News Items

  • news

    Visible to the public "LockBit Reaches New Lows by Targeting an IDD Clinic"

    The Arc of Essex County, a New Jersey-based organization for children with Intellectual and Developmental Disabilities (IDD), has appeared on LockBit's blog, an underground website where the gang posts its victims. The countdown clock implies that the organization's data will be made public if the Arc of Essex County does not pay the demanded ransom. While it is unwise to expect decency from ransomware gangs, LockBit attempts to appear ethical and business-oriented. Last year, after a LockBit affiliate attacked the largest children's hospital in Canada, the Hospital for Sick Children, LockBit issued an apology and made a decryptor available for free. Researchers noted that the gang has a policy prohibiting attacks on medical institutions that could result in the deaths of patients. Avoiding such occurrences helps LockBit avoid law enforcement's interest. This article continues to discuss the targeting of a support service for children with IDD by the LockBit ransomware gang.

    Cybernews reports "LockBit Reaches New Lows by Targeting an IDD Clinic"

  • news

    Visible to the public "US and UK Sanction Seven Russian Cybercriminals"

    The US and UK governments recently announced joint sanctions against seven Russian cybercriminals. The individuals targeted by the sanctions are members of the notorious Trickbot malware gang, which the US and UK accuse of launching malicious cyber activities against critical infrastructure in both countries, including hospitals. The sanctioned Russians were named Vitaly Kovalev, Maksim Mikhailov, Valentin Karyagin, Mikhail Iskritskiy, Dmitry Pleshevskiy, Ivan Vakhromeyev, and Valery Sedletski. The sanctions mean that these cyber threat actors have had all their US and UK assets frozen and are banned from traveling to the two countries. The US Department of Treasury warned that any individuals or financial institutions engaging in transactions with the sanctioned Russian nationals "may be exposed to designation." Trickbot was first identified in 2016, starting life as a banking Trojan, but since evolved into a highly modular malware suite that gives the group the ability to conduct a range of cyber activities, including ransomware attacks. Both the US and UK governments highlighted the gang's involvement in developing ransomware strains targeting critical services as the principal reason for the coordinated designation.

    Infosecurity reports: "US and UK Sanction Seven Russian Cybercriminals"

  • news

    Visible to the public "Dark Web Market Revenues Sink 50% in 2022"

    According to researchers at Chainalysis, revenues generated by underground marketplaces experienced a double-digit decline in 2022, thanks to the closure of the popular Hydra Market in April. The researchers stated that dark web revenues fell from $3.1bn in 2021 to just $1.5bn last year, while average daily revenue for all markets dropped from $4.2m just prior to Hydra's closure to only $447,000 immediately after. The researchers noted that although the collective revenues of drugs markets didn't recover fully, they slowly crawled back up to reach previous levels thanks to the success of Mega Darknet Market, Blacksprut Market, and OMG!OMG! Market in the wake of the Hydra takedown. The researchers stated that criminals migrated to these primarily drug markets in an ever greater number after they also began offering money laundering services, as Hydra did. Some, like OMG, also offer hacking utilities and stolen banking information. The researchers said OMG has several overlaps with Hydra that may suggest its admins are involved in the project. These include the same "dead drop" exchange options for vendors and buyers and shared cryptocurrency deposit addresses.

    Infosecurity reports: "Dark Web Market Revenues Sink 50% in 2022"

  • news

    Visible to the public "Android’s February 2023 Updates Patch 40 Vulnerabilities"

    Google recently announced the release of patches for 40 vulnerabilities as part of the February 2023 security updates for the Android operating system. The first part of the update arrives on devices as a 2023-02-01 security patch level and resolves a total of 17 high-severity vulnerabilities impacting components such as Framework, Media Framework, and System. Google noted that the most severe of these issues is a high-severity vulnerability in the Framework component that could lead to local escalation of privilege with no additional execution privileges needed. Google stated that while most of the vulnerabilities addressed with this patch level could lead to escalation of privilege, several information disclosure and denial-of-service (DoS) bugs were also resolved. The second part of the update arrives on devices as the 2023-02-05 security patch level and resolves 23 security defects in Kernel, MediaTek, Unisoc, Qualcomm, and Qualcomm closed-source components.

    SecurityWeek reports: "Android's February 2023 Updates Patch 40 Vulnerabilities"

  • news

    Visible to the public "Vulnerability Allows Hackers to Remotely Tamper With Dahua Security Cameras"

    Security researchers have discovered a vulnerability that can be exploited by remote hackers to tamper with the timestamp of videos recorded by Dahua security cameras. The flaw, tracked as CVE-2022-30564, was discovered last year by India-based CCTV and IoT cybersecurity company Redinent Innovations. Advisories describing the vulnerability were published recently by both Dahua and Redinent. Redinent assigned the vulnerability a high severity rating, but Dahua has calculated a 5.3 CVSS score for it, which makes it medium severity. According to the Chinese video surveillance equipment maker, the flaw impacts several types of widely used cameras and video recorders, including IPC, SD, NVR, and XVR products. The company noted that an attacker can exploit the vulnerability to modify a device's system time by sending it a specially crafted packet. Redinent says there are thousands of internet-exposed cameras that can be targeted directly by hackers. Exploitation from the local network is also possible. However, Redinent noted that an attacker needs to have knowledge of an API's parameters in order to exploit the vulnerability. Redinent stated that an attacker can make modifications to the timestamp of the video feed, leading to inconsistent dates and times showing up on the recorded video without the need of knowing the username and password of the camera. Redinent noted that it has a direct impact on digital forensics. Dahua device vulnerabilities may be targeted by DDoS botnets, but in the case of CVE-2022-30564, it would most likely be exploited in highly targeted attacks whose goal is to tamper with evidence rather than cybercrime operations. The issue was reported to the vendor in the fall of 2022. Dahua has released patches for each of the impacted devices.

    SecurityWeek reports: "Vulnerability Allows Hackers to Remotely Tamper With Dahua Security Cameras"

  • news

    Visible to the public "Digital License Plates: Will This New Way to Track Vehicles Enhance or Undermine Privacy?"

    California began allowing drivers to purchase digital license plates from a company named Reviver in 2022, joining Michigan and Arizona in permitting such plates. The plates are miniature television screens that replace traditional metal license plates. They include Bluetooth and LTE connectivity similar to that of cell phones. The wired variant includes a built-in GPS tracker. The plates offer various functions that drivers may find useful, including displaying personalized messages, making automatic toll and parking payments, summoning roadside assistance, and conducting car diagnostics. An associated mobile app allows drivers to choose the border and letter colors and register their vehicles. In addition, the license plate can be traced through wireless technology if the vehicle is stolen. However, a team of "white hat" hackers discovered that the connectivity of these plates poses privacy problems. The researchers revealed that they could gain "super administrative access" to Reviver's systems, granting them access to sensitive data and capabilities. With their credentials, they were able to track the GPS location of all Reviver customers, overwrite data, and alter the personalized message included on license plates. This article continues to discuss the security and privacy risks associated with digital license plates.

    CPO Magazine reports "Digital License Plates: Will This New Way to Track Vehicles Enhance or Undermine Privacy?"

  • news

    Visible to the public "Experts Published a List of Proxy IPs Used by the Pro-Russia Group Killnet"

    Researchers at SecurityScorecard published a list of proxy IPs used by the pro-Russian group Killnet in an effort to disrupt its operations and thwart its attacks. The disclosed list of proxy IPs is meant to help organizations block the Killnet Distributed Denial-of-Service (DDoS) bot. Killnet has been active since March 2022, launching DDoS attacks against the governments and critical infrastructure of Ukraine-supporting nations such as Italy, Romania, Moldova, the Czech Republic, Lithuania, Norway, and Latvia. The Dutch National Cyber Security Centre (NCSC) announced at the beginning of this month that the group Killnet launched DDoS attacks against the websites of different hospitals in the Netherlands and Europe. The hackers also targeted hospitals in the US, the UK, Germany, Poland, and Scandinavia. The group recently revealed the attacks on its Telegram channel and demanded action against the US healthcare system. This article continues to discuss the SecurityScorecard's researchers releasing a list of proxy IPs used by the pro-Russia group Killnet to neutralize its attacks.

    Security Affairs reports "Experts Published a List of Proxy IPs Used by the Pro-Russia Group Killnet"

  • news

    Visible to the public "Inadequate Cybersecurity Investments Leave Rail Industry at Risk"

    With the emergence of connected online systems and the convergence of Operational Technology (OT) and Information Technology (IT) systems, network and data-sharing security between IT and OT systems is becoming an integral part of safety, creating new market opportunities in the rail, freight, and transit industries. However, if security steps are not taken to secure data flows between the two domains, this increases complexity, interconnectedness, and cyberattacks. ABI Research predicts that between 2022 and 2027, OT and IoT spending in the rail industry would account for an average of 7.65 percent of total cybersecurity spending in the sector and will reach $300 million globally by 2027. Michael Amiri, Senior Industrial Cybersecurity Analyst at ABI Research, emphasizes that, due to geopolitical tensions and hacker operations, the rail industry should actively engage with cybersecurity vendors to find better solutions for vulnerabilities in their ecosystem, as opposed to waiting for relevant solutions to emerge. This article continues to discuss the importance of the rail industry working closely with cybersecurity vendors and regulatory requirements increasing spending on OT and IoT cybersecurity.

    Help Net Security reports "Inadequate Cybersecurity Investments Leave Rail Industry at Risk"

  • news

    Visible to the public "GAO Calls for Action to Protect Cybersecurity of Critical Energy, Communications Networks"

    A new US Government Accountability Office (GAO) assessment of the nation's critical infrastructure cybersecurity recommends a more robust role for the federal government in protecting Industrial Control Systems (ICS), especially those that operate the nation's energy grid and communications networks. In its report, the GAO pointed out that the US Department of Energy's (DOE) cybersecurity plan did not address vulnerabilities in the distribution systems of individual energy grids. The GAO suggested that, when establishing plans to implement the national cybersecurity strategy for the grid, DOE works with the Department of Homeland Security (DHS), states, and industry to more comprehensively address cyberattack risks to the grid's distribution systems. In addition, the Cybersecurity and Infrastructure Agency (CISA) is urged by the GAO report to improve cooperation and incident management across all levels of government in order to protect against ransomware threats. This article continues to discuss the top recommendations in the new GAO cybersecurity assessment.

    Dark Reading reports "GAO Calls for Action to Protect Cybersecurity of Critical Energy, Communications Networks"

  • news

    Visible to the public "Tor and I2P Networks Hit by Wave of Ongoing DDoS Attacks"

    Isabela Dias Fernandes, executive director of the Tor Project, recently revealed that Distributed Denial-of-Service (DDoS) attacks had targeted the Tor network since at least July 2022. At times, the network was so severely disrupted by the attacks that users could not load pages or access onion services. The peer-to-peer network Invisible Internet Project (I2P) has also been under attack for the past three days. Due to some i2pd routers crashing with out-of-memory (OOM) errors when struck by these DDoS attacks, I2P users may also encounter problems. This article continues to discuss findings surrounding the wave of DDoS attacks hitting Tor and I2P networks.

    Bleeping Computer reports "Tor and I2P Networks Hit by Wave of Ongoing DDoS Attacks"

  • news

    Visible to the public "Gootkit Malware Adopts New Tactics to Attack Healthcare and Finance Firms"

    Cybereason reports that the Gootkit malware targets primarily healthcare and banking organizations in the US, UK, and Australia. According to the cybersecurity firm, it analyzed a Gootkit incident in December 2022 that involved a new deployment method, with the attackers abusing the foothold to deliver Cobalt Strike and SystemBC for post-exploitation. Cybereason stated in an analysis published on February 8, 2023, that the threat actor exhibited swift conduct, quickly gaining control of the compromised network and gaining elevated privileges in less than four hours. Mandiant attributes Gootkit, also known as Gootloader, entirely to a threat actor identified as UNC2565. Since its start as a banking Trojan in 2014, the malware has transformed into a loader capable of distributing next-stage payloads. This article continues to discuss the new tactics of the Gootkit malware.

    THN reports "Gootkit Malware Adopts New Tactics to Attack Healthcare and Finance Firms"

  • news

    Visible to the public "New 'Invisible Finger' Technology Poses Potential Phone-Hacking Threats, Researchers Say"

    Researchers from the University of Florida revealed new technology that enables the hacking of nearby touchscreen-enabled devices using an "invisible finger." The discovery, which was acknowledged by the Institute of Electrical and Computer Engineering at its 2022 Symposium on Security and Privacy, prompted leading manufacturers to reach out to the researchers for advice on how they could prevent the potential security problem. Shuo Wang, professor of electrical and computer engineering at the University of Florida, who led the team, stated that the research aims to help the industry identify vulnerabilities so that companies can improve the security of their products for customers and reduce the possibility of phone hacking. The hacking technique involves using an antenna array, a collection of connected antennas, to remotely tap and swipe a touchscreen using electromagnetic waves. Once controllers get access, they are able to commit a range of malicious activities, including downloading malware or sending themselves money via the victim's payment platform account. This article continues to discuss the research and demonstration of the 'invisible finger' hacking technology.

    The University of Florida reports "New 'Invisible Finger' Technology Poses Potential Phone-Hacking Threats, Researchers Say"

  • news

    Visible to the public "Are VPNs Really the Answer?"

    According to researchers at the University of Michigan (U-M), a Virtual Private Network (VPN) can be one tool in an Internet user's toolbox, but it is insufficient in meeting all privacy needs. Thousands of Internet users rely on VPNs to protect their privacy and security while living and working online every day. However, recent research conducted at U-M has cast doubt on the accuracy of these expectations. VPNs enable users to create "tunnels" through their network to conceal their activities and identities as well as to establish secure connections to other Internet sites. VPNs would appear to be an ideal tool for escaping surveillance or securely accessing restricted content, but recent research indicates that users who rely on VPNs may be more vulnerable to surveillance than previously believed. Over the past two years, U-M researchers have conducted a series of research projects under the VPNalyzer initiative to expose issues such as critical flaws in popular currently available commercial VPNs, the ability of network service providers and governments to identify and block VPN use, and gaps in understanding between VPN users and VPN providers. This article continues to discuss the multi-perspective study of VPN users and VPN providers.

    The University of Michigan reports "Are VPNs Really the Answer?"

  • news

    Visible to the public "Chrome 110 Patches 15 Vulnerabilities"

    Google recently announced that the first stable release of Chrome 110 brings 15 security fixes, including ten that address vulnerabilities reported by external researchers. Of the externally reported bugs, three are rated high severity. Google noted that these include a type confusion flaw in the V8 engine, an inappropriate implementation issue in full screen mode, and an out-of-bounds read vulnerability in WebRTC. Tracked as CVE-2023-0696, the first of the security defects is described as a heap corruption that can be exploited remotely via a crafted HTML page. Google paid a $7,000 bug bounty to the reporting researcher. Google noted that the second high-severity flaw, CVE-2023-0697, impacts Chrome for Android and could allow a remote attacker to use a crafted HTML page to spoof the contents of the security UI. Google rewarded the reporting researcher $4,000 for this bug. The third issue, CVE-2023-0698, could be exploited remotely via an HTML page to perform an out-of-bounds memory read. The reporting researcher received a $2,000 bug bounty for the find. Google noted that Chrome 110 also resolves five medium-severity vulnerabilities reported by external researchers, including a use-after-free flaw in GPU, an inappropriate implementation bug in Download, a heap buffer overflow defect in WebUI, and two types of confusion issues in Data Transfer and DevTools. Google says it handed out over $26,000 in bug bounty rewards to the reporting researchers. Google did not mention whether these vulnerabilities were ever exploited in attacks. The latest Chrome release is rolling out to users as versions 110.0.5481.77/.78 for Windows and version 110.0.5481.77 for Mac and Linux. The iOS and Android versions of the browser have been updated to 110.0.5481.83 and 110.0.5481.63/.64, respectively.

    SecurityWeek reports: "Chrome 110 Patches 15 Vulnerabilities"

  • news

    Visible to the public "More Than 2,000 Cybersecurity Patent Applications Filed Since 2010"

    There has been a surge in cybersecurity-related patent applications over the past decade, with US companies filing the most. IS Decisions, a French software company, estimates that around 2,270 patents pertaining to cybersecurity have been filed since the turn of the century. About 97 percent of cybersecurity-related patents have been filed since 2010, which is a year in which there was a significant increase in global cyberattacks. Stuxnet, the destructive computer worm that impacted Iran's nuclear weapons program, launched a decade of high-profile cyber incidents, including the Sony Pictures hack by North Korea's Lazarus Group and the Silk Road dark web drug market takedown. Countries have been competing to find new ways to prevent cyberattacks in the face of growing threats, and data shows that there are clear winners in regard to the offices getting the most cybersecurity patent filings. The US Patent and Trademark Office is in the lead, with 1,087 cybersecurity-related patent applications filed between 2000 and 2022. With roughly 1.1 million cybersecurity professionals, the US has the largest cybersecurity workforce in the world. Therefore, it is not surprising that it is the leader in cyber advancements, according to researchers. Five of the top ten most prolific cybersecurity patent applicants are American companies, including IBM, Boeing, Microsoft, Honeywell, and Qomplx. This article continues to discuss findings regarding the increase in cybersecurity-related patent applications.

    The Record reports "More Than 2,000 Cybersecurity Patent Applications Filed Since 2010"

  • news

    Visible to the public "NIST Selects ‘Lightweight Cryptography’ Algorithms to Protect Small Devices"

    Security experts at the National Institute of Standards and Technology (NIST) have recently announced a victor in their program to find a worthy defender of data generated by small devices. The winner, a group of cryptographic algorithms called Ascon, will be published as NIST's lightweight cryptography standard later in 2023. NIST noted that the chosen algorithms are designed to protect information created and transmitted by the Internet of Things (IoT), including its myriad of tiny sensors and actuators. They are also designed for other miniature technologies, such as implanted medical devices, stress detectors inside roads and bridges, and keyless entry fobs for vehicles. NIST stated that devices like these need "lightweight cryptography," protection that uses the limited amount of electronic resources they possess. According to NIST computer scientist Kerry McKay, the newly selected algorithms should be appropriate for most forms of tiny tech. To determine the strongest and most efficient lightweight algorithms, NIST held a development program that took several years, first communicating with industry and other organizations to understand their needs and then requesting potential solutions from the world's cryptography community in 2018. After receiving 57 submissions, McKay and mathematician Meltem Sonmez Turan managed a multi-round public review process in which cryptographers examined and attempted to find weaknesses in the candidates, eventually whittling them down to 10 finalists before selecting the winner. NIST noted that Ascon was developed in 2014 by a team of cryptographers from Graz University of Technology, Infineon Technologies, Lamarr Security Research, and Radboud University. Mckay stated that it was selected in 2019 as the primary choice for lightweight authenticated encryption in the final portfolio of the CAESAR competition, a sign that Ascon had withstood years of examination by cryptographers, which is a characteristic the NIST team also valued. There are currently seven members of the Ascon family, some or all of which may become part of NIST's published lightweight cryptography standard.

    NIST reports: "NIST Selects 'Lightweight Cryptography' Algorithms to Protect Small Devices"

  • news

    Visible to the public "Russian Threat Group Suspect Uses Screenshotting to Observe Victims Before Striking, Says Analyst"

    Proofpoint researchers have observed a new threat group, tracked as TA866, spreading malware via phishing emails since October 2022. Although the group's main motive is suspected to be financial gain, an analysis of associated operations reveals that espionage may be a secondary objective. The cybersecurity firm cannot confirm that the threat group is associated with Russia and executing espionage activities on behalf of the country, but an examination of TA866's working patterns suggests this may be the case. Targeting all industries in the US and Germany, the attacks appear to have proceeded into 2023. Proofpoint discovered a cluster of growing financially-driven activity called "Screentime," and TA866's attack vector involved sending emails with a malicious attachment or URL to deliver a payload of malware dubbed "WasabiSeed" and "Screenshotter." In certain instances, Proofpoint also observed follow-up attacks using the malware tools AHK Bot and Rhadamanthys Stealer. Thousands of phishing emails were sent in just a few months by TA866's campaigns, which an analyst spotted at the end of the last year. These emails used trusted software documents to lower victims' skepticism. TA866 is considered an organized actor capable of executing well-planned attacks at scale. Proofpoint says that the threat group has the ability and connections to acquire tools and services from other vendors, allowing it to target additional victims. This article continues to discuss researchers' findings and observations regarding TA866.

    Cybernews reports "Russian Threat Group Suspect Uses Screenshotting to Observe Victims Before Striking, Says Analyst"

  • news

    Visible to the public "Patient Information Compromised in Data Breach at San Diego Healthcare Provider"

    San Diego healthcare services provider Sharp HealthCare has started to inform patients that some of their information was compromised in a recent data breach. A not-for-profit healthcare provider, Sharp operates multiple hospitals and facilities in San Diego County, has 19,000 employees, and works with roughly 2,700 affiliated physicians. The incident took place on January 12, when an unauthorized party gained access to a server running the Sharp.com website. The healthcare services provider stated that the unauthorized access lasted only a few hours, but during this time, the attackers accessed a file containing patient data. The compromised information, the company says, includes names, payment amounts, which Sharp facilities received the payments, and Sharp identification numbers and/or invoice numbers. The company noted that payment card data, Social Security numbers, contact information, health insurance details, birth dates, clinical information, or details about received services were not accessed. Additionally, this incident did not involve unauthorized access to Sharp's medical record systems or the FollowMyHealth patient portal. The organization stated that the incident only impacted Sharp patients who used the online bill payment service to pay a bill or invoice between August 12, 2021, and January 12, 2023. According to The San Diego Union Tribune, roughly 63,000 individuals were impacted.

    SecurityWeek reports: "Patient Information Compromised in Data Breach at San Diego Healthcare Provider"

  • news

    Visible to the public "Novel System Prevents Personal Metadata Leakage From Online Behavior for Privacy Protection"

    According to researchers at the City University of Hong Kong (CityU), preserving privacy is the most difficult aspect of data collection. Even if the data is encrypted, metadata, such as the online behavior of users, can result in identity exposure. Therefore, a research team at CityU has developed "Vizard," a metadata-hiding analytic system that enables data owners to securely define their data authorization and control who can use their data. The Vizard system has potential applications in multiple areas, such as precision medical research. The team used a cryptographic tool called "Distributed Point Function" (DPF) to design Vizard as a metadata-protected data collection and analysis platform. DPF is a building block that supports secure/encrypted computations, which can be used to retrieve data anonymously during computation. According to Wang Cong, a Professor in the Department of Computer Science at CityU, the team developed the Vizard system with stream-specific pre-processing, encryption, and throughput enhancement methods based on DPF. This article continues to discuss the Vizard metadata-hiding analytic system developed by researchers at CityU.

    City University of Hong Kong reports "Novel System Prevents Personal Metadata Leakage From Online Behavior for Privacy Protection"

  • news

    Visible to the public "ESXi Ransomware Campaign Strikes Florida Supreme Court, Worldwide Universities"

    The Florida Supreme Court is the latest high-profile victim of the ransomware campaign aimed at unpatched VMWware ESXi servers. The malicious campaign has also targeted academic institutions. A spokesman for the Florida Supreme Court disclosed that the compromised infrastructure was used to support parts of the Florida state court system. However, they stated that this was separated from the Supreme Court's primary networks, so the state court system's integrity was not jeopardized. The exact extent of the damage caused by the ransomware attacks on academic institutions has yet to be determined. The ESXiArgs ransomware has impacted more than 2,800 organizations. The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) has released a server recovery script in response to the ESXiArgs ransomware campaign. This article continues to discuss the recent targeting of the Florida Supreme Court and universities by the ESXiArgs ransomware campaign.

    ITPro reports "ESXi Ransomware Campaign Strikes Florida Supreme Court, Worldwide Universities"

  • news

    Visible to the public "BEC Attacks Surge 81% in 2022"

    According to security researchers at Abnormal Security, recorded business email compromise (BEC) attacks increased by more than 81% during 2022 and by 175% over the past two years, with open rates on malicious emails also surging. The researchers found that the median open rate for text-based BEC emails during the second half of 2022 was 28%. More worrying still, the researchers revealed that 15% of read malicious emails were replied to by corporate employees. The researchers noted that employees at all levels of an organization engage with BEC emails, but 78% of entry-level sales staff read and replied to these malicious messages. Staffers in transportation sector companies (16%) were most likely to reply to attacks, followed by automotive (9%) and healthcare (8%). The researchers also found that there was a concerning lack of reporting to security teams: just 2% of known attacks were flagged. The researchers stated that BEC attacks increasingly target smaller companies. The researchers saw a 145% increase in malicious emails aimed at SMB inboxes.

    Infosecurity reports: "BEC Attacks Surge 81% in 2022"

  • news

    Visible to the public "Novel Face Swaps Emerge as a Major Threat to Biometric Security"

    According to iProov, digital identities are quickly growing in use as companies' and governments' digital transformation initiatives mature and users seek greater remote access. Biometric face verification is widely regarded as the most user-friendly, secure, and inclusive authentication technology option. Therefore, many organizations have adopted it to support their digital transformation. However, threat actors are launching sophisticated attacks against all systems. In order to achieve both user-friendliness and security, organizations must examine the robustness of their biometric solutions against these sophisticated threats. This article continues to discuss the growing popularity of biometric face verification, the continued evolution of digital injection attacks, and the emergence of novel face swap attacks.

    Help Net Security reports "Novel Face Swaps Emerge as a Major Threat to Biometric Security"

  • news

    Visible to the public "'Money Lover' Finance App Exposes User Data"

    According to Trustwave, the "Money Lover" financial app is leaking user transactions and their related metadata, including wallet names and email addresses. Money Lover is a tool developed by Vietnam-based Finsify for managing personal finances. It is available on Google Play for Android, the Microsoft Store for PCs, and the App Store for iOS, where it has received a 4.6-star rating from over 1,000 users who may or may not have been affected by the vulnerability. Even if the app spilled no actual bank account or credit card information, the potential threat to their customers' accounts would have a monetary impact on both the financial vendor and the customer, according to Trustwave senior security research manager Karl Sigler. Troy Driver, a Trustwave security researcher and Money Lover user, routed the app's traffic through a proxy server using its Web interface and uncovered the issue. From the Web sockets tab of the developer tools window of his browser, he was able to view the email addresses, wallet names, and live transaction data linked with each of the app's shared wallets. This article continues to discuss the broken access control vulnerability that could have led to follow-on attacks for users of the Money Lover app.

    Dark Reading reports "'Money Lover' Finance App Exposes User Data"

  • news

    Visible to the public "Russian Hackers Using Graphiron Malware to Steal Data from Ukraine"

    A threat actor with ties to Russia was seen using new information-stealing malware in cyberattacks against Ukraine. Symantec has dubbed the malware Graphiron, which was created by the Nodaria espionage group. This group is tracked by the Computer Emergency Response Team of Ukraine (CERT-UA) as UAC-002. According to the Symantec Threat Hunter Team, the malware is written in Go and is designed to collect a wide variety of information from impacted computers, including system information, credentials, screenshots, and files. CERT-UA first highlighted Nodaria in January 2022, emphasizing the adversary's use of SaintBot and OutSteel malware in spear-phishing attacks against government organizations. This article continues to discuss Nodaria's use of new information-stealing malware in cyberattacks targeting Ukraine.

    THN reports "Russian Hackers Using Graphiron Malware to Steal Data from Ukraine"

  • news

    Visible to the public "CISA Releases Recovery Script for ESXiArgs Ransomware Victims"

    The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) has provided a script to recover VMWare ESXi servers that were recently encrypted by ESXiArgs ransomware attacks. Recently, vulnerable VMWare ESXi servers were the subject of ESXiArgs ransomware attacks. Since then, according to a list of bitcoin addresses compiled by CISA technical advisor Jack Cable, the attacks have encrypted 2,800 servers. While many devices were encrypted, the campaign was mainly ineffective since the threat actors failed to encrypt flat files, where virtual disk data is stored. This oversight enabled Enes Sonmez and Ahmet Aykac of the YoreGroup Tech Team to develop a way for rebuilding virtual machines from unencrypted flat files. This solution has helped individuals recover their servers, but the process has proven difficult for some. In order to help users recover their servers, CISA released an ESXiArgs-Recover script on GitHub to automate the recovery process. This article continues to discuss CISA's release of a recovery script for ESXiArgs ransomware victims.

    Bleeping Computer reports "CISA Releases Recovery Script for ESXiArgs Ransomware Victims"

  • news

    Visible to the public "ChatGPT May Already Be Used in Nation-State Cyber Attacks"

    According to new research released by BlackBerry Limited, 51 percent of Information Technology (IT) professionals expect that a successful cyberattack, credited to ChatGPT, will occur soon, and 71 percent say that foreign governments are likely already using the Artificial Intelligence (AI) chatbot for malicious activities against other countries. Seventy-four percent of the 1,500 surveyed IT decision-makers across North America, the UK, and Australia expressed concerns about ChatGPT's potential threat to cybersecurity. ChatGPT's ability to help hackers form more believable and legitimate-sounding phishing emails is the leading global concern (53 percent), followed by its ability to help less experienced hackers improve their technical knowledge and develop more specialized skills and its use for spreading misinformation. Over 80 percent of IT decision-makers plan to invest in AI-driven cybersecurity over the next two years, and nearly half (48 percent) plan to do so by the end of 2023, thus underlining the growing fear that signature-based cyber defense solutions are ineffective in the face of a threat that is becoming increasingly complex. While IT directors are confident that ChatGPT will improve enterprise cybersecurity, the survey reveals that 95 percent feel governments need to regulate emerging technologies. However, there is an optimistic consensus that technology and research professionals will benefit more from ChatGPT's capabilities than cybercriminals. This article continues to discuss key findings from BlackBerry's research on IT decision-makers' thoughts and concerns regarding ChatGPT.

    HSToday reports "ChatGPT May Already Be Used in Nation-State Cyber Attacks"

  • news

    Visible to the public "Americans Don't Understand What Companies Can Do With Their Personal Data — and That's a Problem"

    In a new report titled "Americans Can't Consent to Companies' Use of Their Data," researchers surveyed more than 2,000 Americans about digital marketing policies and how companies can and should use their personal data. Their objective was to determine whether online "informed consent" techniques are effective. They discovered that most Americans do not understand the basics of online marketing techniques and policies. Many Americans feel incapable of consenting to how businesses use their personal information. Therefore, according to the researchers, Americans cannot truly grant informed consent to the collection of their digital data. Results from the survey showed that 56 percent of American adults do not understand the phrase "privacy policy," often misunderstanding that it indicates a company will not share their personal data with third parties without consent. In reality, many of these policies say that a company may share or sell whatever data it collects about site users to other websites or businesses. Since many Americans find it difficult to understand online privacy, with "opting-out," "opting-in," biometrics, and Virtual Private Networks (VPNs), they do not trust what is done with their digital data. Eighty percent of Americans believe that the information companies have about them can be used against them. This article continues to discuss findings from the survey that provide insights into Americans' knowledge regarding online marketing practices and how companies can use their data.

    The University of Pennsylvania reports "Americans Don't Understand What Companies Can Do With Their Personal Data -- and That's a Problem"

  • news

    Visible to the public "Fraunhofer Leads Project to Ensure Quantum-Safe Identities"

    Future quantum technologies pose a threat to digital identity security. Malicious actors are expected to use quantum computers to break classical encryption systems. Therefore, Quant-X Security and Coding GmbH, the Fraunhofer Institute for Photonic Microsystems IPMS, MTG AG, and the University of Regensburg have collaborated to launch the "Secure Quantum Communication for Critical Identity Access Management Infrastructures (Quant-ID)" project to combat such attacks. Through this project, they are researching the development of new methods and systems capable of ensuring cryptographic security in the long term based on quantum random numbers and post-quantum cryptography. Thus, highly critical areas, such as government organizations, banks, and insurance companies, will get the protection they need. The project supported by the BMBF began in September 2022 and will last for three years. In order to increase societal acceptance of the digitalization of services and commercial operations, it is necessary to build user-friendly, trustworthy, and privacy-protecting procedures. In the Quant-ID project, participants are conducting collaborative research on reliable digital identities. This article continues to discuss the goals of the Quant-ID project.

    eeNews Europe reports "Fraunhofer Leads Project to Ensure Quantum-Safe Identities"

  • news

    Visible to the public "Thirteen Teams Win at UK's CyberFirst Girls Competition"

    A government-backed competition to encourage school-aged children to pursue a career in cybersecurity persuaded thousands across the UK to enter this year. According to the National Cyber Security Centre (NCSC), thirteen teams were named champions of their region at the 2023 CyberFirst Girls Competition finals last weekend, with more than 8700 entering the contest. The NCSC noted that after passing an online qualifying round, teams of up to four aged 12-13 were invited to face off against each other in regional finals. The challenges posed to teams included tests of their knowledge of cryptography and logic, artificial intelligence, and networking. The winners from each regional final have been invited to a grand prize-giving dinner and celebration day later this year, where a host of other prizes will be handed out, including the top scoring team, school, state newcomer, and most team entries award. The NCSC stated that the industry increasingly needs to build a pipeline of talent to replace retiring cybersecurity professionals whose successors are in short supply. According to the ISC2, there's a current shortfall of 3.4 million security professionals globally, including nearly 57,000 in the UK and over 410,000 in the US. Although diversity is improving, women account for just 30% of those under 30 and even fewer (24%) 30-38 year olds in the industry. For older age groups, their share of the workforce falls to between 12 and 14%. That's part of the reason for the NCSC's focus on school-aged girls for this competition.

    Infosecurity reports: "Thirteen Teams Win at UK's CyberFirst Girls Competition"

  • news

    Visible to the public "Russian Ransomware Money Launderer Pleads Guilty to Funneling Ryuk Payments"

    A Russian cryptocurrency money launderer who was extradited to the U.S. last year has recently pleaded guilty to attempting to conceal at least $400,000 in ransoms paid to criminal hackers. The Department of Justice (DoJ) stated that Denis Mihaqlovic Dubnikov received the illicit funds, which resulted from Ryuk ransomware attacks on unnamed U.S. individuals and organizations, in exchange for bitcoin from criminal hackers. He was extradited to the U.S. in August 2022 and pleaded guilty Monday to one charge of conspiracy to commit money laundering. One of the most common types of ransomware, Ryuk, is often tied to the Russian hacking group known as Wizard Spider. The DOJ noted that Ryuk has been used to target thousands of victims worldwide across various sectors. In October 2020, law enforcement officials specifically identified Ryuk as an imminent and increasing cybercrime threat to hospitals and healthcare providers in the United States. The DOJ said that "between at least August 2018 and August 2021, Dubnikov and his co-conspirators laundered the proceeds of Ryuk ransomware attacks on individuals and organizations throughout the United States and abroad. In July 2019, according to the DOJ, a U.S. company paid 250 Bitcoin ransom to regain access to files encrypted by Ryuk. Later that month, Dubnikov accepted 35 Bitcoin from that ransom payment in exchange for $400,000.

    Cyberscoop reports: "Russian Ransomware Money Launderer Pleads Guilty to Funneling Ryuk Payments"

  • news

    Visible to the public "Vulnerability Provided Access to Toyota Supplier Management Network"

    A security researcher named Eaton Zveare discovered a severe vulnerability in the web portal of Toyota's global supplier management network, which allowed the researcher to gain access to sensitive information. The vulnerability was identified in Toyota's Global Supplier Preparation Information Management System (GSPIMS), a web portal that provides Toyota employees and suppliers with access to ongoing projects, surveys, information on purchases, and more. The issue, Zveare says, was related to the implementation of JWT (JSON Web Token) authentication. The researcher noted that the issue could allow anyone to access any account using a valid email address. JWT is a session token that is typically generated when logging in to a website, which is then used to authenticate the user to secure sections of the website or APIs. The researcher discovered that Toyota's GSPIMS contained a function allowing users to generate a JWT based on the provided email address without requiring a password. With corporate Toyota email addresses easy to guess, the researcher was able to guess an email address by searching the internet for Toyota employees that might be involved in the supply chain. Next, Zveare used that email address to generate a valid JWT and used it to access the GSPIMS. After some reconnaissance on the portal, he discovered an account with system administrator privileges and used the same method to access it. The researcher noted that the system admin account provided access to everything on the portal, including information on over 14,000 user accounts, control over roles each account could have, and details on all available projects, surveys, and various classified documents. According to Zveare, the GSPIMS also allows the system admin to log in as any of the available 14,000 users to supervise their activities. The function that generates the JWT based on email address was apparently implemented to enable this option, but it also created a backdoor into the network. The researchers stated that an attacker with system admin access to GSPIMS could have created a rogue account for persistence, exfiltrated all available data, tampered with or deleted the data, and fetched the corporate email and roles of all 14,000 user accounts to target them in phishing attacks. The researcher reported the vulnerability to Toyota on November 3, 2022. The carmaker patched the issue shortly after.

    SecurityWeek reports: "Vulnerability Provided Access to Toyota Supplier Management Network"

  • news

    Visible to the public "Online Banks Servicing UK's SMBs Found to Have 'Serious' Security Flaws"

    Some of the top online banks in the UK were discovered to have serious security flaws in their products, putting the businesses they serve and their customer at risk of cyberattacks. According to researchers at Red Maple Technologies, working on behalf of Which?, TSB and Virgin Money, which both offer business current accounts to small to medium-sized businesses (SMBs) across the UK, have major security flaws. The researchers expressed a number of concerns regarding TSB's security practices, highlighting that the bank still asks "basic security questions" to recover login credentials. In addition, Red Maple reported discovering two outdated web applications and a possibly insecure subdomain. TSB also lost points for using SMS-based security, failing to provide alerts when significant account changes were made, and providing phone numbers in new-payee notifications. Due to having six outdated web applications, an exposed IP address, and a subdomain using an outdated version of Transport Layer Security (TLS), Virgin Money received the lowest score for online and mobile banking security. This article continues to discuss findings from Red Maple's analysis of 13 current account providers in regard to online and mobile banking security.

    ITPro reports "Online Banks Servicing UK's SMBs Found to Have 'Serious' Security Flaws"

  • news

    Visible to the public "Google Launches New Security and Privacy Features to Mark Safer Internet Day"

    Google announced its new security and privacy initiatives on Safer Internet Day. Among these are new methods for easily and securely entering passwords in Chrome, increased privacy protection for the Google app, enhancements to Google Password Manager, and an expansion of SafeSearch's protection against certain content. Before filling a saved password, Chrome and Android's built-in Password Manager can now use biometric authentication to verify a user's identity. This capability can also be used to reveal, copy, or edit passwords in a secure manner. Face ID will be added to the Google App for iOS to preserve the privacy of the app, preventing unauthorized access to a user's data even if their device gets into the wrong hands. Google blocks a significant amount of phishing attempts and urges the use of multi-factor authentication (MFA). In 2023, Google will boost its anti-phishing efforts by offering 100,000 free Titan Security Keys to individuals at the highest risk of targeted attacks. Google has partnered with the International Foundation for Electoral Systems (IFES) to provide free security training and tools to journalists, politicians, and more who are most at risk of having their accounts compromised. This article continues to discuss the new security and privacy features announced by Google.

    BetaNews reports "Google Launches New Security and Privacy Features to Mark Safer Internet Day"

  • news

    Visible to the public "US Online Grocery Delivery Platform Leaks 11M User Records"

    An attacker uploaded a database containing the personal information of 11 million Weee! customers. Weee! is a US-based online grocery delivery platform. According to researchers at Cybernews, the leak appeared to contain information that had not previously been leaked. The individual who posted the database claims that it was stolen in February 2023. They appear to be the same person who exposed US Cellular's stolen data. The threat actor claims that the database contains sensitive information such as users' first and last names, email addresses, phone numbers, home addresses, delivery types, devices, and other information necessary for grocery delivery. For example, some of the logs have delivery instructions left by Weee! customers for couriers, such as building access codes. This information leaves customers more vulnerable to targeted scams, spear phishing campaigns, tracking, and unsolicited contact. This article continues to discuss the leak of 11 million Weee! customers' data.

    Cybernews reports "US Online Grocery Delivery Platform Leaks 11M User Records"

  • news

    Visible to the public "Patch Released for Actively Exploited GoAnywhere MFT Zero-Day"

    Fortra, known until recently as HelpSystems, alerted GoAnywhere MFT users on February 1 about a "zero-day remote code injection exploit." The company has since released two other security notifications, each of them providing mitigations and indicators of compromise (IoCs). GoAnywhere users are now being informed that a patch has been made available. The company is advising users to install GoAnywhere MFT 7.1.2. Customers running an admin portal exposed to the Internet should install the new version ASAP. Presently there does not appear to be any information about attacks exploiting the vulnerability. It's unclear if state-sponsored threat actors or profit-driven cybercriminals have leveraged it. A CVE identifier has yet to be assigned to the flaw. The company has told users to check log files for a particular line that indicates a system has been targeted in an attack exploiting the zero-day vulnerability. If the log files show signs of compromise, users should check their installation for suspicious administrator users. A researcher has published technical details on the flaw, and a proof-of-concept (PoC) exploit. A Shodan search shows nearly 1,000 internet-exposed instances of GoAnywhere. The company stated that exploitation requires access to the application's admin console, and at least some of the exposed instances appear to be associated with the product's web client interface, which is not affected.

    SecurityWeek reports: "Patch Released for Actively Exploited GoAnywhere MFT Zero-Day"

  • news

    Visible to the public "Patching & Passwords Lead the Problem Pack for Cyber-Teams"

    According to a recent study conducted by the cybersecurity firm Horizon3.ai, ineffective credential policies and a lax approach to patching were among the most common points of Information Technology (IT) security failure for organizations in 2022. The improper configuration of tools also left organizations vulnerable to attack. The study involved the analysis of results of around 7,000 penetration tests that covered approximately 1 million assets. The use of weak or reused credentials topped the list of the Top 10 vulnerabilities identified by Horizon3.ai in 2022, followed by weak or default credential checks in protocols (SSH and FTP) and threat actors leveraging Dark Web credential dumps from Windows and Linux systems. Rounding out the top five were the exploitation of critical vulnerabilities included on the US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) list of the Top 15 Routinely Exploited Vulnerabilities as well as the abuse of critical VMWare vulnerabilities. The study also cautioned that threat actors are combining stolen credentials with the performance of social engineering tactics to conduct high-profile breaches. They are also performing multi-factor authentication (MFA) fatigue attacks. This article continues to discuss key findings and observations from Horizon3.ai's Year in Review 2022 report on the cybersecurity landscape.

    Dark Reading reports "Patching & Passwords Lead the Problem Pack for Cyber-Teams"

  • news

    Visible to the public "UK Metal Engineering Firm Vesuvius Hit by Cyberattack"

    Vesuvius, a UK-based molten metal flow engineering company, recently issued an alert on February 6, 2023, which stated it was "currently managing a cyber incident, which involved unauthorized access to their systems." The ceramics manufacturer is listed on the London Stock Exchange. The company did not give any information on the nature and scope of the incident, the systems impacted, or the attacker's identity. The company stated that immediately upon becoming aware of unauthorized activity on its networks, it took the necessary steps to investigate and respond to the incident, including shutting down affected systems. The company noted that they are working with leading cybersecurity experts to support their investigations and identify the extent of the issue, including the impact on production and contract fulfillment. This incident is the latest of a series of cyberattacks targeting UK companies, with Royal Mail hit in January and Ion, a trading software provider, in early February.

    Infosecurity reports: "UK Metal Engineering Firm Vesuvius Hit by Cyberattack"

  • news

    Visible to the public "LockBit Ransomware Gang Claims Royal Mail Cyberattack"

    The LockBit ransomware gang has claimed responsibility for the cyberattack on Royal Mail, the leading mail delivery service in the UK, which halted the company's international shipping operations due to severe service disruption. This comes after LockBitSupport, the ransomware group's public-facing spokesperson, told Bleeping Computer that LockBit did not attack Royal Mail. Instead, they blamed the attack on other threat actors who used the LockBit 3.0 ransomware builder released in September 2022. LockBitSupport did not explain why printed Royal Mail ransom notes had links to LockBit's Tor negotiation and data leak sites as opposed to those operated by another threat actor. LockBitSupport stated in a post on a Russian-language hacking forum that LockBit was actually behind the attack after determining that one of their affiliates dropped ransomware payloads on Royal Mail's systems. The spokesperson of the ransomware group further stated that they would only release a decryptor and erase the stolen data from Royal Mail's network after receiving a payment. This article continues to discuss the LockBit ransomware gang now claiming responsibility for the cyberattack on the mail delivery service Royal Mail.

    Bleeping Computer reports "LockBit Ransomware Gang Claims Royal Mail Cyberattack"

  • news

    Visible to the public "Royal Ransomware Adds Support for Encrypting Linux, VMWare ESXi Systems"

    The Royal Ransomware group has now added support for encrypting Linux devices and targeting VMWare ESXi virtual machines. Other ransomware operators, including AvosLocker, Black Basta, BlackMatter, HelloKitty, Hive, LockBit, Luna, Nevada, RansomEXX, and REvil, already support Linux encryption. Will Thomas, a researcher at the Equinix Threat Analysis Center (ETAC), found the Linux variant of the Royal Ransomware. The variant appends the .royal_u extension to all encrypted filenames on the virtual machine. The ransomware variant has a 32 out of 63 detection rate, according to VirusTotal query results. According to Thomas, the malware is executed through the command line and supports several parameters for controlling encryption activities. Royal Ransomware is a human-operated threat that emerged in September 2022. It has demanded ransoms of up to millions of dollars. Unlike other ransomware operations, it does not appear to offer Ransomware-as-a-Service (RaaS). Instead, it appears to be a private group with no affiliates. This article continues to discuss Royal Ransomware operators adding support for encrypting Linux devices.

    Security Affairs reports "Royal Ransomware Adds Support for Encrypting Linux, VMWare ESXi Systems"

  • news

    Visible to the public "Hackers Exploit Vulnerabilities in Sunlogin to Deploy Sliver C2 Framework"

    Using Sunlogin software vulnerabilities, threat actors are deploying the Sliver command-and-control (C2) framework for post-exploitation activities. The AhnLab Security Emergency Response Center (ASEC) discovered that security vulnerabilities in Sunlogin, a remote desktop software developed in China, are being exploited to deploy various payloads. In addition to using the Sliver backdoor, threat actors also employed the Bring Your Own Vulnerable Driver (BYOVD) malware to disable security products and install reverse shells, according to the researchers. Attack chains begin with exploiting two Remote Code Execution (RCE) vulnerabilities in Sunlogin versions before v11.0.0.33 (CNVD-2022-03672 and CNVD-2022-10270), followed by the delivery of Sliver or other malware such as Gh0st RAT and the XMRig cryptocurrency miner. This article continues to discuss the threat actors exploiting flaws in Sunlogin software to deploy the Sliver C2 framework.

    THN reports "Hackers Exploit Vulnerabilities in Sunlogin to Deploy Sliver C2 Framework"

  • news

    Visible to the public "Released: Decryptor for Cl0p Ransomware’s Linux Variant"

    The Linux variant of the Cl0p ransomware contains flawed encryption logic, which allowed researchers from SentinelOne to develop and release a free decryptor. Using the asymmetric algorithm RSA and a public key, the Windows variant of Cl0p encrypts the generated RC4 key responsible for file encryption. Researchers explained that in the Linux variant, the generated RC4 key is encrypted using an RC4 master key. This article discusses the differences between the Windows and Linux variants of the Cl0p ransomware and the release of a free decryptor for the Linux variant.

    Help Net Security reports "Released: Decryptor for Cl0p Ransomware's Linux Variant"

  • news

    Visible to the public "'Massive' New ESXiArgs Ransomware Campaign Has Compromised Thousands of Victims"

    European cybersecurity authorities warn of active network exploitation of a nearly two-year-old VMWare ESXi flaw by ransomware attackers. ESXiArgs is the name given to the campaign because, after encrypting a file, the ransomware creates an extra file with the extension .args. According to researchers, the file contains instructions on how to decrypt the victim's document. Censys searches for systems displaying a ransom letter indicate that thousands of servers in Europe and North America have already been hit. The Austrian CERT issued a warning that at least 3,276 systems were compromised. As described by VMWare, ESXi is a bare-metal hypervisor with direct access to and control over underlying resources, providing access to critical files and enabling attackers to disrupt various user resources. In February 2021, a patch for the vulnerability, tracked as CVE-2021-21974, was released. Government agencies and cybersecurity experts urge administrators to quickly patch all unpatched servers. This article continues to discuss the new ESXiArgs ransomware campaign.

    The Record reports "'Massive' New ESXiArgs Ransomware Campaign Has Compromised Thousands of Victims"

  • news

    Visible to the public "Novel Banking Trojan 'PixPirate' Targets Brazil"

    Security researchers at Cleafy have discovered a new Android banking Trojan dubbed "PixPirate" targeting financial institutions in Brazil between the end of 2022 and the beginning of this year. The researchers stated that PixPirate belongs to the newest generation of Android banking trojan, as it can perform ATS (automatic transfer system), enabling attackers to automate the insertion of a malicious money transfer over the Instant Payment platform Pix, adopted by multiple Brazilian banks. The researchers noted that the primary goal of this malware was to steal sensitive information and perpetrate fraud attempts on Pix users. PixPirate is usually delivered using a dropper application, used to download (or in some cases just to unpack) and install the banking trojan. The researchers noted that during its installation, PixPirate immediately tries to enable Accessibility Services that keep being requested persistently with fake pop-ups until the victim accepts. After these permissions were given, the threat actors were observed using PixPirate to write scripts that could interact with the device's UI and perform actions like entering text, simulating touch events, and scrolling through lists, among others. After inspecting the PixPirate code, the researchers identified a few references related to a framework called Auto.js. This is an open-source tool for automating tasks on Android devices using JavaScript. Auto.js also provides a built-in JavaScript interpreter, allowing scripts to run on the device itself without needing external runtime. The researchers noted that Auto.js represents a new framework for mobile banking Trojans that allows malicious actors to speed up the development phase via JavaScript automation scripts, web communication management features within the application, and built-in code encryption/obfuscation capabilities. The researchers warned that the "introduction of ATS capabilities paired with frameworks that will help the development of mobile applications using flexible and more widespread languages could lead to more sophisticated malware.

    Infosecurity reports: "Novel Banking Trojan 'PixPirate' Targets Brazil"

  • news

    Visible to the public "European Police Arrest 42 After Cracking Covert App"

    European police have recently arrested 42 suspects and seized guns, drugs, and millions in cash, after cracking another encrypted online messaging service used by criminals. Police launched raids on 79 premises in Belgium, Germany, and the Netherlands following an investigation that started back in September 2020 and led to the shutting down of the covert Exclu Messenger service. Exclu is just the latest encrypted online chat service to be unlocked by law enforcement. In 2021 investigators broke into Sky ECC, another "secure" app used by criminal gangs. The Dutch police stated that after police and prosecutors got into the Exclu secret communications system, they were able to read the messages passed between criminals for five months before the raids. Those arrested include users of the app, as well as its owners and controllers. Police in France, Italy, and Sweden, as well as Europol and Eurojust, its justice agency twin, also took part in the investigation. The police raids uncovered at least two drug labs, one cocaine-processing facility, several kilograms of drugs, four million euros ($4.3 million) in cash, luxury goods, and guns. Exclu was used by around 3,000 people, including about 750 Dutch speakers. Exclu was installed on smartphones with an operating license costing 800 euros for six months. Exclu made it possible to exchange messages, photos, notes, voice memos, chat conversations, and videos with other users.

    SecurityWeek reports: "European Police Arrest 42 After Cracking Covert App"

  • news

    Visible to the public "Feds Say Cyberattack Caused Suicide Helpline’s Outage"

    A cyberattack caused a nearly daylong outage of the nation's new 988 mental health helpline late last year. Lawmakers are now calling for the federal agency that oversees the program to prevent future attacks. A spokeswoman for the Substance Abuse and Mental Health Services Administration stated that on December 1, the voice calling functionality of the 988 Lifeline was rendered unavailable due to a cybersecurity incident. The spokeswoman noted that the attack occurred on the network of Intrado, which provides telecommunications services for the helpline. The agency did not disclose details about who it believes launched the attack or what kind of cyberattack occurred. Intrado is working with a third-party assessor to investigate the incident, and law enforcement agencies have been notified of the breach. The national 988 phone number, which can be reached by text, chat, or voice calling, has become a lifeline for millions of Americans seeking help during a mental crisis, with millions of calls pouring in during the first six months since its launch in July. Last week, Democrat Rep. Tony Cardenas and Republican Rep. Jay Obernolte, both of California, introduced a bill calling for better coordination and reporting around cyberattacks on the 988 system. The representatives stated that even an outage of a few hours of the national suicide hotline could cost American lives. The representatives believe that it is critical that we mitigate the risks of future disruptions to the service and take steps to resolve cybersecurity vulnerabilities that could put the hotline at risk.

    SecurityWeek reports: "Feds Say Cyberattack Caused Suicide Helpline's Outage"

  • news

    Visible to the public "20 Million Users Impacted by Data Breach at Instant Checkmate, TruthFinder"

    PeopleConnect-owned background check services Instant Checkmate and TruthFinder have recently disclosed data breaches affecting a total of more than 20 million users. In individual data breach notices published on February 3, the organizations informed users that the incident was discovered after cybercriminals started sharing databases stolen from the two companies on underground forums. The databases contain names, email addresses, phone numbers, encrypted passwords, and password reset tokens that are either expired or inactive. The companies confirmed that the list was created several years ago and appears to include all customer accounts created between 2011 and 2019. The two organizations note that the leaked information does not include details on user activity or payment data. While Instant Checkmate and TruthFinder also note that no "readable or usable passwords or other means to compromise user accounts" were leaked, it is not uncommon for cybercriminals to try to crack stolen encrypted passwords. Investigations were launched into both incidents, but no evidence of malicious activity has been found as of now on their networks. According to the two announcements, the data breach resulted from the "inadvertent leak or theft" of the impacted database. While neither Instant Checkmate nor TruthFinder shared information on the number of affected individuals, the data has already been added to Troy Hunt's breach notification service "Have I been pwned." The leaked databases include the information of more than 11.9 million Instant Checkmate accounts and the details of over 8.1 million TruthFinder accounts.

    SecurityWeek reports: "20 Million Users Impacted by Data Breach at Instant Checkmate, TruthFinder"

  • news

    Visible to the public "Scam Alert for Dingo Token That Charges 99% Fee"

    Security researchers at Check Point have warned that a popular cryptocurrency is a scam after spotting backdoor functionality designed to effectively steal users' funds. Dingo Token is relatively small by cryptocurrency standards: its market cap of close to $11m meant it ranked down in 774th place by size when the researchers analyzed it. However, its functionality has the researchers concerned. The researchers stated that the token's developers have embedded backdoor functionality in the token's smart contract, which adds a 95% "taxFee" and a 4% "LiquidityFee." Manipulation of this "setTaxFeePercent" function in the smart contract code of the token has been used 47 times by its developers, according to the researchers. The researchers noted that what they have found at Dingo Token is increasingly commonplace. The researchers stated that this is a common tactic that locks users' funds, and eventually, the scammers pull out all the money. Scammers are increasingly finding cryptocurrency attractive. The researchers recommended that if you've incorporated crypto into your investment portfolio or are interested in investing in crypto in the future, you should use credible exchanges and buy from an established token with numerous transactions behind it. Recently, the value of Dingo Token has surged 36% in a day to reach over $67m. That means it has shot up the rankings to reach #338, according to CoinMarketCap. The researchers stated that the developers will probably activate the backdoor to take 99% of all users' coins once they judge the value of the cryptocurrency has peaked.

    Infosecurity reports: "Scam Alert for Dingo Token That Charges 99% Fee"

  • news

    Visible to the public "Paper: Stable Diffusion 'Memorizes' Some Images, Sparking Privacy Concerns"

    Artificial Intelligence (AI) researchers from Google, DeepMind, UC Berkeley, Princeton, and ETH Zurich have published a paper describing an adversarial attack that can extract a small percentage of training images from latent diffusion AI image synthesis models such as Stable Diffusion. This attack challenges the notion that image synthesis models do not memorize their training data and that, if not published, training data may remain private. AI image synthesis models have sparked ethical debate and legal action. Proponents and opponents of these new technologies often debate the privacy and copyright issues of generative AI tools. Further igniting either side of the debate might have a significant impact on potential legal regulation of the technology. Therefore, this latest work has piqued the interest of AI researchers. This article continues to discuss the study on extracting training data from diffusion models that is raising privacy concerns.

    Ars Technica reports "Paper: Stable Diffusion 'Memorizes' Some Images, Sparking Privacy Concerns"

  • news

    Visible to the public "New York Attorney General Orders Stalkerware Maker to Notify Hacked Victims"

    Following a deal with the New York attorney general's office, a New York-based spyware maker will notify the individuals whose phones were compromised by its mobile spying software. Under the terms of the agreement, Patrick Hinchy, whose 16 companies promoted apps such as PhoneSpector and Highster, will also pay $410,000 in civil fines for illegally promoting mobile surveillance software that allowed its clients to secretly spy on another person's phone. According to the New York attorney general's office, the apps allowed customers to secretly monitor a victim's phone and access their device data, including text messages, emails, images, browsing history, and location information. This article continues to discuss the New York-based spyware maker agreeing to notify those whose phones were compromised by its mobile surveillance software.

    TechCrunch reports "New York Attorney General Orders Stalkerware Maker to Notify Hacked Victims"

  • news

    Visible to the public "Tallahassee Hospital Diverting Patients, Canceling Non-emergency Surgeries After Cyberattack"

    A cyberattack has prompted a Tallahassee hospital to move patients to other hospitals and cancel all non-emergency surgical procedures. Tallahassee Memorial HealthCare, one of the largest hospitals servicing a 21-county region in north Florida and south Georgia, revealed that it had been forced to take its Information Technology (IT) systems offline because of the security issue. Tallahassee Memorial HealthCare operates a 772-bed acute care hospital, a surgery and adult ICU center, a psychiatric hospital, and more. Although there have been debates over whether ransomware attacks on hospitals can directly contribute to loss of life, multiple experts said events over the last five years were proof that the attacks are causing significant and actual real-world harm. The attack on Tallahassee Memorial HealthCare comes only one day after pro-Russian hackers launched Distributed Denial-of-Service (DDoS) attacks against hospitals in at least 25 US states, knocking many offline for hours. This article continues to discuss the impact of the cyberattack on Tallahassee Memorial HealthCare and the increased targeting of hospitals by cybercriminals.

    The Record reports "Tallahassee Hospital Diverting Patients, Canceling Non-emergency Surgeries After Cyberattack"