News Items

  • news

    Visible to the public "GA Health System Reports Healthcare Data Breach"

    Emory Healthcare is a healthcare system in the US state of Georgia, which has disclosed a data breach that potentially compromised the Protected Health Information (PHI) of over 1,000 people. Through a notice issued by the US Department of Labor (DOL), Emory Healthcare became aware of an employee improperly accessing at least 1,600 patient records between December 2020 and December 2021. It was later discovered that an ex-employee leaked the demographic information of hundreds of employees to those committing unemployment benefits fraud. The compromised demographic data includes names, dates of birth, and Social Security numbers. Investigators discovered no indication that any medical histories, tests, laboratory results, diagnosis and treatment plans, or insurance information had been compromised. Emory Healthcare stated that it has cooperated with law enforcement throughout the investigation, arrest, and prosecution of the individuals behind the situation, and will continue to do so as the case progresses. The healthcare system is currently notifying patients whose information is believed to be involved in this event. This article continues to discuss the Emory Healthcare data breach and other security incidents recently faced by healthcare entities.

    HealthITSecurity reports "GA Health System Reports Healthcare Data Breach"

  • news

    Visible to the public "McGraw Hill Exposed Student Data and Grades, Online Privacy Firm Says"

    According to a recent report by vpnMentor, the education publishing company McGraw Hill faced a data breach that may have revealed the email addresses and grades of hundreds of thousands of students. The Internet privacy organization stated that its research team discovered the data breach in mid-June and spent many months trying to contact McGraw Hill. According to the report, the researchers discovered troves of data presumably belonging to McGraw Hill that were accessible to anyone using a web browser. During routine testing, McGraw Hill discovered the publicly accessible data and said it was unaware of any adverse consequences. The data breach may have exposed the personal information of university students in North America, including those attending Johns Hopkins University, the University of California, Los Angeles, and the University of Michigan. The breach exposed more than 117 million files, breaching the privacy of students and employees, according to vpnMentor's assessment. Federal law prohibits institutions from releasing or posting a student's grades without that student's prior written consent. Therefore this data breach could result in government action. McGraw Hill's data leak appears to have been caused not by a cyberattack, but by the company keeping critical files in publicly accessible cloud storage buckets. The vpnMentor research team was unable to determine whether hackers discovered the public buckets before the files were erased. Hackers would have been able to commit common types of fraud against students as a result of the data vulnerability, which involves stealing their identities and leaking their private information online. This article continues to discuss the discovery and potential impact of the McGraw Hill data breach.

    Higher Ed Dive reports "McGraw Hill Exposed Student Data and Grades, Online Privacy Firm Says"

  • news

    Visible to the public "Windows 10 Users Encounter 'Blue Screen of Death' After Latest Patch Tuesday Update"

    Microsoft has issued a warning that some Windows 10 users may experience the Blue Screen of Death (BSOD) after installing its latest "Patch Tuesday" security updates. The company disclosed that the blue screen issue could affect some users who downloaded the KB5021233 update as part of this month's security patches. Initially, KB5021233 was meant to remedy an issue impacting the Camera app after users reported that the program ceases to respond when memory is low. According to the company, the BSOD issue has affected users running Windows 10 versions 22H2, 21H2, 21H1, and 20H2. The BSOD and error code 0xc000021a have prevented affected customers from using their devices. Microsoft disclosed that it is actively working on a fix for the problem and will publish an upgrade in a forthcoming version. However, for consumers currently affected by the issue, the company provided a temporary solution involving the Windows Recovery Environment (WinRE). This article continues to discuss the BSOD issue encountered by some Windows 10 users after installing the KB5021233 update in Microsoft's latest Patch Tuesday and how affected users can mitigate this issue until an official resolution is provided.

    ITPro reports "Windows 10 Users Encounter 'Blue Screen of Death' After Latest Patch Tuesday Update"

  • news

    Visible to the public "Microsoft Details Recent macOS Gatekeeper Bypass Vulnerability"

    Microsoft recently shared details on CVE-2022-42821, a Gatekeeper bypass vulnerability that Apple recently addressed in macOS Ventura, Monterey, and Big Sur. The vulnerability was identified in July 2022, and the security defect is described as a logic issue that could be exploited to bypass Gatekeeper checks, potentially allowing threat actors to execute malicious code on vulnerable systems. Microsoft stated that Gatekeeper bypasses such as this could be leveraged as a vector for initial access by malware and other threats and could help increase the success rate of malicious campaigns and attacks on macOS. Microsoft has created proof-of-concept (PoC) code, dubbed Achilles, that bypasses Gatekeeper by creating a fake directory structure with an arbitrary icon and payload, and creating an AppleDouble file with restrictive ACL. Microsoft noted that the code and the AppleDouble file can be placed in an archive that can be hosted on the internet. Microsoft stated that Apple's Lockdown Mode, introduced in macOS Ventura as an optional protection feature for high-risk users that might be personally targeted by a sophisticated cyberattack, is aimed to stop zero-click remote code execution exploits and therefore does not defend against Achilles. Apple addressed the vulnerability with the release of macOS Ventura 13 in October, and macOS Monterey 12.6.2, and macOS Big Sur 11.7.2 in December.

    SecurityWeek reports: "Microsoft Details Recent macOS Gatekeeper Bypass Vulnerability"

  • news

    Visible to the public "New RisePro Infostealer Increasingly Popular Among Cybercriminals"

    According to researchers at Flashpoint, a recently identified information stealer named "RisePro" is being distributed by pay-per-install malware downloader service "PrivateLoader." RisePro is written in C++ and harvests potentially sensitive information from the compromised machines and then attempts to exfiltrate it as logs. The researchers noted that RisePro was initially spotted on December 13, featured on a cybercrime marketplace called Russian Market, where cybercriminals upload and sell logs exfiltrated using stealers. The researchers stated that the malware appears to be based on Vidar stealer, which has been analyzed several times in the past. Vidar is known for downloading a series of dependencies and configuration settings from its command-and-control (C&C) server. The infostealer was cracked in 2018, and several clones were seen in the past, including the "Oski" and "Mars" stealers. The researchers noted that they have seen RisePro using dropped dynamic link library (DLL) dependencies that Vidar uses, and the malware's analysis suggests that it is very likely a clone of Vidar. However, RisePro also shows similarities with other information stealers out there.

    SecurityWeek reports: "New RisePro Infostealer Increasingly Popular Among Cybercriminals"

  • news

    Visible to the public "Phishing Targets Ukrainian Battlefield Awareness Tool Users"

    The Ukrainian military agency that recently debuted a battlefield situational awareness technology alerted the Ukrainian Computer Emergency Response Team (CERT-UA) about a phishing campaign in which the operators seek to steal files and Internet browser data. CERT-UA stated that the campaign targeted users of the situational awareness tool, called Delta by the Center for Innovations and Development of Defense Technologies within the Ministry of Defense. Delta is a digital map that can be accessed on different platforms, such as a smartphone. The tool is said to provide a comprehensive digital image of the battlefield by integrating data from several sources, such as intelligence and sensors. The center informed CERT-UA about the phishing effort on December 17, resulting in the team issuing a warning. The phishing lure, which originated from a hacked Ministry of Defense email address, instructed victims to update their Delta certificates to continue access. The phishing email has a PDF file purportedly giving additional instructions, as well as an embedded link that, when clicked, led to a phishing website resembling the official Delta login page. This article continues to discuss the phishing campaign targeting users of the Delta battlefield situational awareness tool.

    Data Breach Today reports "Phishing Targets Ukrainian Battlefield Awareness Tool Users"

  • news

    Visible to the public "Sophisticated DarkTortilla Malware Serves Imposter Cisco, Grammarly Pages"

    Researchers at Cyble Research and Intelligence Labs have identified two phishing sites, one masquerading as a Cisco webpage and the other as a Grammarly site, which threat actors are using to deliver a severe piece of malware known as "DarkTortilla." The .NET-based malware can be modified to deliver numerous payloads and is notorious for its quiet and persistent behavior on compromised systems. Since at least 2015, multiple threat groups have used DarkTortilla to distribute information stealers and Remote Access Trojans (RATs), such as AgentTesla, AsyncRAT, and NanoCore. Additionally, some ransomware gangs, such as the operators of Babuk, have incorporated DarkTortilla into their payload delivery chain. In several of these efforts, attackers have largely employed spam emails with malicious file attachments to infect unsuspecting users with the malware. Cyble's analysis of the payload revealed that the malware is packed with features for persistence, process injection, performing antivirus and virtual machine/sandbox checks, displaying fake messages, connecting with its command-and-control (C2) server, and downloading additional payloads. DarkTortilla places a duplicate of itself into the system's Startup folder and creates Run/Winlogin registry entries to ensure persistence on infected systems. DarkTortilla creates a subdirectory and copies itself into it as an additional persistence method. DarkTortilla's fake message feature serves up messages to deceive victims into believing the Grammarly or Cisco application they wanted could not be executed due to missing necessary application components. This article continues to discuss the spread of DarkTortilla malware through spoofed Grammarly and Cisco sites.

    Dark Reading reports "Sophisticated DarkTortilla Malware Serves Imposter Cisco, Grammarly Pages"

  • news

    Visible to the public "Connected Homes Are Expanding, so Is Attack Volume"

    Comcast reports a 14 percent increase in the percentage of Americans reporting unsafe online practices that expose them to cyber threats, such as reusing or sharing passwords, ignoring software updates, and more, during the past two years. Comcast's EVP, CISO, and Product Privacy Officer, Noopur Davis, stated that consumers are purchasing and connecting more devices to their home networks than ever before over the holiday season. With this increase in devices comes an increase in cybersecurity threats. Therefore, consumers must prioritize protecting their connected devices and the people who use them against cyber threats. The Xfinity Cyber Health Report examines cyber threat trends, the expanding number of connected devices in homes, and consumer attitudes and habits regarding cybersecurity. Xfinity xFi homes have an average of 15 connected devices, a 25 percent increase from 2020. Power users own an average of 34 devices. In addition, 58 percent of consumers want to purchase at least one connected item during the holiday season. Each month, xFi Advanced Security blocks an average of 23 unique threats per home, with the total number of attacks being at least three to four times higher due to recurrent attacks. Seventy-four percent of Americans say their home network is attacked less than ten times each month. Sixty-one percent believe that their devices are protected against threats right out of the box, thus leaving many new devices unprotected against potential attackers. This article continues to discuss key findings from the Xfinity Cyber Health Report.

    Help Net Security reports "Connected Homes Are Expanding, so Is Attack Volume"

  • news

    Visible to the public "Malicious 'SentinelOne' PyPI Package Steals Data From Developers"

    Threat actors have uploaded on PyPI a malicious Python package named 'SentinelOne' that masquerades as the authentic Software Development Kit (SDK) client for a reputable American cybersecurity company, but actually steals data from developers. The package provides the requested functionality, which is access to the SentinelOne Application Programming Interface (API) from another project. However, this package has been Trojanized to collect sensitive information from infected developer systems. ReversingLabs found the attack, confirmed the malicious behavior, and reported the package to SentinelOne and PyPI, resulting in the package's removal. Since its initial upload to PyPI on December 11, 2022, the malicious SentinelOne package has been updated twenty times. According to the researchers, the package is considered to be a replica of the legitimate SentinelOne SDK python client, and the threat actor updated it to enhance and repair its malicious capability. All released versions of the malware package have been downloaded more than 1,000 times from PyPI. This article continues

    Bleeping Computer reports "Malicious 'SentinelOne' PyPI Package Steals Data From Developers"

  • news

    Visible to the public "Russian Hackers Target Major Petroleum Refining in NATO Member State During Ukraine War"

    Amid the continuing Russian-Ukrainian conflict, the Russia-affiliated Gamaredon group attempted to break into a petroleum refinery in a NATO member state early this year. The attack, which occurred on August 30, 2022, is one of the numerous strikes conducted by the Advanced Persistent Threat (APT) group attributed to Russia's Federal Security Service (FSB). Gamaredon, also known as Actinium, Armageddon, Iron Tilden, Primitive Bear, Shuckworm, Trident Ursa, and Winterflounder, has a history of harvesting sensitive data mostly from Ukrainian businesses and, to a lesser extent, NATO partners. Palo Alto Networks Unit 42 stated that Trident Ursa has been functioning as a dedicated access creator and intelligence gatherer as the fight has persisted on the ground and in cyberspace. Trident Ursa continues to be one of the most pervasive, intrusive, constantly operational, and Ukraine-focused APTs. Unit 42's monitoring of the group's actions over the past ten months has found over 500 new domains and 200 malware samples, as well as several changes in methods in response to changing and expanding priorities. In addition to cyberattacks, the security community reportedly received threatening tweets from a Gamaredon associate, showing the adversary's use of intimidation measures. This article continues to discuss the Gamaredon group and its targeting of a major petroleum refining company in a NATO member state.

    THN reports "Russian Hackers Target Major Petroleum Refining in NATO Member State During Ukraine War"

  • news

    Visible to the public "Survey Looks at Enterprise Security Priorities for 2023"

    Titaniam recently surveyed corporate security professionals for insight into their predictions regarding cyberattack pattern trends in 2023. In 2023, large organizations will be the primary target of cyberattacks, as threat actors broaden their targeting strategies. Forty-one percent of the respondents predicted this to be the case, with financial institutions (36 percent), government (14 percent), healthcare (9 percent), and education (8 percent) being the top targets. Findings from the survey suggest that the rapid rate of development has introduced new vulnerabilities into corporate networks, making them a more desirable target for cybercriminals. Large firms are embracing more cloud services, gathering data, pushing code into production faster, and linking apps and systems via Application Programming Interfaces (APIs) in order to compete in the digital marketplace. As a result, attackers can exploit numerous misconfigured services, unprotected databases, poorly tested applications, and unknown and insecure APIs. Malware (30 percent), ransomware and extortion (27 percent), insider threats (26 percent), and phishing (17 percent) comprised the top four threats in 2022. The study indicated that malware (40 percent) is anticipated to be the greatest risk for businesses in 2023, followed by insider threats (26 percent), ransomware and related extortion (21 percent), and phishing (16 percent). However, organizations are more concerned about malware in 2023 than they were in 2022. It is essential to recognize that various threats may overlap, as insiders could be involved in ransomware attacks, phishing may be a source of malware, and more. In an effort to surprise and surpass security teams who have strengthened ransomware protections and phishing detection, attackers are adapting their techniques. They are employing new malware, such as loaders, information stealers, and wipers, to expedite attacks, steal critical information, and cause chaos. They also purchase and steal employee credentials to gain access to business networks. This article continues to discuss key findings from Titaniam's survey of security professionals on cyberattack trend predictions for 2023.

    Continuity Central reports "Survey Looks at Enterprise Security Priorities for 2023"

  • news

    Visible to the public  "A Ransomware Attack on a Small Managed IT Provider Disrupts Government Agencies in New Zealand"

    A ransomware attack on a small Information Technology (IT) firm that services dozens of public and private enterprises in New Zealand has disrupted several government agencies. According to the Office of the Privacy Commissioner, the attack targeted Mercury IT, a 25-employee corporation that provides IT infrastructure, telecommunications, cybersecurity, technology support, and advisory services from locations in Wellington and Auckland, New Zealand. New Zealand's Ministry of Justice and Ministry of Health (Te Whatu Ora) have been impacted by the cyber intrusion. On November 30, 2022, the IT supplier reported the ransomware attack and recruited an external specialist after discovering unauthorized access to its server environment. New Zealand's National Cyber Security Centre (NCSC), with help from CERT NZ, and the New Zealand Police, took part in the incident response. On December 6, 2022, the Office of the Privacy Commissioner reported that the event was a ransomware attack, and that authorities were working with the IT provider to confirm the extent of the attack. The Ministry of Justice said the ransomware attack prohibited it from accessing 14,500 coronial files related to the transfer of deceased individuals and 4,000 post-mortem exams. The Health Ministry was also unable to access 8,500 bereavement care records and another 5,500 cardiac and hereditary disease registry records in Auckland, Nelson, Tauranga, Wellington, and Waikato. This article continues to discuss the impact on New Zealand government agencies by a ransomware attack faced by Mercury IT.

    CPO Magazine reports "A Ransomware Attack on a Small Managed IT Provider Disrupts Government Agencies in New Zealand"

  • news

    Visible to the public "Healthcare Cybersecurity Measures Must Go Beyond Perimeter Security"

    Critical infrastructure companies are experiencing an increase in cyberattacks, prompting organization executives to strengthen their security postures beyond perimeter security. As patient safety is at stake, healthcare organizations cannot afford to be vulnerable to expanding cyber threats. According to a report released by Vanson Bourne on behalf of Imprivata, it will be essential for healthcare organizations to prioritize security outside the firewall. Researchers surveyed 760 Information Technology (IT) security experts in the healthcare, banking, manufacturing, and pharmaceutical industries to identify areas where current security measures and compliance strategies might be improved. The present IT world is nothing like it was a decade ago. IT infrastructures have evolved into complex ecosystems that exist beyond well-defined perimeters in order to establish new services, facilities, and locations, as well as maximize existing investments and keep up with numerous users, roles, and applications. The latest findings reveal that almost 99 percent of security leaders have faced a cyberattack in the last year. Cyberattacks generally result in monetary losses due to ransom payments and increased cyber insurance costs. However, the implications for the healthcare industry may extend to patient care. Roughly three out of every ten healthcare delivery firms indicated that a cyberattack resulted in diverted patient care. Additionally, 31 percent claimed that cyberattacks had been related to poor patient outcomes coming from delayed operations and examinations. This article continues to discuss key findings from the survey of IT security leaders in healthcare, finance, manufacturing, and pharmaceutical industries.

    HealthITSecurity reports "Healthcare Cybersecurity Measures Must Go Beyond Perimeter Security"

  • news

    Visible to the public "FoxIt Patches Code Execution Flaws in PDF Tools"

    Foxit Software recently rolled out a critical-severity patch to cover a dangerous remote code execution flaw in its flagship PDF Reader and PDF Editor products. The vulnerability, which was discovered and reported by researchers at the Renmin University of China, could be exploited via rigged PDF files of web pages. Foxit noted that the vulnerability is contained to the Windows platform and affects Foxit PDF Reader 12.0.2.12465 and earlier and the Foxit PhantomPDF - 10.1.7.37777 and earlier. According to security researchers at HackSys Inc., the vulnerability could be exploited if a target is tricked into visiting a rigged web page or opening a malicious file. HackSys noted that the specific flaw exists within the handling of Doc objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. The company noted that an attacker can leverage this vulnerability to execute code in the context of the current process. Foxit has struggled in the past with code execution issues in its PDF-processing products, and a data breach occurred that affected more than 300,000 users.

    SecurityWeek reports: "FoxIt Patches Code Execution Flaws in PDF Tools"

  • news

    Visible to the public "LinkedIn Has Massively Cut the Time It Takes to Detect Security Threats. Here's How It Did It"

    Protecting against phishing, malware, and other cyber threats is a significant cybersecurity problem for any organization, but when a company has over 20,000 workers and operates a service used by nearly a billion people, the challenge becomes considerably more difficult. LinkedIn, the world's largest professional network, has over 875 million members, ranging from entry-level professionals to high-level executives, who use it to network with colleagues and peers, share ideas, and find new employment opportunities. LinkedIn's Threat Detection and Incident Response team is responsible for ensuring its systems' security against various developing cyber threats. It is common knowledge that skilled hacking groups have prominent firms such as LinkedIn in their sights, whether they are attempting to fool users into clicking phishing links or installing malware through manipulative social engineering attacks. LinkedIn's Moonbase program sought to improve threat identification and incident response while enhancing the quality of life for LinkedIn's security analysts and engineers by automating file and server log examination. Between March and September 2022, LinkedIn reconstructed its threat detection and monitoring capabilities, as well as its Security Operations Center (SOC). This process began with reevaluating how potential threats are initially examined and recognized. Jeff Bollinger, the company's director of incident response and detection engineering, emphasizes that it is essential for every team and program to begin with an accurate threat model, as it is important to identify the actual risks facing the organization. This awareness begins with an analysis of the data that need protection the most, such as intellectual property, customer information, and information governed by laws or regulations. This article continues to discuss how LinkedIn made its cybersecurity operations more effective.

    ZDNet reports "LinkedIn Has Massively Cut the Time It Takes to Detect Security Threats. Here's How It Did It"

  • news

    Visible to the public  "GreyNoise Intelligence Dives Deep into the Cybersecurity Landscape with its 2022 Mass Exploitation Report"

    GreyNoise Intelligence, a cybersecurity firm that analyzes Internet scanning traffic to distinguish threats from background noise, has released its inaugural 2022 Mass Exploitation Report, a research report delving into the most significant threat detection events over the past 12 months. In 2022, GreyNoise added more than 230 new detection tags, representing a 38 percent increase from 2021. For its 2022 Mass Exploitation Report, GreyNoise researchers offer insights into an F5 Big-IP iControl REST Authentication Bypass vulnerability, a critical weakness in Atlassian Confluence, and the impact of the Cybersecurity and Infrastructure Security Agency's (CISA) Known Exploited Vulnerability (KEV) catalog updates on defenders. Bob Rudis, GreyNoise's vice president of data science, provides predictions for 2023 in the 2022 Mass Exploitation Report, in addition to insights on the most notable threat detection events of 2022. Rudis predicts daily, ongoing Internet-facing exploit efforts, an increase in post-initial-access internal attacks, and at least a few Log4j-centric attacks making headlines. This article continues to discuss some key findings from the GreyNoise 2022 Mass Exploitation Report.

    PRWeb reports "GreyNoise Intelligence Dives Deep into the Cybersecurity Landscape with its 2022 Mass Exploitation Report"

  • news

    Visible to the public "CISA, FBI Hold Second Meeting of Joint Ransomware Task Force"

    The Cybersecurity and Infrastructure Security Agency (CISA) and the FBI co-chaired the second meeting of the Joint Ransomware Task Force (JRTF), an inter-agency organization created by Congress to unify and bolster efforts against ransomware attacks. The initial JRTF meeting took place in September 2022. During the second meeting, the JRTF discussed measures and activities intended to reduce the prevalence and effect of ransomware attacks. JRTF members reviewed Working Group initiatives, such as victim assistance, measurement, partner involvement, continuous improvement, intelligence integration, and campaign coordination. This article continues to discuss key points made during the second JRTF meeting.

    HSToday reports "CISA, FBI Hold Second Meeting of Joint Ransomware Task Force"

  • news

    Visible to the public "Ransomware Groups to Increase Zero-Day Exploit-Based Access Methods in the Future"

    According to security researchers at Trend Micro, ransomware groups are expected to tweak their tactics, techniques, and procedures (TTPs) and shift their business models as organizations strengthen their cybersecurity measures, law enforcement gets better at tracking down threat actors, and governments tighten regulations on cryptocurrencies. The researchers believe that ransomware groups will target zero-day vulnerabilities more frequently to gain initial access to the target's networks. Those include increased use of zero-day vulnerabilities to get initial access to the targets' networks. Another possible evolution in ransomware attacks involves an increasing focus on targeting cloud infrastructure. The researchers stated that they see these groups potentially diverting in two phases: first, criminals will adapt their current business models to work in cloud environments, treating instances as standard data to be encrypted. Second, they will gain maturity in understanding their targets and cloud environments and create more cloud-specific ransomware families designed specifically with unique cloud services in mind, creating new forms of ransomware attacks.

    Infosecurity reports: "Ransomware Groups to Increase Zero-Day Exploit-Based Access Methods in the Future"

  • news

    Visible to the public "Meta Takes Down Over 200 Covert Influence Operations Since 2017"

    Meta has recently revealed that it has taken down over 200 covert influence operations on its platforms since 2017. Meta, which owns Facebook, Instagram, and WhatsApp, said these networks were disrupted for violating its Coordinated Inauthentic Behavior (CIB) policy. Meta noted that the deceptive networks originated from 68 countries and operated in at least 42 languages. Only a third of them solely targeted audiences outside of their own countries, with the majority focusing on people within their own borders. The most common location for CIB networks was Russia (34), followed by Iran (29) and Mexico (13). Meta noted that Russian operations targeted Ukraine most often, followed by Africa and the United States. Meta stated that Russian influence operations were run by a variety of actors, such as individuals with links to the Russian military and military intelligence, marketing firms, and entities associated with a sanctioned Russian financier. Tactics ranged from writing spammy comments to running fictitious cross-platform media entities that hired real journalists to write for them. Meta stated that Iranian campaigns since 2021 focused mainly on politics in the target country, with the perpetrators linked to smaller groups, like academics or people with a background in teaching English as a foreign language. In contrast, Meta noted that most CIB networks originating in Mexico focused on local audiences, often relating to local elections. Overall, the US was the most targeted country by operations (34), followed by Ukraine (20) and the UK (16). In September 2022, Meta revealed it closed down two significant but unconnected disinformation operations originating in China and Russia, which attempted to influence public opinion in Western countries.

    Infosecurity reports: "Meta Takes Down Over 200 Covert Influence Operations Since 2017"

  • news

    Visible to the public "Number of Command-And-Control Servers Spiked in 2022: Report"

    The 30 percent increase in the number of unique command-and-control (C2) servers in 2022 suggests that cybercriminals and nation-state hackers are increasingly employing the machines to launch attacks. A C2 server is a computer that transmits instructions to infected devices. Typically, the servers are used to establish networks of infected devices capable of launching attacks, encrypting data, and more. Recorded Future researchers spotted more than 17,000 C2 servers in 2022, up from 13,629 the previous year. The list was dominated by Cobalt Strike team servers, botnet families such as IcedID and QakBot, and well-known Remote Access Trojans (RATs) such as PlugX, which Chinese government hackers employ. According to the researchers, botnet malware, primarily Emotet and QakBot, expanded C2 infrastructure and remained active throughout the year. The largest hosting providers, particularly Shenzhen Tencent Computer Systems in China and DigitalOcean in the US, continue to have the highest number of C2 server observations. China has, for the first time, surpassed the US as the leading country in terms of C2 server hosting volume. Recorded Future discovered C2 infrastructure on a total of 1,419 hosting providers in 116 different countries. China had over 4,000 C2 servers, followed by the US s with 3,928 and Hong Kong with 1,451. These three countries accounted for 55 percent of all the discovered C2 servers. Before it can be used maliciously, most server infrastructure is acquired through compromise or real purchases. Popular tools such as Cobalt Strike, which, according to Recorded Future, is the preferred offensive security tool for various actors, are legitimately used by red teams attempting to test corporate networks, but can be misused by criminal and nation-state hackers. This article continues to discuss the rise in the number of C2 servers in 2022.

    The Record reports "Number of Command-And-Control Servers Spiked in 2022: Report"

  • news

    Visible to the public  "OMB Drops New Cybersecurity Metrics in Time for FITARA Hearing"

    The Office of Management and Budget (OMB) has released a new "progress report" on the condition of cybersecurity across federal agencies. The progress report offers new cyber metrics generated from the Federal Information Security Modernization Act (FISMA) metrics to the public and key stakeholders, including Congress. Notably, the cyber progress report may become a future Federal Information Technology Acquisition Reform Act (FITARA) Scorecard category, representing a form of development from the existing FISMA-centric cyber category. The new cybersecurity progress report category is a "preview" on the committee's most recent scorecard, meaning that it does not figure into the latest set of scores. The category offers each agency a percentage score for their cybersecurity progress, ranging from 68 percent for the Department of the Interior to 94 percent for the General Services Administration (GSA) on the most recent scorecard. In accordance with the National Institute of Standards and Technology's (NIST) Cybersecurity Framework, the metrics for this category are organized into the following five categories: Identify, Protect, Detect, Respond, and Recover. Except for the "Protect" category, which is weighted at 40 points, the percentage value total result of each category is weighted at 15 points. OMB stated that the Protect category has more weight than other categories since it contains more criteria, such as the adoption of multi-factor authentication (MFA) and data encryption. This article continues to discuss the progress report on the state of cybersecurity across federal agencies and the new FITARA Scorecard.

    MeriTalk reports "OMB Drops New Cybersecurity Metrics in Time for FITARA Hearing"

  • news

    Visible to the public "Samba Addressed Multiple High-Severity Vulnerabilities"

    Multiple vulnerabilities, tracked as CVE-2022-38023, CVE-2022-37966, CVE-2022-37967, and CVE-2022-45141, exist in Samba and can be exploited to take control of affected systems. Samba announced the 4.17.4, 4.16.8, and 4.15.13 security releases on December 15, 2022, to address the vulnerabilities. Samba is a free software re-implementation of the Server Message Block (SMB) networking protocol that provides file and print services for multiple Microsoft Windows clients and may interact with a Microsoft Windows Server domain as either a Domain Controller (DC) or a domain member. The software is run on most Unix-like systems, including Linux, Solaris, AIX, and BSD variations, as well as Apple's macOS Server and macOS client (Mac OS X 10.2 and higher). This article continues to discuss Samba's release of security updates for multiple vulnerabilities.

    Security Affairs reports "Samba Addressed Multiple High-Severity Vulnerabilities"

  • news

    Visible to the public "Cisco Warns of Many Old Vulnerabilities Being Exploited in Attacks"

    Cisco has recently updated multiple security advisories to warn of the malicious exploitation of severe vulnerabilities impacting its networking devices. Many of the bugs, which carry severity ratings of "critical" or "high," have been addressed 4-5 years ago, but organizations that haven't patched their devices continue to be impacted. Last week, Cisco added exploitation warnings to more than 20 advisories detailing security defects in Cisco IOS, NX-OS, and HyperFlex software. Five of the updated advisories resolve critical-severity vulnerabilities that could allow remote attackers to execute arbitrary code (RCE), cause a denial-of-service (DoS) condition, or execute arbitrary commands. Carrying a CVSS score of 9.8, the exploited vulnerabilities are tracked as CVE-2017-12240, CVE-2018-0171, CVE-2018-0125, CVE-2021-1497, and CVE-2018-0147, and impact Cisco IOS and IOS XE, the RV132W and RV134W routers, HyperFlex HX, and Secure Access Control System (ACS). Cisco also updated 15 advisories that deal with high-severity flaws in Cisco IOS and IOS XE and one that addresses a high-severity arbitrary command execution issue in Small Business RV series routers. Cisco also updated several advisories detailing medium-severity bugs. The US Cybersecurity and Infrastructure Security Agency (CISA) added these vulnerabilities to its Known Exploited Vulnerabilities Catalog months ago, but there does not appear to be any information regarding the attacks exploiting many of these flaws. Organizations are advised to review the advisories and apply necessary patches as soon as possible.

    SecurityWeek reports: "Cisco Warns of Many Old Vulnerabilities Being Exploited in Attacks"

  • news

    Visible to the public  "Google Launches Client-Side Encryption for Gmail in Beta"

    Google has announced that organizations can now request to test client-side encryption for web-based Gmail. This long-promised functionality is now accessible to a limited number of Workspace customers. According to Google, the new encryption option renders important data in the email body and attachments undecipherable to Google servers. However, the security and privacy function is not accessible to all users. Client-side encryption is already available for several Google products, including Drive, Docs, and Meet. Client-side encryption is disabled by default and must be enabled by administrators, according to the company. Then, users can choose to encrypt emails and attachments message-by-message. This article continues to discuss Google expanding access to client-side encryption in Gmail on the web.

    BetaNews reports "Google Launches Client-Side Encryption for Gmail in Beta"

  • news

    Visible to the public "API Vulnerabilities in Wordle Exposed Answers, Opened the Door to Potential Hacking"

    A security researcher has discovered flaws in the online game Wordle, owned by the New York Times, that leak the answer to the daily word puzzle and expose its Application Programming Interface (API) to potential hackers. David Thompson, a security researcher at Noname Security, discovered the vulnerabilities using Google Chrome's built-in developer tool. Thompson discovered the daily answer with the assistance of a JSON-formatted API. Simply visiting the Wordle website, clicking the "network" tab in Chrome's developer tools, and then selecting the "Fetch/XHR" filter led to the solution. Clicking on JSON API with the current date in the "Requests" cell exposes an API GET request. Then by clicking the "Response" tab, the solution will be clearly displayed. Thompson also discovered a technique to find the solution to the following day's Wordle puzzle by using the command line interface to retrieve the JSON file for a different date. In addition to the solution, the returned information also includes the editor's name. When building and releasing APIs, the ability to acquire the information is a common error. In the instance of Wordle, the vulnerabilities violate the OWASP API Security Top 10 in terms of excessive data disclosure and broken function-level authorization. This article continues to discuss the API vulnerabilities found in Wordle.

    SiliconANGLE reports "API Vulnerabilities in Wordle Exposed Answers, Opened the Door to Potential Hacking"

  • news

    Visible to the public "Cybersecurity Market for Connected Cars to Grow To $4.14B by 2026"

    Research and Markets has predicted that the global external cloud automotive cybersecurity services market will increase from $1.74 billion in 2021 to $2.12 billion in 2022 at a Compound Yearly Growth Rate (CAGR) of 21.8 percent and will reach $4.14 billion by 2026 at a CAGR of 18.3 percent. Endpoint, application, and wireless network security are the primary types of security in cloud-based cybersecurity services for the automotive industry. Passenger cars and commercial vehicles are among the several vehicle types. The number of connected vehicles, according to Research and Markets, will drive the growth of the external cloud automotive cybersecurity services market in the coming years. Connected cars have an in-built connectivity system that can access the Internet to communicate with other vehicles. Several of these characteristics have been around for a number of years, but their prevalence will increase as the automotive industry shifts toward autonomous and electrified vehicles. Ted Miracco, CEO of Approov, stated that the automotive industry must embrace a defense-in-depth security strategy. Many of the latest breaches, according to Miracco, involved a single point of failure, such as the exploitation of user passwords or Application Programming Interface (API) keys that let anyone unlock cars. Miracco stated that implementing zero-trust systems capable of verifying not just the user but also the device and the application creates a layered security strategy to prevent these types of attacks. This article continues to discuss the growing cybersecurity market for connected cars and the need for a defense-in-depth strategy for securing these vehicles.

    SC Media reports "Cybersecurity Market for Connected Cars to Grow To $4.14B by 2026"

  • news

    Visible to the public "IRS Mistakenly Publishes 112,000 Taxpayer Records for the Second Time"

    In November, the Internal Revenue Service (IRS) accidentally republished 112,000 taxpayer data records that were previously published due to a technical issue earlier in the year. An external contractor operating on behalf of the IRS and tasked with managing a database for the government agency is supposedly to blame for the incident. According to a letter sent to congressional leaders, the incident involves the upload of 990-T forms containing private information used by tax-exempt entities, including government entities and retirement accounts, to pay income tax on income coming from specific investments or that is unrelated to their exempt purpose. In September 2022, the IRS disclosed that Form 990-T data, which should not have been made public had been made available for download through its Tax Exempt Organization Search (TEOS). At the time, it deleted the files and planned to replace them in the future with updated versions. This time, a contractor reuploaded older files to the database containing the original data, rather than fresh files that ensured the forms were set to be kept private. The IRS had provided the contractor with the new data on November 23, but the contractor had not yet deleted the outdated files from their system. This article continues to discuss the exposure of 112,000 taxpayer records due to a contractor error.

    ITPro reports "IRS Mistakenly Publishes 112,000 Taxpayer Records for the Second Time"

  • news

    Visible to the public "Mobile App Users at Risk as API Keys of Email Marketing Services Exposed"

    Security researchers used CloudSEK's BeVigil security search engine to analyze 600 apps on the Google Play store and found that 50% were leaking application programming interface (API) keys of three popular transactional and marketing email service providers. The providers included Mailgun, MailChimp, and SendGrid. CloudSEK has notified all involved entities and affected apps about the hardcoded API keys. The researchers noted that the leaked API keys allow threat actors to perform various unauthorized actions, such as sending emails, deleting API keys, and modifying two-factor authentication (2FA). The researchers stated that their overall examination of all three providers' data revealed that the USA was the country with the highest number of downloads, followed by the UK, Spain, Russia, and India, leaving over 54 million mobile app users vulnerable. MailGun provides email API services, enabling brands to send, validate and receive emails through their domain at scale. The researchers noted that, in this case, an API key leak could allow threat actors to send and read emails, get Simple Mail Transfer Protocol (SMTP) credentials, IP addresses, and statistics, as well as retrieve mailing lists of customers in order to launch phishing campaigns. CloudSEK said that 35% of the analyzed packages contained a valid Mailgun key embedded in their android code, and 132 domains were configured with the valid keys. MailChimp is a transactional email service first introduced in 2001 and later launched as a paid service with an additional freemium option in 2009. In this case, the researchers noted that an API key leak would allow threat actors to read conversations, fetch customer information, expose email lists of multiple campaigns containing PII, start fake email campaigns and manipulate promotional codes. The research also noted that threat actors could authorize third-party applications connected to a MailChimp account. The researchers highlighted that of a total of 319 identified API keys, 28% were found to be valid, and of those, 12 keys allowed read email access. Finally, SendGrid is a communication platform intended for transactional and marketing emails. It provides cloud-based services to assist businesses with shipping notifications, friend requests, sign-up confirmations, email newsletters, etc. The researchers stated that an API leak would allow a threat actor to send emails, create API keys and control IP addresses used to access accounts. The researchers found that of 319 API keys, 128 were found to be valid, and of those, 121 could allow threat actors to send emails using SendGrid, 65 could allow threat actors to delete API keys, and 42 could allow the modification of 2FA. The researchers stated that software developers must avoid embedding API keys into their applications and should follow "secure coding and deployment practices like standardize review procedures, rotate keys, hide keys and use vault."

    Infosecurity reports: "Mobile App Users at Risk as API Keys of Email Marketing Services Exposed"

  • news

    Visible to the public "FBI: Criminals Using BEC Attacks to Scavenge Food Shipments"

    In recent years, threat actors have often employed Business Email Compromise (BEC) attacks to steal money from organizations. In a new development, cybercriminals are using these attacks to steal food shipments and ingredients from suppliers and distributors. The FBI and the Food and Drug Administration Office of Criminal Investigations (FDA OCI) issued an alert warning on December 16 that the attacks have been ongoing since at least the beginning of this year and have already caused hundreds of thousands of dollars in losses to various organizations. Although BEC is typically used to steal money, in these cases, the cybercriminals spoof emails and domains to impersonate employees of real firms to order food supplies, the two agencies stated in the joint cybersecurity statement. While the activity resembles rat scavenging, the intent of these thefts is often to repackage and resell the stolen food items without respect for safety and sanitation regulations. The advisory cited several instances, the most recent dating back to February, in which businesses were tricked. In one case in August, a food distributor got an email request for two full truckloads of milk supposedly from the CFO of a multinational snack and beverage company. The attacker used the actual name of the CFO but had an email address containing an extra letter in the domain name than that of the real organization. The food distributor fell victim to the scam and was required to pay their supplier over $160,000 for the fake shipment. A food manufacturer lost over $600,000 in February after receiving and fulfilling orders for whole milk powder and nonfat dry milk from four fake organizations. In each instance, the attackers placed orders using real employee names and emails with small domain name changes belonging to legitimate firms. This article continues to discuss the cybercriminals performing BEC attacks to steal food shipments and ingredients from suppliers and distributors.

    Dark Reading reports "FBI: Criminals Using BEC Attacks to Scavenge Food Shipments"

  • news

    Visible to the public  "Open-Source Vulnerabilities Add to Security Debt"

    Mend found and added 33 percent more open-source vulnerabilities to its database in the first nine months of 2022 than it did in the first nine months of 2021, representing both the increase in the number of published open-source packages and the acceleration of vulnerabilities. As organizations continue to rely significantly on their applications for success, this escalating threat is a rising cause for concern. The report's representative sampling of over 1,000 North American organizations from January to September 2022 revealed that just 13 percent of vulnerabilities were remedied, compared to 40 percent remedied by those using current application security best practices. As open-source code is employed in 70 to 90 percent of apps today, more businesses are becoming susceptible to attacks as threat actors exploit the remediation gap. As security debt continues to climb, it is essential to find a means to prioritize the vulnerabilities that offer the greatest risk in order to prevent falling victim to an attack, according to Jeffrey Martin, vice president of product management at Mend. Remediation tools that can evaluate and prioritize the vulnerabilities that could have the greatest impact on systems is a crucial component of managing security debt. To achieve successful prioritization and remediation, organizations must also consider the exploitation context of vulnerabilities, both individually and in conjunction with others, in addition to their severity details. While companies patch thousands of vulnerabilities each month, preventing a growing backlog of vulnerabilities requires remediation best practices to tackle the continual stream of newly found vulnerabilities. This article continues to discuss the growth in open-source vulnerabilities and how to remediate them.

    Help Net Security reports "Open-Source Vulnerabilities Add to Security Debt"

  • news

    Visible to the public "Glupteba Malware Is Back in Action After Google Disruption"

    The Glupteba malware botnet has reemerged, infecting devices throughout the globe after Google halted its operation about a year ago. Google was able to disrupt the blockchain-enabled botnet in December 2021 by obtaining court orders to seize control of the botnet's infrastructure and filing complaints against two Russian operators. However, Nozomi currently says that blockchain transactions, TLS certificate registrations, and reverse engineering Glupteba samples indicate a continuous, large-scale Glupteba campaign that began in June 2022. Glupteba is a blockchain-enabled, modular malware that infects Windows devices to mine cryptocurrency, steal user credentials and cookies, and deploy proxies on Windows and Internet of Things (IoT) devices. These proxies are eventually offered to other cybercriminals as "residential proxies." The malware is primarily distributed via malvertising on Pay-Per-Install (PPI) networks and Traffic Distribution Systems (TDS), which push installers masquerading as free software, videos, and movies. Glupteba exploits the Bitcoin blockchain to evade disruption by obtaining updated lists of command-and-control (C2) servers it should contact to execute commands. Clients of the botnet acquire the C2 server address using a discover function that enumerates Bitcoin wallet servers, retrieves their transactions, and parses them to locate an AES-encrypted address. This article continues to discuss the reemergence of the Glupteba malware botnet.

    Bleeping Computer reports "Glupteba Malware Is Back in Action After Google Disruption"

  • news

    Visible to the public "New Agenda Ransomware Variant, Written in Rust, Aiming at Critical Infrastructure"

    Agenda ransomware has been spotted in the wild with a Rust edition, making it the most recent malware to adopt the cross-platform programming language after BlackCat, Hive, Luna, and RansomExx. Agenda, credited to an operator named Qilin, is a Ransomware-as-a-Service (RaaS) gang that has been linked to a slew of attacks mostly aimed at the manufacturing and Information Technology (IT) industries in several nations. An earlier version of the ransomware, written in Go and personalized for each victim, targeted the healthcare and education sectors in Indonesia, Saudi Arabia, South Africa, and Thailand, among other nations. This article continues to discuss findings regarding the new Agenda ransomware variant.

    THN reports "New Agenda Ransomware Variant, Written in Rust, Aiming at Critical Infrastructure"

  • news

    Visible to the public "New Web Tracking Technique is Bypassing Privacy Protections"

    For decades, advertisers and online trackers have been able to aggregate users' information across all of the websites they visit, mostly through the placement of third-party cookies in users' browsers. Prioritizing user privacy, numerous browsers, including Safari, Firefox, and Brave, began blocking third-party cookies for all users by default two years ago. This poses a problem for corporations that put advertisements on the Internet on behalf of other businesses and rely on cookies to track click-through rates to estimate how much they must be paid. Advertisers have responded by developing user ID (or UID) smuggling, a new method for tracking users across the web. This method does not require third-party cookies. A measurement tool called CrumbCruncher, developed by researchers at UC San Diego, has, for the first time, attempted to quantify the prevalence of UID smuggling in the wild. CrumbCruncher navigates the Internet like a typical user, but keeps track of the number of times it has been tracked using UID smuggling. The researchers discovered that UID smuggling was present in around 8 percent of CrumbCruncher's navigations. They presented these findings at the Internet Measurement Conference in Nice, France, from October 25 to 27, 2022. The team is also making their whole dataset and measurement pipeline available to browser developers. Audrey Randall, a Ph.D. student in computer science at UC San Diego and the paper's lead author, stated that the team's primary objective is to raise browser developers' awareness of the issue. She stated that UID smuggling is more prevalent than anticipated. It is unknown how much of it poses a privacy risk to users. This article continues to discuss the new UID smuggling web tracking technique bypassing privacy protections and the CrumbCruncher tool developed by researchers at UC San Diego to quantify the frequency of UID smuggling in the wild.

    UC San Diego reports "New Web Tracking Technique is Bypassing Privacy Protections"

  • news

    Visible to the public  "Bluetooth Security Challenged"

    Bluetooth was not designed to communicate secure data, but rather to connect devices wirelessly. According to Ohio State University (OSU) professor Zhiqiang Lin and post-doctoral researcher Yue Zhang, the lack of security built into the short-range wireless technology provides hackers with a simple path into Bluetooth-compatible devices. In November, they presented their most recent research on how hackers can use Bluetooth to track a user's location. Lin noted that the objective of such an attack is to circumvent the Media Access Control (MAC) address randomization employed by mobile Bluetooth devices, such as smartphones, earphones, and even hearing aids. The OSU researchers have demonstrated that the Bluetooth Address Tracking (BAT) attack vector works on more than 50 commercially available Bluetooth devices. All Original Equipment Manufacturers (OEMs) and the Bluetooth Special Interest Group (SIG) that establishes standards for the wireless technology were alerted of the issue. The BAT attack vector listens for the signal that idle Bluetooth devices transmit every 20 milliseconds in order to make their MAC address available so that other Bluetooth devices can connect to them. Periodically randomizing the MAC address was intended to avoid direct user tracking. The SIG standardization group added a list of recognized safe devices to prohibit the connection of unknown devices and strengthen security. However, according to the OSU researchers, the process of verifying an authorized device's presence has created a "signature" that hackers can use for device tracking via a side-channel attack. According to Li, the MAC address randomization system is defective because it is vulnerable to a "replay attack" in which the hacker replays a broadcast MAC address, then listens to see if the targeted device responds, thus determining whether it is on the allowed list. This article continues to discuss the demonstration of the BAT attack vector that challenges Bluetooth security.

    Communications of the ACM reports "Bluetooth Security Challenged"

  • news

    Visible to the public "Report Says That Action Is Needed to Prevent AI-Based Attacks Winning the Cyber War"

    While the use of Artificial Intelligence (AI) in cyberattacks remains relatively limited, a new paper titled "The security threat of AI-enabled cyberattacks" predicts that this will soon change. The paper, a collaboration between WithSecure, the Finnish Transport and Communications Agency (Traficom), and the Finnish National Emergency Supply Agency (NESA), examines current trends and advancements in AI, cyber threats, and places where the two interact. It is noted that AI-based cyberattacks remain uncommon and limited to social engineering applications, such as impersonation, or employed in ways not readily observable by researchers and analysts, such as data analysis in backend systems. However, the paper emphasizes that the number and quality of AI advancements have made more sophisticated cyberattacks possible in the near future. According to the analysis, target identification, social engineering, and impersonation are the most imminent AI-enabled threats today and are predicted to increase in number and sophistication over the next two years. Within the next five years, attackers will likely create AI capable of independently discovering vulnerabilities, planning and executing attack campaigns, leveraging stealth to escape defenses, and collecting data from compromised systems or open-source intelligence. The paper emphasizes that while current defenses can solve some of the difficulties posed by AI-using attackers, others require defenders to adapt and evolve. New strategies are required to combat AI-based phishing that employs synthesized material, biometric authentication system spoofing, and other impending capabilities. The report also discusses the role that non-technical solutions such as intelligence sharing, resource allocation, and security awareness training have in mitigating the threat posed by AI-driven attacks. This article continues to discuss key points made in the new report on AI-enabled cyberattacks.

    Continuity Central reports "Report Says That Action Is Needed to Prevent AI-Based Attacks Winning the Cyber War"

  • news

    Visible to the public "Meta's Bug Bounty Program Shows $2m Awarded in 2022"

    Social media giant Meta has recently awarded a total of $2m as part of its bug bounty program. The total amount since the program's establishment in 2011 is reportedly $16m. Meta stated that they received hundreds of impactful bug reports in 2022 from researchers all over the world that have helped to make our community more secure. Since 2011, Meta noted that it had received more than 170,000 reports, of which over 8500 were awarded a bounty. The numbers for 2022 alone were 10,000 reports, with issued rewards on more than 750. Meta also recently released new payout guidelines for mobile remote code execution (RCE) bugs and account takeover (ATO) and two-factor authentication (2FA) bypass vulnerabilities. They range as high as $130,000 for ATO reports and $300,000 for mobile RCE bugs.

    Infosecurity reports: "Meta's Bug Bounty Program Shows $2m Awarded in 2022"

  • news

    Visible to the public "CISA Researchers: Russia's Fancy Bear Infiltrated US Satellite Network"

    Researchers at the US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) recently detected Russian hackers lurking within a US satellite network, raising new fears about Moscow's plans to infiltrate and disrupt the space industry. Researchers linked the attack to the Russian military group known as Fancy Bear, also known as APT28. The attack involved a satellite communications provider with clients in critical infrastructure sectors in the US. In response to a warning concerning strange network behavior, CISA researchers discovered hackers in the satellite network. MJ Emanuel, a CISA incident response analyst who discussed the event at the CYBERWARCON cybersecurity conference last month, stated that Fancy Bear appears to have been in the victim's networks for months. Space security is a growing worldwide concern, particularly as businesses and militaries rely more on satellites for essential communications, the Global Positioning System (GPS), and Internet access. For example, prior to the February Russian invasion, Internet access in Ukraine was affected by a hack targeting the US telecommunications company Viasat, which offers Internet services throughout Europe. This strike, which officials attributed to Russia, is one of the most significant digital attacks of the war, prompting a warning from the FBI and CISA over the possibility of further Russian infiltration of satellite systems. The satellite network intrusion discovered by CISA is a prime example of the type of insufficient security that might provide intruders with access to networks. Fancy Bear apparently exploited a 2018 vulnerability found in an unpatched Virtual Private Network (VPN), allowing its hackers to harvest all active session credentials. This article continues to discuss the infiltration of a US satellite network by Fancy Bear.

    CyberScoop reports "CISA Researchers: Russia's Fancy Bear Infiltrated US Satellite Network"

  • news

    Visible to the public  "'High Severity' Vulnerabilities Uncovered in Three-Quarters of Operational Technology Systems"

    New Microsoft research has found that three-quarters of industrial control devices used in Operational Technology (OT) networks remain unpatched and riddled with significant vulnerabilities. The latest Cyber Signals report from Microsoft revealed that threats against OT systems and Internet of Things (IoT) devices are on the rise and pose major risks to enterprises worldwide. David Atch, leader of IoT and OT security research at Microsoft Threat Intelligence, pointed out the pervasiveness, susceptibility, and cloud connectivity of IoT and OT devices, providing a quickly growing, uncontrolled risk surface that affects a range of industries and organizations. With OT becoming more cloud-connected and the distance between Information Technology (IT) and OT decreasing, access to less-secure OT is enabling infrastructure attacks. An IDC study predicts that by 2025, more than 41 billion IoT devices will be deployed in enterprise and consumer environments. Threat actors often target connected devices such as smart speakers, cameras, and commercial appliances as initial access points. The increasing convergence of IoT and OT with traditional IT systems will require organizations to reconsider the effect and repercussions of cyber risk. OT systems underlie various critical industries, such as energy, transportation, and other essential infrastructure assets. Therefore, successful cyberattacks could have a crippling effect on the global economy. This article continues to discuss the discovery of three-quarters of industrial control devices used in OT networks containing critical vulnerabilities, as well as the evolving threat landscape and how to counter such threats.

    ITPro reports "'High Severity' Vulnerabilities Uncovered in Three-Quarters of Operational Technology Systems"

  • news

    Visible to the public "IBM to Work With Nonprofit on Cloud Security Framework for Financial Services"

    IBM has announced its collaboration with the Cloud Security Alliance (CSA) to strengthen a financial services cloud security architecture. IBM's Cloud Framework for Financial Services has been mapped to CSA's Cloud Control Matrix (CCM), allowing organizations adopting CSA's controls to use services or conduct business with Software-as-a-Service (SaaS) providers on IBM's platform. Jim Reavis, the CSA's CEO, stated that as global regulations continue to evolve, it is crucial for all organizations to adhere to changing requirements while operating in a secure cloud environment, but this is especially important for highly regulated industries such as the financial services industry. IBM has emphasized the importance of establishing a highly secured hybrid, multi-cloud architecture that enables organizations to host workloads wherever they are running. According to Shira Shamban, CEO of Solvo, it makes sense for IBM to develop specific frameworks for the financial services industry because the financial sector is typically the first to implement security and compliance technology. This article continues to discuss the new collaboration between IBM and CSA to bolster a cloud security framework for financial services.

    SC Media reports "IBM to Work With Nonprofit on Cloud Security Framework for Financial Services"

  • news

    Visible to the public "New Report Uncovers Cybersecurity Challenges Facing K-12 Schools"

    In recent years, K-12 schools have become one of the most frequently attacked public institutions in the US. While Information Technology (IT) and cyber experts in this industry have made considerable progress in implementing effective cyber defenses, there is still room for improvement. The Multi-State Information Sharing and Analysis Center (MS-ISAC) developed its first K-12 report to help K-12 leaders better comprehend their cyber risk and take immediate measures to mitigate it. The cybersecurity threat to K-12 schools is ongoing, and the potential damage of cyberattacks endangers the education system and data security. Ransomware continues to be the greatest cybersecurity threat to K-12 schools, resulting in major financial loss and days of downtime. Some K-12 ransomware infections have required months of remediation to fully resolve. In certain instances, the ransom demands of cyber threat actors have surpassed $1 million. The MS-ISAC has seen cyber threat actors sending emails to students, parents, and professors in an effort to increase pressure on schools to pay. MS-ISAC gives further information regarding the leading malware risks to K-12 schools and how threat actors typically break cyber defenses. In the 2021 Nationwide Cybersecurity Review (NCSR), a risk-based assessment that measures cybersecurity preparedness, K-12 schools showed year-over-year improvement, but scored an average of 3.55 out of 7 for cyber maturity. Nearly one-fifth of schools spend less than one percent of their IT budget on cybersecurity, which was cited as one of the top problems by K-12 respondents. Although 29 percent of MS-ISAC K-12 member schools reported being victims of cyber incidents, more than a third of K-12 members reported not having a cyber incident response plan. More should be done to safeguard K-12 institutions and students. The MS-ISAC advises K-12 institutions to adopt five decisive measures to successfully handle their cyber risk. This article continues to discuss the cyber threats faced by K-12 institutions and MS-ISAC's recommendations for bolstering the cybersecurity of these schools.

    HSToday reports "New Report Uncovers Cybersecurity Challenges Facing K-12 Schools"

  • news

    Visible to the public "New Supply Chain Attack Targeted Ukrainian Government Networks"

    Hackers are using fake Windows installers to target Ukrainian government networks in a new supply chain attack. According to a new Mandiant report, threat actors identified as UNC4166 hosted malicious files disguised as legitimate Windows 10 installs on Ukrainian and Russian-language torrent sites such as Toloka and RuTracker. Mandiant says this is a new tactic in espionage operations. Beginning in July, the researchers discovered multiple devices within Ukrainian government networks infected with malicious files. Once installed, these files drop malware that spies on and steals data from its victims. The infected files are meant to target Ukrainian users as they use the Ukrainian language pack. Mandiant also discovered additional payloads most likely deployed after the initial infection, including STOWAWAY, BEACON, and SPAREPART backdoors, which allow hackers to maintain access to the compromised computers, execute commands, transfer files, and steal information such as credentials and keystrokes. The threat actors also integrated anti-detection features into their malware. According to Mandiant, the operation would have required substantial time and resources to create and wait for the malicious files to be put on the targeted network, indicating that the attackers are security-aware. The vice president of Mandiant, John Hultquist, said several Ukrainian government organizations are among the victims of the supply chain attack. The researchers did not say which government institutions were compromised or how pirated torrent files reached their computers. Mandiant lacks sufficient information to link UNC4166 to a sponsor or previously tracked group. However, its targets overlap with organizations attacked with wipers by the Russian military intelligence-associated group Fancy Bear. This article continues to discuss the new supply chain attack targeting Ukrainian government networks.

    The Record reports "New Supply Chain Attack Targeted Ukrainian Government Networks"

  • news

    Visible to the public "Agenda Ransomware Switches to Rust to Attack Critical Infrastructure"

    The Agenda ransomware group has recently been observed developing new malware using the Rust programming language and using it to breach several companies. Security researchers at Trend Micro stated that the companies the ransomware group claimed to have breached on its leak site are located in different countries and mainly belong to the manufacturing and IT industries. They have a combined revenue of around $550m. The researchers stated that they found a sample of the Agenda ransomware written in Rust language and that the variant has also been seen using intermittent encryption tactics to deliver faster encryption and avoid detection more efficiently. The researchers noted that the same ransomware, originally written in Go language, was known for targeting healthcare and education sectors in countries like Thailand and Indonesia. Unlike the previous Golang variant, the Agenda ransomware group did not include the victim's credentials in the Rust variant's configuration. This feature of the latter prevents other researchers not only from visiting the ransomware's chat support site but also from accessing the threat actors' conversations when a sample becomes available externally. The technique would also prevent unsolicited messages from other people besides the victim. The researchers noted that the Agenda ransomware group is one of many slowly migrating its ransomware code to Rust. The researchers stated that the Rust language is becoming more popular among threat actors as it is more difficult to analyze and has a lower detection rate by antivirus engines.

    Infosecurity reports: "Agenda Ransomware Switches to Rust to Attack Critical Infrastructure"

  • news

    Visible to the public "NSA Publishes 2022 Cybersecurity Year in Review"

    The National Security Agency (NSA) has released its Cybersecurity Year in Review for 2022 to discuss its mission priorities and demonstrate how it bolsters the nation's cybersecurity. This year's review emphasizes NSA's capacity to scale cybersecurity solutions through partnerships, resulting in increased speed and agility. Rob Joyce, NSA Cybersecurity Director, stated that by securing the most sensitive networks of the US government, solutions are cascaded to help protect critical infrastructure, US allies, businesses, and consumers worldwide. The Year in Review highlights NSA's efforts, such as collaborating with industry to harden billions of endpoints against active and ongoing nation-state threats, disclosing zero-day vulnerabilities to vendors for remediation before nation-state actors exploit them, releasing cybersecurity guidance to protect against active adversary and cybercriminal threats, and more. The Cybersecurity Collaboration Center (CCC) of the NSA has increased its industry partnerships to over 300 in the past year. NSA combines Signals Intelligence (SIGINT) insights with those of industry partners at the CCC to provide intelligence-driven cybersecurity that protects the nation and its allies. The agency uses encryption to protect millions of devices, and the agency also oversees the infrastructure necessary to key those devices. This involves the production and distribution of the keys, codes, and other cryptographic materials that the US government and military employ to secure weapons, satellites, communications, and a variety of other systems crucially important to the nation's security. This article continues to discuss NSA's 2022 Cybersecurity Year in Review.

    NSA reports "NSA Publishes 2022 Cybersecurity Year in Review"

  • news

    Visible to the public  "Chinese MirrorFace APT Group Targets Japanese Political Entities"

    Researchers at ESET recently uncovered a spear-phishing campaign aimed at Japanese political entities and linked it to the Chinese-speaking Advanced Persistent Threat (APT) group called MirrorFace. The researchers monitored the campaign dubbed Operation LiberalFace, targeting Japanese political entities in a particular political party. The spear-phishing messages were used to deliver the LODEINFO backdoor, which is an implant used to drop additional payloads and exfiltrate sensitive data from the victims' systems. The researchers also shared details on the deployment of a previously unknown credential stealer named MirrorStealer. One of the spear-phishing messages examined by the researchers appeared to be an official communication from the Public Relations department of a certain Japanese political party. The email contained a request for the House of Councillors elections, with an attachment that, when executed, installed the LODEINFO malware. The email encouraged recipients to post the linked films on their own social media pages. This article continues to discuss the MirrorFace APT group targeting Japanese political entities.

    Security Affairs reports "Chinese MirrorFace APT Group Targets Japanese Political Entities"

  • news

    Visible to the public "FuboTV Hit With Cyberattack During World Cup Semifinal Match"

    FuboTV, a live-TV bundle streaming service, recently said it was the target of a criminal cyberattack affecting customers trying to access their subscriptions during the World Cup semifinal match between France and Morocco. Once the attack was detected, FuboTV said, it took immediate steps to contain the incident and was able to restore service by Wednesday evening. FuboTV noted that the cyberattack was reported to law enforcement and that the company has engaged Mandiant to assist in its investigation and response. The investigation is still in the early stages, and the company said it would remain transparent and provide updates when it has further information to share. FuboTV said as of September 30th, it had roughly 1.2 million paying subscribers, a 31% increase year over year.

    CNBC reports: "FuboTV Hit With Cyberattack During World Cup Semifinal Match"

  • news

    Visible to the public  "89% Of Organizations Have Been Hit by an Identity-Based Attack in the Past Year"

    In 2022, identity-based attacks struck every industry and the top companies, and these attacks are not expected to slow down. A recent analysis from One Identity, based on a survey of more than 1,000 Information Technology (IT) security professionals, supports this, indicating that 89 percent of enterprises have been the target of an identity-based attack during the past 12 months. This increase in identity-based attacks is prompting enterprises to reevaluate their defenses, as 80 percent believe that improved identity management systems could have mitigated the impact of many of these attacks. Since the beginning of identity management systems, businesses have been compelled to implement a multitude of access management solutions. However, over the past six decades of identity management, this process has remained the same, and businesses continue to use various siloed solutions. Currently, 96 percent of organizations use several identification solutions, with 46 percent installing at least 25 distinct systems. More does not always equate to better security. Seventy percent of firms spend money on tools they are not even using. Furthermore, the inefficiencies caused by the usage of several technologies cost 42 percent of businesses over $100,000 annually. In response to these expenses, more than half (51 percent) of businesses plan to consolidate their identity security technologies within the next year. Forty-eight percent feel that consolidation will eliminate the time-consuming and costly process of managing multiple identification systems, while 37 percent say it will make it easier to react to the constantly shifting threat landscape. This article continues to discuss identity-based attacks and key findings from One Identity's survey of IT security professionals on the challenges fragmented identity tools create for organizations' security posture.

    VB reports "89% Of Organizations Have Been Hit by an Identity-Based Attack in the Past Year"

  • news

    Visible to the public "Research Finds TikTok Shows New Users Harmful Content Quickly"

    Researchers at the Center for Countering Digital Hate (CCDH) have discovered that the popular social media app TikTok feeds harmful content to a primarily teenage audience within the first half hour of using it. The CCDH conducted the study, setting up eight new accounts, posing as 13-year-old users, and recording what videos were played in the first 30 minutes of using it. The researchers scrolled TikTok's "For You" page, which over time, caters itself to users based on how they engage with the content. The researchers found that TikTok played body image and mental health-related videos every 39 seconds. New accounts were recommended videos discussing eating disorders and self-harm "within minutes." The researchers noted that content directly addressing suicide played every 2.6 minutes, and some eating disorder videos have more than 13 billion views. The researchers pointed out that the report they created is not peer-reviewed and that eight samples is a relatively small sample size to be scientifically reliable. The researchers interacted with all videos featuring body image, mental health, and eating disorders by pausing and liking the videos. The researchers noted that four of the accounts were given generic female usernames and designated their locations as the United States, United Kingdom, Australia, and Canada. The other four accounts were given "loseweight" usernames to test if TikTok would show different content. These were considered "vulnerable" teen accounts, which CCDH opines TikTok deliberately targets with more harmful content. The researchers stated that rather than entertainment and safety, their findings reveal a toxic environment for TikTok's youngest users, intensified for its most vulnerable. The researchers noted that the "loseweight" TikTok accounts were shown three times as many harmful videos and 12 times as many self-harm videos. CCDH ends its report by calling on social media platforms like TikTok to take responsibility for the potential harm they may cause. A spokesperson from TikTok said the behavior by researchers does not accurately "reflect genuine behavior or viewing experiences of real people."

    UPI News reports: "Research Finds TikTok Shows New Users Harmful Content Quickly"

  • news

    Visible to the public "Georgia, NH Latest States to Ban TikTok From State Computers"

    On Thursday, Governors Brian Kemp of Georgia and Chris Sununu of New Hampshire immediately banned the use of TikTok and popular messaging applications from all computer devices controlled by their state governments. The governors noted that the Chinese government may be able to access users' personal information. Both Republican governors also banned the messaging app WeChat and other apps owned by the Chinese firm Tencent. Sununu went further, banning apps owned by Chinese firm Alibaba and telecommunications hardware and smartphones made by Chinese firms, including Huawei and ZTE. Kemp also banned Telegram, saying its Russian control poses similar risks. Sununu ordered state agencies to remove any prohibited software or hardware within 30 days. Kemp and Sununu are among at least 14 governors to take such an action, part of a wave that also includes calls for Congress to ban the use of the programs from federal government computers. Other states that have issued bans include Alabama, Idaho, Iowa, Maryland, Nebraska, North Dakota, Oklahoma, South Carolina, South Dakota, Texas, and Utah.

    The Associated Press reports: "Georgia, NH Latest States to Ban TikTok From State Computers"

  • news

    Visible to the public "HKU Mechanical Engineering Team Develops New Microscale 3D Printer for Multi-Level Anti-counterfeiting Labels"

    Counterfeiting endangers the world's economy and security. The value of global counterfeit and pirated products is estimated to be between $1.7 and $4.5 trillion per year, according to a report issued by the US Patent and Trademark Office (USPTO) in 2020. Conventional anti-counterfeiting approaches, such as QR codes can be easily fabricated because of limited data encryption capacity on a planar space. Therefore, researchers have been looking at increasing encryption density in a limited space. Dr. Ji Tae Kim of the Department of Mechanical Engineering at the University of Hong Kong (HKU) led the development of a high-precision 3D printing method capable of producing new polarisation-encoded 3D anti-counterfeiting labels. This new 3D label has the ability to encrypt more digital information than a traditional 2D label. The work titled, "Three-Dimensional Printing of Dipeptides with Spatioselective Programming of Crystallinity for Multi-level Anti-counterfeiting," was published in Nano Letters. The new 3D printing method, when combined with nature-driven molecular self-assembly, can produce multi-segmented 3D FF micro-pixels with programmed crystallinity for high-density data encryption. A tiny single 3D pixel can encrypt a multi-digit binary code consisting of "0" and "1" through the use of different responses of the amorphous and crystalline segments to polarised light. This article continues to discuss the high-precision 3D printing method developed to produce new polarisation-encoded 3D anti-counterfeiting labels, which can encrypt more digital information than traditional 2D labels.

    University of Hong Kong reports "HKU Mechanical Engineering Team Develops New Microscale 3D Printer for Multi-Level Anti-counterfeiting Labels"

  • news

    Visible to the public "CMS Subcontractor Breach Potentially Exposes Sensitive Data of 254,000 Customers"

    According to the Centers for Medicare and Medicaid Services (CMS), personal data, including bank routing and account information for 254,000 people, may have been compromised during a ransomware attack on an agency subcontractor. CMS stated that the subcontractor, Healthcare Management Solutions (HMS), is operating under a contract with ASRC Federal Data Solutions LLC to resolve system errors related to Medicare beneficiary entitlement and premium payment records. HMS also supports the collection of Medicare premiums from the direct-paying beneficiary population. The incident occurred on October 8, per a sample letter from CMS to affected recipients. CMS stated that it was informed that the subcontractor's systems were involved in a cybersecurity incident, but CMS systems were not affected. According to the letter, CMS assessed with "high confidence" that the event may have involved sensitive data. Initial evidence suggests that HMS violated its commitments to CMS, and CMS continues to examine the event. In addition to banking information, the attack may have compromised the names, addresses, dates of birth, Social Security numbers, Medicare Beneficiary Identifiers (MBIs), as well as Medicare entitlement, enrollment, and premium information of beneficiaries. This article continues to discuss the CMS subcontractor breach that has exposed sensitive data of 254,000 individuals.

    NextGov reports "CMS Subcontractor Breach Potentially Exposes Sensitive Data of 254,000 Customers"