows, Phones"

  • news

    Visible to the public "Experts Warn of 'Beep' - A New Evasive Malware That Can Fly Under the Radar"

    Researchers have discovered a new piece of evasive malware named Beep, which is designed to evade detection and drop additional payloads on a compromised system. Natalie Zargarov, a researcher at Minerva Labs, stated that the creators of this malware appear to be trying to implement as many anti-debugging and anti-VM tactics as they could find. One of these techniques was delaying execution using the Beep API function, hence the name of the malware. The first component of Beep is a dropper responsible for creating a new Windows Registry key and executing a Base64-encoded PowerShell script within it. This article continues to discuss researchers' findings regarding the new Beep malware.

    THN reports "Experts Warn of 'Beep' - A New Evasive Malware That Can Fly Under the Radar"

  • news

    Visible to the public "Preventing Grid Cyberattacks With the Flip of a Switch"

    Electrical substations are considered the "middle-man" of the power system, but unlike the middle-man targeted for elimination in most corporate transactions, the electrical substation plays a critical role in the route of electricity from the grid to the customer. This journey has always been a complicated and multi-step process, but the risks of cyberattacks on the electrical grid have just made things a little more difficult. Therefore, Chen-Ching Liu, professor in the Bradley Department of Electrical and Computer Engineering at Virginia Tech and head of the Power and Energy Center, will collaborate with academics, industry professionals, and the Department of Energy (DOE) during the next three years to improve grid cybersecurity. The DOE's $3 million funding comes at a time when cyberattacks on the power grid are not just possible but destructive. For example, in 2015, six substations in Ukraine's electrical grid faced attacks via remote control of the circuit breakers, resulting in a nearly six-hour-long blackout. This attack exposed the vulnerabilities of the smart grid and was the first cyberattack known to have caused a significant power outage. Substations are typically unstaffed and located in remote areas. Furthermore, substations significantly outnumber power plants and control centers, making them an attractive target for cybercriminals seeking to wreak the most damage. Liu and his team are developing Cyber-REsilience for SubsTations (CREST) technology to address these threats and prevent a similar attack on the US power grid. CREST is composed of three primary phases of operation: detection, mitigation, and recovery. This methodology stresses the detection and mitigation of cyber threats through the enhancement of cyber resilience. This article continues to discuss the work that Liu and his team are doing to improve electrical substation cybersecurity.

    Virginia Tech reports "Preventing Grid Cyberattacks With the Flip of a Switch"

  • news

    Visible to the public "Dong Chen Wins NSF CAREER Award for Project on Cybersecurity, Smart Home Device Data"

    Dong Chen, assistant professor of computer science at Colorado School of Mines, has won a National Science Foundation (NSF) CAREER Award for research aimed at providing smart home device users greater control over their data privacy. Chen will receive $586,000 over the course of five years for his efforts to develop a family of algorithms, mechanisms, and prototypes that will enhance Internet of Things (IoT) security and privacy for smart homes. As part of his project, Chen will also establish IoT cybersecurity workshops for middle and high school instructors in Colorado public schools, focusing on districts with populations of underrepresented students in STEM. Hands-on course modules will be developed to cover IoT systems, cybersecurity, and Artificial Intelligence (AI), which will be used to train students from K-12, undergraduate, and graduate levels. For the purpose of guiding the next generation of IoT, cybersecurity, and AI researchers, outreach activities will be held at local elementary, middle, and high schools. This article continues to discuss the different aspects of Chen's CAREER project, from empowering users of smart home devices to protect their privacy to improving diversity in the cybersecurity field.

    Colorado School of Mines reports "Dong Chen Wins NSF CAREER Award for Project on Cybersecurity, Smart Home Device Data"

  • news

    Visible to the public "Adobe Plugs Critical Security Holes in Illustrator, After Effects Software"

    Software maker Adobe recently released security fixes for at least a half dozen vulnerabilities that expose Windows and macOS users to malicious cyberattacks. Adobe warned that security problems exist in three of its most popular software products Photoshop, Illustrator, and After Effects. According to Adobe's security bulletins, the Illustrator and After Effects patches carry critical severity ratings because of the risk of code execution attacks. The company stated that the Adobe Illustrator vulnerability, tracked as CVE-2022-23187, is a buffer overflow issue that leads to arbitrary code execution. The bug is present for both Windows and macOS users on Illustrator 26.0.3 and earlier versions. A second critical bulletin was released to cover at least four documented Adobe After Effects vulnerabilities that expose Windows and macOS users to code execution attacks. Successful exploitation of the four bugs could lead to arbitrary code execution in the context of the current user. Adobe tracks the After Effects bugs as CVE-2022-24094, CVE-2022-24095, CVE-2022-24096, and CVE-2022-24097. The company also shipped a third bulletin to cover an important-severity flaw in its flagship Adobe Photoshop software. Adobe noted that the Photoshop vulnerability (CVE-2022-24090) affects both Windows and macOS users and warns that successful exploitation could lead to a memory leak in the context of the current user. Adobe said it was unaware of any exploits in the wild for any flaws patched this month.

    SecurityWeek reports: "Adobe Plugs Critical Security Holes in Illustrator, After Effects Software"

  • news

    Visible to the public "11,000 Sites Have Been Infected With Malware That's Good at Avoiding Detection"

    According to researchers from the security firm Sucuri, nearly 11,000 websites have been infected with a backdoor capable of redirecting visitors to websites that generate fake views of Google Adsense advertisements. All of the infected websites discovered by Sucuri use the WordPress Content Management System (CMS) and have an obfuscated PHP script injected into their legitimate files. These files include "index.php," "wp-signup.php," "wp-activate.php," and "wp-cron.php," and more. In addition, some of the infected websites inject obfuscated code into wp-blog-header.php and other files. The additional injected code functions as a backdoor designed to prevent the malware from being eradicated by loading itself into files that run whenever the targeted server is rebooted. Sucuri researcher Ben Martin explained that these backdoors download additional shells and a Leaf PHP mailer script from a remote domain and place them in files with random names in the wp-includes, wp-admin, and wp-content directories. Since the additional malware injection is embedded in the wp-blog-header.php file, it will execute each time the website is loaded and reinfect it. This guarantees that the environment will remain infected until all traces of the infection have been eliminated. This article continues to discuss the infection of about 11,000 websites with malware that is effective at evading detection.

    Ars Technica reports "11,000 Sites Have Been Infected With Malware That's Good at Avoiding Detection"

  • news

    Visible to the public "Unique Iran-Based Threats Target Defense and Healthcare"

    Early in November 2022, the Department of Health and Human Services' Health Sector Cybersecurity Coordinating Center released a security brief detailing how Tehran-backed actors have attacked healthcare, defense, and other sectors. One incident involved a campaign by the Tortoiseshell threat group, which compromised Facebook users by impersonating recruiters for the medical field, journalism, and other occupations. Their efforts led people in the US and Europe to download malware-infected files. Other schemes tricked victims into entering credentials on fake websites. Iran-based threat groups are not known for their technical expertise, but their social engineering tactics enable them to conduct successful attacks. Facebook released a report in 2021 on its part in dismantling the Iranian Tortoiseshell group. Previously, the actors focused on the Middle Eastern Information Technology (IT) industry. The group then expanded to other regions and industries. Facebook determined that the Tortoiseshell group had largely targeted the defense and aerospace industries in the US and the UK. Tortoiseshell used Facebook as part of a larger cross-platform espionage campaign. In addition, the group deployed malware payloads via email, messaging platforms, and phishing websites. This article continues to discuss the Tortoiseshell group's tactics, techniques, and procedures (TTPs).

    Security Intelligence reports "Unique Iran-Based Threats Target Defense and Healthcare"

  • news

    Visible to the public "Chinese Hackers Infiltrate South American Diplomatic Networks"

    The Chinese state-sponsored threat actor DEV-0147 has recently been spotted targeting diplomatic entities in South America with the ShadowPad remote access Trojan (RAT), also known as PoisonPlug. Microsoft stated that the threat actor's new campaign represents a notable expansion of the group's data exfiltration operations that previously targeted government agencies and think tanks in Asia and Europe. From a technical standpoint, Microsoft noted that it observed DEV-0147 deploy ShadowPad, a RAT associated with other China-based actors, to achieve persistence, and QuasarLoader, a webpack loader, to download and execute additional malware. The company stated that "DEV-0147's attacks in South America included post-exploitation activity involving the abuse of on-premises identity infrastructure for recon and lateral movement and the use of Cobalt Strike for command and control and data exfiltration." Microsoft noted that Microsoft 365 Defender detects these DEV-0147 attacks through Microsoft Defender for Identity and Defender for Endpoint. Microsoft is urging organizations to enforce multi-factor authentication (MFA). DEV-0147 is not the only threat actor in China leveraging ShadowPad in recent times. A June 2022 advisory by Kaspersky saw Chinese threat actors using the malware to target unpatched Microsoft Exchange servers in different Asian countries. According to security researchers at Secureworks, ShadowPad has evolved from the PlugX malware.

    Infosecurity reports: "Chinese Hackers Infiltrate South American Diplomatic Networks"

  • news

    Visible to the public "Dakota State Partners With NSA, Puts $90M into Cyber Research"

    Through investment and a new partnership with the National Security Agency (NSA), Dakota State University (DSU) seeks to solidify its position as a cybersecurity research and training hub for the Upper Midwest. The university has committed $90 million to a five-year project to improve cybersecurity education and research, and it is collaborating with the NSA to provide faculty training and technical support. DSU plans to use part of the $90 million to recruit more students and specialized faculty, as well as establish a Governor's Cyber Academy on the Madison campus and build a specialized facility that will be co-owned by the state. The goal is to support 400 to 500 full-time jobs. In addition to employee training and mentoring, officials stated that the partnership with NSA could provide help with curriculum development, guest lectures, and researchers for DSU's Applied Research Lab or Madison Cyber Labs, which study technology application, adverse event planning, and other Information Technology (IT) security-related topics. This article continues to discuss DSU partnering with NSA and investing in recruiting, research, and facilities in order to build a regional hub for cybersecurity studies and workforce development.

    GovTech reports "Dakota State Partners With NSA, Puts $90M into Cyber Research"

  • news

    Visible to the public "Artificial Intelligence Offers Swindlers a New Tool for Romance Scams"

    This Valentine's Day, scammers could use Artificial Intelligence (AI), such as ChatGPT, to craft love letters aimed at luring people into their malicious schemes. Romance scams refer to the practice of using fake online identities to gain victims' trust for financial benefit. Although it may seem unlikely that humans can be deceived by machine-generated love letters, the McAfee Modern Love Research Report found that 7 out of 10 people could not tell the difference. In order to conduct the study, the researchers presented a ChatGPT-generated love letter to over 5,000 people worldwide. They found that 33 percent of the participants believed a human wrote the letter, while 3 percent were unable to tell the difference. Steve Grobman, CTO at McAfee, emphasized that scammers can use AI, such as ChatGPT, which anyone with a web browser can easily access, to engage in malicious activity, particularly during holidays, to target individuals who have lowered their guard. In addition to ChatGPT, deepfake images, AI-generated conversations, and emotion analysis will soon be executed at scale, according to Bud Broomhead, CEO of Viakoo. This article continues to discuss the potential use of AI tools, including ChatGPT to support romance scams and other malicious activities.

    SC Media reports "Artificial Intelligence Offers Swindlers a New Tool for Romance Scams"