News Items

  • news

    Visible to the public "Will Protect Personal Data Behind New Algorithms"

    Ume University's Xuan-Son Vu, a postdoctoral fellow in computing science, is involved in a new research collaboration that will help researchers comply with the EU's General Data Protection Regulation (GDPR). According to Xuan-Son Vu, new methods will be developed to automatically mask sensitive information and separate it from the data researchers require. Researchers worldwide must be able to share research information with one another to gain new knowledge and remain at the forefront. However, there is a risk that people mentioned in words in various masses of text can be identified. According to Xuan-Son Vu, there could be information about a person's name, where they live, or their political beliefs. The new research project "Grandma Karl is 27: Automatic pseudonymization of research data" aims to address difficult and important challenges in pseudonymization. The goal is to develop linguistic algorithms that detect personal data and sensitive information in large amounts of text and automatically replace the words with appropriate pseudonyms. As a result, personal data can be protected in this way, and all texts can be used in various types of research. This article continues to discuss the project aimed at automatically masking personal and sensitive information and separating it from the data required by researchers.

    UMU reports "Will Protect Personal Data Behind New Algorithms"

  • news

    Visible to the public "Most Apps Used in US Classrooms Share Students' Personal Data With Advertisers, Researchers Find"

    According to a new study conducted by the nonprofit Internet Safety Labs, 96 percent of apps used in K-12 schools in the US share children's personal information with third parties, including advertisers, often without the knowledge or consent of users or schools. The study shows how the race by schools to expand their technological arsenal has put students and their parents in a position of not knowing where their personal information is going. The researchers examined 13 schools in each state, resulting in a total of 663 schools representing nearly 500,000 students. They discovered that most schools had more than 150 approved classroom technologies. The report builds on previous research conducted by the group, formerly known as the Me2B Alliance, which discovered that hundreds of advertisers obtained valuable student data from a website specializing in school sports data. According to the most recent report, the exposure of student data to advertisers via school-approved technology is widespread. Almost a quarter of the apps recommended or required by schools contained advertisements, and 13 percent had retargeting advertisements, which allow digital advertisers to target visitors based on previous website visits. There is a risk that student data will be pulled into advertising networks with no way for schools or parents to find out. Several states, including California, prohibit the use of student data for this type of targeting. Google was the most common third-party that received data from school apps. Almost 70 percent of all apps were found to be sending data to Google, and 70 percent of them included Google Software Developer Kits (SDKs). Some of this is due to Google's dominance as a hardware and software supplier for K-12 schools. Researchers discovered that customized apps for schools were less safe than the general pool of apps studied. For example, researchers discovered that 81 percent of custom apps requested access to location information. Furthermore, 69 percent of custom apps accessed calendars, contacts, and other social information. This article continues to discuss findings from Internet Safety Labs' exploration of children's educational technology safety across US schools.

    CyberScoop reports "Most Apps Used in US Classrooms Share Students' Personal Data With Advertisers, Researchers Find"

  • news

    Visible to the public "California Hit By Cyberattack, LockBit Claims Responsibility"

    California's Cybersecurity Integration Center (Cal-CSIC) recently confirmed that California's finance department had recently been hit by a cyberattack. Upon identification of the threat, digital security and online threat-hunting experts were rapidly deployed to assess the extent of the intrusion and to evaluate, contain and mitigate future vulnerabilities. The Cal-CSIC noted that while they cannot comment on specifics of the ongoing investigation, they confirmed that no state funds had been compromised. The Russia-affiliate ransomware group Lockbit is claiming responsibility for the attacks. LockBit said they have stolen 76GB of data, including IT and financial documents, confidential data, and "sexual proceedings in court." They added that the Department of Finance has until December 24 to pay up, or else the group will publish a cache of stolen files. The California Budget website remains offline. The security incident comes weeks after a report from Trellix confirmed LockBit ransomware remained the most widespread in the third quarter of 2022.

    Infosecurity reports: "California Hit By Cyberattack, LockBit Claims Responsibility"

  • news

    Visible to the public "What Dangerous Security Vulnerabilities Can Access Control Systems Have?"

    Many access control systems that use facial recognition technology are insecure. They can be breached, deceived, and shown a person's photo on the phone screen rather than their actual face. A typical access control system consists of a device in a metal case with a screen and a front-facing camera aimed at the visitor. Face recognition occurs within the device. Photos taken during the authentication process are not transmitted to a central server. The tablet's processor power is sufficient to perform recognition on its own. A typical deployment architecture includes several of such devices and a central server that synchronizes the user base across devices. There are several vulnerabilities that can come into play here. The device is protected from physical interference by its metal case, but an open USB port can ruin everything. Its purpose is to service the device, but malicious actors can connect their devices and use them to install spyware or run malicious code. Another widespread issue is the device's firmware, which is sometimes based on an old version of Android from several years ago. Many security-related improvements have been made to the operating system over the years. One of the primary reasons devices are breached is because of operating system vulnerabilities. Many access control systems still use HTTP to communicate between the device and the server. All information is sent in clear text and can be intercepted. Administrative commands are also sent in plain text. An attacker with access to the network to which the tablet is connected can intercept network traffic between the access control system and the server, and obtain the information required to carry out attacks. Hackers can register a user, give that user an administrator role, delete that user, and begin synchronization. Some developers exacerbate the vulnerability by creating a completely ineffective device authentication procedure. This article continues to discuss the potential security vulnerabilities faced by access control systems.

    BetaNews reports "What Dangerous Security Vulnerabilities Can Access Control Systems Have?"

  • news

    Visible to the public "'Crisis Situation' Declared as Two Swedish Municipalities Hit by Cyberattack"

    Following a cyberattack, the Swedish municipalities of Borgholm and Morbylnga have declared a "crisis situation." An intrusion into the joint Information Technology (IT) system used by the two municipalities, which comprise the island of Oland with a population of just over 25,000 people, has been confirmed. Staff disconnected both districts' official systems from the Internet overnight, and external actors were brought in as part of the councils' incident management response, according to Borgholm municipal manager Jens Odevall. While Morbylnga's website is unavailable, Borgholm's website is hosted by an outside provider and is still accessible. However, a number of citizen services provided by both municipalities, including email and some healthcare services, are now unavailable. Local healthcare providers have reverted to using pen and paper. The nature of the incident has not yet been revealed, but it follows a series of ransomware attacks on European municipalities, including Antwerp, Belgium. This article continues to discuss the impact of a cyberattack on the Swedish municipalities of Borgholm and Morbylanga.

    The Record reports "'Crisis Situation' Declared as Two Swedish Municipalities Hit by Cyberattack"

  • news

    Visible to the public "Fortinet Urges Customers to Fix Actively Exploited FortiOS SSL-VPN Bug"

    Fortinet has patched an actively exploited FortiOS SSL-VPN flaw, which could allow a remote, unauthenticated attacker to execute arbitrary code on devices. Fortinet strongly advises customers to update their installations in order to address the FortiOS SSL-VPN vulnerability, tracked as CVE-2022-42475. According to Fortinet, the vulnerability is a heap-based buffer overflow issue in FortiOS sslvpnd. A heap overflow is a type of buffer overflow that occurs when a chunk of memory is allocated to the heap and data is written to it without any bound checking. This can result in the overwriting of critical heap data structures such as heap headers or any heap-based data such as dynamic object pointers, which can then result in the overwriting of the virtual function table. The vulnerability impacts FortiOS version 7.2.0 through 7.2.2, FortiOS version 7.0.0 through 7.0.8, and more. A remote attacker can also use the flaw to execute commands through specially crafted requests. This article continues to disucss the actively exploited FortiOS SSL-VPN bug.

    Security Affairs reports "Fortinet Urges Customers to Fix Actively Exploited FortiOS SSL-VPN Bug"

  • news

    Visible to the public "December Headline: Python, C and C++ Competing For Language of The Year Award"

    According to the TIOBE Index, which promises to check more than one billion lines of code every day in an effort to keep on top of usage, noted that Python remains the most popular coding language, affording a 16.66% rating, just a touch ahead of C in second place, which ranks at 16.56%. Researchers at the TIOBE Index noted that percentages are calculated not on market share but are instead "based on the number of skilled engineers worldwide, courses, and third-party vendors." The researchers stated that December 2021's third place prize to Java has been challenged in the latest round of figures, as it dropped in ratings by 1.7% to fourth place. Toppling Java off its podium, C++ witnessed a substantial 4.21% growth, but in reality, at 11.94% and 11.82%, both programming languages remain incredibly tight as they continue to be favored by developers worldwide. Rounding up the top five was C# at 4.92%, with JavaScript coming in at 7th place, PHP in 12th, and Apple's Swift coding language in 15th, down from 10th this time last year. The researchers noted that TIOBE's latest figures show that there is a very clear quartet of preferred programming languages that are likely to continue battling it out for top place alone unless another language experiences a significant surge in popularity.

    TIOBE reports: "December Headline: Python, C and C++ Competing For Language of The Year Award"

  • news

    Visible to the public "24% of Technology Applications Contain High-Risk Security Flaws"

    During a new study, security researchers at Veracode found that with more applications to contend with than other industries, tech firms would benefit from implementing improved secure coding training and practices for their development teams. The researchers found that 24 percent of applications in the technology sector contain security flaws that are considered high risk, meaning they would cause a critical issue for the application if exploited. The researchers noted that organizations whose developers had completed just one lesson in their hands-on Security Labs training program fixed 50 percent of flaws two months faster than those without such training. The researchers stated that the technology industry has the second-highest proportion of applications that contain security flaws, at 79 percent, making it marginally better than the public sector at 82 percent. The tech sector lands in the middle of the pack when it comes to the proportion of flaws that are fixed. The researchers noted that tech firms are comparatively quick to fix software security flaws. However, the industry still takes up to 363 days to fix 50 percent of flaws, suggesting there is still ample room for improvement. Server configuration, insecure dependencies, and information leakage are the most common types of flaws discovered by dynamic analysis of technology applications. The researchers noted that the sector exhibits the highest disparity from the industry average for cryptographic issues and information leakage, perhaps indicating that developers in the tech industry are more savvy on data protection challenges.

    Help Net Security reports: "24% of Technology Applications Contain High-Risk Security Flaws"

  • news

    Visible to the public "As Wiretap Claims Rattle Government, Greece Bans Spyware"

    Lawmakers in Greece recently approved legislation banning commercial spyware and reforming rules for legally-sanctioned wiretaps following allegations that senior government officials and journalists had been targeted by shadowy surveillance software. Under the new law, the use, sale, or distribution of spyware in Greece will carry a penalty of a two-year minimum prison sentence. Additional safeguards were also planned for legal wiretaps. The government insists its agencies have never used the spyware. A prosecutor from Greece's Supreme Court is heading an investigation into the surveillance allegations. At the same time, the use of spyware in Greece and several other European Union members is also the subject of a European Parliament inquiry.

    SecurityWeek reports: "As Wiretap Claims Rattle Government, Greece Bans Spyware"

  • news

    Visible to the public "Uber Suffers Data Breach After Attack on Third-Party Vendor"

    A threat actor named "UberLeaks" published employee email addresses, Information Technology (IT) asset information, and corporate reports online, resulting in a new data breach for Uber. The stolen Uber and Uber Eats data was published on a hacking forum known for publishing data breaches. Archives claiming to be source code associated with Mobile Device Management (MDM) platforms used by Uber and Uber Eats, as well as third-party vendor services, have been leaked. Uber confirmed that its data was stolen in a breach on Teqtivity, the company's asset management and tracking service. The third-party company also acknowledged the cybersecurity incident. The threat actor gained unauthorized access to Teqtivity's systems, compromising customer data. They infiltrated the Teqtivity Amazon Web Services (AWS) backup server containing code and data files pertaining to Teqtivity customers. According to the firm, the data exposed included device information such as serial number, make, model, and technical specs, as well as user data such as first name, last name, work email address, and work location details. Each post on the hacking forum refers to a Lapsus$ hacking group member. This group is suspected of being behind many high-profile attacks, including a September attack on Uber in which cybercriminals gained access to the company's internal network and Slack server. However, Uber claims that the Lapsus$ group is unrelated to this specific breach. The company also stated that it had not observed any malicious access to its systems. Nonetheless, security experts say that the leaked data contains enough information for targeted phishing attacks on Uber employees. This article continues to discuss the new data breach faced by Uber.

    Cybernews reports "Uber Suffers Data Breach After Attack on Third-Party Vendor"

  • news

    Visible to the public "Security Overlooked in Rush to Hybrid Working"

    Security researchers at Apogee have discovered that security is a priority for less than a fifth (14%) of organizations looking to transition fully to a hybrid or remote workforce, leaving many exposed to cyber risk. The researchers polled 100 SME IT directors in the UK and 100 of their counterparts in the public sector. The researchers noted that a quarter of respondents identified security challenges that have impacted their progress in digital transformation. This is a common problem for organizations that fail to prioritize security by design in such projects. Without security front-and-center, initiatives can be quickly derailed by breaches and other incidents. Only a third (34%) of respondents claimed that they have endpoint security in place, and only 26% have device encryption. In addition, only a fifth (19%) have an "end-of-life plan" in place for their devices, and a further 30% plan to implement one in the future. That still leaves around half of the respondents with no such plans, putting devices potentially at risk if they are allowed to remain functional with no vendor patches being issued. The researchers also found that almost one in three (29%) IT directors said they only audit their IT estate between once a month and once every 4-6 months, which could leave both networks and devices vulnerable to cyberattacks. Nearly two-thirds (64%) admitted they are not very confident in their IT estate's ability to meet compliance requirements.

    Infosecurity reports: "Security Overlooked in Rush to Hybrid Working"

  • news

    Visible to the public "Aussie Data Breaches Surge 489% in Q4 2022"

    Security researchers at Surfshark have found that Australia had the highest "data breach density" in the world as of the fourth quarter. On average, 7387 user accounts were leaked per 100,000 Australians during the first two months of this quarter, making its breach density 24 times higher than the global average. The researchers noted that Russia came in second (2568 accounts per 100,000), followed by Turkey (2421 per 100,000). The researchers stated that so far this quarter, an average of 22 Australian accounts have been breached every minute, versus just two in the previous quarter. This is primarily down to the 1.88 million Australian user profiles stolen during October and November, which itself is up from 300,000 in Q3 2022. The researchers noted that this is a 489% increase, Australia's highest quarterly spike in data breach count this decade. The researchers noted that globally, data breaches have gone down by 70.8% from October to November. In Australia, however, data breaches have surged by 1550%, from 107,659 in October to 1,776,065 in November. The researchers noted that Australia is still only 16th in the world by total data breach count. Since 2004, the country has had 125.8 million accounts breached versus 9.73 billion in the US.

    Infosecurity reports: "Aussie Data Breaches Surge 489% in Q4 2022"

  • news

    Visible to the public "Metaparasites & the Dark Web: Scammers Turn on Their Own"

    Cybercriminals are typically considered parasites that feed on various victims, but they have become targets themselves as there are "metaparasites" going to dark web marketplaces to find their own set of targets. Metaparasites present the unintended consequence of exposing threat intelligence to researchers, including contact and location information for cybercriminals. Sophos senior threat researcher Matt Wixey spoke about the metaparasite ecosystem in a session titled "Scammers Who Scam Scammers, Hackers Who Hack Hackers" at Black Hat Europe 2022. According to research he conducted with his colleague Angela Gunn, the underground economy is rife with a diverse set of fraudsters who successfully extract millions of dollars per year from other cybercriminals. The researchers examined data from three dark web forums over a 12-month period and discovered thousands of successful scam attempts. Over the course of a year, scammers defrauded users of these forums out of approximately $2.5 million. The amounts per scam can range from $2 to the low six figures. Cybercriminals have been observed using various tactics on these forums, but one of the most common is the "rip and run." A buyer receives goods such as an exploit but fails to pay for them, or a seller is paid but fails to deliver on what was promised. Scammers have left the marketplace and refused to respond to any inquiries. It is the dark web's equivalent of the dine-and-dash tactic. There are also a lot of scammers selling fake goods, such as nonexistent cryptocurrency accounts, macro builders that do not build anything malicious, fake data, or databases that are either already public or have previously been leaked. This article continues to discuss findings from the investigation of metaparasites on dark web forums and how these findings can help security researchers.

    Dark Reading reports "Metaparasites & the Dark Web: Scammers Turn on Their Own"

  • news

    Visible to the public "State-Sponsored Attackers Actively Exploiting RCE in Citrix Devices, Patch ASAP! (CVE-2022-27518)"

    The National Security Agency (NSA) has warned that a Chinese state-sponsored group is exploiting an unauthenticated Remote Code Execution (RCE) flaw, tracked as CVE-2022-27518, to compromise Citrix Application Delivery Controller (ADC) deployments. Compromising Citrix ADCs can facilitate illegitimate access to targeted organizations through the circumvention of normal authentication controls. The flaw results from vulnerable devices' software failing to maintain control over a resource throughout its creation, use, and release, thus allowing remote attackers to execute arbitrary code on vulnerable appliances without prior authentication. The zero-day vulnerability impacts both Citrix ADC and Citrix Gateway. Citrix ADC is typically used to provide load-balanced, secure remote access to Citrix Virtual Apps and Desktops applications. Citrix Gateway is a secure remote access solution that includes identity and access management capabilities as well as Single Sign-On (SSO) for various hosted applications. The NSA has published threat-hunting guidance for organizations to determine whether their Citrix ADC environments have been compromised. The agency has linked the attacks to APT5, also known as UNC2630 and MANGANESE. APT5 has been targeting and breaching organizations in a variety of industries, particularly telecommunications and technology firms, for over a decade. Previously, the group was known to exploit vulnerabilities in Virtual Private Network (VPN) products from Fortinet, Palo Alto Networks, and Pulse Secure. This article continues to discuss the discovery and exploitation of the RCE vulnerability impacting Citrix ADC and Citrix Gateway appliances.

    Help Net Security reports "State-Sponsored Attackers Actively Exploiting RCE in Citrix Devices, Patch ASAP! (CVE-2022-27518)"

  • news

    Visible to the public "Cryptocurrency Mining Campaign Hits Linux Users With Go-Based CHAOS Malware"

    An open-source Remote Access Trojan (RAT) called CHAOS was used in a cryptocurrency mining attack against the Linux operating system. Trend Micro discovered the threat in November 2022, and it has remained nearly the same in all other aspects, including terminating competing malware, and security software, and deploying the Monero (XMR) cryptocurrency miner. According to researchers David Fiser and Alfredo Oliveira, the malware achieves persistence by modifying a UNIX task scheduler that, in this case, downloads itself every 10 minutes from Pastebin. This is followed by the download of next-stage payloads, which include the XMRig miner and the Go-based CHAOS RAT. According to the cybersecurity firm, the main downloader script and additional payloads are hosted in multiple locations to ensure that the campaign stays active and new infections continue. Once downloaded and launched, the CHAOS RAT sends detailed system metadata to a remote server. It has the ability to perform file operations, take screenshots, shut down and restart the computer, and open arbitrary URLs. This article continues to discuss the use of the Go-based CHAOS RAT in cryptocurrency mining attacks targeting Linux users.

    THN reports "Cryptocurrency Mining Campaign Hits Linux Users With Go-Based CHAOS Malware"

  • news

    Visible to the public "New Python Malware Backdoors VMware ESXi Servers for Remote Access"

    A previously unknown Python backdoor targeting VMware ESXi servers has been discovered, allowing hackers to remotely execute commands on a compromised system. VMware ESXi is a virtualization platform that is commonly used in the enterprise environment to host multiple servers on a single device while making better use of CPU and memory resources. Juniper Networks researchers discovered the new backdoor while exploring a VMware ESXi server. However, due to limited log retention, they could not determine how the server was compromised. They suspect the server was compromised by exploiting the CVE-2019-5544 and CVE-2020-3992 vulnerabilities in ESXi's OpenSLP service. Although the malware can target Linux and Unix systems, Juniper's analysts discovered multiple indications that it was designed for ESXi attacks. This article continues to discuss the new Python backdoor targeting VMware ESXi servers.

    Bleeping Computer reports "New Python Malware Backdoors VMware ESXi Servers for Remote Access"

  • news

    Visible to the public "Xnspy Stalkerware Spied on Thousands of iPhones and Android Devices"

    A monitoring app called Xnspy has stolen data from tens of thousands of iPhones and Android devices, and most owners are unaware that their data has been compromised. Xnspy is one of many stalkerware apps marketed as allowing a parent to monitor their child's activities but are used by many to spy on a spouse or domestic partner's devices without their permission. Stalkerware apps, also known as spouseware, are installed covertly by someone with physical access to a person's phone, bypassing on-device security protections, and are designed to remain hidden from home screens, making them difficult to detect. Once installed, these apps will silently and continuously upload the contents of a person's phone, including call history, text messages, photos, browsing history, and precise location data, giving the person who planted the app near-complete access to the victim's data. New research shows that many stalkerware apps have security flaws and expose data stolen from victims' phones. Security researchers Vangelis Stykas and Felipe Solferini spent months examining several known stalkerware apps and analyzing the edges of the networks to which the apps send data. Their study discovered common and easy-to-find security vulnerabilities in several stalkerware families, including Xnspy, such as credentials and private keys left in the code by the developers and broken or nonexistent encryption. In some cases, the flaws expose the victims' stolen data, which is now on the insecure servers of someone else. Stykas and Solferini discovered clues and artifacts that identified the individuals behind each operation during their research, but did not share details of the vulnerabilities with the stalkerware operators or publicly disclose details about the flaws for fear of benefiting malicious hackers and further harming victims. According to Stykas and Solferini, all of the flaws they discovered are simple to exploit and have most likely existed for years. This article continues to discuss the Xnspy monitoring app stealing data from iPhones and Android devices.

    TechCrunch reports "Xnspy Stalkerware Spied on Thousands of iPhones and Android Devices"

  • news

    Visible to the public "Cyber Security Experts Identify New Threat to Blockchain Technology"

    A team of researchers from Charles Darwin University (CDU) and the University of Tehran in Iran discovered a new cyber threat that brings blockchain security in critical infrastructure into question. The study labeled the new cyber threat a misleading attack due to its intent to deceive miners. Miners perform computations to validate transactions on a blockchain in order to keep it up to date, and are compensated with cryptocurrency. With this new strategy to mislead miners, the system is at risk. The attack misleads blockchain miners by stealing some of their computational power and redirecting it to a different chain or fork. Miners are compensated for using their computational power to verify transactions on the blockchain of a specific cryptocurrency. The misleading attack is carried out by someone who redirects some miners' computational power to a different chain in order for the attacker to outrun the main chain and thus become the dominant one. The chain to which miners are being misdirected is designed to fail in competition, as is the main chain. Everything is set up for the attacker's chain to win and become dominant. This vulnerability can also help other types of blockchain attacks succeed. This new blockchain attack method is concerning because its success rates are high, and the blockchain technology was being used in critical infrastructures. There is a widespread belief that blockchain, such as Bitcoin, is safe and secure from attack, but this new misleading attack, as well as some other high-profile attacks costing millions of dollars, have demonstrated that blockchain technology is not as secure as it needs to be. According to the researchers, if no preventive measures are taken, this attack has the potential to undermine trust in blockchain security and reduce its value. Significant consequences can be expected if such a blockchain is ever used in critical infrastructure or financial systems. This article continues to discuss the study and findings behind a new misleading attack on Bitcoin.

    CDU reports "Cyber Security Experts Identify New Threat to Blockchain Technology"

  • news

    Visible to the public "Future-Proofing Cybersecurity in the Indo-Pacific Region"

    The Post-Quantum Cryptography in the Indo-Pacific Program (PQCIP) is a new project led by Monash University researchers in collaboration with the Oceania Cyber Security Centre (OCSC) that aims to train organizations across the Indo-Pacific region in order to help them protect themselves against emerging cybersecurity threats. The researchers are looking for participants from 11 Indo-Pacific countries focused on cybersecurity and Information Technology (IT) to receive free training in advanced cryptography to help protect against threats from quantum computers. The PQCIP is seeking collaboration with organizations and government bodies in Malaysia, Indonesia, Samoa, Tonga, Vanuatu, Papua New Guinea (PNG), Kiribati, the Federated States of Micronesia (FSM), Tuvalu, the Cook Islands, and Nauru. Associate Professor Ron Steinfeld of Monash University's Faculty of IT stated that encryption is one of the most important safeguards against data breaches. However, most currently deployed cryptography is not resistant to attacks from large-scale quantum computers, which can rapidly decrypt most of today's encrypted data, and such computers are expected to become a reality in the coming years, according to Associate Professor Steinfeld. There has been a significant increase in cyberattacks and data leaks recently. Therefore, it is critical now to help neighboring countries boost their capabilities to counter current cyber threats while also preparing for the next generation of attacks. Cybersecurity experts from Monash and OCSC will lead participants in the PQCIP through a detailed assessment of their current post-quantum cybersecurity capabilities, tailored education, planning, and cyber threat evaluation. Dr. James Boorman, OCSC Head of Research and Capacity Building, stated that the program aims to provide participants with an advanced understanding of post-quantum cryptography, comprehensive knowledge of related tools, and the ability to create their transition plan to protect their organizations from quantum computing threats. This article continues to discuss the goals of the PQCIP project.

    Monash University reports "Future-Proofing Cybersecurity in the Indo-Pacific Region"

  • news

    Visible to the public  "Why Deepfake Phishing Is a Disaster Waiting to Happen"

    People have used Artificial Intelligence (AI) technology to distort reality as it has advanced. They have made fake images and videos of Tom Cruise, Mark Zuckerberg, and other high-profile individuals. While many of these applications are harmless, others, such as deepfake phishing, are far more sinister. A new wave of threat actors is using AI to create synthetic audio, image, and video content designed to impersonate trusted individuals such as CEOs and other executives in order to trick employees into handing over sensitive information. However, most organizations are unprepared to deal with these types of threats. Gartner analyst Darin Stewart warned in 2021 that while businesses scramble to defend against ransomware attacks, they are doing nothing to prepare for an onslaught of synthetic media. Organizations cannot afford to ignore the social engineering threat posed by deepfakes, especially with providers such as OpenAI offering access to AI and Machine Learning (ML) through new tools like ChatGPT. While deepfake technology is still in its early stages, it is gaining popularity. Cybercriminals are already experimenting with it in order to launch attacks on unsuspecting users and organizations. According to the World Economic Forum (WEF), the number of deepfake videos on the Internet is increasing at a rate of 900 percent per year. At the same time, VMware discovered that two out of every three defenders have seen malicious deepfakes used as part of an attack, a 13 percent increase from the previous year. These attacks have the potential to be devastatingly effective. For example, in 2021, cybercriminals impersonated the CEO of a large corporation using AI voice cloning. They tricked the organization's bank manager into transferring $35 million to another account to complete an "acquisition." In 2019, a similar incident occurred when a fraudster called the CEO of a UK energy firm and impersonated the CEO of the firm's German parent company using AI. The malicious actor requested a $243,000 urgent transfer to a Hungarian supplier. Many analysts believe that the rise in deepfake phishing will continue, and that threat actors' false content will become more sophisticated and convincing. This article continues to discuss the state of deepfake phishing in 2022, how deepfakes mimic individuals and bypass biometric authentication, the role of security awareness training in addressing deepfake phishing, and fighting adversarial AI with defensive AI.

    VB reports "Why Deepfake Phishing Is a Disaster Waiting to Happen"

  • news

    Visible to the public "Budget and Momentum Are Key to Cybersecurity Automation Maturity -- And CISOs Are Feeling Left Behind"

    As cyber threats become more sophisticated and the human and financial resources available to combat them become scarce, there is an increasing demand for cybersecurity automation. By reducing reliance on manual processes, intelligent automation of key cybersecurity processes can significantly improve an organization's posture while also supporting under-pressure employees. ThreatQuotient surveyed 750 cybersecurity professionals, including from organizations in the UK, the US, and Australia, to gain insight into how far organizations have progressed in their efforts to deploy automation. Respondents included CISOs, Security Operation Center (SOC) leaders, Incident Response (IR) heads, cyber threat intelligence heads, and Information Technology (IT) security solutions architects from a variety of industries, including defense, retail, financial services, central government, and critical national infrastructure. Respondents worked for companies with 2,000 to 10,000+ employees. This was a follow-up to ThreatQuotient's 2021 UK survey, which revealed that businesses lacked confidence in the outcomes of automation processes. Cybersecurity automation has gained traction in the intervening year, with this year's results indicating that concerns have shifted to more practical deployment issues, such as integrating with existing technology and a lack of workforce skills. These difficulties became clear when respondents were asked to rate the current maturity of their cybersecurity operations on a scale adapted from one developed by Accenture. ThreatQuotient wanted to understand how cybersecurity professionals perceive the sophistication of their setup and how it contributes to the overall business. The responses show significant differences in how different roles perceive their security operations maturity, and when cross-referenced with responses to other questions, it was discovered that existing automation adoption and increased budget allocation are linked to maturity. The 262 CISOs surveyed were the least confident in the maturity of their setup. This article continues to discuss key findings from ThreatQuotient's report on the state of cybersecurity automation adoption.

    BetaNews reports "Budget and Momentum Are Key to Cybersecurity Automation Maturity -- And CISOs Are Feeling Left Behind"

  • news

    Visible to the public  "Over a Quarter of UK Manufacturers Experienced Substantial Financial Loss From Cyber Attacks in Last 12 Months"

    Almost half of Britain's manufacturers (42 percent) have fallen victim to cybercrime over the last 12 months, according to a new survey report titled "Cyber Security: UK manufacturing," published by Make UK. 26 percent reported a considerable financial loss resulting from an attack. Although two-thirds of respondents said the importance of cybersecurity has increased in the last 12 months, most decided not to take any additional cybersecurity actions despite adopting new technologies to boost production. Maintaining legacy Information Technology (IT) (45 percent), a lack of cyber skills within the company (38 percent), and providing access to third parties for monitoring and maintenance (33 percent) were the most cited cybersecurity vulnerabilities. The study also discovered that production halts were the most common result of a cyberattack (65 percent), with reputational damage ranking second (43 percent). The adoption of Industrial Internet of Things (IIoT) devices is the most important driver of cybersecurity adoption in one out of every three organizations (30 percent). These new IIoT processes, such as automated sensors that drive efficiencies, are central to manufacturing production and are regarded as business-critical functions. Thirty-seven percent say that cybersecurity concerns have delayed the introduction of new connected technologies into their organization, stifling potential productivity gains and impeding growth. This article continues to discuss findings from Make UK's report on manufacturing cybersecurity.

    Continuity Central reports "Over a Quarter of UK Manufacturers Experienced Substantial Financial Loss From Cyber Attacks in Last 12 Months"

  • news

    Visible to the public "HSE Cyberattack Costs Ireland $83m So Far"

    The cost of the cyberattack that hit the Irish Health Service Executive (HSE) last year has officially reached $83.75m. The cyberattack, believed to have been conducted by Russia-based state actors, was reportedly caused by a malicious Microsoft Excel file delivered via a phishing email. The file was opened at an HSE workstation in March 2021. The malware would have been latent for two months before the breach, which was reportedly discovered in May, two months later. A total of roughly 100,000 people had their personal data stolen during the cyberattack. Dave Gerry, COO at Bugcrowd, stated that healthcare continues to be a target of attacks given their enormous attack surface across critical applications, cloud environments, and IoT devices. Gerry noted that ensuring critical applications, devices, and systems are secure should remain the main priority for healthcare security professionals.

    Infosecurity reports: "HSE Cyberattack Costs Ireland $83m So Far"

  • news

    Visible to the public "PERSPECTIVE: Leveraging Public-Private Partnerships to Improve Cybersecurity in the Transportation Sector"

    The number of weekly ransomware attacks against the US transportation sector increased by 186 percent between June 2020 and June 2021. Other types of cyberattacks are increasing at a similar rate. For example, pro-Russian hackers targeted public-facing websites of numerous US airports in October 2022. Cyber experts believe these attacks were probing attempts by hackers to learn how to launch more malicious attacks in the future. Cyberattacks are growing while transportation operators face market pressures to automate functions ranging from ticketing to self-driving vehicles. Increased automation requires an even greater reliance on information systems, creating a catch-22 between innovation and vulnerability. Therefore, the Transportation Security Administration (TSA) and the US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) are responding by expanding cybersecurity requirements for airport, airline, rail, pipeline, and mass transit operators. Designating a cybersecurity coordinator, reporting cyber incidents, conducting cybersecurity assessments, and developing remediation and incident response plans are all part of the detailed requirements. This article continues to discuss TSA's new cyber requirements, overcoming resource challenges by leveraging industry, the benefits of the proposed framework, and the need for regulatory approaches to evolve to meet new threats.

    HSToday reports "PERSPECTIVE: Leveraging Public-Private Partnerships to Improve Cybersecurity in the Transportation Sector"

  • news

    Visible to the public "PLAY Ransomware Group Claims Responsibility for Antwerp Attack as Second Belgian City Confirms New Incident"

    The PLAY ransomware group has claimed responsibility for a recent ransomware attack on Antwerp, Belgium, just as the city of Diest has confirmed that a cyberattack has targeted it. On December 19, the PLAY group threatened to start leaking Antwerp's stolen data. It remains unclear what information was stolen. According to VRT News, the cyberattack impacted the city of Diest, which has a population of about 20,000 people. All city services' Information Technology (IT) systems are down because of the attack. Officials have not yet confirmed the nature of the recent attack on Antwerp, but have stated that the most significant impact was on the city's residential care centers. The Antwerp Public Prosecutor's Office stated that an investigation into the incident has been launched. The general manager of Zorgbedrijf Antwerpen (Antwerp Healthcare), Johan de Muynck, warned that the software used to keep track of who should receive which medicines was currently down. Rather than typical electronic prescriptions, patients are currently receiving paper prescriptions signed by doctors. Citizen services were also impacted, according to Het Laatste Nieuws (HLN). Identity cards, for example, currently cannot be issued. Many of the applications at those counters are federal, and the lines have been closed as a precaution. Only travel passes are still available. This article continues to discuss the PLAY ransomware group claiming responsibility for a recent ransomware attack on the Belgian city of Antwerp as well as another incident faced by a second Belgian city.

    The Record reports "PLAY Ransomware Group Claims Responsibility for Antwerp Attack as Second Belgian City Confirms New Incident"

  • news

    Visible to the public "Ransomware Gang Hacks Belgian Police Unit While Targeting Municipality, Leaks Investigation Reports"

    The Ragnar Locker ransomware gang exposed sensitive data from a Belgian police unit after mistaking it for the municipality of Zwijndrecht. Belgian media outlets called the data leak one of the biggest public service exposures in the country's history, exposing people who reported crimes. As a result, the exposure may have an impact on law enforcement operations and investigations by endangering witnesses and alerting suspects. The stolen data was published on the ransomware gang's 'name and shame' dark web data leak site. Confidential information such as investigation reports, criminal records, thousands of license plates, traffic fines, personnel files, telephone research, and crime files, including images of child abuse, have been exposed in leaked data. The leak also revealed traffic camera recordings that could reveal people's whereabouts at specific times, invading their privacy and putting their safety at risk. Names, phone numbers, and subscriber and SMS metadata of people under covert police investigation were also leaked. This information could alert suspects to ongoing investigations, giving them the opportunity to destroy evidence and harm potential witnesses. The ransomware gang, according to Belgian local media, exposed 18 years of data collected by the Belgian police unit from 2006 to September 2022. Although the leak affects only a small Belgian police unit, it has the potential to affect thousands of citizens. This attack demonstrates the serious consequences of cyberattacks, with people who have reported crimes or abuse potentially having their personal information leaked online. The Zwijndrecht police unit in Antwerp, Belgium, blamed human error for the incident. This article continues to discuss the Ragnar Locker ransomware gang exposing sensitive data of a Belgian police unit and the potential impact of this leak.

    CPO Magazine reports "Ransomware Gang Hacks Belgian Police Unit While Targeting Municipality, Leaks Investigation Reports"

  • news

    Visible to the public "Attackers Lure Victims to Click on Fake Invoice to Bypass Microsoft Office 365 Email Security"

    Armorblox researchers detailed an attack in which the threat actor tricked victims with a fake invoice before bypassing Microsoft Office 365 email security, potentially compromising over 100,000 users. The researchers discovered and stopped this fraudulent email invoice attack, which targeted "a national institution in the education industry." According to the researchers, the email's subject header encouraged victims to open and read it. The goal was to use this social engineering technique to instill in the victims a sense of urgency, making it appear as if they needed to act sooner rather than later. According to Mika Aalto, co-founder and CEO of Hoxhunt, the most sophisticated social engineering attacks are not being detected by large investments in security gateway technologies, and complex organizations are looking for answers. Aalto emphasizes that the human element is still present in most data breaches, indicating that traditional approaches are no longer effective. According to Aalto, new approaches to addressing this challenge are increasingly being deployed, including Artificial Intelligence (AI)-based security behavior change platforms that use gamification to improve engagement and enable people to detect and report sophisticated threats. One of the most effective approaches to addressing this challenge is to build large 'human detection engines.' Darren Guccione, co-founder and CEO of Keeper Security, says high-profile breaches call on organizations to implement a zero-trust architecture, enable multi-factor authentication (MFA), and use strong and unique passwords for each account. However, Guccione claims that the effectiveness of these measures is diminished when users are duped into handing over credentials through phishing, smishing, and other social-engineering techniques. This article continues to discuss the attack in which victims were lured with a fake invoice that then bypassed Microsoft Office 365 email security.

    SC Media reports "Attackers Lure Victims to Click on Fake Invoice to Bypass Microsoft Office 365 Email Security"

  • news

    Visible to the public "Users Warned of New Aerst, ScareCrow, and Vohuk Ransomware Families"

    Security researchers at Fortinet have shared information on three new ransomware families named Aerst, ScareCrow, and Vohuk. The researchers noted that the new ransomware targets Windows computers encrypts victim files, and demands a ransom payment in exchange for a decryption key. This new ransomware has been used in an increasing number of attacks. The researchers stated that Aerst was seen appending to encrypted files the ".aerst" extension and displaying a popup window containing the attacker's email address instead of dropping a typical ransom note. The researchers noted that the popup window contains a field where the victim can enter a purchase key required to restore the encrypted data. Aerst deletes Volume Shadow copies to prevent file recovery. The other ransomware Vohuk does drop a ransom note readme.txt, asking the victim to contact the attackers via email. Seemingly under continuous development, the malware assigns a unique ID to each victim. The researchers noted that this ransomware family appends the ".vohuk" extension to the encrypted files, replaces file icons with a red lock icon, and changes the desktop wallpaper with its own. This ransomware leaves a distinctive mutex, "Global\\VohukMutex," which prevents different instances of Vohuk ransomware from running on the same system. Vohuk has been used mainly to target users in Germany and India. The third ransomware, ScareCrow, has a ransom note named "readme.txt," which instructs victims to contact the attacker using one of three Telegram channels. This ransomware seems to be the most widespread, with files submitted from the United States, Germany, India, Italy, the Philippines, and Russia. The researchers noted that they have identified some similarities between ScareCrow and Conti, such as the use of the CHACHA algorithm for encryption and the use of the WMI command-line utility to delete Volume Shadow copies, which suggest that ScareCrow's developers might have used Conti source code leaked earlier this year. The researchers stated that the ransomware's developer has encrypted each command string in the malware, including DLL names, API names, and even command strings, with a different decryption routine. ScareCrow appends the ".crow" extension to the encrypted files.

    SecurityWeek reports: "Users Warned of New Aerst, ScareCrow, and Vohuk Ransomware Families"

  • news

    Visible to the public  "Telstra Blames IT Blunder for Leak of 130,000 Customer Records"

    Telstra, an Australian telecommunications company, has stated that an internal Information Technology (IT) error caused a data leak affecting hundreds of thousands of customers. On December 9, the company announced that it had discovered an error that had resulted in customers' names, phone numbers, and addresses being listed on the Directory Assistance service and the White Pages. The White Pages is an Australian directory of contact information for people and businesses, whereas Directory Assistance is used to look up a phone number for a person or business listed in the pages. The services were previously government-owned but are now privatized, and Telstra is responsible for providing both to the public as part of its regulatory obligations. According to Telstra, the leak was caused by a misalignment of databases. Telstra began working to remove the identified impacted customers from the Directory Assistance service and the online version of the White Pages, according to Michael Ackland, Telstra's CFO. Telstra is also contacting all affected customers and offering them free IDCARE assistance, a service that provides national identity and cyber support to Australia and New Zealand. Telstra was also the victim of a data breach in early October 2022, which involved unauthorized access to employee information. It stated at the time that a third-party platform had been compromised and was being used to access its data. The data was restricted to company employees and dated back to 2017, with an estimated 30,000 people affected. This article continues to discuss Telstra's recent internal IT error that led to customer records getting leaked.

    ITPro reports "Telstra Blames IT Blunder for Leak of 130,000 Customer Records"

  • news

    Visible to the public "Security Researchers Discover 22 Issues in Google One VPN"

    The Google One Virtual Private Network (VPN) service is now available to Google One Premium members in over 20 countries. During the summer, NCC Group, an information assurance firm, conducted a security assessment of the Google One VPN service and discovered 22 flaws. Researchers discovered three medium-severity issues, ten low-severity issues, and nine informational observations. The most notable discovery was related to the Windows application's requirement to be executed with administrator privileges. Although NCC Group found no software vulnerabilities in this application, NCC stated in its report that potentially insecure coding practices could result in a privilege escalation attack. During the retest, Google resolved the issue, and the application is now executed with user privileges. The other two medium-risk discoveries were in the login process of both Windows and macOS applications, which would allow local malicious applications to deny the service's availability or obtain the OAuth token sent after a successful login by manipulating local ports temporarily opened by the applications during the login process. This article continues to discuss findings from the security assessment of the Google One VPN service.

    Cybernews reports "Security Researchers Discover 22 Issues in Google One VPN"

  • news

    Visible to the public "Researchers Find 63 Zero-Day Bugs at Latest Pwn2Own"

    Participants at the latest Pwn2Own competition discovered many zero-day vulnerabilities in a range of products. The contest is run by Trend Micro's Zero Day Initiative (ZDI). During the competition, which lasted three days, contestants were paid $934,750 for the vulnerabilities they discovered. 26 contestants and teams attempted to exploit 66 target products. The contestants found a total of 63 unique zero-days. The Master of Pwn title came down to the wire, but the team from DEVCORE claimed their second title with winnings of $142,500 and 18.5 points. Team Viettel and the NCC group were close behind with 16.5 and 15.5 points, respectively. Some of the devices targeted by the contestants included printers, routers, smart speakers, NAS devices, and smartphones, such as the Samsung Galaxy S22. The vendors of hacked products will now have 120 days to patch the 63 zero-days found in their offerings before they are publicly disclosed by the ZDI.

    Infosecurity reports: "Researchers Find 63 Zero-Day Bugs at Latest Pwn2Own"

  • news

    Visible to the public "Transitive Dependencies Account for 95% of Bugs"

    Security researchers at Endor Labs have discovered that nearly all open source vulnerabilities (95%) are found in transitive or indirect dependencies. The researchers noted that developers increasingly favor open source as a way to accelerate time to market. However, only a small number (5%) of these so-called software dependencies are actually chosen by DevOps teams. Most are automatically pulled into the codebase, known as transitive/indirect dependencies. The researchers stated that this can add extra risk if they're not all mapped, with any associated bugs remediated. The CEO of Endor Labs said that in this environment, open source software is the backbone of our critical infrastructure, but even veteran developers and executives are often surprised to learn 80% of the code in modern applications comes from existing OSS. The researchers noted that this is a vast arena, yet it's been largely overlooked. The researchers stated that even if developers use the latest version of open source packages, there's a 32% chance it will contain vulnerabilities. A separate report from Sonatype released earlier in 2022 claimed that transitive dependencies accounted for six out of every seven bugs affecting open source projects over the past year.

    Infosecurity reports: "Transitive Dependencies Account for 95% of Bugs"

  • news

    Visible to the public "Preparations for Quantum Cyber Threat Get a Senate Boost"

    The Senate has passed the Quantum Computing Cybersecurity Preparedness Act to bolster national security by preparing the federal government's defenses against quantum-computing-enabled data breaches. The bill aims to protect sensitive data from the threat of a quantum computer capable of decoding current cryptographic standards. Quantum computers with faster-than-ever calculation power to decipher today's encryption are still thought to be a decade or more away. However, supporters of the Biden-Harris administration's plan argue that adversaries may be harvesting data now with the intention of decrypting it later, once the technology has been sufficiently developed. Adversaries scan cybersecurity systems for flaws in order to compromise infrastructure, data, and security. Therefore, it is critical to be prepared to defend against any adversaries who use this extremely sophisticated and emerging technology against the US. The Quantum Computing Cybersecurity Preparedness Act largely mirrors a national security memo issued by the Biden-Harris administration in May outlining deadlines for agencies to inventory all currently deployed cryptographic systems in order to prioritize their transition to forms of encryption experts say would be impervious to fast quantum computers. The National Institute of Standards and Technology (NIST) and the National Security Agency (NSA) are working together to create standards for implementing four quantum-resistant algorithms, which NIST announced in July after inviting scientists worldwide to submit proposals. In advance of the algorithms, a January national security memo gave the NSA the power to issue Binding Operational Directives (BODs) to help agencies transition to the new standards. In addition to reiterating the administration's instructions to agencies, including the Office of Management and Budget (OMB), the legislation requires OMB to report on the migration effort to Congress on an annual basis. According to the press release, the reports should outline the administration's strategy and projected costs. This article continues to discuss the Quantum Computing Cybersecurity Preparedness Act.

    NextGov reports "Preparations for Quantum Cyber Threat Get a Senate Boost"

  • news

    Visible to the public "Google: Use SLSA Framework for Better Software Security"

    Google recommends that organizations use the Supply Chain Levels for Software Artifacts (SLSA) framework when developing software to improve software security and integrity, following an exploration of best practices for securing the software supply chain. Google made several recommendations for improving supply chain security, including the need for organizations to take more direct responsibility for open-source software and to take a more holistic approach to address risks like the Log4J vulnerability and the SolarWinds breach. Google's report on software security is the first in a new research series called "Perspectives on Security," which looks at emerging security trends and how to address them. The report's publication coincides with the second anniversary of the SolarWinds breach disclosure, and its recommendations are based on Google's analysis of that incident and other software supply chain breaches that have occurred since then. These include incidents at Codecov, Kaseya, and public code repositories such as PyPI. The breaches have elevated software supply chain security to the top of the enterprise Information Technology (IT) priority list. According to a recent Mandiant report, supply chain compromises accounted for 17 percent of all intrusions in 2021. Supply chain issues were the second most common initial intrusion vector in 2021, trailing only software vulnerability exploits. This article continues to discuss the main takeaways for security decision-makers from Google's new security perspectives report.

    Dark Reading reports "Google: Use SLSA Framework for Better Software Security"

  • news

    Visible to the public "New Ransomware Strain Discovered Lurking in Open-Source Packages"

    Checkmarx and Phylum detailed a typosquatting campaign aimed at the NPM and PyPI package managers. This campaign includes embedded ransomware and targets the popular "requests" package on PyPI and the "discord.js" package on NPM. When the ransomware is executed, it changes the desktop background, encrypts files, and leaves a file requesting $100 in cryptocurrency in exchange for the decryption key. Unlike most open-source attacks, the payload is only executed when the infected function is called, allowing the threat actor to avoid detection by many security scanners. The payload is compatible with multiple operating systems, allowing the campaign to reach a broader audience. While NPM has a mechanism in place to detect typosquatting packages, the threat actor can circumvent it by employing different naming techniques. The researchers discovered several indicators that point to the attacker being Russian. The Telegram user account linked to the attack, for example, has a Russian phone number, and the attacker was able to respond to messages in Russian. These attacks show that cyberattackers have been focusing their attention on the open-source package ecosystem. The researchers believe this trend will only accelerate in 2023, forcing developers and organizations to implement appropriate controls. The fight against threat actors who seek to contaminate the software supply chain ecosystem remains a challenge as attackers continue to evolve and use novel and unexpected techniques. This article continues to discuss the new ransomware strain found in open-source packages.

    Medium reports "New Ransomware Strain Discovered Lurking in Open-Source Packages"

  • news

    Visible to the public "MuddyWater APT Group Is Back With Updated TTPs"

    Deep Instinct's Threat Research team discovered a new campaign carried out by the MuddyWater Advanced Persistent Threat (APT) group, also known as SeedWorm, TEMP.Zagros, and Static Kitten. The APT's campaign has targeted Armenia, Azerbaijan, Egypt, Iraq, Israel, Jordan, Oman, Qatar, Tajikistan, and the United Arab Emirates. In addition, the campaign has updated tactics, techniques, and procedures (TTPs). The first MuddyWater campaign, which targeted entities in the Middle East, was observed in late 2017. Over time, the group evolved by adding new attack techniques to its arsenal. The APT group has also targeted European and North American countries. The US Cyber Command (USCYBERCOM) officially linked Iran's Ministry of Intelligence and Security (MOIS) to the MuddyWater APT group in January. Deep Instinct observed a campaign that began in September, which differs from previous ones in that it employs a new remote administration tool called "Syncro." MuddyWater is not the only threat actor using Syncro. It has also been used in BatLoader and Luna Moth campaigns. The MuddyWater APT group used an HTML attachment as a lure and used third-party providers to host the archives containing the remote administration tool installers. HTML attachments are typically delivered to recipients and are not blocked by antivirus or email security software. The threat actors were seen in July using the ScreenConnect remote administration tool, which was delivered via an installer called "promotion.msi." The installers used in the current campaign were also given the name "promotion.msi." This article continues to discuss the Iran-linked MuddyWater APT targeting countries in the Middle East as well as Central and West Asia in a new campaign.

    Security Affairs reports "MuddyWater APT Group Is Back With Updated TTPs"

  • news

    Visible to the public "Security Is No Longer an Internal Affair"

    Dimensional Research surveyed 1,175 security professionals and executives from five continents to get a global perspective of the capabilities of security solutions, deployment strategies, gaps, and the value of tool consolidation. According to the survey, 67 percent of respondents said their company had lost a business deal due to the customer's lack of trust in their security strategy. Customers and partners demand higher standards, indicating that security has evolved beyond internal consideration. Ninety-one percent of respondents stated that their company's security strategy and practices must now align with the security policies and standards of their customers. Partners are also exercising a new level of due diligence, with 85 percent of respondents stating that their company must provide proof of meeting the security requirements of their partners. A LogRhythm report in 2020 revealed a significant misalignment between executives and their security teams, with 43 percent of respondents saying they received enough executive support. The most recent research found that support nearly doubled over the last two years. Eighty-three percent of respondents said they now have enough budget support, strategic vision, and buy-in, implying a better understanding between executive leadership and their security teams. When asked if employee turnover reduces the effectiveness of their security teams, 77 percent of executives, 70 percent of directors and managers, and 58 percent of security team members agreed. This article continues to discuss key findings from the Dimensional Research survey of security professionals and executives.

    Help Net Security reports "Security Is No Longer an Internal Affair"

  • news

    Visible to the public "Hack-for-Hire Group Targets Travel and Financial Entities with New Janicab Malware Variant"

    As part of a broader campaign aimed at legal and financial investment institutions in the Middle East and Europe, a hack-for-hire group called Evilnum has targeted travel agencies. The attacks, which occurred in 2020 and 2021 and most likely began in 2015, used a reworked variant of a malware called Janicab. This malware uses public services such as WordPress and YouTube as dead drop resolvers. Janicab infections have affected people in Egypt, Georgia, Saudi Arabia, the United Arab Emirates, and the United Kingdom. However, this is the first time this group has targeted legal organizations in Saudi Arabia. The threat actor, also known as DeathStalker, is known to use backdoors such as Janicab, Evilnum, Powersing, and PowerPepper to steal sensitive corporate information. Their desire to obtain sensitive business information indicates that DeathStalker is a group of mercenaries providing hacking-for-hire services or acting as financial information brokers. According to ESET, the hacking group has a pattern of harvesting internal company presentations, software licenses, email credentials, and documents containing customer lists, investments, and trading operations. Zscaler and Proofpoint discovered new attacks orchestrated by Evilnum earlier this year, directed against companies in the cryptocurrency and financial technology verticals since late 2021. An examination of the DeathStalker intrusions revealed the use of an LNK-based dropper embedded within a ZIP archive for initial access via spear-phishing. The lure attachment claims to be an industrial profile document related to power hydraulics that, when opened, leads to the deployment of the VBScript-based Janicab implant, which can execute commands and deploy additional tools. This article continues to discuss the Evilnum group targeting legal and financial investment institutions in the Middle East and Europe with a new Janicab malware variant.

    THN reports "Hack-for-Hire Group Targets Travel and Financial Entities with New Janicab Malware Variant"

  • news

    Visible to the public "UCalgary Research Raises Questions About Internet Security"

    Research by Dr. Joel Reardon, a University of Calgary Internet security and privacy expert, and his colleague, Dr. Serge Egelman, at the University of California Berkeley, has led to the web browser firm Mozilla removing an offshore company as a trusted "root certificate authority." Root certificate authorities are the foundation of all Internet security, and their removal is both rare and significant. Any root certificate authority can vouch for a website's legitimacy. The major web browser companies and other technology companies rely on a root certificate authority to ensure the legitimacy of websites and to seamlessly guide users to them. If a user wants to go to a website, the only way they know they are talking to the right website is because some root certificate authority they trust says so. The Washington Post explored Reardon and Egelman's concerns about a Panamanian company, TrustCor Systems, which is a root certificate authority. The researchers informed Mozilla, Google, and Apple of their findings, and the case was discussed in an online forum attended by other Internet security experts and browser specialists. After a month of discussion, Mozilla decided on November 30 to "distrust," or essentially remove TrustCor's root certificate authority from Mozilla's Firefox browser. An improperly acting certificate authority could expose millions of Internet users to people spying on their Internet activity and gaining access to users' phone numbers, email addresses, and exact locations. Certificates are also used for "code signing," which ensures that computers receive software updates from legitimate sources. As a result, a misbehaving certificate authority could tamper with this process. Reardon's and Egelman's research revealed that TrustCor had ties to another company, Measurement Systems, a software maker that can spy on Internet users. TrustCor's products include an email service that claims to be end-to-end encrypted. Reardon, Egelman, and other experts discovered evidence that the company reads emails sent through its system. This article continues to discuss the discovery of security and privacy issues associated with the TrustCor root certificate authority.

    University of Calgary reports "UCalgary Research Raises Questions About Internet Security"

  • news

    Visible to the public "FAU Receives NSF Grant for Secure Communications Over 5G Networks"

    To deter and defeat agile adversaries, people and assets deployed by the US Department of Defense (DOD) in ground, sea, air, and space must maintain operational wireless network connectivity. Researchers from Florida Atlantic University's (FAU) College of Engineering and Computer Science, Florida International University (FIU), Virginia Tech (VT), and PQSecure Technologies have collaborated to develop a universal radio adapter that will enable seamless and secure operations for US military, government, and critical infrastructure systems via non-cooperative indigenous 5G networks. The National Science Foundation (NSF) has awarded the research team a one-year, $750,000 grant for the project titled "Autonomously Tunable Waveform-Agnostic Radio Adapter for Seamless and Secure Operation of DOD Devices Through Non-Cooperative 5G Networks." The project's goal is to reduce the likelihood of communications being intercepted, disrupted, or jammed over 5G networks. The project is part of the NSF's acceleration of 5G solutions to provide secure communications to the US government and critical infrastructure operators anywhere and at any time. The FAU, FIU, VT, and PQSecure Technologies collaboration is one of 16 multidisciplinary teams chosen nationally by the NSF for the 2022 Convergence Accelerator program. Researchers will develop a waveform-agnostic adapter compatible with US DOD communication protocols that operate from HF up to the Ka-band. The research effort includes post-quantum-computing secure cryptography, physical layer security, interference avoidance, policy and governance for secure communications, and more. The universal radio adapter's goal is to accelerate transformative outcomes in how the US DOD personnel, aircrafts, satellites, mobile phones, vehicles, sensors, drones, and other Internet of Things (IoT) devices operate through either friendly or adversary untrusted 5G network infrastructure, seamlessly connecting with devices on trusted US military networks. The goal is also to provide end-to-end data integrity, confidentiality, and resiliency by data hiding and autonomously switching between communications pathways. This article continues to discuss the goals of the "Autonomously Tunable Waveform-Agnostic Radio Adapter for Seamless and Secure Operation of DOD Devices Through Non-Cooperative 5G Networks" project.

    FAU reports "FAU Receives NSF Grant for Secure Communications Over 5G Networks"

  • news

    Visible to the public "Testing Environments Help S&T and CISA Secure Transportation Infrastructure"

    The Science and Technology Directorate (S&T) is working with the Cybersecurity and Infrastructure Security Agency (CISA) to develop and test new technologies and tools to combat both online and physical threats. According to the S&T program manager Alex Karr, all critical infrastructure sectors, including energy, manufacturing, and transportation, rely heavily on sophisticated technologies such as Industrial Control Systems (ICS), cellular networks, and Artificial Intelligence (AI). All of these are accessed, monitored, and controlled via the Internet, making them vulnerable to hacking, malware attacks, and other malicious activities. S&T is collaborating with CISA, the Idaho National Laboratory (INL), the Pacific Northwest National Laboratory (PNNL), and other government and private stakeholders to design and implement two cutting-edge training tools, both of which are part of CISA's Control Environment Laboratory Resource (CELR) test environment. These CELR test environments, one designed by INL and the other by PNNL, will be integrated into CISA's existing suite of internet security tools in the future. According to Tim Huddleston, INL program manager for Infrastructure Assurance and Analysis, CELR test environments are miniaturized test environments that emulate critical facilities and their associated technologies and physical components. They provide a safe environment for first responders and security professionals to simulate cyberattacks, conduct research and analysis on these attacks, and practice the implementation of countermeasures that will allow them to detect, mitigate, or prevent such incidents in the real world. This article continues to discuss the development and testing of new technologies and tools to combat cyberattacks on critical infrastructure.

    DHS reports "Testing Environments Help S&T and CISA Secure Transportation Infrastructure"

  • news

    Visible to the public "Truebot Malware Activity Increases With Possible Evil Corp Connections"

    Security researchers at Cisco Talos have discovered that threat group Silence has been infecting an increasing number of devices using Truebot malware. The researchers suggest that there is a connection between Silence and the infamous hacking group Evil Corp (tracked by Cisco as TA505). According to an advisory published on Thursday, the campaigns observed by the researchers have resulted in the creation of two botnets: one with infections distributed worldwide (particularly in Mexico and Brazil) and a more recent one focused on the US. The researchers noted that while they don't have enough information to say that there is a specific focus on a sector, they noticed a number of compromised education sector organizations. One of the researchers, Tiago Pereira, believes Truebot to be a precursor to other threats that are known to have been responsible for attacks leading to high losses. The researchers stated that Silence is not simply expanding its targets but also advancing from using malicious emails as its primary delivery method to new techniques.

    Infosecurity reports: "Truebot Malware Activity Increases With Possible Evil Corp Connections"

  • news

    Visible to the public  "Hive Ransomware Group Leaks Data From European Retailer"

    The Hive Ransomware-as-a-Service (RaaS) group claims to have published customer data obtained during an attack on French sports retailer Intersport in November. The notorious RaaS group leaked some Intersport data to its dark web leak site and threatened to leak more unless the retailer paid extortion money. According to the French publication Le Monde, the hack allegedly included passport information for Intersport employees from stores in northern France, pay slips, a list of former and current employees from other stores, and Social Security numbers. La Voix du Nord reported the hack occurred during Black Friday sales and prevented employees from accessing cash registers. The incident also required manual restocking at the stores. The Swiss company operates 5,800 stores worldwide, 780 of which are in France. According to the US federal government, Hive has impacted over 1,300 businesses worldwide, collecting approximately $100 million in ransom payments. Depending on the affiliate carrying out the ransomware attack, the group employs various methods to gain access. Affiliates have used a lack of multi-factor authentication (MFA) to gain access to Remote Desktop Protocol (RDP), Virtual Private Networks (VPNs), and other remote network connection protocols in some cases. In other cases, it has evaded MFA by exploiting CVE-2020-12812, a now-patched improper authentication vulnerability in Fortinet's operating system. This article continues to discuss the Hive RaaS group leaking customer data stolen from Intersport.

    InfoRiskToday reports "Hive Ransomware Group Leaks Data From European Retailer"

  • news

    Visible to the public "CommonSpirit Health Says Patient Data Was Stolen During Ransomware Attack"

    CommonSpirit Health, based in Chicago, has confirmed that an October ransomware attack exposed the personal information of over 620,000 patients. On October 5, CommonSpirit Health, which operates over 700 care sites and 142 hospitals across 21 states, confirmed an Information Technology (IT) security issue. The incident disrupted access to electronic health records and delayed patient care in multiple regions. CommonSpirit confirmed the incident was a ransomware attack in a December update. According to the organization, threat actors gained access to portions of its network between September 16 and October 3. They may have accessed certain files that contain personal information belonging to patients who received care or family members of those who received care at Franciscan Health, a 12-hospital affiliate of CommonSpirit Health. While the investigation is ongoing, CommonSpirit notes that this data includes names, addresses, phone numbers, dates of birth, and unique ID numbers used internally by the organization. The attackers did not gain access to medical record numbers or insurance IDs, and there is no evidence that any personal information was misused as a result of the attack. According to Brett Callow, threat analyst at Emsisoft, at least 15 US health systems operating 61 hospitals across the country have been impacted by ransomware attacks in 2022. Sensitive data, including personal health information, was compromised in at least 12 of these incidents. This article continues to discuss the CommonSpirit Health ransomware attack.

    TechCrunch reports "CommonSpirit Health Says Patient Data Was Stolen During Ransomware Attack"

  • news

    Visible to the public "DHS Secretary Says US Faces a New Kind of Warfare"

    Secretary of Homeland Security Alejandro Mayorkas recently stated that national security and homeland security are now more interconnected than ever before, largely driven by the fact that U.S. adversaries can execute attacks "with a keystroke." Mayorkas said that global interconnectedness and the willingness of nations to unleash digital attacks that have international ramifications has brought the national security threat "directly to our communities." During his speech, Mayrokas pointed to several well-known cyberattacks that had global reach, such as the NotPetya attack in 2017 and the Russian cyberattack against the U.S. satellite company Viasat at the start of the Ukraine war, saying that "our homeland security has converged with our national security." Mayrokas noted that ubiquitous cutting-edge technologies, economic and political instability, and our globalized economy have erased borders and increasingly bring threats and challenges directly into our communities. His remarks come amid growing reports of nation-state hackers hitting federal and private organizations. Mayorkas said that the U.S. faces "a new kind of warfare." He noted that with a keystroke, our adversaries can disrupt power or water to a small city, mine troves of American's personal data, or steal intellectual property. Mayorkas pointed to the Cybersecurity and Infrastructure Security Agency's Joint Cyber Defense Collaborative as at the "heart" of trying to solve the national and international threats. Mayorkas also pointed to the "Shield's Up" campaign and Cyber Safety Review Board as other examples.

    CyberScoop reports: "DHS Secretary Says US Faces a New Kind of Warfare"

  • news

    Visible to the public "New Facial Recognition Technology Scans Your Ear"

    The need for new authentication methods that do not require a person's full face to be visible has emerged in the post-COVID world of face coverings and amplified hygiene awareness. According to new research from the University of Georgia, people may soon be able to access their devices using their ears rather than their face or fingerprint. Thirimachos Bourlai, the lead author of the study, says the ear is one of the few body parts that remains relatively the same over time, making it a useful alternative to technology requiring face or fingerprint recognition. The ear recognition system developed by Bourlai's team correctly authenticates individuals with up to 99 percent accuracy, depending on the dataset and model used for testing. Ears, like fingerprints, are distinctive to each individual, as even identical twins' ears differ. An added benefit is that, with the exception of the earlobe, which drops lower over time, ears do not age in the same way that the face does. The ear recognition software functions similarly to face recognition software. When a person purchases a new phone, they must first register their fingerprint or face for the phone to recognize them. In order to get a complete "picture" of their fingerprint, new devices typically require users to place their fingers repeatedly over the sensor. Face-recognition technology relies on users moving their faces in specific ways in front of their camera for the device to effectively capture their facial features. The algorithm takes multiple samples of a person's identity, such as facial images or fingerprints, and logs them into the device while configuring a biometric device. When a user unlocks their device with a biometric, a live sample is taken and compared to the device logs, such as a picture of their face or, in this case, a picture of their ear. Bourlai's software evaluates ear scans and determines whether they are suitable for automated matching using an ear recognition algorithm. To test the software, he used various ear datasets with a wide range of ear poses. Bourlai tested his algorithm on two different datasets of ear images. In one dataset, system accuracy increased from 58.72 percent to 97.25 percent when compared to prior ear recognition software, while in the other, accuracy increased from 45.8 percent to 75.11 percent when compared to the baseline approach. This article continues to discuss the new ear identification technology developed by researchers at the University of Georgia.

    UGA Today reports "New Facial Recognition Technology Scans Your Ear"

  • news

    Visible to the public "New App Store Code of Practice Aims to Strengthen Ecosystem Cyber Security"

    The UK government has announced plans for a code of practice to strengthen app security across the app market. The new voluntary code aims to better protect users from malicious apps available on app stores such as Google Play and Apple's App Store. The new measures include requiring app developers to implement processes that ensure privacy information is more readily available and allow security experts to report software vulnerabilities. Furthermore, the code will result in the creation of a more robust and transparent app vetting process, the requirement for developers to keep apps up to date, and the ability for users to use apps even if they choose to disable certain functionalities, such as microphone access or location tracking. The UK government stated that as part of the move, it would work closely with developers and operators to implement the code over a nine-month period. This will include working with companies such as Apple, Google, Amazon, Huawei, Microsoft, Sony, and Samsung. The new voluntary rules are a component of the government's National Cyber Strategy, which aims to protect and support the UK's digital technology sector while also strengthening national cyber resilience. The move has been endorsed by the National Cyber Security Centre (NCSC) as a positive step toward creating a more transparent and secure app ecosystem for UK consumers and businesses. In recent months, the proliferation of malicious software on app stores has raised concerns among both consumers and business users. Malwarebytes discovered in November that the Google Play store, for example, featured apps that infected devices with malware and displayed malicious pop-up ads. According to the study, four malicious apps were downloaded over a million times by Android users. This problem has not gone unnoticed by operators. Earlier this year, Android announced new Play Store policies to mitigate security risks and compel developers to update older apps. According to Michael White, technical director and principal architect at Synopsys Software Integrity Group, the new code of practice could address lingering security concerns about small businesses' use of open-source software. This article continues to discuss the new app store code of practice announced by the UK government.

    ITPro reports "New App Store Code of Practice Aims to Strengthen Ecosystem Cyber Security"

  • news

    Visible to the public "Will the 2.5M Records Breach Impact Student Loan Relief?"

    According to a recent Maine Attorney General data breach notification, more than 2.5 million student loan accounts were compromised in the summer of 2022. The breach targeted Nelnet Servicing, a servicing system and web portal provider for the Oklahoma Student Loan Authority (OSLA) and EdFinancial. An investigation determined that between June and July 2022, intruders accessed student loan account registration information, including names, addresses, emails, phone numbers, and Social Security numbers for 2,501,324 student loan account holders. The breach, according to Nelnet, did not expose users' financial information. It remains unclear how the breach occurred or who was responsible for the attack. Some are concerned about the long-term consequences of this incident for student loan recipients. President Biden announced a student loan relief plan in August 2022 that would impact millions of borrowers. The information stolen in the OSLA / Nelnet breach could be used to take advantage of the loan forgiveness plan. Actors could use the stolen emails to contact unsuspecting loan holders. Borrowers could be tricked by threat actors using social engineering or phishing scams. The schemes may also be used to gain access to bank accounts or other sensitive information. According to one study, 83 percent of surveyed organizations have experienced multiple data breaches. Furthermore, 45 percent of the incidents investigated were cloud-based. The average total cost of a data breach has risen to $4.35 million. This article continues to discuss the OSLA / Nelnet breach, the threat posed by this breach to student loan holders, credential hacking becoming a common incident faced by organizations, and how to bolster security against data breaches.

    Security Intelligence reports "Will the 2.5M Records Breach Impact Student Loan Relief?"

  • news

    Visible to the public "'Zombinder' Service Allows Cybercriminals to Easily Add Malware to Legitimate Apps"

    A newly discovered dark web service allows cybercriminals to easily add malware to legitimate applications. ThreatFabric researchers detailed "Zombinder," which was discovered while investigating several cases of threat actors employing Ermac, a type of Android banking malware. As the researchers explored further, they discovered a campaign that used a variety of malware to target Android and Windows users, including Erbium, the Aurora stealer, and the Laplas clipper. The researchers traced the campaign back to a third-party darknet service provider dubbed Zombinder advertised as an Application Programming Interface (API) binding service. It appears to have been launched in March 2022 and is now believed to be used by various threat actors. Those behind the service advertise it as offering a universal binder that would enable malware to be bound with almost any legitimate application. In its most recent campaign, Zombinder distributed the Xenomorph banking malware disguised as a VidMate application. The modified application is advertised and downloaded from a malicious website that mimics the application's original website, with the victim tricked into visiting the site via malicious ads. Unlike other malicious campaigns in which applications fail to function, the Zombinder-infected application performs as expected. The victims are completely unaware that they have been infected with malware. Although the service's primary focus is on Android applications, those behind it also provide binding for Windows applications. This article continues to discuss the researchers' findings and observations regarding Zombinder.

    SiliconANGLE reports "'Zombinder' Service Allows Cybercriminals to Easily Add Malware to Legitimate Apps"

  • news

    Visible to the public  “HHS Warns Royal Ransomware Threat Targeting Healthcare Providers”

    The Department of Health and Human Services (HHS) Cybersecurity Coordination Center has been made aware of targeted cyberattacks against the healthcare sector since the emergence of the human-operated ransomware threat group known as Royal in September. Over the last three months, the number of Royal-based attacks has steadily increased, with ransom demands ranging from $250,000 to more than $2 million. Analyses of successful healthcare compromises confirm that the group appears to be focused on organizations in the US. Furthermore, Royal claims to have published 100 percent of the data allegedly extracted from the victim in each of these exploits. Like most ransomware groups, Royal has been observed exfiltrating sensitive data, deploying Cobalt Strike for persistence, harvesting credentials, and moving laterally through a system until they eventually encrypt the files. Royal should be considered a threat to the health and public health sectors, according to HHS, because of the history of ransomware victimizing the healthcare community. The group appears to be a private organization with no affiliate partners, and it does not provide Ransomware-as-a-Service (RaaS). According to HHS multiple actors are spreading Royal ransomware, which is also distributed via DEV-0569. According to a Microsoft analysis, DEV-0569 heavily relies on malvertising, phishing links that point to a malware downloader posing as software installers or updates embedded in spam emails, fake forum pages, and blog comments. The threat was observed using contact forms on the targeted entity's website to deliver phishing links in one attack method. This article continues to discuss HC3's warning about the Royal ransomware targeting the healthcare sector.

    SC Media reports "HHS Warns Royal Ransomware Threat Targeting Healthcare Providers"