News Items

  • news

    Visible to the public "Cloud-Delivered Malware Attacks Almost Tripled in 2022"

    In 2022, the number of cloud apps used to distribute malware nearly tripled, as users were confronted with an increasingly malicious cyber threat landscape. According to research from Netskope, over 400 different cloud apps were employed to target users with malware during the year, with OneDrive being the most often abused tool by threat actors. The company warned that this surge represents a growing trend in cloud security threats. According to Netskope, the number of users uploading content to the cloud increased significantly in 2022, providing attackers with a larger pool of potential targets. Attackers perceive cloud apps as a perfect location for harboring malware and causing harm. OneDrive made up almost 25 percent of global user uploads, while Google Gmail and Microsoft SharePoint observed increases of 7 percent and 5 percent, respectively. The analysis discovered that OneDrive accounted for 30 percent of all cloud-based malware distribution, while threat actors also used Weebly and GitHub to spread malicious files. Another finding from the Cloud Threat Report showed the increasing prevalence of cloud-delivered malware versus web-based threats. In 2022, cloud apps were responsible for 48 percent of malware distribution, a 10 percent rise from the previous year, and this trend is projected to continue. As a result of the widespread move to remote and hybrid operations due to the pandemic, this trend has been amplified by the growing reliance on cloud apps and infrastructure across various industries. This article continues to discuss the rise in Cloud-delivered malware attacks.

    ITPro reports "Cloud-Delivered Malware Attacks Almost Tripled in 2022"

  • news

    Visible to the public "Zoom Patches High Risk Flaws on Windows, MacOS Platforms"

    Video messaging giant Zoom recently released patches for multiple security vulnerabilities that expose Windows and macOS users to malicious cyberattacks. The vulnerabilities in the enterprise-facing Zoom Rooms product could be exploited in privilege escalation attacks on both Windows and macOS platforms. The company's first batch of patches for 2023 includes patches for a trio of "high-severity" vulnerabilities in Zoom Room for Windows Installers, Zoom Room for Windows Clients, and Zoom Rooms for macOS Clients. The first flaw fixed (CVE-2022-36930) is a Local Privilege Escalation flaw in Zoom Rooms for Windows Installers (CVSS 8.2/10). Zoom Rooms for Windows installers before version 5.13.0 contain the local privilege escalation vulnerability. A local low-privileged user could exploit this vulnerability in an attack chain to escalate their privileges to the SYSTEM user. CVE-2022-36929, a Local Privilege Escalation flaw in Zoom Rooms for Windows Clients (CVSS 7.8/10), was also fixed. Zoom Rooms for Windows clients before version 5.12.7 contain this local privilege escalation vulnerability. A local low-privileged user could exploit this vulnerability in an attack chain to escalate their privileges to the SYSTEM user. The last flaw fixed (CVE-2022-36927) is a Local Privilege Escalation flaw in Zoom Rooms for macOS Clients (CVSS 8.8/10). Zoom Rooms for macOS clients before version 5.11.3 contain this local privilege escalation vulnerability. A local low-privileged user could exploit this vulnerability to escalate their privileges to root. Zoom also released fixes for a pair of medium-severity bugs in Zoom Rooms for macOS clients before version 5.11.4, warning that this version of the software contains an insecure key generation mechanism. Zoom also fixed a path traversal vulnerability in Zoom for Android Clients, warning that a third-party app could exploit this vulnerability to read and write to the Zoom application data directory.

    SecurityWeek reports: "Zoom Patches High Risk Flaws on Windows, MacOS Platforms"

  • news

    Visible to the public "Iowa's Largest City Cancels Classes Due to Cyberattack"

    Iowa's largest school district canceled classes for Tuesday after determining there was a cyberattack on its technology network. Des Moines Public Schools announced Monday that classes would be canceled for its 33,000 students after being "alerted to a cybersecurity incident on its technology network." The district said in a news release that it took its internet and network services offline while it assessed the situation. The school district didn't describe the nature of the attack or say whether sensitive information might have been stolen. The district will decide Tuesday afternoon whether to hold classes Wednesday. Sports and other activities were canceled at Des Moines schools Tuesday, but teams will be allowed to compete at schools outside the district.

    SecurityWeek reports: "Iowa's Largest City Cancels Classes Due to Cyberattack"

  • news

    Visible to the public "PyPI Users Targeted With PoweRAT Malware"

    Security researchers at Phylum have identified a malicious attack targeting Python Package Index (PyPI) users with the PoweRAT backdoor and information stealer. The campaign was first detected on December 22, 2022, when a malicious package named PyroLogin was identified as Python malware designed to fetch code from a remote server and execute it silently. The researchers noted that between December 28 and 31, they observed five additional packages containing code similar to PyroLogin being published to PyPI: EasyTimeStamp, Discorder, Discord-dev, Style.py, and PythonStyles. The infection chain, which involves the execution of various scripts and the abuse of legitimate operating system functions, begins with a setup.py file, meaning that the malware is automatically deployed if the malicious packages are installed using Pip. The researcher's analysis of the execution process revealed the use of obfuscation and attempts to prevent static analysis. A message claiming "dependencies" are being installed is displayed to prevent raising victims' suspicion while the malicious code is executed in the background. The researchers noted that the infection chain also includes the installation of multiple potentially invasive packages, including libraries that allow the attackers to control and monitor mouse and keyboard input, capture the screen, and dropping malicious code into the Windows startup folder for persistence. Once up and running on the victim's machine, the malware allows the attackers to steal sensitive information such as browser cookies and passwords, crypto wallets, Discord tokens, and Telegram data. The harvested information is exfiltrated in a ZIP archive. Acting as a command-and-control (C&C) client, the researchers noted that the Flask app allows the attackers to extract information such as usernames, IPs, and machine details, run shell commands, download and execute remote files, and even run arbitrary Python code. The malware, which functions as an information stealer combined with a remote access trojan (RAT), also contains a function that sends to the attackers a constant stream of images of the victim's screen and allows them to trigger mouse click and button presses. The malware is named Xrat, but Phylum decided to call it PoweRAT "because of its early reliance on PowerShell in the attack chain." The researchers noted that even if the attacker fails to establish persistence or fails to get the remote desktop utility working, the stealer portion will still ship off whatever it found.

    SecurityWeek reports: "PyPI Users Targeted With PoweRAT Malware"

  • news

    Visible to the public "Homeland Security, CISA Builds AI-Based Cybersecurity Analytics Sandbox"

    Two of the leading security agencies in the US are building a Machine Learning (ML)-based analytics environment to combat fast-evolving threats and create more robust infrastructures for both the public and private sectors. The Science and Technology Directorate research arm of the Department of Homeland Security (DHS) and the Cybersecurity and Infrastructure Security Agency (CISA) envision a multi-cloud collaborative sandbox that will serve as a training ground for government researchers to test Artificial Intelligence (AI)- and ML-based analytic methods and technologies. It will also incorporate a "loop" of automated ML through which workloads will flow. According to the agencies, the CISA Advanced Analytics Platform for Machine Learning (CAP-M) will facilitate cybersecurity problem-solving for both on-premises and cloud environments. CAP-M will have a multi-cloud environment and multiple data structures, a logical data warehouse to simplify access to all CISA data sets, and a production-like environment to promote realistic testing of vendor solutions. This platform will initially serve cyber missions, but will be adaptable and expandable to accommodate data sets, tools, and collaboration for other infrastructure security missions. The facility will be used for ongoing experimentation in various areas, including data analysis and correlation, to help organizations in adapting to the threat landscape. The data collected from the experiments would be shared with government, academic, and private organizations. The plan involves the protection of privacy and the security of the platform itself. This article continues to discuss plans surrounding the AI-based cybersecurity analytics sandbox.

    The Register reports "Homeland Security, CISA Builds AI-Based Cybersecurity Analytics Sandbox"

  • news

    Visible to the public "Hive Claims Stealing Consulate Health Data; Provider Reports Vendor Incident"

    The Hive ransomware threat group recently claimed to have stolen 550 GB of data from Consulate Health Care. The actors' dark web posting appeared around the same time a notice was posted on the company's website that warned patients of potential access to their data. The company owns 140 nursing homes across the country and also provides other senior care services. The company does not currently know the number of patients whose data may have been accessed. Consulate Health has also not confirmed whether the vendor incident is tied to the Hive posting. The company determined that one of its vendors experienced a "security incident" in early December. Threat actors targeted portions of the network, prompting incident response plans and an investigation to determine the scope. The analysis confirmed that the threat actors may have accessed records containing personal information. The company intends to notify patients as soon as they've determined whether their information was contained in the files accessed by the actors. For now, patients are being urged to "remain vigilant" and monitor for unauthorized activity.

    SC Media reports: "Hive Claims Stealing Consulate Health Data; Provider Reports Vendor Incident"

  • news

    Visible to the public "New Jersey, Ohio Join Other States in Banning TikTok From State Devices"

    New Jersey and Ohio on Monday announced that they were joining other states in banning use of the popular video app TikTok on government-owned and managed devices. New Jersey Governor Phil Murphy stated that in addition to banning the short-video app owned by Chinese technology conglomerate ByteDance from state devices, he also was banning software vendors, products, and services from more than a dozen vendors, including Huawei, Hikvision, Tencent Holdings, ZTE Corporation, and Kaspersky Lab. Wisconsin Governor Tony Evers announced last Friday that he is also planning to join other states in banning use of the popular video app that has more than 100 million U.S. users. Calls to ban TikTok from government devices gained steam after U.S. FBI Director Christopher Wray said in November that it poses national security risks. Wray flagged the threat that the Chinese government could harness the app to influence users or control their devices.

    Reuters reports: "New Jersey, Ohio Join Other States in Banning TikTok From State Devices"

  • news

    Visible to the public "Norton, Avira, Avast, AVG Affected by a Privilege Escalation Bug"

    Multiple Windows antivirus software brands under the multinational software company Gen Digital were vulnerable to a privilege escalation flaw. The vulnerability affected NortonLifelock products, including Norton Antivirus Windows ERASER Engine, Avira Security, Avast Antivirus, and AVG Antivirus. The vulnerability, tracked as CVE-2022-4294, was given a severity rating of 7.1, suggesting high severity. After initially compromising affected software, privilege escalation vulnerabilities enable attackers to obtain escalated system access. Privilege escalation vulnerabilities are attractive to attackers because they are usually required for different malicious operations. However, developers often overlook these types of vulnerabilities due to their usually low severity ratings. According to Norton, the flaw was patched in versions 22.10 of Avast and AVG Antivirus, 119.1.5.1 of Norton Antivirus ERASER Engine, and 1.1.78 of Avira Security. This article continues to discuss the privilege escalation bug that impacted several Windows antivirus software brands.

    Cybernews reports "Norton, Avira, Avast, AVG Affected by a Privilege Escalation Bug"

  • news

    Visible to the public  "Kinsing Malware Targets Kubernetes Environments via Misconfigured PostgreSQL"

    Researchers at Microsoft Defender for Cloud saw threat actors behind the Kinsing cryptojacking operation exploiting poorly configured PostgreSQL containers and using insecure images to gain initial access in Kubernetes environments. Aqua Security discovered the cryptocurrency miner Kinsing for the first time in April 2020, when threat actors were found scouring the Internet for Docker systems running Application Programming Interface (API) ports without a password. The Kinsing malware exploits Docker installations' resources in order to mine cryptocurrency. Recent observations by Microsoft researchers revealed a significant number of clusters running a PostgreSQL container infected with the Kinsing malware. According to researchers, the threat actors can leverage multiple misconfigurations to get access to an unprotected PostgreSQL server. This article continues to discuss Kinsing cryptojacking operators exploiting misconfigured and exposed PostgreSQL servers to access Kubernetes environments.

    Security Affairs reports "Kinsing Malware Targets Kubernetes Environments via Misconfigured PostgreSQL"

  • news

    Visible to the public "GitHub Makes It Easier to Scan Your Code for Vulnerabilities"

    "Default setup" is a new code scanning configuration option for GitHub repositories that allows developers to configure automatically with just a few clicks. Although the CodeQL code analysis engine, which drives GitHub's code scanning, supports various languages and compilers, the new option is only available for Python, JavaScript, and Ruby repositories. In the next six months, according to GitHub's director of product marketing, Walker Chabbott, GitHub will increase its language support. This article continues to discuss GitHub's new code scanning setup option.

    Bleeping Computer reports "GitHub Makes It Easier to Scan Your Code for Vulnerabilities"

  • news

    Visible to the public "JsonWebToken Security Bug Opens Servers to RCE"

    A high-severity vulnerability, tracked as CVE-2022-23529, has been discovered in the popular JsonWebToken (JWT) open-source encryption project. An attacker could use this flaw for Remote Code Execution (RCE) on a target encryption server. The JWT open standard specifies a technique for securely transmitting information using encoded and signed JSON data. Unit 42 of Palo Alto Networks discovered that an exploit for the vulnerability causes the server to verify a maliciously crafted JSON web token request. This vulnerability affects all JWT versions prior to and including v8.5.1. According to a January 9 statement from Unit 42, v9.0.0 is the patched version of the package. Unit 42 security researcher Artur Oleyarsh notes that vulnerabilities associated with JSON Web tokens are typically related to token forging techniques that allow an adversary to circumvent authentication and authorization procedures. This article continues to discuss findings regarding the JWT security vulnerability that leaves servers open to RCE.

    Dark Reading reports "JsonWebToken Security Bug Opens Servers to RCE"

  • news

    Visible to the public  "Identity Thieves Exploit Security Flaw to Steal Credit Reports From Experian"

    The credit reporting company Experian has experienced yet another security breach. Identity thieves obtained credit records by exploiting a security flaw on its website. KrebsOnSecurity revealed that identity thieves are exploiting the Experian website to acquire credit reports by using an individual's name, address, birthday, and Social Security number. After spending time in Telegram chat groups dedicated to exploiting compromised identities, a Ukrainian security researcher uncovered the vulnerability. Obtaining a credit report on the Experian website required answering numerous questions, but identity thieves learned they could deceive Experian into granting them access to credit reports. Access could be gained by modifying the address displayed in the browser's URL bar at a specific point during the identity verification process. This article continues to discuss identity thieves exploiting a security weakness on Experian's website to obtain credit reports and other security incidents faced in the credit reporting industry.

    SiliconANGLE reports "Identity Thieves Exploit Security Flaw to Steal Credit Reports From Experian"

  • news

    Visible to the public "New Study Uncovers Text-to-SQL Model Vulnerabilities Allowing Data Theft and DoS Attacks"

    A team of researchers from the University of Sheffield has demonstrated methods that exploit Text-to-SQL models to generate malicious code, which could enable adversaries to extract sensitive data and launch Denial-of-Service (DoS) attacks. Xutan Peng, a researcher at the University of Sheffield, stated that various database applications use Artificial Intelligence (AI) algorithms that could transform human questions into SQL queries (Text-to-SQL) to improve user interaction. However, the researchers found that crackers can trick Text-to-SQL models into producing malicious code by posing specially crafted questions. Because such code is automatically run on the database, the effects can be significant. The findings, which were confirmed against two commercial products BAIDU-UNIT and AI2sql, represent the first empirical instance of Natural Language Processing (NLP) models being used in the wild as an attack vector. This article continues to discuss findings from the study on Text-to-SQL model vulnerabilities.

    THN reports "New Study Uncovers Text-to-SQL Model Vulnerabilities Allowing Data Theft and DoS Attacks"

  • news

    Visible to the public "'Copyright Infringement' Lure Used for Facebook Credential Harvesting"

    A recently discovered extensive credential-harvesting campaign has hackers leveraging Facebook copyright infringement notices to steal enterprise credentials. According to researchers at Avanan, this latest phishing campaign sends users an email warning that because the page has uploaded a photo violating Facebook's copyright infringement policy, the account will be permanently suspended unless they click on a link to appeal the decision. This link leads not to a Meta site but to a credential-harvesting site. The researchers noted that though this email has a sender address that clearly does not come from Facebook, it's otherwise fairly believable. The researchers stated that the campaign could be aimed at any organization but would be most effective with companies that rely heavily on Facebook advertising. The researchers noted that the urgency indicated in the email could cause some to take quick action. The researchers stated that to avoid falling for this phishing campaign, people should double-check sender addresses, hover over all URLs before clicking, and log into the Facebook account directly to check the status of the account instead of clicking on the URL in the email.

    Dark Reading reports: "'Copyright Infringement' Lure Used for Facebook Credential Harvesting"

  • news

    Visible to the public "Ground-breaking Tech Finally Turns Cybersecurity's Weakest Link to Its Greatest Strength, Says Deakin University"

    In collaboration with Deakin University, the Tide Foundation has verified a new security paradigm. Tide unravels the question of "who's guarding the guardian?" and undermines the current security idea that implies safeguarding something requires heavily fortifying it, locking all entrances, and employing a guard to admit only approved individuals. The innovative Self-Sovereign-Authority technology developed by Tide enables the organization's Information Technology (IT) systems to lock highly sensitive digital assets, such as Personally Identifiable Information (PII), health data, Intellectual Property (IP), and financial information, with keys so secure that no one can access them. Not even Tide, the creator of the technology, has access. Each user's key is produced in a decentralized network using a zero-knowledge process. Through the decentralized network, users log in to the organization using a password or multi-factor authentication (MFA). A user who wants to access a critical resource logs in through Tide's decentralized network in order to change their identity into a digital authority for that specific asset. This feature is enabled by Tide's innovation in decentralized threshold multiparty cryptography. This article continues to discuss Tide's new approach to digital identity that allows users to authorize a system instead of the system authorizing the users.

    ACCESSWIRE reports "Ground-breaking Tech Finally Turns Cybersecurity's Weakest Link to Its Greatest Strength, Says Deakin University"

  • news

    Visible to the public "Dark Web Actors Fight For Drug Trafficking and Illegal Pharmacy Supremacy"

    According to new research conducted by Resecurity, the annual sale of illegal drugs on the dark web exceeded $470m in 2022. The company's new report highlights the growth of the shadow economy and new communication methods used by criminals, including proprietary Android-based mobile apps and the launch of an underground marketplace called Kraken. More specifically, the researchers suggest that following the takedown of the Hydra Marketplace by Germany's Federal Criminal Police Office in April 2022, at least 10 darknet markets have risen to fill the regional void for drugs and other illicit goods. Among these is the Kraken, which Resecurity says has already accumulated over 1720 reputable sellers and shops selling illicit goods. Most of the underground marketplaces examined by the researchers were observed primarily fighting for brand recognition. The researchers stated that they saw an increase in tensions between different influence groups behind illegal marketplaces on the dark web, as they were attacking each other, performing DDoS attacks, and trying to abuse the reputation of competitors to capture a bigger market share. The researchers noted that due to these cyber battles, several actors have moved from the now-closed Hydra to new marketplaces and have started leveraging alternative digital channels, including customized mobile apps and instant messengers like Telegram. The researchers stated that the ecosystem of drug sales on the dark web poses threats internationally, with several epicenters primarily concentrated in Eurasia and Central Asia and actively used for drug trafficking. The researchers also identified multiple drug shops on the dark web providing customers with personalized Android-based phones with pre-installed apps used for purchases, secure communications, and sending instructions to couriers. Looking forward, the researchers expect new marketplaces to emerge in 2023. The researchers stated that the law enforcement community needs to develop new ways to monitor illegal drug trades in the dark web and adjust their tactics to the dynamically changing threat landscape.

    Infosecurity reports: "Dark Web Actors Fight For Drug Trafficking and Illegal Pharmacy Supremacy"

  • news

    Visible to the public "Hackers Target Cryptocurrency Customers by Impersonating Well-Known Employee"

    Researchers from Division Seven, SafeGuard's threat intelligence division, have detailed how a threat actor targeted clients of a cryptocurrency company they partner with using a social engineering approach with a twist. The hackers pretended to be a well-known employee. Following Microsoft Security's December report on targeted attacks on the cryptocurrency industry, the investigation was initiated. Microsoft researchers reported that a threat actor, tracked as DEV-0139, was joining Telegram groups that targeted cryptocurrency investment firms. It was discovered that DEV-0139 was exploiting Telegram channels used to promote interactions between VIP clients and cryptocurrency exchange platforms to identify possible targets. According to Microsoft's assessment, the threat actor posed as a representative of another cryptocurrency investment firm and invited targets to a different chat group while pretending to request comments on the free structure used by cryptocurrency trading platforms. This information was then used to distribute a malicious Excel file, including tables detailing the fee structures of cryptocurrency exchange companies. This article continues to discuss the malicious operation in which hackers impersonated a well-known employee to target cryptocurrency customers.

    SiliconANGLE reports "Hackers Target Cryptocurrency Customers by Impersonating Well-Known Employee"

  • news

    Visible to the public "Serbian Government Reports 'Massive DDoS Attack' Amid Heightened Tensions in Balkans"

    Multiple major Distributed Denial-of-Service (DDoS) attacks have been launched against the website and Information Technology (IT) infrastructure of the Serbian Ministry of Internal Affairs, according to an announcement by the Serbian government. Belgrade said that government officials and employees from state-owned Telekom Srbija (Telecom Serbia) were able to repel the five massive attacks aimed at disrupting the IT infrastructure of the Ministry of Interior. The DDoS attacks coincide with a wave of similar occurrences attributed to Russian-supporting groups in relation to the invasion of Ukraine, although no group has claimed responsibility for the attempts to take the Serbian website and services offline. This article continues to discuss the DDoS attacks faced by the website and IT infrastructure of Serbia's Ministry of Internal Affairs and the possible motives behind these attacks.

    The Record reports "Serbian Government Reports 'Massive DDoS Attack' Amid Heightened Tensions in Balkans"

  • news

    Visible to the public "CISA Notifies Hitachi Energy Customers of High-Severity Vulnerabilities"

    The US Cybersecurity and Infrastructure Security Agency (CISA) recently published advisories to inform organizations using Hitachi Energy products about several recently addressed critical and high-severity vulnerabilities. CISA published three advisories describing security flaws in three products made by energy solutions provider Hitachi Energy. The vendor published its own advisories for the vulnerabilities in December. One CISA advisory describes five high-severity vulnerabilities in UNEM, a component of Hitachi Energy's network management system (NMS). The issues are related to encryption and user credentials, and they can be exploited to obtain sensitive information and make malicious modifications to the system. CISA noted that network access to the targeted system is required for exploitation. A different advisory was published for the impact of the same five vulnerabilities on Foxman-UN, a different product in the NMS suite. The third advisory describes three flaws affecting OpenSSL and Zlib, which are used by Hitachi Energy's Lumada Asset Performance Management (APM) product. CISA noted that the OpenSSL issues have been classified as "high severity" and they can be exploited to cause a denial-of-service (DoS) condition, while the Zlib vulnerability is "critical" and it could allow, in addition to DoS attacks, arbitrary code execution. Hitachi has released updates that should address most of the vulnerabilities, and the ones not addressed will be fixed soon. When its advisories were published, Hitachi Energy was unaware of any of the vulnerabilities being publicly disclosed or exploited for malicious purposes.

    SecurityWeek reports: "CISA Notifies Hitachi Energy Customers of High-Severity Vulnerabilities"

  • news

    Visible to the public "Air France, KLM Customers Warned of Loyalty Program Account Hacking"

    Franco-Dutch airline company Air France-KLM has recently started informing Flying Blue customers of a data breach involving their user accounts. Air France-KLM was formed in 2004 following the merger between Air France and KLM. Flying Blue is their loyalty program, also used by Aircalin, Kenya Airways, TAROM, and Transavia. Last week the company began notifying Flying Blue customers of suspicious activity on their accounts, saying that some of their personal information might have been compromised during the incident. Potentially compromised data includes names, phone numbers, email addresses, Flying Blue numbers and level, miles balance, and last transaction. According to Air France-KLM, no credit card data or payment information was exposed during the incident. The company told the impacted customers that it has locked them out of their accounts and instructed them to reset their passwords. It is currently unclear if hackers penetrated the company's systems or if the customer accounts were accessed as a result of credential stuffing attacks, which are not uncommon these days.

    SecurityWeek reports: "Air France, KLM Customers Warned of Loyalty Program Account Hacking"

  • news

    Visible to the public "Rackspace Ransomware Attack Was Executed by Using Previously Unknown Security Exploit"

    The Play ransomware group breached the Rackspace Hosted Exchange email system using the MS Exchange exploit chain recently disclosed by Crowdstrike researchers. The attack combines CVE-2022-41082, a Remote Code Execution (RCE) flaw, and CVE-2022-41080, a privilege escalation vulnerability, to get gain remote access to vulnerable MS Exchange installations. Rackspace has not disclosed whether it has paid the ransom to get the encrypted data decrypted, nor has it disclosed the sum demanded. Recent attacks by the Play ransomware group have also affected the Belgian city of Antwerp and the German hotel chain H-Hotels. In September 2022, Trend Micro researchers published the attack playbook for Play ransomware. However, it is evident that the ransomware group's initial access capabilities have been enhanced with the introduction of this new Exchange exploit chain. Rackspace highlights that Microsoft announced CVE-2022-41080 as a privilege escalation issue without noting that it was vulnerable as part of an RCE chain. When it comes to remediating vulnerabilities, a large number of enterprises lag significantly behind. This article continues to discuss the Rackspace ransomware attack, what is next for customers, and the Play ransomware gang's growing arsenal.

    Help Net Security reports "Rackspace Ransomware Attack Was Executed by Using Previously Unknown Security Exploit"

  • news

    Visible to the public "Russia-Linked Turla APT Sneakily Co-Opts Ancient Andromeda USB Infections"

    A hacking gang, believed to be the Russia-linked Turla Team, reregistered at least three domains associated with the decade-old Andromeda malware, enabling the group to deploy its own espionage and surveillance tools on Ukrainian targets. According to the cybersecurity firm Mandiant, the Turla Team Advanced Persistent Threat (APT), also tracked as UNC4210, gained control of three domains that were a part of Andromeda's now defunct command-and-control (C2) infrastructure in order to reconnect to the compromised systems. The objective was to distribute a reconnaissance tool Kopiluwak and the backdoor QuietCanary. Andromeda is a commercially available malware program that dates back to at least 2013 and attacks systems via infected USB devices. It connects to a number of domains, the majority of which have been taken offline. According to Tyler McLellan, a senior principal analyst at Mandiant, there is no connection between the Turla Team and the group responsible for Andromeda, which makes the co-opting of previously compromised devices rather unique. This article continues to discuss the Turla Team APT using C2 servers from the decade-old Andromeda malware to install reconnaissance tools and a backdoor on previously infected systems in order to target Ukrainian victims.

    Dark Reading reports "Russia-Linked Turla APT Sneakily Co-Opts Ancient Andromeda USB Infections"

  • news

    Visible to the public "Gotta Catch 'Em All: Cybercriminals Target Victims With Fake Pokémon Game"

    Cybersecurity researchers at the AhnLab Security Emergency Response Center (ASEC) in South Korea have found a phishing campaign that aims to spread malware using a fake Pokemon NFT game. ASEC discovered at least two phishing pages masquerading as a Pokemon game that distribute the NetSupport Remote Access Tool (RAT) to seize control of victims' devices. Although NetSupport RAT is a legitimate program, in the wrong hands, it can be exploited for malicious purposes, including the installation of additional malware and information extortion. ASEC noted that the threat actors could be using apps other than Pokemon to distribute malware, as was recently the case with a phishing website masquerading as an update page for SocGholish software. This article continues to discuss threat actors exploiting the popularity of the Pokemon franchise and the NFT card trading market to spread malware.

    Cybernews reports "Gotta Catch' Em All: Cybercriminals Target Victims With Fake Pokemon Game"

  • news

    Visible to the public "Malicious PyPI Packages Create Cloudflare Tunnels to Bypass Firewalls"

    Six malicious packages were discovered on the Python Package Index (PyPI), installing information-stealing and Remote Access Trojan (RAT) malware leveraging Cloudflare Tunnel to circumvent firewall rules for remote access. The malicious packages aim to steal confidential user information stored in browsers, execute shell commands, and steal typed secrets via keyloggers. The six packages were identified by the Phylum research team, which carefully watches PyPI for the emergence of new malicious campaigns. According to the researchers, these malicious extensions debuted in the package repository on December 22. The threat actors uploaded more packages until the final day of the year. All packages have been removed from PyPI. However, those who downloaded them must manually remove the infection's traces, specifically the persistence methods. The malicious packages include pyrologin, easytimestamp, discorder, discord-dev, style.py, and pythonstyles. This article continues to discuss the discovery of six malicious packages deploying information stealers on developer systems.

    Bleeping Computer reports "Malicious PyPI Packages Create Cloudflare Tunnels to Bypass Firewalls"

  • news

    Visible to the public "Hackers Can Abuse Visual Studio Marketplace to Target Developers with Malicious Extensions"

    A new attack vector aimed at the Visual Studio (VS) Code extensions marketplace could be used to upload malicious extensions masquerading as their official equivalents in order to launch supply chain attacks. Ilay Goldman, a security researcher at Aqua, stated that the technique might serve as an entrance point for an attack on numerous companies. Microsoft's marketplace for VS Code extensions enables developers to add programming languages, debuggers, and tools to the VS Code source-code editor to modify their workflows. Without a sandbox, all extensions operate with the privileges of the person who opened VS Code, which means they can install any program on a user's computer, including ransomware, wipers, and more. Aqua discovered that not only is it easy for a threat actor to impersonate a popular extension by modifying the URL, but the marketplace also permits the adversary to use the same name and extension publisher details, including the project repository information. Although the method prohibits replicating the number of installs and the number of stars, it can be used to trick developers because there are no constraints on the other identifying qualities. This article continues to discuss the abuse of the VS Code extensions marketplace to target developers with rogue extensions.

    THN reports "Hackers Can Abuse Visual Studio Marketplace to Target Developers with Malicious Extensions"

  • news

    Visible to the public “Preparing Businesses for the Quantum Era”

    Quantum computer and cryptography research has emerged as a crucial tool for digital security in order to tackle cybersecurity threats. Dr. Michele Mosca is a Combinatorics and Optimization professor at the University of Waterloo and a member of the Institute for Quantum Computing (IQC) faculty. IQC is a world-leading facility at the University of Waterloo that is not only dedicated to ground-breaking research but has also spawned more than 17 quantum companies. Mosca is researching quantum-attack-resistant cryptography for digital systems. Mosca is also the co-founder and CEO of evolutionQ, a company aimed at preparing companies for future quantum security attacks. As the quantum era approaches, threats to digital systems are close and sophisticated, so it is essential to tackle this reality head-on in order to preserve the confidentiality, integrity, and availability of virtual spaces. If systems fail or go offline abruptly, the repercussions could be disruptive and could bring an end to critical infrastructures. Mosca plans to leverage cryptography, the study of secure communication systems, to allow the use of untrusted media and entities while maintaining trust in the outcomes. Mosca's academic and business objectives in cryptography focus on establishing a robust cyber immune system as opposed to only protecting against certain known attacks. This article continues to discuss the importance of preparing businesses for the quantum era and Mosca's efforts to develop quantum-safe cybersecurity.

    The University of Waterloo reports "Preparing Businesses for the Quantum Era"

  • news

    Visible to the public "How Hackers Might Be Exploiting ChatGPT"

    The popular Artificial Intelligence (AI) chatbot ChatGPT could be exploited by threat actors to hack into target networks with relative ease. The Cybernews research team uncovered that the AI-based chatbot ChatGPT, a recently launched platform that attracted the online community's attention, might supply hackers with step-by-step instructions on how to breach websites. Researchers at Cybernews warn that the AI chatbot, while entertaining to experiment with, may also be harmful because it can provide thorough instructions on how to exploit vulnerabilities. The team attempted to identify a website's vulnerabilities using ChatGPT. The researchers asked questions and followed the chatbot's instructions to determine if it could provide a step-by-step tutorial for exploiting the vulnerabilities. For their experiment, the researchers used the "Hack the Box" cybersecurity training platform, which provides a virtual training environment and is employed by cybersecurity professionals, schools, and organizations to develop hacking skills. The team approached ChatGPT under the notion that they were conducting a penetration testing challenge in which a hack is duplicated using various tools and techniques. The chatbot answered with five basic starting points for what to look for on the website in the exploitation of vulnerabilities. By describing what they observe in the source code, researchers were able to determine which parts of the code to prioritize. They also received samples of proposed code improvements. After about 45 minutes of interacting with the chatbot, researchers were able to hack the offered website. This article continues to discuss the demonstrated use of ChatGPT as a potential assistant in hacking operations.

    Security Affairs reports "How Hackers Might Be Exploiting ChatGPT"

  • news

    Visible to the public "Grand Jury Indicts Suspects Who Hijacked Ring Cameras to Livestream Swatting Attacks"

    Two suspects have beeen charged by federal prosecutors in the Central District of California with swatting attacks that used hacked Ring cameras to livestream armed police. The attacks prompted the FBI to issue a warning regarding swatting attacks livestreamed using Ring cameras in December 2020, advising Ring camera owners to use complex passwords and enable multi-factor authentication (MFA). Ring LLC, an Amazon subsidiary, stated that unauthorized third parties took control of consumer accounts, but the company was helping victims regain access to their accounts. In addition, the smart home solutions provider worked with the FBI to detect cybercriminals and required users to enable two-factor authentication (2FA). The suspects targeted Ring users who shared the same password in order to launch swatting attacks, mock law enforcement, and livestream the encounters on social media. If convicted, the suspects may face up to five years in jail on accusations of willful access to an unauthorized computer. This article continues to discuss the indictment of suspects who allegedly used hacked Ring cameras to livestream swatting attacks.

    CPO Magazine reports "Grand Jury Indicts Suspects Who Hijacked Ring Cameras to Livestream Swatting Attacks"

  • news

    Visible to the public "NATO Tests AI’s Ability to Protect Critical Infrastructure Against Cyberattacks"

    During an international experiment on AI's ability to secure and defend systems, power grids, and other critical assets by cyber experts at the North Atlantic Treaty Organization's (NATO) Cyber Coalition 2022 event late last year, researchers found that autonomous intelligence, artificial intelligence (AI) that can act without human intervention, can help identify critical infrastructure cyberattack patterns and network activity, and detect malware to enable enhanced decision-making about defensive responses. The researchers stated that the simulated experiment saw six teams of cyber defenders from NATO allies tasked with setting up computer-based systems and power grids at an imaginary military base and keeping them running during a cyberattack. The researchers noted that if hackers interfered with system operations or the power went down for more than 10 minutes, critical systems could go offline. The differentiator was that three of the teams had access to a novel Autonomous Intelligence Cyberdefense Agent (AICA) prototype developed by the US Department of Energy's (DOE) Argonne National Laboratory, while the other three teams did not. The aim of the experiment was to test and measure AI's efficiency in collecting data and assisting teams in responding to cyberattacks against critical systems and services, along with highlighting the need for tools that improve collaboration between humans and machines to reduce cyber risk. The teams that used Argonne's AICA prototype made key observations surrounding network activity, logged events, and intrusion detection alerts, or they detected malware that enabled enhanced operator queries and automated decision-making about defensive responses. The researchers noted that all the teams were able to keep their grids online, but that wasn't the only valuable outcome. The researchers stated that they were able to see the network as AICA sees it, including relationships between attack patterns, network traffic, and target systems. Agents use this information to build a knowledge graph of the network, and that helps them better protect it. Bob Kolasky, Exiger SVP of critical infrastructure and former assistant director at the Cybersecurity and Infrastructure Security Agency (CISA), stated that the exercise shows the potential for emerging technology to be a game changer in managing risk to complex, interdependent systems. Kolasky said that National Laboratories, such as Argonne, are bringing exquisite modeling, synthetic data, and high computing power to support critical infrastructure. This will enable enhanced AI, and it will be important to test how AI is applied through operational concepts. Kolasky noted that it is exciting to see NATO testing how to apply AI for critical infrastructure protection.

    CSO reports: "NATO Tests AI's Ability to Protect Critical Infrastructure Against Cyberattacks"

  • news

    Visible to the public  "Identifying a Vulnerability in Critical Spacecraft Networks"

    When two spacecrafts have to bridge a connection in orbit, they dock, which means that the onboard computers controlling their thrusters require an unimpeded connection that cannot be interrupted for even a split second. Movement instructions must be properly synchronized and consistently given on time. Linh Thi Xuan Phan of the University of Pennsylvania, along with colleagues from NASA and the University of Michigan, discovered a significant security flaw in Time-Triggered Ethernet (TTE), an efficient communication protocol that is not only used to facilitate spacecraft-to-spacecraft connections but is also widely used in aviation and energy. TTE enables important systems, such as vehicle controls, to share hardware with non-critical systems, such as in-flight Wi-Fi, without interfering with one another. However, the team's research was the first to demonstrate that TTE's safety guarantees could be broken by electromagnetic interference, potentially causing a catastrophic failure during a simulated docking procedure. They showed that low-priority signals could be transmitted in such a way that the Ethernet cables carrying the message would cause enough electromagnetic interference to allow a malicious message to pass through switches that would ordinarily stop them. This article continues to discuss the discovery of a critical security flaw in the networking approach used in aerospace and other safety-critical systems.

    PennToday reports "Identifying a Vulnerability in Critical Spacecraft Networks"

  • news

    Visible to the public "Hackers Use Windows Error Reporting Tool to Attack Devices"

    Hackers are compromising systems by abusing the Windows Problem Reporting tool. Using a Dynamic Link Library (DLL) sideloading method, the attackers exploit WerFault.exe to load malware into the Random Access Memory (RAM) of a compromised system. The Windows executable enables the hackers to operate without raising suspicion. K7 Security Labs, an Indian Information Technology (IT) security firm specializing in antivirus and threat management solutions, discovered the malicious campaign. While the researchers were unable to identify the hackers, it is suspected that they are Chinese. Last summer, QBot malware distributors were observed using a similar attack chain, leveraging the Windows Calculator to avoid detection by security tools. This article continues to discuss the abuse of the Windows Problem Reporting tool by hackers.

    Techzine reports "Hackers Use Windows Error Reporting Tool to Attack Devices"

  • news

    Visible to the public "The FCC Wants Carriers to Notify You Sooner When There's a Data Breach"

    The Federal Communications Commission (FCC) has recently proposed rules that would improve reporting for breaches at carriers. Most notably, the move would scrap a mandatory wait of seven business days before a telecom can warn customers about a security incident. The FCC noted that hackers would have a shorter window of opportunity to abuse one's data without their knowledge. The proposal would also clarify that carriers must notify the FCC, FBI, and Secret Service of any reportable data breaches. Providers would likewise have to alert customers to inadvertent breaches, such as leaving account info exposed. The FCC is simultaneously asking for public input on whether or not breach alerts should include specific information to help people take action, such as the nature of the compromised data. The FCC stated that the existing rules are more than 15 years old and are reportedly "out-of-step" at a time when it's frequently vital to notify victims and authorities as quickly as possible. The FCC noted that, in theory, telecoms will warn users sooner and reduce the chances of identity fraud and follow-up hacks. This won't guarantee timely alerts, but it could minimize the damage for both customers and the networks' bottom line. The new proposal is also more consistent with other laws on breach reporting, particularly in states like California. The FCC is also wondering whether or not there should be a ceiling on the notification period and whether smaller carriers should get more time to report intrusions. Public comments (open 30 days after the proposal reaches the Federal Register) may help shape these rules, but there's no guarantee the end result will address every concern.

    Engadget reports: "The FCC Wants Carriers to Notify You Sooner When There's a Data Breach"

  • news

    Visible to the public "Russian Hackers Targeted U.S. Nuclear Scientists"

    According to Internet records reviewed by Reuters and five cybersecurity experts, a Russian hacking group known as Cold River targeted three nuclear research laboratories in the US this past summer. Cold River targeted the Brookhaven National Laboratory (BNL), Argonne National Laboratory (ANL), and Lawrence Livermore National Laboratory (LLNL) between August and September in 2022, when President Vladimir Putin indicated Russia would be willing to use nuclear weapons to defend its territory. These findings were made based on Internet records showing hackers creating fake login pages for each institution and emailing nuclear scientists in an attempt to steal their passwords. Since the invasion of Ukraine, Cold River has intensified its hacking campaign against Kyiv's allies, according to cybersecurity researchers and western government officials. This article continues to discuss Russian hackers targeting US nuclear scientists.

    Reuters reports "Russian Hackers Targeted U.S. Nuclear Scientists"

  • news

    Visible to the public "Cyber Attacks on UK Organizations Surged 77% In 2022, New Research Finds"

    In 2022, UK organizations faced an average of 788 weekly cyberattacks, a 77 percent increase from 2021. According to new data from Check Point, the intensity of cyber threats will increase by 38 percent compared to the previous year. In addition, the global volume of cyberattacks reached an all-time high in the fourth quarter, with an average of 1,168 attacks per organization each week. Check Point stated that this surge was mostly driven by smaller, more agile threat actors and sophisticated ransomware gangs, many of which targeted healthcare organizations, academic institutions, and private companies. The education sector was the most attacked industry in the UK in 2022. This industry experienced an average of 2,653 attacks each week, which represents a 237 percent increase compared to 2021. This article continues to discuss the significant increase in cyberattacks in the UK.

    ITPro reports "Cyber Attacks on UK Organizations Surged 77% In 2022, New Research Finds"

  • news

    Visible to the public "Many of 13 New Mac Malware Families Discovered in 2022 Linked to China"

    According to Mac security expert Patrick Wardle, more than a dozen new Mac malware families were discovered in 2022, including information stealers, cryptocurrency miners, loaders, and backdoors, many of which have been linked to China. Patrick Wardle compiled a list of the macOS malware that came to light over the course of last year. The number of new malware appears to be increasing, as only eight new families were spotted in 2021. The first malware to emerge in 2022 was SysJoker, a cross-platform backdoor used by an APT actor in targeted attacks. SysJoker, which was observed targeting an educational institution, can download and execute other malicious components. The second macOS malware, DazzleSpy, was used as part of a state-sponsored cyberespionage campaign aimed at pro-democracy activists in Hong Kong. The malware has been described as a backdoor and information stealer, and the main suspect behind these attacks is China. Another new piece of malware, which may be linked to DazzleSpy, has been named VPN Trojan (Covid), and it has been described as a persistent backdoor that can download and execute second stage payloads directly from memory. The article continues to discuss the other macOS malware that was discovered in 2022.

    SecurityWeek reports: "Many of 13 New Mac Malware Families Discovered in 2022 Linked to China"

  • news

    Visible to the public 10th Annual Best Scientific Cybersecurity Paper Winners Announced

    The tenth NSA Competition for Best Scientific Cybersecurity Paper reco

  • news

    Visible to the public "Real Vulnerability Management Goes Beyond NIST's Cybersecurity Framework"

    Skybox Security's technical director, Ed Mosquera, urges local government agencies to develop a proactive and risk-based approach to cybersecurity rather than relying solely on the National Institute of Standards and Technology's (NIST) Cybersecurity Framework, because simply being NIST compliant is not enough to keep data and networks secure. Government agencies invest much in technology to protect their systems in accordance with the NIST framework. As a result, agencies that have completed the checklist may believe they are safe, but this type of thinking leads to unnoticed vulnerabilities that can be exploited by malicious actors. The NIST compliance framework was created to help companies better understand and manage network and data risks. There are still gaps when complying with such frameworks, so they should only be one component of a security strategy. A piecemeal approach to cybersecurity based on reactive cybersecurity frameworks is now ineffective. Due to the pandemic, security teams have had to face quickly changing regulatory requirements as well as an increasingly aggressive threat landscape. A proactive, risk-based approach to cybersecurity builds a secure network architecture on top of compliance frameworks. This article continues to discuss the importance of going beyond the NIST framework and the components for successfully implementing a proactive risk-based cybersecurity strategy.

    GCN reports "Real Vulnerability Management Goes Beyond NIST's Cybersecurity Framework"

  • news

    Visible to the public "Data, Privacy, And the Future of Artificial Intelligence"

    Data privacy and protection have become increasingly important and restrictive for US and European businesses. Simultaneously, innovators at the forefront of Artificial Intelligence (AI) research are constantly seeking larger and better datasets to develop advanced technologies to solve humanity's most difficult issues. Currently, the US and China are competing as the two AI superpowers. The US is in the lead, but its advantage is declining. The importance of privacy should be balanced with future economic and national security interests. While American AI developers are bumping up against sectoral data privacy legislations, Chinese AI developers are not subject to similar constraints. In addition to having access to the world's largest population of 1.4 billion people, China's leading AI developers also benefit from legal and regulatory frameworks tailored to support Beijing's technological goals. Collectively, these regulations specify that all data generated about Chinese residents must be maintained within China's borders and must be shared with the Chinese government. This article continues to discuss the future of AI and data privacy.

    Cyber Defense Magazine reports "Data, Privacy, And the Future of Artificial Intelligence"

  • news

    Visible to the public "Survey Report Looks at How Prepared Industrial Enterprises Are for Operations Recovery Following Cyber Attacks"

    A new Industrial Cyber Magazine survey report, sponsored by Salvador Technologies, explores some specific challenges faced in planning for Operational Technology (OT) recovery and business continuity. Because of the significant contrasts between OT and Information Technology (IT) environments in the OT/ICS recovery process, 90 percent of survey respondents agreed that the OT recovery process should be owned by OT professionals rather than IT. However, 40 percent of respondents stated that IT teams manage the recovery process at their organization. According to the report, this dissonance may put OT systems at risk of costly downtime following a cyberattack. While today's IT and cloud-based solutions can restore/recover, they cannot do it fast or without human intervention. Alex Yevtushenko, CEO of Salvador Technologies, says this causes major bottlenecks and can lead to hidden costs, delays, and threats. OT/ICS cybersecurity experts are encouraged to prioritize establishing a recovery solution that is both OT-centric and can ensure operational continuity. This article continues to discuss key findings from the new Industrial Cyber Magazine survey report.

    Continuity Central reports "Survey Report Looks at How Prepared Industrial Enterprises Are for Operations Recovery Following Cyber Attacks"

  • news

    Visible to the public "Notorious Russian Spies Piggybacked on Other Hackers' USB Infections"

    In 2008, Turla, a Russian cyberespionage group, gained notoriety as the hackers behind agent.btz, a piece of malware that spread throughout the US Department of Defense's (DOD) computers via infected USB devices inserted by Pentagon employees. The same group now appears to be attempting a new variation of this approach, which involves hijacking the USB infections of other hackers in order to piggyback on their infections and choose their spying targets. Mandiant has disclosed that it discovered an incident in which Turla hackers accessed victim networks by registering the expired domains of nearly a decade-old cybercriminal malware that spread through infected USB drives. Turla was able to seize control of the malware's command-and-control (C2) servers and sift through its victims to identify those worthy of espionage targeting. This strategy allows Turla to remain undiscovered by hiding itself within the footprints of other hackers while scouring a broad assortment of networks. This article continues to discuss the Russian cyberespionage group Turla piggybacking on other hackers' USB infections.

    Wired reports "Notorious Russian Spies Piggybacked on Other Hackers' USB Infections"

  • news

    Visible to the public "Hackers Went After Personally Identifiable Information the Most, Study Says"

    According to a recent analysis conducted by Imperva, which examined the top 100 breaches from July 2021 to July 2022, hackers targeted Personally Identifiable Information (PII) 42.7 percent of the time. The Imperva study stated that of all the types of data available for cybercriminals to steal, such as credit card information, passwords, and source code, PII is the most valuable because criminals can compile more PII from the dark web to then engage in more complex fraud schemes that are harder to prevent fraud or full-on identity theft. Imperva conducted the research using publicly available web sources, breach news, hacker forums, studies of stolen database dumps, and data from its own honeypots. This article continues to discuss key findings from Imperva's analysis of 100 data breaches.

    SC Magazine reports "Hackers Went After Personally Identifiable Information the Most, Study Says"

  • news

    Visible to the public "Latest Phishing Campaign Hits Zoom Users With Malware"

    According to Cyble Research and Intelligence Labs (CRIL), IcedID malware was used in a phishing campaign targeting Zoom users. Attackers use the banking Trojan IcedID, also known as BokBot, to steal victims' banking credentials. This malware targets businesses primarily and is capable of stealing financial information. IcedID also functions as a loader, allowing it to deploy additional malware families or download additional modules. Typically, IcedID spreads by spam emails with malicious Office file attachments. However, in this campaign, the attackers used a phishing website to distribute the malware. Users were tricked into downloading the IcedID malware from the legitimate-looking phishing page that resembled the official Zoom website. This article continues to discuss threat actors using Zoom to deliver IcedID malware.

    Cybernews reports "Latest Phishing Campaign Hits Zoom Users With Malware"

  • news

    Visible to the public "User Documents Overwritten With Malicious Code in Recent Dridex Attacks on macOS"

    Security Researchers at Trend Micro have found that the cybercriminals behind the Dridex banking trojan have adopted a new tactic in recent attacks targeting macOS devices, overwriting the victim's document files to deliver their malicious code. Dridex has been active since at least 2012 and is considered one of the most prevalent financial threats. Dridex survived a takedown attempt in 2015 and remained operational after receiving various updates. In 2019, the Department of Homeland Security (DHS) warned of continuous Dridex attacks targeting financial institutions. According to the researchers, a recently observed Dridex attack targeting macOS stood out because of a novel tactic employed to disguise the malicious Microsoft Word document used for malware delivery. The researchers noted that the attackers distribute a Mach-o executable file that is designed to search for .doc files in the current user directory and write malicious macro code to all of them in plain hexadecimal dump, not in content. The researchers stated that while the macro feature in Microsoft Word is disabled by default, the malware will overwrite all the document files for the current user, including the clean files. This makes it more difficult for the user to determine whether the file is malicious since it doesn't come from an external source. The researchers explained that the malicious embedded document was not new, first observed in the wild in 2015. The analyzed Mach-o file sample was first submitted to VirusTotal in 2019. The researchers stated that analysis of the overwritten documents revealed the inclusion of an AutoOpen macro meant to call several functions with normal-looking names but which were meant to perform nefarious actions. The payload delivered by the macro was an .exe file meant to fetch the Dridex loader. While the .exe file would not run on macOS, the analyzed variant might be in testing stages and could later be converted to fully work on macOS. The researchers concluded that currently, the impact on macOS users for this Dridex variant is minimized since the payload is an exe file (and therefore not compatible with macOS environments). However, it still overwrites document files which are now the carriers of Dridex's malicious macros. Furthermore, it's possible that the threat actors behind this variant will implement further modifications that will make it compatible with macOS.

    SecurityWeek reports: "User Documents Overwritten With Malicious Code in Recent Dridex Attacks on macOS"

  • news

    Visible to the public "Social Security Numbers Stolen in Ransomware Attack on Maternal Health Org"

    Cybercriminals stole Social Security numbers and other personal information during a ransomware attack on a maternal health service organization. Cybersecurity experts informed Maternal and Family Health Services that the hackers had access to their systems as early as August 21, 2021. Maternal and Family Health Services said it was notified of the ransomware attack on April 4. The private non-profit serving Northeastern Pennsylvania stated that it has only recently begun issuing breach notification letters. The compromised information includes names, addresses, dates of birth, Social Security numbers, driver's license numbers, financial account/payment card information, usernames and passwords, medical information, and health insurance information. Included among those affected are staff, patients, and vendors. No ransomware gang has been attributed to the attack yet. Ransomware assaults on hospitals have become so common that the US Department of Health and Human Services (HHS) has created a cybersecurity page on the various ransomware activities. In an effort to help healthcare organizations protect themselves, HHS has released reports on ransomware gangs, including Royal, Cuba, Venus, Lorenz, and Hive. This article continues to discuss the ransomware attack on the maternal health organization, how the organization responded to the attack, and the growing frequency of cyberattacks on hospitals.

    The Record reports "Social Security Numbers Stolen in Ransomware Attack on Maternal Health Org"

  • news

    Visible to the public "UK Schools Hit by Mass Leak of Confidential Data"

    Confidential data from 14 UK schools have recently been leaked online by hackers following attacks that took place in 2022. The leaked documents include children's SEN information, pupil passport scans, staff pay scales, and contract details. The information was leaked after the impacted schools refused to pay the attacker's ransom demands. According to authorities, the attacks and leaks are believed to be perpetrated by the threat actor Vice Society, which has conducted numerous ransomware and extortion campaigns targeting education institutions in the UK and the US. In October 2022, the Los Angeles Unified School District (LAUSD) warned that Vice Society had begun posting data it stole from the institution. "The schools impacted by the new leak are: Carmel College, St Helens; Durham Johnston Comprehensive School; Frances King School of English, London/Dublin; Gateway College, Hamilton, Leicester; Holy Family RC + CE College, Heywood; Lampton School, Hounslow, London; Mossbourne Federation, London; Pilton Community College, Barnstaple; Samuel Ryder Academy, St Albans; School of Oriental and African Studies, London; St Paul's Catholic College, Sunbury-on-Thames; Test Valley School, Stockbridge; The De Montford School, Evesham." The education sector has been heavily targeted by ransomware in the past few years. Security researchers at Sophos discovered that in July 2022, 56% of lower education institutions had been hit by ransomware in the previous year, along with 64% of higher education bodies.

    Infosecurity reports: "UK Schools Hit by Mass Leak of Confidential Data"

  • news

    Visible to the public "Ransomware Disruption at The Guardian to Last at Least a Month"

    A ransomware attack on The Guardian at the end of 2022 will continue to cause operational issues for several more weeks, according to the company. Hackers conducted a cyberattack against The Guardian on December 20, forcing the London-based newspaper's owner, the Guardian Media Group, to order staff to work from home. However, a new internal note from the group's CEO, Anna Bateson, sent at the start of the new year, warned of more disruption to come. According to the CEO, as a result of the steps they took to secure their network, a number of key systems have been taken offline and remain unavailable. The CEO noted that to reduce strain on their networks and help the enterprise tech, ESD, and other involved teams focus on the most essential fixes, everyone must work from home until at least Monday, January 23, in the UK, US, and Australia. That will make it around a month after the attack struck that staff, including journalists, will be forced to work remotely. It is unclear what internal systems are impacted and if the threat actors were able to steal any data before being discovered. The report noted that Wi-Fi systems at the groups' headquarters were knocked out, while it appears as if customer service phone lines are also affected. So far, no threat group has claimed responsibility for the attack or posted data to a leak site.

    Infosecurity reports: "Ransomware Disruption at The Guardian to Last at Least a Month"

  • news

    Visible to the public "Space Race: Defenses Emerge as Satellite-Focused Cyberattacks Ramp Up"

    The US National Institute of Standards and Technology (NIST) and the MITRE Corporation have both released frameworks to help companies and government organizations develop defenses against attacks aimed at satellites and spacecraft. The FBI and the US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) warned early in 2022 that attacks against satellite ground-based and space-based infrastructure might become a reality, and they did so shortly thereafter. In 2022, there were nation-state operations aimed at Viasat and SpaceX's Starlink satellites, prompting governments and aerospace firms to develop defenses. In the early days of Russia's invasion of Ukraine, Russia-aligned hackers targeted the ground-based component of Viasat's satellite communications network, knocking Internet modems across Europe offline. According to government authorities and SpaceX CEO Elon Musk, Russia soon after also targeted the distributed satellite Internet provider Starlink, which has been essential for supporting Ukraine with Internet connectivity. Advanced Persistent Threats (APTs) sponsored by nation-states are more likely to be the cyberattackers in this domain. However, a significant portion of today's ground-based satellite infrastructure uses common computer and communications technology. The similarities make it easier for attackers to exploit the systems underlying satellite systems, while the complex supply chain makes the infrastructure more vulnerable to attack. This article continues to discuss cyberattacks on the space sector's infrastructure and efforts to bolster the security of this infrastructure.

    Dark Reading reports "Space Race: Defenses Emerge as Satellite-Focused Cyberattacks Ramp Up"

  • news

    Visible to the public "Bitdefender Releases Free MegaCortex Ransomware Decryptor"

    The antivirus company Bitdefender has released a decryptor for the MegaCortex ransomware family, allowing victims of the gang to restore their data for free. Bitdefender analysts and professionals from Europol, the NoMoreRansom Project, and the Zurich Public Prosecutor's Office and Cantonal Police collaborated to develop the decryptor. The decryptor is a standalone executable that does not require installation and provides the option to automatically locate encrypted files on the victim's system. In addition, the decryptor can create a backup copy of the encrypted files in case something goes wrong during decryption and renders the files unrecoverable. Those who have previously attempted to decrypt their files with varying degrees of success can use the new decryptor's advanced setting to replace them with uncorrupted versions. In May 2019, Sophos researchers identified the MegaCortex ransomware, observing it attacking corporate networks alongside QBot, Emotet, and Cobalt Strike. This article continues to discuss the decryptor created for MegaCortex victims and the history of the ransomware family.

    Bleeping Computer reports "Bitdefender Releases Free MegaCortex Ransomware Decryptor"

  • news

    Visible to the public  "Blind Eagle Hackers Return with Refined Tools and Sophisticated Infection Chain"

    Blind Eagle, a financially driven threat actor, has reemerged with a sophisticated toolkit and a complex infection chain as part of its attacks against Colombian and Ecuadoran organizations. Check Point's latest research provides new insights into the tactics, techniques, and procedures (TTPs) of the Spanish-speaking gang, such as the employment of sophisticated tools and government-themed tricks to activate the kill chain. Blind Eagle, also known as APT-C-36, is noted for its limited geographic focus and indiscriminate attacks targeting South American countries since at least 2018. Trend Micro documented Blind Eagle's activity in September 2021, uncovering a spear-phishing campaign that spread BitRAT, a commodity malware, mostly to Colombian businesses, with a minor focus on Ecuador, Spain, and Panama. This article continues to discuss new findings surrounding the Blind Eagle's tools and infection chain.

    THN reports "Blind Eagle Hackers Return with Refined Tools and Sophisticated Infection Chain"

  • news

    Visible to the public "Cloud-Native Application Adoption Puts Pressure on AppSec Teams"

    Oxeye released five predictions about what will influence enterprise security spending in 2023. The industry-wide analysis shows that the industry is moving away from outdated software infrastructure and standardizing on cloud-native applications, thus requiring new and more effective approaches to cloud-native application security. In the next 12 months, cloud-native application development will surpass traditional, monolithic application development. A growing number of vulnerabilities that cross microservices and traverse the infrastructure layer will have an impact on container-based distributed systems. Application security is now affected by the underlying cloud infrastructure, and cloud security professionals must now include the application layer in their analysis of attack paths. This article continues to discuss predicted trends that will shape enterprise spending in 2023.

    Help Net Security reports "Cloud-Native Application Adoption Puts Pressure on AppSec Teams"