News Items

  • news

    Visible to the public "Memory-Safe Programming Languages Are on the Rise. Here's How Developers Should Respond"

    According to a study by Consumer Reports, developers in the private and public sectors should commit to using memory-safe languages for new products and tools. They are also urged to identify the most critical libraries and packages to move to memory-safe languages. The US nonprofit known for evaluating consumer products investigated what actions can be taken to promote memory-safe programming languages, such as Rust, over C and C++. Consumer Reports wants to address industry-wide problems that cannot be resolved through user behavior or consumer choice, citing memory unsafety as one of the issues. The report titled "Future of Memory Safety" delves into various memory-related issues, such as the difficulties in promoting memory-safe language adoption in universities, the levels of distrust for memory-safe languages, the introduction of memory-safe languages to code bases written in other languages, as well as incentives and public accountability. In 2019, Microsoft disclosed that 70 percent of the security flaws it had addressed over the previous 12 years were memory-safety vulnerabilities. The percentage was high because Windows was mostly written in C and C++. Since then, the National Security Agency (NSA) has advised developers to move from using C++ towards C#, Java, Ruby, Rust, and Swift. This article continues to discuss key findings and points made in the Consumer Reports study on memory safety.

    ZDNet reports "Memory-Safe Programming Languages Are on the Rise. Here's How Developers Should Respond"

  • news

    Visible to the public "German Government, Airports, Banks Hit With Killnet DDoS Attacks"

    After Berlin agreed to send its advanced Leopard 2 tanks to Ukraine, Russia-backed threat group Killnet retaliated with DDoS attacks aimed at Germany's government, banking, and airport sites. Germany's BSI federal agency, which oversees information security, stated that the attacks caused some minor outages but otherwise did little damage. BSI noted that currently, some websites are not accessible. According to the BSI's assessment, the DDoS attacks should not affect the targeted companies' services. Last fall, Killnet was behind similar DDoS attacks against US airports and has been escalating its nefarious cyber activities throughout Russia's invasion of Ukraine.

    Dark Reading reports: "German Government, Airports, Banks Hit With Killnet DDoS Attacks"

  • news

    Visible to the public "NIST Risk Management Framework Aims to Improve Trustworthiness of Artificial Intelligence"

    The US National Institute of Standards and Technology (NIST) has released its Artificial Intelligence Risk Management Framework (AI RMF 1.0). This guidance document aims to help organizations designing, developing, deploying, or using AI systems, manage the risks of AI systems, including privacy and cybersecurity risks. The AI RMF was developed in close collaboration with private and public sectors in response to a direction from Congress for NIST to design the framework. It is designed to adapt to the AI landscape as technologies continue to advance and to be utilized by organizations in varied degrees and capacities so that society can benefit from AI technologies while also being protected from their potential risks. The AI RMF is split into two parts, with the first explaining how organizations should frame AI-related risks and describing the qualities of trustworthy AI systems. The second part describes four functions that can help enterprises address AI-related risks. This article continues to discuss the AI RMF 1.0 aimed at building trust in AI technologies and promoting AI innovation while mitigating risk.

    NIST reports "NIST Risk Management Framework Aims to Improve Trustworthiness of Artificial Intelligence"

  • news

    Visible to the public "Mitigations Developed for Potential Lateral Movement on Azure AD Kerberos"

    Researchers discovered that threat actors could exploit a new Microsoft cloud authentication protocol to steal or fake cloud tickets as well as conduct lateral movement in cloud-based Azure AD Kerberos. According to researchers at Silverfort, the new attacks stem from well-known on-premises Kerberos attacks Silver Ticket and Pass The Ticket (PTT), which are used for lateral movement in Active Directory. As part of its cloud migration, Microsoft made Azure AD Kerberos available to authenticate access to cloud resources without requiring the on-premises AD version. Silverfort developed Bounce the Ticket and Silver Iodide, which are two variants of Silver Ticket and PTT that work for Azure AD Kerberos. According to the researchers, the new attacks provide malicious access to hosted infrastructure such as servers and storage. A Microsoft spokesman stated that this technique is not a vulnerability and that a potential attacker would need administrator or elevated rights to access the storage account data in order to use it. This article continues to discuss the vulnerability discovered by Silverfort researchers in Azure AD Kerberos, Microsoft's response to this discovery, and recommended mitigations.

    SC Media reports "Mitigations Developed for Potential Lateral Movement on Azure AD Kerberos"

  • news

    Visible to the public "Cybercriminals Use Microsoft OneNote Attachments to Spread Malware"

    Cybercriminals are using OneNote attachments in phishing emails to infect victims with remote access malware, allowing them to steal passwords and cryptocurrency wallets. Since attackers have been spreading malware via infected Word and Excel attachments for years, running macros to download and install malware, this approach is not new. However, Microsoft disabled macros by default in Office documents in July 2022, rendering malicious attachments less effective. Therefore, attackers began using new file formats, such as password-protected ZIP files and ISO images. A Windows flaw that allowed ISOs to bypass security warnings and the failure of the popular 7-Zip archive utility to propagate Mark of the Web (MOTW) flags to files extracted from ZIP archives facilitated the rapid rise in popularity of these file formats. Microsoft addressed the issue by instructing Windows to display security alerts when a user attempts to access downloaded ISO or ZIP files, but this did not prevent malicious actors from switching to Microsoft OneNote attachments. This article continues to discuss the use of Microsoft OneNote attachments to spread malware.

    Techzine reports "Cybercriminals Use Microsoft OneNote Attachments to Spread Malware"

  • news

    Visible to the public "A Network of Knockoff Apparel Stores Exposed 330,000 Customer Credit Cards"

    A database storing hundreds of thousands of unencrypted credit card numbers and cardholder information was found exposed on the Internet. The database had around 330,000 credit card numbers, cardholder names, and complete billing addresses when it was taken offline, with the amount of data growing in real-time as users placed new orders. The data included all the information a criminal would need to execute fraudulent purchases and transactions using a cardholder's information. The exposed credit card data belong to customers who made purchases through a network of nearly identical websites claiming to sell designer products. When a customer made a purchase on these websites, their credit card details and billing information were stored in a database that was left unprotected on the Internet. The unencrypted financial information was accessible to anyone who knew the database's IP address. Anurag Sen, a security researcher, discovered the exposed credit card records and requested assistance from TechCrunch in notifying the owner. Sen was not the first to uncover the exposed data, since a ransom message left on the exposed database indicated that the data had already been discovered. Instead of attempting to identify the owner and reporting the exposure appropriately, the unidentified individual claimed to have copied the records and demanded a small sum of cryptocurrency to return it. This article continues to discuss the exposure of customer credit cards by a network of knockoff apparel online stores.

    TechCrunch reports "A Network of Knockoff Apparel Stores Exposed 330,000 Customer Credit Cards"

  • news

    Visible to the public "Recent Rise in SEO Poisoning Attacks Compromise Brand Reputations"

    In recent weeks, SentinelOne has observed an increase in malicious search engine advertisements. SentinelOne researchers note that attackers using Search Engine Optimization (SEO) poisoning are typically more successful when they SEO poison the results of popular downloads related to companies with limited internal brand protection resources. SEO poisoning attacks involve manipulating search engine results so that the first advertised links lead to attacker-controlled sites, often to infect users with malware or to lure more people into an advertisement fraud scheme. This article continues to discuss the concept of SEO poisoning attacks, an example of a recent SEO poisoning campaign provided by SentinelOne, and how to mitigate the threat of such attacks.

    TechRepublic reports "Recent Rise in SEO Poisoning Attacks Compromise Brand Reputations"

  • news

    Visible to the public "Ransomware Groups Rebrand and Claim More Victims"

    According to a new report from the GuidePoint Research and Intelligence Team (GRIT), ransomware activity increased from Q3 2022 to Q4 2022, with rebranded ransomware gangs significantly increasing the number of publicly claimed victims. No quarter of 2022 had less than 569 victims, with the biggest slowdown occurring in late June and early July, most likely due to the switch from Lockbit2 to Lockbit3 among threat actors. The cryptocurrency market's challenges could have also had an impact. On average, ransomware gangs were responsible for publicly sharing 6.87 victims each day to their respective leak sites throughout the year. GRIT tracked 54 groups implementing a double-extortion methodology as part of the report. Many of the groups were found to be using a Ransomware-as-a-Service (RaaS) model to boost productivity and maximize revenue. In every month in 2022, at least one new gang with double-extortion capabilities emerged. This article continues to discuss key findings from GRIT's report on ransomware attack trends in 2022.

    BetaNews reports "Ransomware Groups Rebrand and Claim More Victims"

  • news

    Visible to the public "Ticketmaster Claims Bot Attack Disrupted Taylor Swift Tour Sales"

    Ticketmaster has recently claimed they were hit by a cyberattack in November 2022 that led to extensive issues with ticket sales for Taylor Swift's US tour. The company noted that they were hit with three times the amount of bot traffic than they had ever experienced, and for the first time in 400 Verified Fan on sales, they came after their Verified Fan access code servers. The company stated that while the bots failed to penetrate its systems or acquire any tickets, the attack required them to slow down and even pause its sales. This is what led to the terrible consumer experience. Alexander Heid, chief research and development officer at SecurityScorecard, agrees that Ticketmaster appears to have suffered from a bot-driven attack. Heid stated that the availability issues reported by Ticketmaster to have occurred during the sale of Taylor Swift tickets were a result of bots attempting to acquire tickets for resale; the high volume of requests resulted in a DDoS-like condition whereby floods of artificial traffic caused slowdowns and outages during a flash sales event.

    Infosecurity reports: "Ticketmaster Claims Bot Attack Disrupted Taylor Swift Tour Sales"

  • news

    Visible to the public "Dutch Hacker Steals Data From Virtually Entire Population of Austria"

    A Dutch hacker allegedly stole data on 9 million Austrian citizens via a misconfigured cloud database, thus leading to their recent arrest. The attack was first detected in May 2020 and involved the Fees Info Service (GIS), which is responsible for collecting TV and radio license fees in Austria. According to Austria's Federal Criminal Police Office (Bundeskriminalamt/BK), the GIS had hired an Information Technology (IT) company based in Vienna to work on its internal databases. The databases contained information about citizens' locations, which could be used to find anyone attempting to avoid paying a broadcast fee. One of the IT company's employees used GIS data during a test and left a database accessible online without protecting it. According to investigators, the hacker discovered the data via a search engine. The data is suspected of having impacted nearly all Austrian citizens, as the country has a population of approximately 9.1 million people. Names, dates of birth, and registration addresses were among the exposed data. This article continues to discuss the theft of data from a misconfigured cloud database that has impacted almost the entire Austrian population.

    ITPro reports "Dutch Hacker Steals Data From Virtually Entire Population of Austria"

  • news

    Visible to the public "Hive Ransomware Operation Apparently Shut Down by Law Enforcement"

    The Hive ransomware operation appears to have been shut down as part of a major law enforcement operation involving agencies in 10 countries. A message in Russian and English on the Hive ransomware operation's Tor-based website reads: "The Federal Bureau of Investigation seized this site as part of a coordinated law enforcement action taken against Hive Ransomware." Another message says the action was taken in coordination with Europol and authorities in Florida, which indicates that more details will likely be made available in the upcoming period by the Justice Department and Europol. Until law enforcement agencies confirm the shutdown of Hive, there could be a slight chance that the website seizure notice was posted by the cybercriminals themselves. Hacker groups falsely claiming to have been shut down by police are not unheard of. However, Allan Liska, a ransomware expert working for threat intelligence company Recorded Future, reported that the Hive infrastructure was seized. The US government reported that in November 2022, the Hive ransomware gang had hit more than 1,300 businesses and made an estimated $100 million in ransom payments. Data collected by the DarkFeed deep web intelligence project shows that Hive was still active last week. The Hive ransomware operation was launched in 2021. The ransomware was offered under a ransomware-as-a-service (RaaS) model. A free decryptor for files encrypted with the Hive ransomware was released by a South Korean cybersecurity agency in the summer of 2022.

    SecurityWeek reports: "Hive Ransomware Operation Apparently Shut Down by Law Enforcement"

  • news

    Visible to the public "UK Warns of Targeted Phishing Attacks from Russia and Iran"

    The UK has issued a warning about the threat posed by targeted spear-phishing attacks against organizations and individuals conducted by malicious threat actors in Russia and Iran. In an advisory, the National Cyber Security Centre (NCSC) detailed the attackers' methods and recommended mitigation strategies to tackle the ongoing threat. Throughout 2022, separate campaigns were launched by the Russia-based group SEABORGIUM and Iran-based group TA453, also known as APT42, to target various organizations and individuals in the UK and worldwide for information-gathering. According to the advisory, the attacks are not directed at the general public but rather at specific sectors, including academia, defense, government, non-governmental organizations, think tanks, politicians, journalists, and activists. This article continues to discuss the NCSC's warning about targeted spear-phishing campaigns carried out by cyber actors based in Russia and Iran.

    HSToday reports "UK Warns of Targeted Phishing Attacks from Russia and Iran"

  • news

    Visible to the public "Dark Web Posts Advertising Counterfeit Cash Surge 90%"

    Security researchers at Cybersixgill found that there was a double-digit increase in deep and dark web ads and sellers promoting counterfeit currency last year, hinting at rising demand from the criminal community. The researchers observed a 91% year-on-year increase in posts on the sites it monitored and an 82% increase in the number of unique sellers in 2022. The researchers claimed that technological advances could be giving those at the top end of the market an edge. The top 10% of sellers are responsible for 80% of listings. The researchers noted that it is possible that the vastly increased supply and growth of suppliers of counterfeit currency is a result of the proliferation of advanced printing technology and techniques, which enable more actors to produce convincing counterfeits with less difficulty. This theory is backed by another finding by the researchers, a decrease in feedback provided to sellers of fake currency. The researchers noted that despite the overall rise in fake currency advertised on the underground, there was an approximately 53% decrease in feedback to these listings. The researchers stated that "if we assume that customers are more likely to write feedback when they are dissatisfied with the transaction, the inverse relationship between posts advertising counterfeit money and feedback on these posts suggests that customers are increasingly satisfied with the product and the supplier." Despite the fact that cryptocurrency is often linked to cybercrime, traditional cash appears to remain a major source of criminal activity. The researchers noted that the surge in supply via the dark web could be down to a rise in demand from criminals looking to finance their schemes. The researchers concluded that the large volume of posts advertising counterfeit currency on the underground indicates the enduring relevance of cash, despite the rise of digital currencies. Unfortunately, the ultimate victims of money counterfeiting operations are the stores, local businesses, and individuals who accept cash payments.

    Infosecurity reports: "Dark Web Posts Advertising Counterfeit Cash Surge 90%"

  • news

    Visible to the public "Lloyds Bank Warns of 80% Surge in Advance Fee Scams"

    A leading UK bank has recently warned consumers about the rise of scams in which victims are asked to pay an upfront fee for a product or service that doesn't materialize. According to Lloyds Bank, so-called "advance fee" fraud surged by 82% year-on-year in 2022, with fake ads for loans, jobs, and rental properties among the most common tactics used by scammers. The lender claimed that the cost-of-living crisis may be forcing consumers into making risky decisions. The bank noted that this is especially true of loan fee scams, where fraudsters target people on low incomes or with a poor credit history in the hope they'll take the bait. They'll approve a loan no matter what the victim's credit history is and then request an upfront fee in order to receive the funds, which never arrive. Reports of loan fee scams have increased 105% year-on-year and continue to rise sharply. The company stated that the important thing to remember is that a genuine lender will always conduct thorough credit checks prior to agreeing a loan and won't ask for an upfront payment before releasing the funds. The average victim lost $881 last year, down significantly from $1479 in 2021. The bank noted that this could be because fraudsters are going for higher volumes of lower value scams. Those aged 25 - 44 years old are most likely to fall victim. People in this age range make up around half (49%) of all victims.

    Infosecurity reports: "Lloyds Bank Warns of 80% Surge in Advance Fee Scams"

  • news

    Visible to the public "Ransomware Access Brokers Use Google Ads to Breach Your Network"

    DEV-0569 is a threat actor observed using Google Ads in ongoing advertising campaigns aimed at distributing malware, stealing credentials, and ultimately compromising networks for ransomware attacks. In recent weeks, cybersecurity researchers have demonstrated how Google search results have become a nest for malicious advertisements spreading malware. These advertisements pose as websites for well-known software, such as LightShot, Rufus, 7-Zip, FileZilla, LibreOffice, AnyDesk, Awesome Miner, TradingView, WinRAR, and VLC. These malicious advertisement campaigns have been used to distribute RedLine Stealer, Gozi/Ursnif, Vidar, and more. This article continues to discuss findings regarding the use of Google Ads by ransomware access brokers.

    Bleeping Computer reports "Ransomware Access Brokers Use Google Ads to Breach Your Network"

  • news

    Visible to the public "Supply Chain Attacks Caused More Data Compromises Than Malware"

    According to the Identity Theft Resource Center (ITRC), there were fewer compromises reported in the first half of 2022 due in part to Russia-based cybercriminals being distracted by the war in Ukraine and the volatility in the cryptocurrency markets. However, data breaches steadily escalated in the latter part of 2022. Since 2021, the number of affected victims (422.1 million) has increased by 41.5 percent. Cyberattacks continue to be the leading cause of data breaches. In 2022, the number of data breaches caused by supply chain attacks surpassed those caused by malware. Malware is commonly viewed as the core of most cyberattacks, but supply chain attacks surpassed malware-based attacks by 40 percent in 2022. More than 10 million people were affected by supply chain attacks targeting 1,743 organizations, according to the report. In comparison, 70 attacks involving malware impacted 4.3 million users. This article continues to discuss key findings from ITRC regarding data breaches in 2022.

    Help Net Security reports "Supply Chain Attacks Caused More Data Compromises Than Malware"

  • news

    Visible to the public "820,000 People Affected by Zacks Investment Research Breach From November 2021"

    After discovering a breach that lasted for nearly a year, Zacks Investment Research is issuing breach notification letters to 820,000 individuals. The company disclosed in documents with the Maine Attorney General's office that it experienced a data breach from November 2021 to August 2022. Names, addresses, phone numbers, email addresses, and passwords for the Zacks website were compromised. The data originates from an older database of Zacks customers who registered for the Zacks Elite product between November 1999 and February 2005. Zacks now has security measures to prevent affected users from accessing their accounts using the leaked password. When victims access their accounts, they will be requested to create a new password. This article continues to discuss the Zacks Investment Research data breach.

    The Record reports "820,000 People Affected by Zacks Investment Research Breach From November 2021"

  • news

    Visible to the public "US Federal Agencies Fall Victim to Cyber Attack Utilizing Legitimate RMM Software"

    At least two US federal agencies were victims of a malicious cyber campaign involving legitimate Remote Monitoring and Management (RMM) software to carry out a phishing scam. US cybersecurity authorities stated that cybercriminal actors sent phishing emails that led to the download of legitimate RMM software, such as ScreenConnect and AnyDesk, which was then used in a refund scam to steal money from victims' bank accounts. The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) have issued a joint advisory pertaining to the widespread campaign. The attacks, which occurred between mid-June and mid-September 2022, were financially motivated. However, threat actors could use the access for various activities, including selling it to other hacker groups. The use of remote software by hackers has long been a cause for concern, since it provides an effective approach to gaining local user access on a host without elevating privileges or gaining a foothold through other ways. This article continues to discuss the campaign involving legitimate RMM software.

    THN reports "US Federal Agencies Fall Victim to Cyber Attack Utilizing Legitimate RMM Software"

  • news

    Visible to the public "Researchers Pioneer POC Exploit for NSA-Reported Bug in Windows CryptoAPI"

    Researchers have created a proof-of-concept (POC) exploit for a public x.509 certificate-spoofing vulnerability in the Windows CryptoAPI that was reported to Microsoft by the National Security Agency (NSA) and the National Cyber Security Center (NCSC) last year. Microsoft patched the vulnerability, tracked as CVE-2022-34689, in August 2022, but reported it publicly in October 2022. At the time, the vulnerability was assessed as one that attackers were more likely to exploit, but Microsoft provided little details on the flaw and how an attacker could use it. However, researchers at Akamai who have been analyzing the vulnerability for several months have disclosed details of an attack they developed for it. According to the researchers, the attack would allow attackers to spoof the target certificate and masquerade as any website, with the ability to perform various malicious actions. CryptoAPI is a Windows Application Programming Interface (API) used by developers to enable cryptography support for their applications. One of CryptoAPI's functions is to validate digital certificate authenticity, which is where the vulnerability exists. This article continues to discuss the POC exploit developed by Akamai researchers for the public x.509 certificate-spoofing vulnerability in the Windows CryptoAPI.

    Dark Reading reports "Researchers Pioneer POC Exploit for NSA-Reported Bug in Windows CryptoAPI"

  • news

    Visible to the public "NIST Post-Quantum Cryptography Candidate Cracked"

    Belgian researchers successfully broke the SIKE cryptographic algorithm, a fourth and final-round candidate that the US National Institute of Standards and Technology (NIST) evaluated for its Post-Quantum Cryptography (PQC) standard. In roughly 62 minutes, Wouter Castryck and Thomas Decru, researchers at the KU Leuven research university in Leuven, Belgium, cracked the SIKE algorithm using a single core on a six-core Intel Xeon CPU E5-2630v2 at 2.60GHz. NIST expects its PQC standard algorithms to be resistant to post-quantum hacking techniques, so it decided not to standardize the SIKE algorithm. According to the Office of Management and Budget (OMB), the US must move its cryptographic systems to quantum-resistant cryptography by 2035, minimizing as much quantum risk as possible. However, quantum computers may be able to break classical encryption schemes by 2030. Therefore, affected companies must implement the PQC standards before quantum computers become fully operational. This article continues to discuss researchers cracking the SIKE PQC candidate algorithm, NIST's selection of cryptographic algorithms for PQC standardization, the challenges of creating such algorithms, and the importance of organizations implementing PQC standards before quantum computers become fully available.

    CACM reports reports "NIST Post-Quantum Cryptography Candidate Cracked"

  • news

    Visible to the public  "PLAY Ransomware Gang Allegedly Attacks Arnold Clark Auto Dealership"

    The PLAY ransomware group allegedly published sensitive personal information stolen from Arnold Clark, one of the largest vehicle dealerships in the UK. After detecting unusual network activity in December 2022, the company said it had taken action to protect client data but did not describe the nature of the hack. The company's statement has not yet been amended following the exposure of what appears to be client information on the extortion website of the PLAY ransomware gang. The data includes passport information and National Insurance numbers, in addition to addresses and phone numbers. The bank records and vehicle credit documents of the company's customers were also made public. It is suspected that both individual and business clients' information was compromised in the attack. According to Arnold Clark, which employs over 11,000 people across 193 dealerships in Britain, the attack temporarily disrupted its operations. This article continues to discuss the cyberattack on the Arnold Clark auto dealership and the PLAY ransomware gang claiming to have been behind the attack by releasing stolen data.

    CyberIntelMag reports "PLAY Ransomware Gang Allegedly Attacks Arnold Clark Auto Dealership"

  • news

    Visible to the public "VMware Warns of Critical Code Execution Bugs in vRealize Log Insight"

    VMware has patched multiple vulnerabilities in its vRealize Log Insight appliance, tracked as CVE-2022-31706, CVE-2022-31704, CVE-2022-31710, and CVE-2022-31711. The log collection and analytics virtual appliance allows administrators to gather, view, manage, and analyze syslog data. Log Insight monitors application logs, network traces, configuration files, messages, and performance data in real-time. The product's most severe vulnerabilities include a directory traversal flaw and a broken access control vulnerability. An unauthenticated attacker can exploit one of the two vulnerabilities to inject files into an impacted appliance's operating system, resulting in Remote Code Execution (RCE). This article continues to discuss the potential exploitation and impact of the vulnerabilities in the VMware vRealize Log Insight appliance.

    Security Affairs reports "VMware Warns of Critical Code Execution Bugs in vRealize Log Insight"

  • news

    Visible to the public "Hacking Accounted For Nearly 80% of Healthcare Data Breaches Last Year"

    According to Fortified Health Security's "2023 Horizon Report," nearly 80 percent of healthcare data breaches reported to the HHS Office for Civil Rights (OCR) in 2022 were connected to hacking and Information Technology (IT) incidents, a 45 percent rise from five years ago. Furthermore, 70 percent of reported breaches affected healthcare providers. Business associates and health plans represented a smaller part of the overall number of affected organizations. In 2022, 51.4 million healthcare records were compromised, up from 49.4 million in 2021. As previously reported, many of the top ten most significant healthcare data breaches reported to HHS in 2022 were caused by third-party vendors, highlighting the need for improved third-party risk management. According to Fortified Health Security, these trends are expected to persist into 2023. This article continues to discuss key findings from Fortified Health Security's 2023 Horizon Report and how healthcare organizations can minimize internal and external cyber threats.

    HealthITSecurity reports "Hacking Accounted For Nearly 80% of Healthcare Data Breaches Last Year"

  • news

    Visible to the public  "French Rugby Club Leaks Source Code"

    The professional rugby union club Stade Francais exposed its followers to security risks for almost a year after its website's source code leaked. Stade Francais is a Paris-based rugby union club with hundreds of thousands of devoted social media fans. Researchers at Cybernews found that the server hosting the official Stade Francais website was leaking its source code via the publicly accessible .git directory. Poor access control to .git directories potentially allowed threat actors to make unauthorized changes to the club's server. If the threat actors had exploited the vulnerability, user data may have been compromised, and the server could have been taken over. Unauthorized access to the website's .git directory made it possible for anyone to download the application's source code. It raises concerns because threat actors could have used this access to trick unsuspecting users into installing malicious applications. Threat actors could have also used the access to add skimmers that allow payment card stealers on the website's online store. This article continues to discuss the leak of the Stade Francais website's source code.

    Cybernews reports "French Rugby Club Leaks Source Code"

  • news

    Visible to the public "Hilton Denies Hack After Data From 3.7 Million Honors Customer Offered for Sale"

    After cybercriminals claimed to have infiltrated the networks of the Hotel giant Hilton and stolen 3.7 million customers' information, the company denied that it had been hacked. According to hackers, a 2017 database containing customer information from the Hilton Hotel Honors program was compromised. In addition to names, Honors IDs, and Honors Tiers, the database contains reservation-specific data, such as check-in dates. A spokeswoman for Hilton stated that there is no evidence suggesting that the company's systems have been hacked and confirmed that no guest passwords, contact information, or financial details had been exposed. Given the amount of customer information collected by hotels, they are a prime target for hackers. There are also state-sponsored cyber espionage organizations, such as DarkHotel, APT28, and the Rana Group, that specialize in attacks against hotels worldwide. This article continues to discuss hackers claiming to have stolen data related to 3.7 Hilton Hotel customers and notable hacking incidents faced by other hotels.

    The Record reports "Hilton Denies Hack After Data From 3.7 Million Honors Customer Offered for Sale"

  • news

    Visible to the public "Yahoo Overtakes DHL As Most Impersonated Brand in Q4 2022"

    Security researchers at Check Point have discovered that Yahoo knocked DHL off the top spot as the most imitated brand in the last quarter of 2022, now responsible for 20% of all phishing attempts recorded in the wild. The researchers stated that several cybercriminals had been found distributing emails with subject lines that told a recipient they had won prize money from initiatives organized by Yahoo worth hundreds of thousands of dollars. Email senders showed names such as "Award Promotion" or "Award Center." The phishing messages also warned that the target must refrain from telling people about winning the prize because of legal issues. It asked the recipient to share their personal information and bank details in order to receive the winning prize money into their accounts. As for other brands most impersonated in Q4 2022, DHL came in second place with 16% of all brand phishing attempts, and Microsoft followed in the third spot with 11%. The researchers noted that industry-wise, the technology sector was the most imitated by brand phishing in the last quarter of 2022, followed by shipping and social networks.

    Infosecurity reports: "Yahoo Overtakes DHL As Most Impersonated Brand in Q4 2022"

  • news

    Visible to the public "Improving Data Security for a Hybrid Society: Insights from New Study"

    Researchers at the Tokyo University of Science have introduced a new method that can perform computations with encrypted data more quickly and at a lower cost than traditional approaches, while also enhancing security. Society 5.0 is described as a connected society powered by data shared among people and Artificial Intelligence (AI) technologies connected via Internet of Things (IoT) devices. Although this can be advantageous, protecting data privacy for secure processing, transmission, and storage is critical. Currently, Homomorphic Encryption (HE) and secret sharing are two methods used to maintain the privacy of sensitive data while computing it. Professor Keiichi Iwamura and Assistant Professor Ahmad A. Aminuddin of the Tokyo University of Science introduced a new secure computation method in which all computations are performed on a single server without a high computational cost. The system involves a Trusted Third Party (TTP), one computing server, four players who provide the server with secret inputs, and one player who restores the result of the computation. This article continues to discuss the fast and efficient method developed to handle encrypted data in the cloud for Society 5.0.

    Tokyo University of Science reports "Improving Data Security for a Hybrid Society: Insights from New Study"

  • news

    Visible to the public "Security Update for Chrome 109 Patches 6 Vulnerabilities"

    Google has recently awarded a total of more than $25,000 to the researchers who reported the vulnerabilities patched with the release of a Chrome 109 update. The company informed users on Tuesday that six security holes have been patched in Chrome, including four reported by external researchers. Google noted that two of them are high-severity use-after-free issues affecting the WebTransport and WebRTC components. Researchers Chichoo Kim and Cassidy Kim have been credited for reporting the flaws, and they have earned a total of $19,000 for their findings. These vulnerabilities are tracked as CVE-2023-0471 and CVE-2023-0472. Google noted that use-after-free bugs affecting Chrome can typically be exploited for remote code execution and sandbox escapes, but in many cases, they need to be chained with other flaws. The latest Chrome update also fixes a medium-severity type confusion issue that earned a researcher $7,500 and a medium-severity use-after-free issue for which the reward has yet to be determined. Google noted that none of these vulnerabilities appear to have been exploited in the wild. According to Google's own data, eight Chrome flaws were exploited in attacks in 2022.

    SecurityWeek reports: "Security Update for Chrome 109 Patches 6 Vulnerabilities"

  • news

    Visible to the public "North Korean Threat Actor Targets Cryptocurrency With New Methodologies"

    A new report by researchers at Proofpoint describes a state-sponsored North Korean threat actor that has been actively targeting cryptocurrency holders and exchanges with new methods. The gang, known as TA444, has been operating since at least 2017 and began focusing on cryptocurrency in 2022. It shares similarities with the public activities of APT38, Bluenoroff, BlackAlicanto, Stardust Chollima, and COPERNICIUM, and it is suspected of funneling funds to North Korea or its foreign handlers. What makes TA444 interesting is that it applies a greater diversity of delivery techniques and payloads than other groups. In order to trap victims, the group also uses blockchain-related lures, fake employment listings for major companies, and more. This article continues to discuss the tactics, capabilities, and targets of the TA444 group.

    SiliconANGLE reports "North Korean Threat Actor Targets Cryptocurrency With New Methodologies"

  • news

    Visible to the public "New Stealthy Python RAT Malware Targets Windows in Attacks"

    A new Python-based malware with Remote Access Trojan (RAT) capabilities has been discovered in the wild, giving its operators control over compromised systems. The new RAT, dubbed "PY#RATION" by researchers at Securonix, leverages the WebSocket protocol to communicate with the command-and-control (C2) server and exfiltrate data from the target system. Since August 2022, when the PY#RATION campaign began, the researchers have observed various variants of the RAT, indicating its active development. The PY#RATION malware is spread via a phishing campaign involving password-protected ZIP attachments containing two shortcut .LNK files appearing as images. This article continues to discuss findings and observations regarding the PY#RATION RAT.

    Bleeping Computer reports "New Stealthy Python RAT Malware Targets Windows in Attacks"

  • news

    Visible to the public "Over 4,500 WordPress Sites Hacked to Redirect Visitors to Sketchy Ad Pages"

    A malicious campaign has infected more than 4,500 WordPress websites as part of an operation believed to have been active since at least 2017. Sucuri reported that the infections involve the injection of obfuscated JavaScript hosted on a malicious domain aimed at driving visitors to different unwanted websites. Data shows that the latest operation has been in effect since December 26, 2022. A previous set of attacks observed in early December 2022 affected more than 3,600 websites, while another wave observed in September 2022 affected over 7,000 websites. The malicious code is injected into the WordPress "index.php" file, with Sucuri adding that it has removed such changes from over 33,000 files on hijacked websites during the last 60 days. In recent months, this campaign has steadily shifted from the use of fake CAPTCHA push notification scam pages to black hat 'ad networks.' When users visit one of the compromised WordPress websites, a redirect chain is triggered by a traffic-direction system, placing the victims on pages showing advertisements for products that ironically combat intrusive advertisements. This article continues to discuss the massive campaign that has infected thousands of WordPress websites.

    THN reports "Over 4,500 WordPress Sites Hacked to Redirect Visitors to Sketchy Ad Pages"

  • news

    Visible to the public Spotlight on Lablet Research #38 - Operationalizing Contextual Integrity

    Spotlight on Lablet Research #38 -

    Operationalizing Contextual Integrity

  • news

    Visible to the public SoS Musings #69 - ChatGPT: A New Threat to Cybersecurity

    SoS Musings #69 -

    ChatGPT: A New Threat to Cybersecurity

  • news

    Visible to the public Cybersecurity Snapshots #38 - Royal Ransomware

    Cybersecurity Snapshots #38 -

    Royal Ransomware

  • news

    Visible to the public Cyber Scene #76 - Cybersecurity New Math: Folding, Holding, and Anteing Up

    Cyber Scene #76 -

    Cybersecurity New Math: Folding, Holding, and Anteing Up

  • news

    Visible to the public "CISA Provides Resources for Securing K-12 Education System"

    The US Cybersecurity and Infrastructure Security Agency (CISA) recently published a report detailing the cybersecurity risks the K-12 education system faces, along with recommendations on how to secure it. Over the past four years, there have been thousands of cyber incidents involving K-12 institutions. The K-12 Cybersecurity Act of 2021 instructed CISA to review the cyber risks to elementary and secondary schools, evaluate challenges schools and school districts face in securing information systems, to provide recommendations on improving the protection of these systems, and develop an online training toolkit for school officials. CISA noted that discussions with stakeholder groups relevant to the K-12 education community revealed that the majority of them do not have the time or resources to secure information systems and sensitive student and employee records or to implement cybersecurity protocols. Most reported that the breadth of available cybersecurity information, like news coverage, conference panels, webinars, and more, only made matters more complicated. Nearly all reported that they needed simplicity, prioritization, and resources targeted to the unique needs and context of K-12 organizations. According to CISA, "with finite resources, K-12 institutions can take a small number of steps to significantly reduce cybersecurity risk," such as deploying multi-factor authentication (MFA), patching known vulnerabilities, creating backups, and implementing cyber incident response plans and cybersecurity training programs. CISA also discovered that many school districts struggle with insufficient IT resources and cybersecurity capacity. CISA noted that this can be addressed by using free or low-cost services, by asking technology providers for strong security controls at no additional cost, by migrating IT services to more secure cloud versions, and by taking advantage of the State and Local Cybersecurity Grant Program (SLCGP). CISA stated that K-12 entities cannot singlehandedly identify and prioritize emerging threats, risks, and vulnerabilities. CISA recommended that they join relevant collaboration groups, work with other information-sharing organizations, and collaborate with CISA and FBI regional cybersecurity personnel. The agency recommends that all K-12 institutions start by investing in the most impactful security measures, which will allow them to eventually migrate to a mature cybersecurity plan. They should also prioritize investments in line with CISA's Cross-Sector Cybersecurity Performance Goals (CPGs).

    SecurityWeek reports: "CISA Provides Resources for Securing K-12 Education System"

  • news

    Visible to the public "Riot Games Says Source Code Stolen in Ransomware Attack"

    On Tuesday, video games developer Riot Games confirmed that source code was stolen from its development systems during a ransomware attack last week. The incident was initially disclosed on January 20, when the company stated that systems in its development environment had been compromised and that the attack impacted its ability to release content. On January 24, Riot Games revealed that ransomware was used in the attack and that source code for several games was stolen. Their analysis confirmed source code for League, TFT, and a legacy anticheat platform were exfiltrated by the attackers. The company reiterated that while the development environment was disrupted, no player data or personal information was compromised in the attack. The company noted that the stolen source code, including some experimental features, will likely lead to new cheats emerging. The game developer also revealed that it received a ransom demand but noted it had no intention to pay the attackers. The attacker wrote in the ransom note that they were able to steal the anti-cheat source code and game code for League of Legends and for the usermode anti-cheat Packman. The attackers are demanding $10 million in return for not sharing the code publicly.

    SecurityWeek reports: "Riot Games Says Source Code Stolen in Ransomware Attack"

  • news

    Visible to the public "Just Half of Firms Have Sufficient Cybersecurity Budget"

    Security researchers at Neustar Security Services have discovered that only 49% of organizations based in EMEA and the US believe they have sufficient budget to meet their current needs, with many claiming funding may actually decrease in 2023. The researchers polled senior IT and security professionals from six markets across the US and EMEA to better understand their cyber risk challenges. The researchers found that budget was a pressing concern, with over one in 10 (11%) respondents claiming they only had enough to protect their most critical assets. More than a third (35%) admitted that budgets would stay flat or decline in 2023, potentially exposing their organization as a result. The researchers noted that even though the vast majority of respondents (83%) said their C-suite understands the gravity of the current threat landscape, 69% are concerned that budgetary challenges are restricting the deployment of new strategies and technologies. These concerns are particularly acute at a time when ransomware (75%), phishing (74%), DDoS (72%), targeted hacking (71%), and social engineering (71%) attacks are perceived to be on the rise. Respondents believe that the biggest threat to their security posture is the increased sophistication of attacks, cited by 60%. Other top concerns were listed as an increase in attacker activity (54%), budget constraints (35%), and an expanding attack surface (35%).

    Infosecurity reports: "Just Half of Firms Have Sufficient Cybersecurity Budget"

  • news

    Visible to the public "The Future of Quantum Security Will Be Encoded in Light, Researchers Hope"

    The future of data security may depend on the transfer of information as encrypted light particles. New US-Swiss research is paving the way for quantum cryptography devices to establish a new cybersecurity system. The development of a fully functional quantum computer could render present data security schemes insufficient. The quantum technology research project, funded in part by the US, aims to combine classical and quantum technologies to improve the security of digital networks before there are fully operational quantum computers. Through the US-Swiss bilateral collaboration in quantum technology, researchers in Switzerland are focusing on device-independent quantum cryptography, which is a process that would enable today's standard computers to transmit secure encryptions with the addition of a quantum-capable component. This article continues to discuss the quantum technology research initiative aimed at developing a more robust network security countermeasure to combat the potential of fully operational quantum computers.

    GCN reports "The Future of Quantum Security Will Be Encoded in Light, Researchers Hope"

  • news

    Visible to the public "A Major App Flaw Exposed the Data of Millions of Indian Students"

    An app operated by India's Education Ministry contains a security flaw that exposed the personal information of millions of students and teachers for over a year. The Digital Infrastructure for Knowledge Sharing (Diksha) app, which was launched in 2017, stored the data. During the height of the COVID-19 pandemic, when the Indian government was forced to close schools across the country, Diksha became a major tool for students to receive course materials and assignments from home. However, the cloud server storing Diksha's data was left unsecured, leaving the data of millions of individuals exposed to hackers, fraudsters, and anyone else who knew where to look. More than one million teachers' full names, phone numbers, and email addresses were included in files on the insecure server. Another file contained data on around 600,000 students. Although the students' email addresses and phone numbers were partially hidden, the data included their full names, where they went to school, their enrollment dates, and more. This article continues to discuss the mandatory app that exposed the personal information of students and teachers across India.

    Wired reports "A Major App Flaw Exposed the Data of Millions of Indian Students"

  • news

    Visible to the public "Trained Developers Get Rid of More Vulnerabilities Than Code Scanning Tools"

    An EMA survey of 129 software development professionals revealed that only 10 percent of organizations using code scanning tools prevented a higher percentage of vulnerabilities than those not using such tools. Continuous training significantly improved code security for over 60 percent of organizations that adopted it. About 70 percent of companies are missing important security phases in their Software Development Lifecycle (SDLC), suggesting the difficulty of a "shift-left" strategy. Although new vulnerabilities per year in the National Vulnerability Database (NVD) increased by more than 210 percent between 2015 and 2021 (from 6,487 to 20,139), the shift-left strategy has not been widely used. EMA's analysis revealed that only 25 percent of organizations use a shift-left security strategy, despite increased industry awareness of its significance. The research revealed that security remains a lesser priority for many companies, as almost half do not have a dedicated step for security validation, 20 percent do not plan their application security, and 4 percent do not have a dedicated step for security implementation. This article continues to discuss key findings from the EMA survey and the importance of training developers to improve code security.

    Help Net Security reports "Trained Developers Get Rid of More Vulnerabilities Than Code Scanning Tools"

  • news

    Visible to the public "New Wave of Attacks Use Known Vulnerabilities to Target Microsoft Exchange"

    Researchers at Bitdefender warn of a new wave of attacks exploiting known Microsoft Exchange vulnerabilities. At the end of November 2022, researchers observed an uptick in attacks involving ProxyNotShell/OWASSRF exploits targeting on-premises Microsoft Exchange deployments. The Server-Side Request Forgery (SSRF) attacks allow an attacker to send a specially crafted request from a vulnerable server to a second server. This allows them to gain access to the vulnerable server's resources and carry out malicious activities on the server. SSRF flaws are among the most commonly exploited vulnerabilities. If a web application is vulnerable to SSRF, an attacker could send a request from the vulnerable server to a local network resource that is normally inaccessible to the attacker. An attacker could also send a request to an external server, such as a cloud service, to perform actions on behalf of the vulnerable server. Multiple techniques are combined to establish exploit chains that result in Remote Code Execution (RCE) in the latest wave of attacks against Microsoft Exchange. This article continues to discuss findings regarding the new set of attacks targeting Microsoft Exchange.

    SiliconANGLE reports "New Wave of Attacks Use Known Vulnerabilities to Target Microsoft Exchange"

  • news

    Visible to the public "ChatGPT Just Passed an MBA-Level Exam at Wharton"

    ChatGPT has made some poor attempts to be a journalist and a therapist, but could it be a good student? Professor Christian Terwiesch from the Wharton School of the University of Pennsylvania believes it can. After Terwiesch proctored a final exam from a Master of Business Administration course for the chatbot, he found that ChatGPT passed. Terswiesch noted that not only did ChatGPT pass, it scored a B- to a B. Terswiesch described three main trends in ChatGPT's performance on the exam. First, he claims that ChatGPT performed well on open-ended questions based on case studies. Second, he claims that the AI struggled with some 6th-grade arithmetic. For example, some answers were incorrect by magnitudes of ten. Finally, the researcher stated that the chatbot couldn't handle "process analysis" questions which included "process flows with multiple products and problems with stochastic effects such as demand variability." ChatGPT was able to improve its results when provided with hints from humans, the same way a student might receive hints from their professor when asking a question during an exam. Based on his work, Terwiesch argues that ChatGPT could be an invaluable tool for education, but "professors and administrators need to be mindful of what the AI can and cannot do before baking it into a curriculum."

    Gizmodo reports: "ChatGPT Just Passed an MBA-Level Exam at Wharton"

  • news

    Visible to the public "LastPass Owner GoTo Says Hackers Stole Customers' Backups"

    LastPass' parent company GoTo has revealed that attackers stole customers' encrypted backups during a recent breach. LastPass initially confirmed the breach on November 30, 2022. At the time, the LastPass chief executive Karim Toubba stated that an unauthorized entity had accessed some customers' information stored in a third-party cloud platform shared by LastPass and GoTo. The attackers used information stolen during an earlier intrusion into LastPass' systems to further access the companies' shared cloud data. Now, about two months later, in a new statement, GoTo confirmed that the cyberattack affected several of its products, including the business communications tool Central, the online meetings service Join.me, the hosted Virtual Private Network (VPN) service Hamachi, and its Remotely Anywhere remote access tool. GoTo stated that the intruders stole encrypted backups from these services as well as the encryption key used by the company to secure the data. This article continues to discuss GoTo's confirmation that hackers stole customers' backups and the company's encryption key.

    TechCrunch reports "LastPass Owner GoTo Says Hackers Stole Customers' Backups"

  • news

    Visible to the public "Malware Blurs Line Between Banking Trojan and Surveillance"

    Hook is an Android banking Trojan that can take remote control of mobile devices. The Trojan, which the cybersecurity company ThreatFabric identifies as an improved variant of the existing Ermac Trojan, can carry out an entire attack chain, from infection to fraudulent transactions. Hook abuses a screen-sharing implementation known as virtual network computing to achieve the functionality of a remote access tool that can take screenshots, mimic clicks, and input swipe gesture commands. In addition, it is capable of transmitting geolocation data and taking over files. Hook can also launch the WhatsApp chat application to extract messages and send a news message, which could be used to spread the malware. DukeEugene, a threat actor who has been renting Ermac, began offering Hook in mid-January, according to ThreatFabric. This article continues to discuss findings regarding the Hook Android banking Trojan characterized as an improved version of the existing Ermac Trojan.

    InfoRiskToday reports "Malware Blurs Line Between Banking Trojan and Surveillance"

  • news

    Visible to the public "Arm Vulnerability Leads to Code Execution, Root on Pixel 6 Phones"

    A security researcher recently published technical details on an Arm Mali GPU vulnerability leading to arbitrary kernel code execution and root on Pixel 6 phones using a malicious app installed on the targeted device. The vulnerability is tracked as CVE-2022-38181 (CVSS score of 8.8). The issue is described as a use-after-free bug that impacts Arm Mali GPU driver versions prior to r40p0 (released on October 7, 2022). The researcher stated that the issue is related to a special function for sending "job chains" to the GPU, which also supports jobs implemented in the kernel, which run on the CPU instead (which are called software jobs or softjobs). The researcher noted that due to the complexity involved in managing memory sharing between user space applications and the GPU, many of the vulnerabilities in the Arm Mali GPU involve the memory management code. The current vulnerability is another example of this and involves a special type of GPU memory: the JIT memory. The researcher noted that some of the softjobs instruct the kernel to allocate and free JIT memory, and CVE-2022-38181 is related to these: malicious code can be used to add a JIT memory region to an eviction list, then create memory pressure to trigger a vulnerable eviction function, resulting in the JIT region being freed without freeing the pointer. The researcher discovered that a freed JIT region could be replaced with a fake object, which could be used to potentially free arbitrary pages and then exploit these to gain read and write access to arbitrary memory. As a final step in exploiting the vulnerability, an attacker would need to "map kernel code to the GPU address space to gain arbitrary kernel code execution, which can then be used to rewrite the credentials of our process to gain root, and to disable SELinux." The researcher reported the vulnerability to the Android security team in July 2022, along with proof-of-concept (PoC) code demonstrating how the issue can be exploited to execute code and gain root access on Pixel 6. Initially, the Android team marked the flaw "high severity," but it then informed the researcher that no patch will be released and redirected the report to the Arm team. After Arm's patch in October 2022, Google included a fix for this vulnerability in the January 2023 security update for Pixel devices.

    SecurityWeek reports: "Arm Vulnerability Leads to Code Execution, Root on Pixel 6 Phones"

  • news

    Visible to the public "Apple Patches WebKit Code Execution in iPhones, MacBooks"

    Apple's product security response team recently rolled out patches to cover numerous serious security vulnerabilities affecting users of its flagship iOS and macOS platforms. Apple warned that the most serious documented vulnerabilities affect WebKit and can expose iOS and macOS devices to code execution attacks via booby-trapped web content. On the mobile side, Apple pushed out iOS and iPadOS 16.3 with fixes for more than a dozen documented security defects in a range of operating system components. These include a trio of WebKit rendering engine bugs that expose devices to arbitrary code execution. Apple noted that the WebKit flaws also affect users of Apple's macOS Ventura, Monterey, and Big Sur operating systems. The iOS and iPadOS 16.3 update also fixes privacy and data exposure vulnerabilities in AppleMobileFileIntegrity, ImageIO, kernel, Maps, Safari, Screen Time, and Weather. Apple also rolled out macOS Ventura 13.2 with patches for about 25 documented vulnerabilities, some severe enough to cause code execution attacks.

    SecurityWeek reports: "Apple Patches WebKit Code Execution in iPhones, MacBooks"

  • news

    Visible to the public "Attacks Targeting Realtek SDK Vulnerability Ramping Up"

    Palo Alto Networks recently warned of an increase in cyberattacks targeting CVE-2021-35394, a remote code execution (RCE) vulnerability in the Realtek Jungle SDK. The vulnerability was disclosed in August 2021, and the vulnerability impacts hundreds of device types that rely on Realtek's RTL8xxx chips, including routers, residential gateways, IP cameras, and Wi-Fi repeaters from 66 different manufacturers, including Asus, Belkin, D-Link, Huawei, LG, Logitech, Netgear, ZTE and Zyxel. The company noted that the bug allows unauthenticated attackers to execute code on vulnerable devices, gaining complete control over them. The first in-the-wild attacks targeting CVE-2021-35394 were observed days after details of the bug were made public, with an estimated one million devices exposed to attacks at the time. The company noted that as of December 2022, they observed 134 million exploit attempts in total leveraging this vulnerability, and about 97% of these attacks occurred after the start of August 2022. The end goal of many of the observed attacks was malware distribution, as threat groups are targeting the flaw in large-scale attacks aimed at Internet of Things (IoT) devices, which underscores the need for organizations to ensure that these devices are properly protected. A Shodan search performed by Palo Alto Networks security researchers has revealed the existence of more than 80 different IoT device models from 14 unique vendors that have port 9034 open. The researchers discovered that D-Link devices are the most popular devices (31 models), followed by LG (8) and Belkin and Zyxel (6 each). According to Palo Alto Networks, while the impacted vendors might have released software updates to resolve the issue or mitigation recommendations for their users, many organizations continue to use vulnerable devices. To date, the researchers observed three types of attacks: a script is used to fetch malware from a remote location, an injected command directly writes the payload to a file and executes it, or an injected command is used to cause a denial-of-service (DoS) condition. Most of the observed malicious payloads are Mirai, Gafgyt, and Mozi malware variants. A Golang-based distributed denial-of-service (DDoS) botnet called RedGoBot has been distributed as well, starting in early September 2022. An analysis of the observed 134 million exploit attempts shows that 30 regions were the source of attacks, with the US leading the fray at 48.3%, followed by Vietnam at 17.8%, and Russia at 14.6%.

    SecurityWeek reports: "Attacks Targeting Realtek SDK Vulnerability Ramping Up"

  • news

    Visible to the public "Record-Breaking Year for DDoS Attacks Targeting Russia"

    According to Russia's largest internet service provider, Russian organizations were deluged with web and DDoS attacks last year in a bid to disrupt operations, deface websites, and "sow panic." Rostelecom said in a new report that in 2022 it recorded "a record-breaking DDoS attack in terms of power and duration." The most powerful attack was 760Gb/s, around twice as big as 2021's top attack. The company noted that the longest DDoS lasted 2000 hours or about three months. The company analyzed data on almost 600 companies from industries including telecoms, retail, finance, and the public sector and recorded 21.5 million web attacks in total. The vast majority (79%) of these were DDoS, although vulnerability exploitation, including SQL injection, path traversal, local file inclusion, and cross-site scripting, made up another 11%. OS command injection attacks comprised a further 10%. The company noted that most DDoS attacks used a "carpet bombing" tactic of targeting multiple IP addresses for a single organization within a short timeframe. However, after a sharp spike in attacks in the first two quarters of the year following the invasion of Ukraine, attacks apparently became more targeted and sophisticated.

    Infosecurity reports: "Record-Breaking Year for DDoS Attacks Targeting Russia"

  • news

    Visible to the public "Up to 350,000 Open-Source Projects Vulnerable to 15-Year-Old Python Bug"

    A 15-year-old Python vulnerability has impacted hundreds of thousands of open-source projects over the course of its existence. The vulnerability, tracked as CVE-2007-4559, is a path traversal flaw in the extract and extractall functions of the Python tarfile module. Trellix researchers warned that, if abused, the vulnerability could allow an attacker to overwrite arbitrary files within a TAR archive. Researchers initially believed they had uncovered a new zero-day vulnerability upon discovering the bug. However, a following study revealed that the flaw dated back to 2007. At the time, the vulnerability was thought to be of minor importance, but Trellix then revealed that it was discovered in about 350,000 open-source projects and in an undisclosed number of closed-source projects. Since the bug's discovery, Trellix stated that it had collaborated with GitHub to implement a fix. To date, about 62,000 vulnerable open-source projects have been fixed. This article continues to discuss the discovery and impact of the 15-year-old Python bug.

    ITPro reports "Up to 350,000 Open-Source Projects Vulnerable to 15-Year-Old Python Bug"