News Items

  • news

    Visible to the public "Los Angeles Housing Authority Says Cyberattack Disrupting Systems"

    The Housing Authority of the City of Los Angeles (HACLA) has announced that it has fallen victim to a cyberattack after appearing on the LockBit ransomware group's leak site. A spokesperson for the agency stated that the agency is working with third-party specialists to determine the source of the disruption, confirm its impact on its systems, and securely restore full functioning to the environment. HACLA is one of the largest and oldest public housing authorities in the US. The agency has a budget of more than $1 billion per year and houses more than 19,000 families in the city. This is the second significant cyberattack on a Los Angeles agency, following the attack on the Los Angeles Unified School District (LAUSD) in September 2022. Since LAUSD is the country's second-largest school district, the incident grabbed the attention of the White House, and both the FBI and the US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) were involved in response efforts. The LockBit ransomware group said on December 31 that it had stolen 15 TB of data and gave HACLA until January 12 to pay the demanded ransom. LockBit has previously attacked housing authorities. The group claimed it targeted the Chattanooga Housing Authority in November 2022, although local officials never confirmed the attack. This article continues to discuss the cyberattack on HACLA and the LockBit ransomware group claiming responsibility for the attack.

    The Record reports "Los Angeles Housing Authority Says Cyberattack Disrupting Systems"

  • news

    Visible to the public "Nashville Hospital Hit by Data Breach"

    A Howard County hospital is the latest Arkansas healthcare provider to announce a data security breach that could put patients and employees at risk. Howard Memorial Hospital, located in the city of Nashville, became aware of suspicious network activity on Dec. 4. An investigation discovered the potential for files to be stolen by an "unknown actor" between Nov. 14 and Dec. 4. The hospital employs 250 employees and sees about 10,000 emergency department visits annually. The healthcare system, which includes outpatient clinics, had a gross revenue of $76 million during the 2021 fiscal year. Hospital Administrative Director Sandy Webb said the breach originated outside the hospital. Details on how the data theft was discovered, the number of files affected, and the potential financial impact was not immediately available. Information potentially stolen could include the patient's name, contact information, date of birth, social security number, health insurance information, medical record number, medical history, diagnosis, treatment, and physician name. Employee's records stolen could include name, contact information, date of birth, social security number, and bank account information. The U.S. Department of Health and Human Services Office for Civil Rights is required by law to post a public list of breaches of unsecured protected health information affecting 500 or more individuals. In 2022, the department reported four previous hacking or information technology incidents for healthcare providers in Arkansas. The four breaches accounted for 490,868 individuals affected this year. The breaches happened at Mena Regional Health Care System, Independent Case Management, Magie Mabrey Hughes Eye Clinic, and ARcare. ARcare saw the largest breach, with 345,353 individuals affected. Nationally, there have been 22 million individuals affected by hackers hacking healthcare providers' networks during 2022.

    Arkansas Democrat Gazette reports: "Nashville Hospital Hit by Data Breach"

  • news

    Visible to the public "Chinese 'RedZei' Group Batters Victims With Incessant Vishing Effort"

    Chinese threat actors have been targeting Chinese-speaking students in the UK with a novel phone scam aimed at stealing their personal information via repeated phone calls and voicemails that are difficult for victims or carriers to reject. Will Thomas, a cybersecurity researcher, disclosed that a gang dubbed RedZei or RedThief calls victims once or twice per month from a unique UK-based phone number, leaving an unusual automated voicemail message if the recipient does not answer. Thomas has been tracking the campaign for over a year and has developed a profile of the threat actors based on the calls and voicemails. He stated that it is difficult to prevent subsequent attempts to compromise victims once they have been targeted by the scam, which uses social engineering to obtain personal information from students. RedZei uses a new pay-as-you-go UK-based phone number from one of the major mobile network operators for each wave of scam calls, he explained. This renders blocking the crooks' phone numbers practically ineffective. Phone-based scams, also known as vishing, are not new among cybercriminals. In an attempt to scam victims, threat actors have been known to use entire call centers to make fraudulent robocalls, mimicking banks and other trustworthy businesses. In another variation, criminals have used emails or other Internet-based contact methods to encourage victims to call a fake "tech support" line, where their personal information is taken for malicious purposes. The RedZei campaign employs some similar strategies, but adds its own spin to the vishing scam. It has used well-known companies, such as the Bank of China or China Mobile (CMLink), in socially engineered campaigns designed to trick students into divulging their personal information. This article continues to discuss the new RedZei campaign targeting Chinese-speaking students in the UK.

    Dark Reading reports "Chinese 'RedZei' Group Batters Victims With Incessant Vishing Effort"

  • news

    Visible to the public "Russia's Wartime Cyber Operations in Ukraine: Military Impacts, Influences, and Implications"

    A paper from the Carnegie Endowment for International Peace (CEIP) 'Cyber Conflict in the Russia-Ukraine War' series examines the military effectiveness of Russia's wartime cyber operations in Ukraine, the reasons why these operations have not had a greater strategic impact, and the lessons that can be applied to other nations' military cyber efforts. It expands upon prior research by adopting a more systematic and comprehensive approach and including a broader range of publicly available data. Each Carnegie expert examined a different aspect of the cyber conflict. This study seeks to bridge the gap between cyber-specific and general military assessments of the Russia-Ukraine conflict. Most analyses of Russian cyber activities in Ukraine have been released by cyber specialists writing for their own field, with limited incorporation of non-cyber military sources and concepts. In contrast, leading narratives of the war make little mention of cyber activities. The paper fills the void by situating Russian cyber operations in Ukraine within the context of Moscow's larger military objectives, campaigns, and kinetic activities. According to the paper, Russia's disruptive or damaging cyberattacks may have contributed to Moscow's initial invasion, but they have caused negligible harm to Ukrainian targets since then. Another point raised is that such cyberattacks have not significantly enhanced Russia's kinetic capabilities. This article continues to discuss some key points made in a new paper on Russia's wartime cyber operations in Ukraine.

    HSToday reports "Russia's Wartime Cyber Operations in Ukraine: Military Impacts, Influences, and Implications"

  • news

    Visible to the public "Bitcoin Core Developer Loses $3.6M After Claimed Hack"

    Luke Dashjr, one of bitcoin's core developers, stated in a series of tweets that he had lost his BTC holdings. Although the exact amount of stolen cryptocurrency is unknown, he disclosed an address where 217 BTC, or around $3.6 million at current values, had been moved. Dashjr revealed that an unidentified party had gained access to his Pretty Good Privacy (PGP) key, an encryption system that uses a public-private key pair to protect information. Since his keys were hacked, everything he had signed with them, including cryptocurrency wallets, could also have been compromised. PGP keys are often used to encrypt messages between a sender and a recipient, as well as sign software to show that it has not been tampered with. Although he claimed not to know how the attacker gained access to his keys, the community suspects that one of his servers may have been infected with malware. Dashjr also urged Bitcoin Knots wallet users to double-check their installation, since it may be using his compromised PGP keys. He warned that the current Knots download could not be relied upon until the matter is resolved. He noted that Bitcoin Core was secure since it was signed by a different entity. Dashjr suggests that an attacker may insert malware or malicious code into Bitcoin Knots and conceal the activity by signing it with his compromised PGP key. This would make it appear as though he had complied and prepared the code, and that the download was legitimate. This article continues to discuss a bitcoin core developer losing millions of dollars in BTC due to hacking.

    SiliconANGLE reports "Bitcoin Core Developer Loses $3.6M After Claimed Hack"

  • news

    Visible to the public "Critical Vulnerabilities Patched in Synology Routers"

    Taiwan-based networking and storage solutions provider Synology has recently informed customers about the availability of patches for several critical vulnerabilities, including flaws likely exploited recently at the Pwn2Own hacking contest. The company published two new critical advisories in late December. One of the advisories describes an internally discovered vulnerability affecting Synology VPN Plus Server, which turns routers into an advanced VPN server. The company noted that the security hole, tracked as CVE-2022-43931, is an out-of-bounds write issue in the remote desktop functionality of VPN Plus Server. It can allow a remote attacker to execute arbitrary commands. The second advisory describes multiple vulnerabilities impacting the Synology Router Manager (SRM), the operating system that powers the firm's routers. The company noted that the flaws can be exploited for arbitrary command execution, denial-of-service (DoS) attacks, and reading arbitrary files. The SRM advisory credits several people and companies for reporting the vulnerabilities. The issues were disclosed through Trend Micro's Zero Day Initiative (ZDI). This suggests that the vulnerabilities were demonstrated at the Pwn2Own Toronto 2022 hacking contest, which took place December 6-9.

    SecurityWeek reports: "Critical Vulnerabilities Patched in Synology Routers"

  • news

    Visible to the public "Ransomware Attack Forces Canadian Mining Company to Shut Down Mill"

    Canadian Copper Mountain Mining Corporation (CMMC) recently shut down its mill after falling victim to a ransomware attack. Listed on the Toronto Stock Exchange, the firm owns most of the Copper Mountain mine. Located in southern British Columbia, the mine produces an average of 100 million pounds of copper equivalent per year. The company fell victim to a ransomware attack on December 27, 2022. Because of the ransomware attack, the company has isolated operations, switched to manual processes, where possible, and the mill has been preventatively shut down to determine the effect on its control system. The company stated that it implemented risk management systems and protocols immediately after discovering the cyberattack and that the relevant authorities are assisting with the investigation. The company noted that there had been no safety or environmental incidents due to the attack. The company has not yet shared information on the type of ransomware used in the attack nor how the attackers breached its systems. According to a BleepingComputer report, stolen credentials might have been used for intrusion. Earlier in December, credentials belonging to a CMMC employee account were being offered for sale on a hacker portal.

    SecurityWeek reports: "Ransomware Attack Forces Canadian Mining Company to Shut Down Mill"

  • news

    Visible to the public "The Security System of the Future – Electronic Devices Could Use 'Logic Locks' To Fend Off Malicious Attacks"

    Future electronic products may incorporate enhanced security mechanisms into their circuitry to fight against malicious attacks. Researchers from King Abdullah University of Science and Technology (KAUST) have revealed how protective "logic locks" based on the field of spintronics might be placed into the integrated circuits of electronic chips to protect chip security. KAUST's Yehia Massoud notes that the requirement for hardware-based security features reflects the nature of today's electronics production. Electronics businesses typically use big, external, specialized foundries to manufacture their chips, which reduces costs but raises the possibility of supply chain vulnerabilities. An untrusted foundry could unlawfully copy the circuit design for the production of counterfeit chips, or the design could be maliciously modified by the incorporation of "hardware Trojans" that alter its behavior in some way. According to Divyanshu Divyanshu, a Ph.D. student at Massoud's labs, security methods such as logic locking are now widely employed to build confidence in the globalized integrated circuit manufacturing chain. To protect chip security, the group developed an integrated circuit logic lock based on a Magnetic Tunnel Junction (MTJ). Logic locking functions like a combination lock, explains Divyanshu. Unless the lock receives the correct "key" combination signal, the circuit's operation is scrambled. The lock's keys are stored in memory that cannot be altered, ensuring hardware security against several threat scenarios. This article continues to discuss the integrated circuit logic lock designed by the KAUST researchers aimed at protecting electronic devices from cyberattacks.

    SciTechDaily reports "The Security System of the Future - Electronic Devices Could Use 'Logic Locks' To Fend Off Malicious Attacks"

  • news

    Visible to the public "BitRAT Campaign Relies on Stolen Sensitive Bank Data as a Lure"

    Researchers at Qualys discovered a new malware campaign distributing the BitRAT Remote Access Trojan (RAT) via phishing emails involving stolen bank information. BitRAT is a relatively new threat that has been advertised on underground marketplaces and forums for $20 since February 2021. The RAT facilitates data exfiltration, payload execution with bypasses, Distributed Denial-of-Service (DDoS) attacks, keylogging, webcam recording, credential theft, and more. While analyzing various BitRAT lures, the researchers found that a threat actor had likely gotten access to client data by hijacking the Information Technology (IT) infrastructure of a cooperative bank in Columbia. The attackers then used bait, including sensitive financial data, to convince victims to install malware. The researchers determined that the threat actors had access to a database holding 4,18,777 rows of sensitive consumer data, including Columbian national ID numbers, email addresses, phone numbers, customer names, payment records, salaries, home addresses, and other information. The threat actors exported the data through weaponized Excel maldocs and employed them in phishing emails designed to persuade recipients to open the file. After the file is opened and the macro is enabled, a second-stage Dynamic Link Library (DLL) payload is downloaded and run. The second-stage DLL uses different anti-debugging techniques, retrieves the RAT, and executes BitRAT on the host. This article continues to discuss the new BitRAT malware campaign.

    Security Affairs reports "BitRAT Campaign Relies on Stolen Sensitive Bank Data as a Lure"

  • news

    Visible to the public "Crooks Monitor Twitter Complaints to Target Users via Phishing"

    Recent research by Cyble Research and Intelligence Labs reveals that fraudsters monitor user complaints on Twitter in order to target Indian citizens. The team witnessed scammers looking at Twitter for potential complaints in order to obtain information from victims. The Indian Railway Catering and Tourism Corporation (IRCTC) is involved in a similar scheme. Similarly, threat actors search Twitter for complaints about the IRCTC to collect user contact information and then make direct contact with potential victims. After extracting information, the fraudsters act as IRCTC customer service agents and request sensitive information, such as the Train PNR number, order number, refund amount, and payment method. Even if the victim is unable to provide the requested information, fraudsters could still employ a variety of techniques to steal money. The scammers were spotted sending SMS messages with an activation code and requesting that victims forward it to a certain number. Additionally, they would want personal information, such as the UPI payment app used. According to the researchers, criminals can then link the victim's mobile number or account to their own device using UPI. This article continues to discuss the phishing scheme involving the monitoring of Twitter complaints that is targeting Indian citizens.

    Cybernews reports "Crooks Monitor Twitter Complaints to Target Users via Phishing"

  • news

    Visible to the public "Security Teams Expect Breach and Incident Reporting Requirements to Create More Work"

    According to Deepwatch, most Information Technology (IT) security professionals will concentrate on enhancing their detection and response capabilities despite rising costs and regulatory challenges. The research identified digital transformation activities and regulatory requirements as the top two cost factors for 2023. Seventy-eight percent of security professionals expect that breach and incident reporting requirements would raise their teams' workload, while 77 percent expect that privacy rules will do the same. In addition, 78 percent of security professionals are concerned about the expense of cyber insurance. Thirty-nine percent said it is currently too expensive, and another 39 percent stated that while they believe cyber insurance gives value now, that will not be the case if prices increase further. Ninety-five percent of security professionals identify ongoing difficulties with staffing, and 82 percent have or are contemplating managed services. This article continues to discuss key findings from Deepwatch's year-end report on the state of security operations as well as expected challenges and strategies for 2023.

    Help Net Security reports "Security Teams Expect Breach and Incident Reporting Requirements to Create More Work"

  • news

    Visible to the public "Ransomware Impacts Over 200 Government, Education, Healthcare Orgs in 2022"

    According to the cybersecurity firm Emisoft, ransomware attacks affected more than 200 larger organizations in the US public sector in the government, educational, and healthcare verticals in 2022. Data collected from publicly available reports, disclosure statements, leaks on the dark web, and third-party intelligence suggest that hackers stole data in nearly half of these ransomware attacks. According to available data, the ransomware threat impacted 105 counties, 44 universities and colleges, 45 school districts, and 24 healthcare providers in the US. Emisoft presented these statistics to emphasize that not all victims disclose such events, and some may have gone unnoticed by the researchers. Therefore, the figures in the year-end report on the condition of ransomware in the US should be regarded as conservative, as they cannot be used to accurately build a trend. Incidents involving the public sector are more likely to be disclosed, allowing for more consistent data. As a result, the researchers believe that this information could point to ransomware activities in the private sector. This article continues to discuss key findings from Emisoft's report on the state of ransomware in the US.

    Bleeping Computer reports "Ransomware Impacts Over 200 Government, Education, Healthcare Orgs in 2022"

  • news

    Visible to the public "PyTorch Machine Learning Framework Compromised with Malicious Dependency"

    Following a dependency confusion attack, the PyTorch package maintainers have advised users who installed nightly editions of the library between December 25, 2022, and December 30, 2022, to remove and download the most recent versions. PyTorch-nightly Linux packages installed via pip during the affected time period installed a dependency, "torchtriton," which was compromised on the Python Package Index (PyPI) code repository and executed a malicious binary, the PyTorch team said. Similar to Keras and TensorFlow, PyTorch is an open-source Python-based Machine Learning (ML) framework that was originally developed by Meta Platforms. The PyTorch team reported learning about the malicious dependence on December 30. The supply chain attack involved uploading a malware-infected version of the legitimate dependency torchtriton to the PyPI code repository. Since package managers such as pip look for a package in public code registries like PyPI before private registries, the fraudulent module was installed on users' systems rather than the true version obtained from the third-party index. The malicious variant is designed to steal system information, such as environment variables, the current working directory, and the host name. This article continues to discuss the compromise of the PyTorch ML framework with a malicious dependency.

    THN reports "PyTorch Machine Learning Framework Compromised with Malicious Dependency"

  • news

    Visible to the public "Researchers Develop a Device That Can Use Wi-Fi To See Through Walls"

    A team of University of Waterloo researchers developed a drone-powered device that can see through walls using Wi-Fi networks. Wi-Peep is a device that can fly close to a building and then use the inhabitants' Wi-Fi network to identify and locate Wi-Fi-enabled devices inside. The Wi-Peep device exploits a vulnerability referred to as polite Wi-Fi. Smart devices will automatically respond to contact attempts from any device within range, even if the network is password protected. According to the team, Wi-Peep sends several signals to a device as it flies and then measures the response time to determine the device's location within one meter. Dr. Ali Abedi, an adjunct professor of computer science at Waterloo, compares the Wi-Peep device to lights in the visible spectrum and the walls to glass. One might follow security guards' movements inside a bank by tracking the location of their phones or smartwatches, using similar technology. A criminal could also determine the position and type of smart devices in a home, such as security cameras, laptops, and smart TVs, to find a suitable candidate for a home invasion. Furthermore, because the device is operated via a drone, it can be used quickly and remotely without the user being detected. Although Wi-Fi security vulnerabilities have been explored before using large, expensive devices, the Wi-Peep stands out due to its accessibility and mobility. Abedi's team built the Wi-Peep device with a store-bought drone and $20 worth of hardware. This article continues to discuss the research and testing behind the Wi-Peep device that brings further attention to Wi-Fi vulnerabilities.

    SciTechDaily reports "Researchers Develop a Device That Can Use Wi-Fi To See Through Walls"

  • news

    Visible to the public "Ransomware Ecosystem Becoming More Diverse for 2023"

    In 2022, the ransomware ecosystem shifted, with attackers transitioning from large groups that once dominated the threat landscape to smaller Ransomware-as-a-Service (RaaS) operations for greater flexibility and less attention from law enforcement. This democratization of ransomware is bad news for companies since it has led to increased diversity in tactics, methods, and procedures (TTPs), more indicators of compromise (IOCs) to monitor, and more challenges to overcome when negotiating or paying ransoms. The DarkSide attack on Colonial Pipeline in 2021, which resulted in a major disruption of fuel supply along the US East Coast, highlighted the risk that ransomware attacks pose to critical infrastructure. This incident increased efforts by the highest levels of government to combat this threat. This boosted attention from law enforcement prompted the operators of underground cybercrime forums to reassess their ties with ransomware groups, with some forums prohibiting the promotion of such threats. DarkSide discontinued operations shortly thereafter, followed by REvil, also known as Sodinokibi. Russia's invasion of Ukraine in February 2022 strained the relationships of numerous ransomware groups with members and affiliates in both Russia and Ukraine, as well as other former Union of Soviet Socialist Republics (USSR) nations. This article continues to discuss the future of the ransomware ecosystem. The top active ransomware gangs to watch in 2023 include LockBit, Hive, Black Basta, Royal, and Vice Society.

    CSO Online reports "Ransomware Ecosystem Becoming More Diverse for 2023"

  • news

    Visible to the public  "Cyber Ranges Bolster IoT Security"

    The Government Accountability Office (GAO) released a report identifying government challenges to standardized security evaluations for Internet of Things (IoT) devices and Operational Technology (OT) devices. However, according to Joel Bagnal, director at the security company SpyCloud, state and local governments are required not to wait for federal guidance, as they can gain the upper hand by establishing more cyber ranges. In recent years, cyber ranges have risen in importance, with state-level ones opening in Louisiana, Virginia, and more. They primarily train cybersecurity professionals through hands-on labs and realistic exercises. Bagnal stated that increasing the number of ranges available to state and local governments would help officials in understanding the vulnerabilities of IoT and OT devices and learning to control the risk. He emphasized that a cyber range allows security staff to observe vulnerabilities being exploited and then learn how to apply this firsthand knowledge to their own network. Bagnal pointed out that the Idaho National Laboratory (INL) has a section devoted to critical infrastructure protection and IoT device security research, and is beginning to give recommendations for reducing vulnerabilities. The National Initiative for Cybersecurity Education (NICE) also published a guide on how cyber ranges can be used for education and training, stating that they are a crucial tool for closing the skills gap and securing society. This article continues to discuss the importance of setting up more cyber ranges to bolster cybersecurity for IoT and OT devices.

    GCN reports "Cyber Ranges Bolster IoT Security"

  • news

    Visible to the public "New Version of HITRUST CSF Helps Healthcare Tackle Emerging Cybersecurity Threats"

    HITRUST will release version 11 of its Cybersecurity Framework (CSF) in January with new and enhanced features for dealing with growing cybersecurity threats and minimizing certification efforts. HITRUST can help healthcare organizations bolster their security postures and manage third-party risk. The HITRUST CSF is a risk- and compliance-based framework seeking to provide structure and advice across several data privacy and security regulations and standards, thereby reducing enterprise burden and complexity. In particular, CSF version 11 will provide enhanced control mappings and precision to cut certification efforts by 45 percent. In addition, the new version allows the complete HITRUST assessment portfolio to use cyber threat-adaptive controls suitable for each level of assurance. The next version will include more authoritative sources, such as the National Institute of Standards and Technology (NIST) SP 800-53, Rev 5, and the Health Industry Cybersecurity Practices (HICP) standards. HITRUST also created Artificial Intelligence (AI)-based standards development tools to help its assurance experts map and maintain authoritative sources. This AI-based toolbox will save maintenance and mapping efforts by up to 70 percent, according to HITRUST. CSF version 11 enables a single framework within the HITRUST CSF to provide an approach that covers broad assurance needs for various risk levels and compliance requirements with greater assurance reliability than alternative assessment options. This article continues to discuss the new version of the HITRUST CSF that will help healthcare organizations combat cybersecurity threats.

    HealthITSecurity reports "New Version of HITRUST CSF Helps Healthcare Tackle Emerging Cybersecurity Threats"

  • news

    Visible to the public "2023 Workforce Predictions: Lack of Talent Will Haunt Firms as Leadership Comes Under Scrutiny"

    The skills gap in cybersecurity that has plagued the security community for several years will not close soon. Eighty percent of firms suffered at least one data breach in the past year due to a lack of cybersecurity talent or awareness, according to research. As of July 2022, there are more than 700,000 unfilled cybersecurity posts in the public sector. The inability to recruit and retain sufficient talent to fight against a large volume of attacks would leave the public sector extremely vulnerable in 2023. In order to address the expanding cyber skills gap, the public sector must boost compensation packages to minimize talent loss to well-paid professions in the private sector and increase worker diversity. According to Cathy Grossi, vice president of product management at Accela, governments will leverage technology to overcome workforce shortages in 2023. Smart agencies will rely on data exchange to maximize their use of available resources. Governments can automate end-to-end procedures that span many departments or agencies, as well as leverage digital technologies such as chatbots, Machine Learning (ML), smart algorithms, and natural language processing to create processes that free up personnel for other duties. This article continues to discuss experts' insights and predictions regarding the cybersecurity workforce for 2023.

    SC Media reports "2023 Workforce Predictions: Lack of Talent Will Haunt Firms as Leadership Comes Under Scrutiny"

  • news

    Visible to the public "War and Geopolitical Conflict: The New Battleground for DDoS Attacks"

    As Russian ground soldiers prepared to enter Ukraine in February 2021, Ukrainian government agencies, online media companies, banking institutions, and hosting providers were bombarded with Distributed Denial-of-Service (DDoS) attacks. The use of DDoS attacks to achieve geopolitical advantage is not new, but the increasing frequency of these operations is significant. According to Netscout's most recent "DDoS Threat Intelligence Report," there were over 6 million DDoS attacks in the first half of 2022, the majority of which were connected to national or regional conflicts. In April 2022, the frequency of DDoS attacks against Ukraine stabilized, but cyberattacks against Ukraine's perceived allies increased. This is likely due to the migration of Ukrainian Internet properties to countries such as Ireland, since the instability of the intra-Ukrainian Internet drove numerous network parts to rely on connectivity in other nations. Internet-wide echoes of this conflict continue to reverberate. India suffered a considerable rise in DDoS attacks in March 2022 as a result of its abstentions from UN Security Council and General Assembly votes denouncing Russian actions in Ukraine. Similarly, Belize saw its biggest number of DDoS attacks during the first half of the year on the same day that it issued public declarations in favor of Ukraine. Finland, a neighboring neighbor of Russia, reported a 258 percent rise in DDoS attacks year-over-year, together with its declaration to apply for NATO membership. This article continues to discuss the growth in DDoS stemming from war and geopolitical as well as the need for organizations to implement organized DDoS defenses.

    Dark Reading reports "War and Geopolitical Conflict: The New Battleground for DDoS Attacks"

  • news

    Visible to the public "WordPress Security Alert: New Linux Malware Exploiting Over Two Dozen CMS Flaws"

    A previously undiscovered strain of Linux malware is targeting WordPress sites by exploiting vulnerabilities in over two dozen plugins and themes to infiltrate vulnerable systems. New research from Doctor Web finds that malicious JavaScript code is injected into targeted web pages if the sites employ outdated versions of add-ons. Therefore, when consumers click on any part of an infected page, they are redirected to other websites. The attacks entail weaponizing known security flaws in 19 plugins and themes that are likely installed on a WordPress website, and deploying an implant that can target a specific website in order to grow the network. It can also inject JavaScript code received from a remote server in order to redirect site users to a website of the attacker's choosing. Doctor Web reported discovering a second variant of the backdoor, which employs a new command-and-control (C2) domain and an updated list of vulnerabilities affecting 11 additional plugins, bringing the total to 30. Both variants are believed to have an unimplemented technique for brute-forcing WordPress administrator credentials. However, it is unclear whether this is a remnant from an earlier version or a future feature. WordPress users are advised to keep all platform components, including third-party plugins and themes, up-to-date. In order to secure their accounts, it is also recommended that they use strong, unique login passwords. This article continues to discuss the latest findings regarding the new Linux backdoor malware targeting WordPress websites.

    THN reports "WordPress Security Alert: New Linux Malware Exploiting Over Two Dozen CMS Flaws"

  • news

    Visible to the public "Poland Warns of Pro-Kremlin Cyberattacks Aimed At Destabilization"

    According to Poland's security agency, since the beginning of the war between Russia and Ukraine, Poland has been a regular target of pro-Russian hackers. The agency states that cyberattacks against Polish government systems, private businesses, media organizations, and residents have increased during the past year. Poland's strategic, energy, and military sectors are particularly at risk. According to Polish cybersecurity officials, these attacks are Russia's response to Poland's support for Ukraine and an attempt to destabilize the country. Killnet, a group of pro-Kremlin hackers, declared "war" on Ukraine's allies, including Poland, in early May. In July, Killnet disabled the primary Polish government websites. Microsoft researchers found a coordinated ransomware campaign targeting the transportation and logistics industries in Ukraine and Poland in October. Officially, these attacks were linked to the Russian hacker group known as Iridium. Poland's security agency attributed the November attack on the Polish parliament to the pro-Russian group NoName057(16). After the Polish parliament labeled Russia a "state sponsor of terrorism," the gang allegedly attacked its website. Russia uses cyberattacks, including ransomware, Distributed Denial-of-Service (DDoS) attacks, and phishing campaigns in response to other countries' "unfavorable and inconvenient" actions for the Kremlin. This article continues to discuss points from Poland's security agency's new statement on pro-Kremlin cyberattacks on the country.

    The Record reports "Poland Warns of Pro-Kremlin Cyberattacks Aimed At Destabilization"

  • news

    Visible to the public "LockBit Apologized for the Attack on the SickKids Pediatric Hospital and Releases a Free Decryptor"

    The LockBit ransomware group has issued an official apology for its attack on the Hospital for Sick Children (SickKids) and released a free decryptor for the hospital. The group is known to prohibit its affiliates from attacking healthcare organizations. Its policy prohibits encrypting the systems of companies whose failure could result in the deaths of humans. The gang claimed that one of its affiliates violated its rules by attacking SickKids, so it has blocked them. According the gang, the decryptor it has published is a Linux/VMware ESXi decryptor. The attack on the Hospital for Sick Children in Toronto, Canada occurred on December 18, 2022. The hospital is the largest pediatric healthcare facility in Canada and is located on University Avenue in Toronto, Ontario. Multiple network systems at the hospital were affected by the incident, but according to the healthcare organization, patient care was unaffected. This article continues to discuss the ransomware attack on the pediatric health center and the LockBit ransomware group releasing a decryptor to the hospital for free.

    Security Affairs reports "LockBit Apologized for the Attack on the SickKids Pediatric Hospital and Releases a Free Decryptor"

  • news

    Visible to the public "Ransomware Gang Cloned Victim's Website to Leak Stolen Data"

    The operators of the ALPHV ransomware, also known as BlackCat ransomware, have created a copy of a victim's website in order to publish stolen data on it. The ALPHV group is known for experimenting with new extortion techniques to shame and coerce victims into paying the demanded ransom. Although these approaches may not be effective, they create an ever-growing threat landscape for victims to face. On December 26, the threat actor revealed on their data leak website that they had compromised a financial services company. As the victim did not comply with the threat actor's demands, BlackCat publicized all the stolen files as a punishment, which is a common tactic employed by ransomware operators. As a variation from the standard procedure, the hackers chose to release the data on a website that resembles the victim's in terms of appearance and domain name. The hackers did not preserve the site's original headings. They instead used their own titles to categorize the compromised information. The cloned website is hosted on the clear web to ensure that the stolen files are widely accessible. It presently displays memos to workers, payment forms, employee information, information on assets and expenses, financial data for partners, passport scans, and more. There are 3.5 GB of documents in all. ALPHV also uploaded the stolen data to an anonymous file-sharing service and posted the link on its leak website. This article continues to discuss the new tactic used by the ALPHV ransomware gang.

    Bleeping Computer reports "Ransomware Gang Cloned Victim's Website to Leak Stolen Data"

  • news

    Visible to the public "Attackers Never Let a Critical Vulnerability Go to Waste"

    GreyNoise Intelligence has released new research that examines the past 12 months' most notable threat detection events in depth. Bob Rudis, vice president of research and data science at GreyNoise Intelligence, stated that when it comes to cybersecurity, not all vulnerabilities are created equal, and many that gain public attention often turn out not to be significant. Researchers have provided insights into the celebrity vulnerability hype cycle for its 2022 report, with a breakdown of CVE-2022-1388, an F5 Big-IP iControl REST Authentication Bypass, how hard attackers will work to never let a critical vulnerability go to waste by looking at the depth and breadth of CVE-2022-26134, a critical weakness in Atlassian Confluence, and the impact of the US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) catalog releases on defenders. According to the report, there will be an increase in daily, persistent Internet-facing exploit attempts, post-initial access internal attacks, and headline-grabbing Log4j-centric attacks. This article continues to discuss key findings and insights from GreyNoise Intelligence's new research report.

    Help Net Security reports "Attackers Never Let a Critical Vulnerability Go to Waste"

  • news

    Visible to the public "Cybersecurity for Investors: Why Digital Defenses Require Good Governance"

    Hacker attacks and data breaches have put cybersecurity and data protection at the top of most companies' agendas. As a digitally driven world grapples with the need for more secure defenses, investors must face governance challenges and expanding economic threats. Cybersecurity and data security is a major concern in many industries. Companies must constantly examine their defenses and preparation in order to help limit the damage of a possible attack as threats evolve. Public declarations of preparedness often exaggerate the real amount of defenses in place. Despite companies' awareness, many investors do not place a strong priority on cybersecurity. Experts believe this is a mistake, especially given the importance of governance issues in the Environmental, Social, and Governance (ESG) focus. Unprepared businesses suffer financial losses, penalties, and reputational damage, which can undermine a company's image, compromise a stock, and more. Diana Lee, Director of Corporate Governance and an ESG Analyst for the Responsible Investment team at AllianceBernstein, talked to cybersecurity experts from various fields and explored the regulatory landscape to offer investors criteria for assessing cyber risk management. This article continues to discuss the costs of escalating attacks, the biggest challenges for companies, how investors can evaluate cyber risk management, and strategies for complex threats.

    Harvard Law School Forum on Corporate Governance reports "Cybersecurity for Investors: Why Digital Defenses Require Good Governance"

  • news

    Visible to the public "ECE Faculty Develops Inventive Cybersecurity Technology, Wins Best Paper at International Conference"

    Mohamed "Aly" El-Hadedy, assistant professor of electrical and computer engineering at California State Polytechnic University, Pomona, was a member of a team whose innovative cybersecurity solution won Best Paper at the 2022 IEEE International System-on-Chip (SoC) Conference (IEEE SOCC). At the conference in Belfast, Northern Ireland, researchers from around the world presented their findings on the SoC technology. Laptops, smartphones, autonomous vehicles, and many other technologies use SoC. It is anticipated that by 2030, the number of Internet of Things (IoT) devices will exceed 25 billion, posing a significant cybersecurity threat. In response, the National Institute of Standards and Technology (NIST) launched a global competition to design a lightweight cryptographic solution for protecting IoT devices. Aly and his colleagues released "RECO-HCON: A High-Throughput Reconfigurable Compact ASCON Processor for Trusted IoT," suggesting a solution to the issue of inadequate cybersecurity in high-performance computing clusters connected to the same network or the Internet. Their proposed technique includes the secure exchange of data while drastically reducing processing power. Aly, colleagues from the University of Illinois Urbana-Champaign, and academics from Changhai Jiao Tong University developed a crypto-processor that is between 100 million and one billion times smaller than the ordinary smartphone. The processor also consumes a trivial amount of power. This article continues to discuss the inventive cybersecurity solution proposed by the team.

    California State Polytechnic University, Pomona reports "ECE Faculty Develops Inventive Cybersecurity Technology, Wins Best Paper at International Conference"

  • news

    Visible to the public "Online Fraudsters Can Be Identified by Their Mouse Movements"

    By attempting to perpetrate fraud, online fraudsters can be identified. An international research team led by Professor Markus Weinmann of the Cologne Institute for Information Systems (CIIS) at the University of Cologne conducted the study. The researchers discovered that, on average, the mouse movements of fraudsters were longer and slower than those of honest individuals. The chance of fraud can thus be calculated as users enter data. Since the costs of online fraud are often passed on to all consumers, detecting fraudulent users early on can result in lower insurance premiums for honest users. The study, titled "The path of the righteous: using trace data to understand fraud decisions in real time," was published in the journal MIS Quarterly by Markus Weinmann (University of Cologne), Joe Valacich (University of Arizona), Christoph Schneider (IESE Business School), Jeff Jenkins (Brigham Young University), and Martin Hibbeln (University of Duisburg-Essen). The team studied whether online fraudsters could be differentiated from honest users based on trace data, which is real-time data such as mouse movements or click-streams. Professor Weinmann mentioned that they have been working on trace data and consumer behavior for ten years. An earlier study examined the relationship between mouse cursor motions and emotion recognition. The scientists analyzed the behavior of fraudsters by examining trace data, conducting two controlled experiments in which participants performed various tasks. Participants were permitted to commit fraud for monetary benefit. While doing the tasks, the team documented the mouse movements. The results indicate that, on average, dishonest participants were substantially slower and had greater variations in their mouse movements than honest users. According to Weinmann, greater fraud increases movement deviations and decreases movement speed. The studies concluded that fraudsters deviated 20-42 percent more and moved the mouse 15-26 percent more slowly than honest users. This article continues to discuss the study on identifying online fraudsters based on their mouse movements.

    The University of Cologne reports "Online Fraudsters Can Be Identified by Their Mouse Movements"

  • news

    Visible to the public  "The Digital Future Requires Making 5G Secure"

    Fifth-generation (5G) technology is expected to deliver the high-speed, low-latency wireless infrastructure required for the "smart" era. According to some predictions, fifty percent of all global data traffic will be created during the next five years by connected devices that do not require human participation. However, for the promise to become a reality, the connecting networks must be safe. A new report from the Brookings Institution evaluates the 5G promise, its cybersecurity problems, and the policy considerations required to realize the 5G promise. The report concludes that, as China and Europe advance their 5G initiatives, an American emphasis on network security will accelerate 5G adoption and generate a competitive edge for US enterprises abroad and at home. Such goals can be attained by applying well-known cybersecurity approaches, a federal oversight program that eschews regulatory micromanagement in favor of a light-but-frequent evaluation of 5G cyber risk mitigation operations, and adequate government funding. 5G wireless networks improve the efficiency and capabilities of the communications infrastructure to make room for a new generation of services, but they also open up new security holes that put the networks and the people who use them at risk. The first 5G vulnerability is that network tasks previously performed by purpose-built hardware are now virtualized in hackable software. Using software running on general-purpose computers to construct a network boosts capabilities and reduces costs, but introduces new vulnerabilities. Previously, networks ran on proprietary hardware and software that provided targeted security against threats. Moving additional functions to hackable software disaggregated from a purpose-built network appliance has opened up new attack vectors for 5G networks. This article continues to discuss key points made in the new Brookings report on 5G security.

    The Brookings Institution reports "The Digital Future Requires Making 5G Secure"

  • news

    Visible to the public "Taking a Closer Look at Blockchain Security"

    Blockchain's high level of security attracts users, notably in the financial sector. However, its security is contingent on the integrity of more than half of its network, which several causes can alter. Ning Zhang, assistant professor of computer science and engineering at the McKelvey School of Engineering at Washington University in St. Louis, will use a four-year, $360,000 grant from the National Science Foundation (NSF) to develop novel blockchain defense strategies. In particular, Zhang and his lab will explore the effects of clustered power in large mining pools, heterogeneous network connectivity, and malicious peer-to-peer network link manipulation on fundamental blockchain security, as well as the difficulty of establishing a trustworthy external data feed. In order to investigate the security and fairness of the blockchain, the team will create new models and analyses of consensus methods, network connection, and other aspects. The models will help them in developing a quantitative understanding of the system under different network connectivity configurations. Additionally, they will research the use of trusted computing to combat network attacks against the blockchain. This article continues to discuss the study aimed at developing defense mechanisms for the blockchain.

    Washington University in St. Louis reports "Taking a Closer Look at Blockchain Security"

  • news

    Visible to the public "How SASE Promotes DevSecOps Adoption"

    The Cornell Policy Review has provided an analysis of how Secure Access Service Edge (SASE) can promote DevSecOps adoption. DevSecOps is a software development approach that integrates development, security, and operations throughout the development lifecycle. It eases communication among previously separate teams in order to break down silos and ensure security is emphasized throughout all phases. This methodology allows teams to shift security to the left. The goal is to detect security problems before they enter production, so that teams may collaborate to remedy them while they are still simple and inexpensive to fix. DevOps teams generally transition to DevSecOps by including security throughout all pipeline phases. SASE is a network architectural framework that centralizes cloud-native security technologies as well as Wide Area Network (WAN) capabilities. It delivers an end-to-end solution for securely connecting endpoints, systems, and users to services and applications in any place. SASE is a framework, not a specific technology. It can be used to consolidate a number of technologies, such as Secure Web Gateways (SWGs), Cloud Access Security Brokers (CASBs), Firewall-as-a-Service (FWaaS), and Zero Trust Network Access (ZTNA). The concept is to use the technology required to support agile operations from a single location. This article continues to discuss DevSecOps, SASE, and how SASE promotes DevSecOps adoption.

    Cornell University reports "How SASE Promotes DevSecOps Adoption"

  • news

    Visible to the public "These Are the Drones You're Looking For: Improved Design, Detection, Navigation, Cyberdefense"

    Some teams at the Stevens Institute of Technology are engaged in the physical and digital defense of drones. The head of the Safe Autonomous Systems (SAS) lab, Jafarnejad Sani, who joined Stevens in 2019, predicts that as drones become an increasingly important part of modern engineering, delivery services, and homeland security, physical and remote cyberattacks against them will become more prevalent. Sani and his team focus on cybersecurity, programming situational intelligence and awareness into networked drone formations and systems. His lab is equipped with an indoor flying range, a Vicon motion-capture camera system, and computation stations for the design, testing, and verification of both aerial and ground robots. Sani and Stevens Ph.D. candidate Mohammad Bahrami recently conducted proxy tests to identify stealthy adversaries for networked Unmanned Aerial Vehicles (UAVs) using several quadrotors in the SAS lab. Sani received funding from the National Science Foundation (NSF) in April 2022 to advance his work on attack-resistant vision-guided drones in partnership with a team from the University of Nevada, Reno. He explains that they will use control theory and Machine Learning (ML) tools to identify and defend against cyberattacks, with a focus on high-dimensional visual data. They will also develop novel detection, isolation, and recovery algorithms to help UAV fleets defend against and recover from hacks and cyberattacks. This article continues to discuss efforts being made at the Stevens Institute of Technology to improve the cybersecurity of drones.

    Stevens Institute of Technology reports "These Are the Drones You're Looking For: Improved Design, Detection, Navigation, Cyberdefense"

  • news

    Visible to the public "Infostealer Malware Threat Grows as MFA Fatigue Attacks Spread"

    According to research conducted by the Cyber Threat Intelligence team at Accenture, infostealer malware grew in underground criminal networks in 2022, while multi-factor authentication (MFA) fatigue attacks increased. Infostealers are malicious software packages aimed at stealing sensitive information, including passwords, from victims. In an MFA fatigue attack, an attacker bombards a user's MFA device, generally a smartphone, with login approval requests. The goal is to exhaust the user so that they finally accept a login request to stop the notifications. Researchers have discovered that cybercriminals have expanded their infostealer malware variants to capitalize on demand, citing an increase in compromised credential marketplaces and a move toward private sales for quality logs. Timothy Morris, the chief security advisor at Tanium, believes that infostealer malware is booming because extortion is thriving. Extortion is more profitable and easier than ransomware. He explained that most people associate extortion with holding company data hostage or threatening to release stolen data during or after a ransomware attack, which is typical of second-level extortion. The third level consists of threats to release the data of individuals or entities contained inside the exfiltrated data. He noted that the third level of extortion can be reached by simply taking information, which infostealer software excels at. Morris stated that the same abilities and infrastructure used to create and operate a banking Trojan may be repurposed for use in an infostealer malware campaign. This article continues to discuss infostealer malware and MFA fatigue attacks.

    Security Boulevard reports "Infostealer Malware Threat Grows as MFA Fatigue Attacks Spread"

  • news

    Visible to the public "2023 Workforce Predictions: Lack of Talent Will Haunt Firms as Leadership Comes Under Scrutiny"

    The skills gap in cybersecurity that has plagued the security community for several years will not close soon. Eighty percent of firms suffered at least one data breach in the past year due to a lack of cybersecurity talent or awareness, according to research. As of July 2022, there are more than 700,000 unfilled cybersecurity posts in the public sector. The inability to recruit and retain sufficient talent to fight against a large volume of attacks would leave the public sector extremely vulnerable in 2023. In order to address the expanding cyber skills gap, the public sector must boost compensation packages to minimize talent loss to well-paid professions in the private sector and increase worker diversity. According to Cathy Grossi, vice president of product management at Accela, governments will leverage technology to overcome workforce shortages in 2023. Smart agencies will rely on data exchange to maximize their use of available resources. Governments can automate end-to-end procedures that span many departments or agencies, as well as leverage digital technologies such as chatbots, Machine Learning (ML), smart algorithms, and natural language processing to create processes that free up personnel for other duties. This article continues to discuss experts' insights and predictions regarding the cybersecurity workforce for 2023.

    SC Media reports "2023 Workforce Predictions: Lack of Talent Will Haunt Firms as Leadership Comes Under Scrutiny"

  • news

    Visible to the public "Nearly 50% Of Phishing Attacks in 2021 Aimed at Government Employees Were Attempted Credential Theft"

    Lookout's 2022 Government Threat Report shows that mobile phishing and device vulnerability risk is rising among US government agencies. In 2021, nearly half of all phishing attacks against government personnel would target employee credentials, up from 30 percent in 2020. Government agencies store and send various types of sensitive data, the protection of which is critical to the welfare of hundreds of millions of people. A breach of a government institution that results in the disclosure of sensitive information, the theft of credentials, or the forced disruption of activities due to ransomware can have a disproportionately large impact compared to a usual cybersecurity incident. In order to accommodate a bigger remote workforce, the federal, state, and local governments have increased their reliance on unmanaged mobile devices by 55 percent between 2020 and 2021, signaling a shift toward a Bring Your Own Device (BYOD) model. One out of every eight government employees was exposed to phishing attacks. With over two million federal government employees alone, this constitutes a substantial potential attack surface, as a single successful phishing attempt is sufficient to infect an entire agency. From 2020 to 2021, mobile phishing encounter rates for state and local governments on both managed and unmanaged devices increased by 48 percent and 25 percent, respectively. Through the first half of 2022, this steady ascent persisted. The sophistication of threat actors is increasing, with 16 percent of phishing attacks seeking to deliver malware. Nearly 50 percent of state and local government employees use outdated Android operating systems, leaving them vulnerable to many device vulnerabilities, but this is an improvement from 99.9 percent in 2021. This article continues to discuss key findings from Lookout's 2022 Government Threat Report.

    VB reports "Nearly 50% Of Phishing Attacks in 2021 Aimed at Government Employees Were Attempted Credential Theft"

  • news

    Visible to the public "Ransomware Attacks on Healthcare Organizations on the Rise"

    From 2016 to 2021, ransomware attacks on healthcare delivery organizations increased, exposing the Protected Health Information (PHI) of roughly 42 million patients, according to a report published online by JAMA Health Forum on December 29. Hannah T. Neprash, Ph.D., of the University of Minnesota in Minneapolis, and colleagues quantified the frequency and characteristics of ransomware attacks on healthcare delivery organizations using data from the Tracking Healthcare Ransomware Events and Traits database from 2016 to 2021 in a cohort study. From January 2016 to December 2021, the researchers discovered that 374 ransomware attacks on US healthcare delivery firms exposed the PHI of millions of patients. From 2016 to 2021, the annual number of attacks climbed by more than twice, from 43 to 91. In 44.4 percent of ransomware attacks, the delivery of healthcare was affected. Electronic system outages, cancellations of scheduled care, and ambulance diversion were common types of disruptions. During the studied period, ransomware attacks on health delivery companies increasingly affected major organizations with several facilities, exposed more patients' PHI and were connected with greater delays or cancellations of scheduled services. This article continues to discuss trends in ransomware attacks on US hospitals, clinics, and other healthcare delivery organizations.


    Medical Xpress reports "Ransomware Attacks on Healthcare Organizations on the Rise"

  • news

    Visible to the public "Data Breaches Could be Even More Expensive in 2023"

    Security researchers at Acronis have claimed that data breaches could be even more expensive next year. The researchers collected data from more than 750,000 unique endpoints, distributed worldwide, and now estimate that the average cost of a data breach will hit $5 million by next year. To make matters even worse, the researchers expect the number of breaches to increase significantly. The researchers stated that threats from malicious and phishing emails rose by 60% year-on-year. Social engineering attacks rose in the last four months of the year and now account for roughly 3% of all attacks. The researchers also found that leaked or stolen passwords and other credentials were the triggers for almost half of all reported cybersecurity incidents in H1 2022. In the third quarter of the year, the proportion of phishing attacks against malware attacks increased by 1.3 times, and now make up more than three-quarters (76%) of all email attacks (up from 58% in the first half of the year). The researchers stated that the majority of the victims of phishing attacks were located in the United States, but businesses in Germany and Brazil were also heavily targeted. Endpoints in South Korea, Jordan, and China, were the biggest malware targets.

    TechRadar reports: "Data Breaches Could be Even More Expensive in 2023"

  • news

    Visible to the public "The Password Isn't Dead Yet. You Need a Hardware Key"

    Earlier this year, Cloudflare was one of hundreds of targets in a criminal phishing campaign that successfully breached a number of technology organizations. While some Cloudflare employees fell for the phishing emails, the attackers were unable to penetrate further into the company's infrastructure. As part of Cloudflare's security methods, all employees are required to use a physical security key when logging into all applications. Following the incident, Cloudflare announced a partnership with the hardware authentication token manufacturer Yubikey to provide Cloudflare clients with discounted keys. Cloudflare was not the only organization that valued the security offered by hardware tokens. Apple recently announced hardware key support for Apple IDs. The Vivaldi browser has also introduced Android hardware key support. As Cloudflare did, several big platforms and corporations have encouraged hardware key adoption and made their staff use them for years. However, this recent rise in interest and implementation is a response to the proliferation of digital threats. Hardware authentication is secure, as the key must be physically possessed and produced. This means that an online phisher cannot simply persuade someone into giving up their password, or even a password plus a second-factor code, in order to gain access to a digital account. This article continues to discuss the concept of hardware authentication and why its implementation would be beneficial to digital security.

    Wired reports "The Password Isn't Dead Yet. You Need a Hardware Key"

  • news

    Visible to the public "Code-Generating AI Can Introduce Security Vulnerabilities, Study Finds"

    According to a new study, software developers that employ code-generating Artificial Intelligence (AI) systems are more likely to introduce security flaws into the applications they write. The report from Stanford University-affiliated researchers exposes the potential risks of code-generating systems as vendors such as GitHub begin pushing them. Neil Perry, a Ph.D. candidate at Stanford and co-author of the paper, emphasized that code-generating systems are not a replacement for human coders. Developers who use them to complete assignments outside of their area of expertise should be concerned, and those who use them to speed up tasks for which they are already proficient should double-check the outputs and context. The Stanford study focused on Codex, the AI code-generation system created by the San Francisco-based research lab OpenAI. The researchers recruited 47 developers, ranging from undergraduate students to industry experts with years of programming experience, to use Codex to solve security-related challenges in programming languages such as Python, JavaScript, and C. Compared to a control group, study participants who had access to Codex were more likely to create inaccurate and "insecure" programming solutions when using Codex. Furthermore, they were more likely than the control group to claim that their insecure solutions were secure. Megha Srivastava, a Stanford graduate student and the study's second co-author, emphasized that the findings do not completely condemn Codex and other code-generating systems. For one, the study participants lacked the security skills that would have enabled them to properly identify code vulnerabilities. Srivastava believes that code-generating systems are dependable for low-risk activities, such as exploratory research code, and that their coding suggestions could be enhanced through fine-tuning. This article continues to discuss the research on the possibility of code-generating AI introducing security vulnerabilities into applications.

    TechCrunch reports "Code-Generating AI Can Introduce Security Vulnerabilities, Study Finds"

  • news

    Visible to the public "What Is Multi-Factor Authentication (MFA) Fatigue and How Do You Defend Against Attacks?"

    Multi-factor authentication (MFA) is a commonly employed security approach that requires the usage of two or more distinct authentication factors to verify the user's identity. Inadvertently, as MFA has become more prevalent in the commercial world, it has become more vulnerable to abuse by cybercriminals due to MFA fatigue. MFA is more secure than a username and password alone since it adds a second authentication layer, and it's increasingly necessary for platforms ranging from online banking to enterprise applications. MFA is more secure than not using it as all, but the process might be tiresome for users who previously just required a username and password stored in a password manager. Every time a user attempts to log in to their bank, online productivity suite, or work email, the user must accept the login attempt, which could be considered a laborious and frustrating task. This is the opportunity that cybercriminals try to exploit. A hacker attempting to get access to a user's account can send a push notification to their smartphone by submitting a username and password. These credentials can be obtained through various methods, such as by searching lists of alphanumeric combinations kept in a dictionary, guessing passwords, or using real credentials stolen via insider leaks, theft, or phishing. When the right username and password are entered, the push notification is activated. In a brute-force attack, malicious automated systems make numerous attempts, each of which generates a push notification. This is done with the expectation that the victim "approves" out of fatigue. The cybercriminal relies solely on the victim to authenticate the login attempt. Even though some users will be vigilant at all times, hackers just require a small percentage of users to gain access. In the end, MFA fatigue attacks depend on user error. This article continues to discuss the MFA fatigue attacks and how to defend against them.

    ITPro reports "What Is Multi-Factor Authentication (MFA) Fatigue and How Do You Defend Against Attacks?"

  • news

    Visible to the public "Adobe, Apple, Cisco, Microsoft Flaws Make Up Half of KEV Catalog"

    In November 2021, the US Cybersecurity and Infrastructure Security Agency (CISA) published the Known Exploited Vulnerabilities Catalog to help federal agencies and critical infrastructure organizations identify and remediate vulnerabilities that are actively being exploited. CISA, between January to the end of November 2022, added 548 new vulnerabilities to the catalog across 58 updates. Including the approximately 300 vulnerabilities added in November and December 2021, CISA listed approximately 850 vulnerabilities in the first year of the catalog's existence. Security researchers at Grey Noise discovered that actively exploited vulnerabilities in Microsoft, Adobe, Cisco, and Apple products accounted for over half of the updates to the KEV catalog in 2022. A little over three-quarters, or 77%, of the updates to the KEV catalog, were older vulnerabilities dating back to before 2022. The researchers noted that many were published in the previous two decades. CISA updates the KEV catalog only if the vulnerability is under active exploitation, has an assigned CVE, and there is clear guidance on how to remediate the issue. In 2022, the researchers noted that enterprise defenders had to deal with an update to the KEV catalog on an almost weekly basis, as a new alert was typically issued every four to seven days.

    Dark Reading reports: "Adobe, Apple, Cisco, Microsoft Flaws Make Up Half of KEV Catalog"

  • news

    Visible to the public "Linux Backdoor Malware Infects WordPress-Based Websites"

    The Information Technology (IT) security solutions vendor Dr. Web has identified Linux malware that compromises WordPress-based websites. It exploits 30 flaws in various plugins and themes for this platform. If websites use outdated versions of such add-ons, the targeted web pages are injected with malicious JavaScript code. When consumers click on any part of an infected page, they are sent to other websites. Cybercriminals have been targeting WordPress-powered websites for many years. Experts in information security have documented instances in which numerous WordPress platform vulnerabilities are exploited to compromise websites and introduce malicious code. The investigation performed by Dr. Web's researchers on a recently discovered Trojan application revealed that it might be the tool that cybercriminals have been employing for more than three years to carry out such attacks and profit from traffic resales. According to Dr. Web's anti-virus categorization, this malware is dubbed "Linux.BackDoor.WordPressExploit.1" and targets 32-bit versions of Linux. It can potentially operate on 64-bit versions. Attackers remotely control the backdoor. It is capable of attacking a specified website, entering standby mode, shutting off, and pausing action logging. The Trojan's main function is to hijack websites that use the WordPress Content Management System (CMS) and inject a malicious script into their web pages. It accomplishes this by exploiting known vulnerabilities in WordPress plugins and website themes. Before attacking, the Trojan contacts its command-and-control (C2) server and obtains the address of the site to be infected. Then the backdoor attempts to exploit vulnerabilities in outdated plugins and themes. This article continues to discuss findings regarding the Linux backdoor malware infecting WordPress-based websites.

    Dr. Web reports "Linux Backdoor Malware Infects WordPress-Based Websites"

  • news

    Visible to the public "Ireland to Examine Twitter Data Breach That May Affect 400M+ Users"

    Ireland's privacy regulator has declared that it will investigate a recently discovered data leak that could affect over 400 million Twitter users. The Data Protection Commission (DPC) is already probing the company for an earlier data breach. In the latter incident, which occurred in November, hackers leaked the personal information of 5.4 million Twitter users. Earlier this month, there were reports that the personal information of more than 400 million Twitter users had been made available on a hacker forum. The hacked data reportedly includes the names, phone numbers, usernames, follower counts, and account creation dates of the impacted users. The hacker responsible for the attack requested $200,000 in exchange and deletion of the data. Additionally, the hacker made the data of over 1,000 users public. According to reports, the users include politicians, celebrities, and other public figures. Reportedly, a vulnerability in one of Twitter's Application Programming Interfaces (APIs) was exploited to steal the data. The bug in the API was caused by a flaw in software released in 2021, which allowed hackers to discover the phone numbers and email addresses associated with certain Twitter accounts. This article continues to discuss Ireland launching an investigation of the recent Twitter data breach.

    SiliconANGLE reports "Ireland to Examine Twitter Data Breach That May Affect 400M+ Users"

  • news

    Visible to the public "Netgear Fixes a Severe Bug in Its Routers"

    Multiple Wi-Fi router models, including Wireless AC Nighthawk, Wireless AX Nighthawk (Wi-Fi 6), and Wireless AC router models, were affected by a flaw that Netgear has now addressed. The company stated that the vulnerability is a pre-authentication buffer overflow vulnerability and recommended that consumers update their devices' firmware immediately. An attacker can exploit this flaw without authorization or user interaction. This vulnerability is often exploited by threat actors to cause a Denial-of-Service (DoS) condition or to execute arbitrary code on susceptible devices. The company included a list of fixes for the specific product models. This article continues to discuss the high-severity bug affecting multiple Wi-Fi router models that have now been addressed by Netgear.

    Security Affairs reports "Netgear Fixes a Severe Bug in Its Routers"

  • news

    Visible to the public "More Machine IDs, Attacks on Providers and AI Verification -- Identity Management Predictions for 2023"

    Although the complete replacement of passwords has been prophesied for many years, earlier identity-verification methods continue to persist. However, this is changing, namely due to the exponential development of machine IDs. Some industry professionals have provided their forecasts for the identification industry in 2023. Shira Shamban, co-founder and CEO of Solvo, expects an identity-centric security model. In tandem with the emergence of a data-centric approach to security, an identity-centric paradigm will develop. When infrastructures were completely on-premises in the past, the network served as the security perimeter. In the cloud-native era of today and with the proliferation of Application Programming Interfaces (APIs), it is necessary to have strong Identity and Access Management (IAM) practices throughout the entire organization, creating a unique identity not only for each employee but also for the specific cloud components, such as containers, serverless functions, and data resources. Maintaining a state with the least privileges on a large scale will become increasingly important. Michael Mumcuoglu, CEO and co-Founder of CardinalOps, believes that identity providers will be the target of an increasing number of attacks. In addition to SolarWinds-style attacks on software vendors and attacks on Managed Security Service Providers (MSSPs) aimed at downstream consumers, identity providers such as Okta, OneLogin, and Microsoft Active Directory will be targeted by other attacks. Once an attacker has gained access to these systems, they may effortlessly impersonate employees, boost their privileges, and remain practically undetectable. Consequently, it is essential for enterprises to ensure that they are continually checking logs for unexpected actions, such as the creation of new user accounts, particularly from strange regions, as well as password changes and multi-factor authentication (MFA) resets. This article continues to discuss industry experts' identity management predictions for 2023.

    BetaNews reports "More Machine IDs, Attacks on Providers and AI Verification -- Identity Management Predictions for 2023"

  • news

    Visible to the public "6 Ways to Protect Your Organization Against LAPSUS$"

    Researchers at Microsoft are urging businesses to educate employees on the type of social engineering attacks used by hacking group DEV-0537 (LAPSUS$) and strengthen their security posture. The hacking group DEV-0537, also known as LAPSUS$, operates globally using a pure extortion and destruction model without deploying ransomware payloads. The researchers noted that, unlike other social engineering attackers, DEV-0537 publicly announces its attacks on social media and pays employees for login credentials and multifactor authentication (MFA) approval. In the past, the group has also used SIM-swapping to facilitate account takeovers, targeted personal employee email accounts, and intruded on crisis-communication calls once their targets have been hacked. The researchers noted that with some education on DEV-0537's known tactics and strong cyber hygiene, businesses can guard themselves against future social engineering attacks. The researchers pointed out six ways to help protect against becoming a victim of LAPSUS$: require healthy and trusted endpoints, leverage modern authentication options for VPNs, strengthen and monitor your cloud security posture, improve awareness of social engineering attacks, and establish operational security processes in response.

    Dark Reading reports: "6 Ways to Protect Your Organization Against LAPSUS$"

  • news

    Visible to the public "Ukraine Closes Fraudulent Call Center That Ripped off Thousands"

    Thousands of victims were tricked by impostors working out of a Ukrainian call center who pretended to be Information Technology (IT) security employees at their banks. The scheme has now been shut down. The scammers called the victims, informed them that their bank accounts had been compromised by attackers, and asked for financial information. The bank accounts of the victims were drained by the criminals. The scheme was discovered by the Cyber Police Department of Ukraine, the Main Investigative Department of the National Police, the Prosecutor General's Office, and Kazakhstan's law enforcement officers. Investigators discovered that 37 operators from a call center formed by three Dnipro residents called Kazakhstan residents while posing as IT security personnel at their banks. The criminals alerted the citizens to strange transactions and persuaded them that threat actors had accessed their accounts. Under the guise of reversing the transactions, individuals were convinced to hand over financial information. In order to collect the funds, offshore bank accounts and cryptocurrency wallets were used. It is expected that over 18,000 Kazakh citizens have fallen victim to the scam. It is unknown at this time how much money was lost. In addition to searching the call center and the suspects' homes, law enforcement agents have seized 45 pieces of computer equipment, mobile phones, SIM cards, and draft records. Furthermore, it is now evident that the criminals were in possession of databases containing the personal information of Kazakhstani citizens. This article continues to discuss the takedown of a Ukrainian call center that defrauded thousands of victims while pretending to be bank IT security employees.

    Cybernews reports "Ukraine Closes Fraudulent Call Center That Ripped off Thousands"

  • news

    Visible to the public "Port of Lisbon Website Still Down as LockBit Gang Claims Cyberattack"

    Port of Lisbon's website remains offline days after officials revealed it was the victim of a hack. Due to its strategic location at the crossroads of Europe and Africa, the Port of Lisbon is one of the busiest in all of Europe, processing 13,200,000 tonnes of cargo annually. The Administration of the Port of Lisbon (APL) reported on December 25 that it had been targeted. Despite the attack, port officials stated that operational activity was not compromised, although they did remark that the National Cybersecurity Center and the Judiciary Police were contacted. The LockBit ransomware organization claimed to have conducted the attack against the port and stolen financial data, audits, budgets, contracts, ship logs, and other cargo and crew-related information. The group gave the port until January 18 to comply with extortion demands or the stolen data will be leaked. The incident is the latest in a string of cyberattacks on European ports that have created significant problems. In February, European prosecutors and cybersecurity officials initiated an investigation into a ransomware attack that affected a number of major oil port ports. In February, the loading and unloading systems of the German logistics company Marquard & Bahls-owned oil firms Oiltanking and Mabanaft were compromised by a hack. Ports and maritime operations have distinctive characteristics that make them attractive to threats: their worldwide footprint, high frequency of contact, and amplified consequence of loss make a cyberattack a crucial issue. This article continues to discuss the Port of Lisbon security incident.


    The Record reports "Port of Lisbon Website Still Down as LockBit Gang Claims Cyberattack"

  • news

    Visible to the public "DOE Research Looks at EV Charging Infrastructure Vulnerability"

    The US Department of Energy (DOE) funded research that brings further attention to cybersecurity for Electric Vehicle (EV) charging infrastructure. Researchers from Sandia National Laboratories have been examining vulnerabilities in charging infrastructure alongside other federal institutions for the past four years and recently released a report on their findings. According to the publication, EV charging infrastructure has multiple vulnerabilities, such as skimming credit card information, leveraging cloud servers to take over a network of EV chargers, and more. The researchers analyzed multiple interfaces, including vehicle-to-charger connections, wireless communications, cloud services, and charger maintenance ports for both AC and DC chargers. They discovered flaws in each interface type, including hackers' ability to eavesdrop on vehicle-to-charger connections from more than 50 yards away. Researchers at Argonne National Laboratory discovered that not all chargers had appropriate firewalls to prevent intrusions, while Idaho National Laboratory discovered that some systems were vulnerable to malicious firmware updates. Charger maintenance ports may also enable system reconfiguration, giving hackers access to a charging network from a single unit. This article continues to discuss some findings from the research on EV charging infrastructure vulnerabilities.

    GCR reports "DOE Research Looks at EV Charging Infrastructure Vulnerability"

  • news

    Visible to the public "Ukraine Successfully Blocked Over 4,500 Cyberattacks in 2022"

    Ukraine's domestic intelligence service has stated that in 2022, it successfully thwarted over 4,500 cyberattacks. The Security Service of Ukraine (SSU), which defends Ukraine's information and digital security during wartime, reports that the number of cyberattacks has increased threefold since 2021, and fivefold since 2020, when just 800 cyberattacks were recorded. Illia Vitiuk, head of the SSU Cyber Security Department, attributed his department's achievement to the lessons learned during the BlackEnergy cyberattack, which caused power disruptions for around 1.4 million Ukrainians during the peak of the 2015 winter. In the first three months of 2022, the Cyber Rapid Response Team of the State Cyber Defense Center of Ukraine reported a high number of suspicious cybersecurity or information security incidents. This article continues to discuss how Ukraine blocked more than 4,500 cyberattacks in 2022.

    GovInfoSecurity reports "Ukraine Successfully Blocked Over 4,500 Cyberattacks in 2022"

  • news

    Visible to the public "3Commas Confirms Report On 100,000 API Keys Leaked"

    As 2022 draws to a close, an anonymous Twitter user has leaked over 100,000 API Keys stolen from 3commas. A spokesperson from 3Commas stated that hackers made off with $22 million worth of cryptocurrency due to stolen API keys from them. Originally, Yuriy Sorokin, one of the firm's co-founders, shot down these accusations and indicated that security is not a problem. In late November, customers began reporting unauthorized purchases made in their names. 3Commas noted that users should turn off their API keys in 3Commas. The company also asked that all supported exchanges immediately revoke keys associated with 3Commas. This includes Binance and Kucoin. This will make it so that hackers who have stolen API keys won't be able to manipulate their coins on those markets.

    Information Security Buzz reports: "3Commas Confirms Report On 100,000 API Keys Leaked"