News Items

  • news

    Visible to the public "NSA Releases Series on Protecting DOD Microelectronics From Adversary Influence"

    The National Security Agency's (NSA) Joint Federated Assurance Center (JFAC) Hardware Assurance Lab has made four Cybersecurity Technical Reports publicly available to help the Department of Defense (DOD) in protecting Field-Programmable gate array (FPGA)-based systems from adversary influence. The reports were created to help bolster the security of FPGAs, which are programmable microelectronic components, during their manufacturing, acquisition, programming, and initial attachment. The document "Field-Programmable Gate Array (FPGA) Overall Assurance Process" describes the process used by the NSA JFAC to develop threat categories and mitigations. This report allows teams to try performing the same quality assurance work on other types of microelectronic devices. The report "Field-Programmable Gate Array Best Practices -- Threat Catalog" describes the high-level threat categories associated with FPGA devices at each Level of Assurance. This is part of the DOD Program Protection Plan's Trusted Systems and Networks stage. The "Field-Programmable Gate Array Level of Assurance 1 Best Practices" report includes mitigations for each relevant FPGA threat category at Level of Assurance 1, while the "Third-Party IP Review Process for Level of Assurance 1" report details a methodology for performing an engineering review of third-party intellectual property included in an FPGA design for Trojan detection. This article continues to discuss the series of reports released by NSA's JFAC Hardware Assurance Lab aimed at helping the DOD protect FPGA-based systems.

    NSA reports "NSA Releases Series on Protecting DOD Microelectronics From Adversary Influence"

  • news

    Visible to the public "LF Electromagnetic Radiation Used for Stealthy Data Theft From Air-Gapped Systems"

    Mordechai Guri, a cybersecurity researcher from the Ben-Gurion University of the Negev in Israel who specializes in air gap jumping, has recently released a paper detailing yet another method that can be used to stealthily exfiltrate data from systems isolated from the internet and local networks. The researchers stated that the new method involves using the dynamic power consumption of modern computers and manipulation of CPU loads in order to cause the device to generate specific low-frequency (LF) electromagnetic radiation in the 0-60 kHz band. Guri was able to show how a malicious actor who has managed to plant a piece of malware on the targeted device can exfiltrate small pieces of highly sensitive information, such as passwords or encryption keys. The researcher demonstrated that the attack can be conducted over distances of 2 meters (6.5 feet) and even more. The attack method has been named COVID-bit because this distance is often recommended for preventing Covid-19 transmission. Guri noted that the malware planted on the air-gapped computer can cause the device to generate a certain frequency to represent a "1" bit and a different frequency for a "0" bit. The transmitted data can then be captured from a short distance, including through a wall, by a smartphone or laptop that has been fitted with a $1 antenna that can be hidden inside a case or within harmless-looking objects such as headphones. Guri noted that the smartphone records the frequency and translates it to the corresponding "0" or "1" bit. In addition to the actual payload that is being exfiltrated, the attacker can add calibration bits and bits used for error detection, which leads to a reduction in speed, but makes the exfiltration channel more reliable. The researchers stated that experiments showed that the COVID-bit attack can achieve data transmission rates of up to 1,000 bits per second, which would allow an attacker to exfiltrate a Bitcoin private key in less than a second and a 4096-bit RSA encryption key in 4 seconds. The researcher noted that keylogging can be conducted in real time.


    SecurityWeek reports: "LF Electromagnetic Radiation Used for Stealthy Data Theft From Air-Gapped Systems"

  • news

    Visible to the public "SOHO Exploits Earn Hackers Over $100,000 on Day 3 of Pwn2Own Toronto 2022"

    Trend Micro's Zero Day Initiative (ZDI) recently announced total payouts nearing $1 million after the first three days of Pwn2Own Toronto 2022, and there is one day left to go. On the third day of the event, participants earned $253,500 for hacking NAS devices, printers, smart speakers, routers, and smartphones. ZDI noted that $681,000 was paid out in the first two days. ZDI stated that the new SOHO Smashup category earned participants the highest amounts on the third day. In this category, a small office/home office (SOHO) scenario is simulated, with the goal being to hack a router on the WAN interface and then pivoting to the LAN, where a second device needs to be hacked, such as a smart speaker, NAS appliance, or printer. ZDI noted that a team representing NCC Group earned $50,000 for hacking a Ubiquiti router and a Lexmark printer in a SOHO Smashup attack. The Star Labs team earned $25,000 for an attack targeting a Synology router and a Canon printer. Team Viettel was awarded $37,500 for a hack involving a Cisco router and a Canon printer. ZDI stated that the last Samsung Galaxy S22 exploit of this Pwn2Own earned a participant $25,000. White hat hackers were awarded $125,000 for Galaxy S22 vulnerabilities disclosed at the event. Google and Apple phones have not been targeted. Also, on the third day, $20,000 rewards were earned by participants for Sonos One smart speaker and WD NAS appliance exploits. Eleven attempts are scheduled for the last day, and participants will target printers and routers.

    SecurityWeek reports: "SOHO Exploits Earn Hackers Over $100,000 on Day 3 of Pwn2Own Toronto 2022"

  • news

    Visible to the public "Over 4,000 Vulnerable Pulse Connect Secure Hosts Exposed to Internet"

    Security researchers at Censys have discovered that more than 4,000 internet-accessible Pulse Connect Secure hosts are impacted by at least one known vulnerability. Touted as the most widely deployed SSL VPN solution, Pulse Connect Secure provides remote and mobile users with secure access to corporate resources. The researchers stated that Pulse Secure appliances are known for being the target of choice for both cybercriminals and state-sponsored threat actors, and government agencies have issued multiple alerts to warn of continuous exploitation of unpatched vulnerabilities in these products. Despite that, however, the number of vulnerable Pulse Connect Secure hosts remains high. The researchers found that 4,460 out of 30,266 appliances exposed to the internet lack patches. According to the researchers, roughly 3,500 of the vulnerable appliances are missing patches released in August 2021 to resolve six vulnerabilities, including a critical-severity file write bug that can be exploited to execute arbitrary code with root privileges. The researchers also discovered that over 1,800 of the vulnerable hosts have not been patched against three critical-severity issues that Pulse Secure resolved in May 2021, two weeks after warning that one of the flaws (CVE-2021-22893, CVSS score of 10) was being exploited in attacks. The researchers discovered hundreds of Pulse Connect Secure appliances still impacted by other critical vulnerabilities, including CVE-2018-5299 (CVSS score of 9.8), CVE-2018-6320 (CVSS score of 9.8), CVE-2019-11510 (CVSS score of 10), and CVE-2019-11540 (CVSS score of 9.8). According to the researchers, there are roughly 8,500 internet-accessible Pulse Connect Secure hosts in the US, 1,000 of which are impacted by a known vulnerability. Japan is in second place, with 3,000 hosts (700 vulnerable), followed by the UK and Germany with just over 1,700 hosts each (155 and 134 vulnerable ones, respectively).

    SecurityWeek reports: "Over 4,000 Vulnerable Pulse Connect Secure Hosts Exposed to Internet"

  • news

    Visible to the public "Air-Gapped Networks Vulnerable to DNS Attacks"

    Researchers from the security firm Pentera discovered that common misconfigurations in how Domain Name System (DNS) is implemented in an enterprise environment can put air-gapped networks and the high-value assets they are designed to protect at risk of external attacks. The researchers discovered that organizations using air-gapped networks connected to DNS servers might inadvertently expose their assets to threat actors, potentially resulting in high-impact data breaches. According to the researchers, attackers can use DNS as a command-and-control (C2) channel to communicate with these networks via DNS servers connected to the Internet, allowing them to breach them even when an organization believes the network has been successfully isolated. Air-gapped networks are separated from the common user network and do not have Internet access. They are designed to protect an organization's high-value assets by using a Virtual Private Network, Secure Sockets Layer Virtual Private Network (SSL VPN), or the users' network via a jump box for access. These networks, however, still require DNS services, which are used to assign names to systems for network discovery. If network administrators do not carefully configure DNS, this represents a vulnerability. Hackers have a stable communication line into an air-gapped network by abusing DNS, allowing them to exfiltrate sensitive data while appearing completely legitimate to an organization's security protocols. This article continues to discuss DNS as a highly misconfigurable protocol, how threat actors can use DNS to break an air gap, and how to mitigate DNS attacks on air-gapped networks.

    Dark Reading reports "Air-Gapped Networks Vulnerable to DNS Attacks"

  • news

    Visible to the public "PCI Secure Software Standard 1.2 Released"

    The PCI Security Standards Council (PCI SSC) has released version 1.2 of the PCI Secure Software Standard as well as the supporting program documentation. The PCI Secure Software Standard is one of two PCI Software Security Framework (SSF) standards. The PCI Secure Software Standard and its security requirements help ensure that the design, development, and maintenance of payment software protects payment transactions and data, reduces vulnerabilities, and prevents attacks. The Web Software Module is a set of supplemental security requirements introduced in version 1.2 of the PCI Secure Software Standard to address the most common security issues associated with the use of Internet-accessible payment technologies. According to Emma Sutcliffe, SVP Standards Officer of the PCI SSC, the PCI Secure Software Standard is designed to provide a more flexible approach to testing the security and integrity of payment software. The Web Software Module was developed to help software vendors and developers identify and implement appropriate software security controls to protect against common web software attacks. The Web Software Module includes high-level requirement areas such as documenting and tracking the use of open-source and third-party software components and Application Programming Interfaces (APIs) in payment software. This article continues to discuss version 1.2 of the PCI Secure Software Standard.

    Help Net Security reports "PCI Secure Software Standard 1.2 Released"

  • news

    Visible to the public  "Cisco Discloses High-Severity IP Phone Bug With Exploit Code"

    Cisco has disclosed a critical vulnerability that could enable Remote Code Execution (RCE) and Denial-of-Service (DoS) attacks on its latest generation of IP phones. The company warned that its Product Security Incident Response Team (PSIRT) is aware of the availability of proof-of-concept (POC) exploit code and that the vulnerability has been publicly discussed. However, according to Cisco's PSIRT, it is not aware of any attempts to exploit this flaw in attacks. Cisco did not release security updates to address this bug prior to its public disclosure, but says a patch will be available in January 2023. The security flaw, tracked as CVE-2022-20968, is caused by insufficient input validation of received Cisco Discovery Protocol packets, which unauthenticated, adjacent attackers can exploit to cause a stack overflow. The bug impacts Cisco IP phones running firmware versions 14.2 and earlier. While no security update or workaround for the flaw is currently available, Cisco provides mitigation advice for administrators who want to protect vulnerable devices in their environment from potential attacks. Disabling the Cisco Discovery Protocol on affected IP Phone 7800 and 8800 Series devices that also support Link Layer Discovery Protocol (LLDP) for neighbor discovery is required. According to Cisco's security advisory, devices will then use LLDP to discover configuration data such as voice VLAN and power negotiation. This article continues to discuss the high-severity vulnerability impacting Cisco IP phones.

    Bleeping Computer reports "Cisco Discloses High-Severity IP Phone Bug With Exploit Code"

  • news

    Visible to the public "Researchers Uncover New Drokbk Malware that Uses GitHub as a Dead Drop Resolver"

    Nemesis Kitten, a subgroup of an Iranian nation-state group, has been linked to Drokbk. This previously undocumented custom malware uses GitHub as a dead drop resolver to exfiltrate data from infected computers or to receive commands. According to Secureworks principal researcher Rafe Pilling, using GitHub as a virtual dead drop helps the malware blend in. Since all traffic to GitHub is encrypted, defensive technologies cannot see what is being exchanged. Furthermore, because GitHub is a legitimate service, it raises fewer concerns. The malicious activities of the Iranian government-sponsored actor first came to light in February 2022, when it was observed exploiting Log4Shell flaws in unpatched VMware Horizon servers to deploy ransomware. The larger cybersecurity community has identified Nemesis Kitten as TunnelVision, Cobalt Mirage, and UNC2448. It is also a sub-cluster of the Phosphorus group, with the Microsoft ID DEV-0270. It is also said to have tactical overlaps with Cobalt Illusion, also known as APT42, a Phosphorus subgroup that conducts information collection and surveillance operations against individuals and organizations of strategic interest to the Iranian government. This article continues to discuss the Nemesis Kitten nation-state group's use of the new Drokbk malware.

    THN reports "Researchers Uncover New Drokbk Malware that Uses GitHub as a Dead Drop Resolver"

  • news

    Visible to the public "Social Engineering Hackers Use Excel to Target Crypto VIPs"

    North Korea's Lazarus Group is suspected of luring high-volume traders in cryptocurrency chat groups on Telegram into installing backdoors by asking for feedback on trading platform fee structures. Microsoft researchers and the digital forensics firm Volexity both have discovered the campaign, which tricks victims into opening an Excel spreadsheet containing malicious macros. Volexity associates the campaign with the Lazarus Group, while Microsoft identifies the threat actor as DEV-0139, a designation reserved for unknown or emerging clusters of threat activity. Microsoft monitors known Lazarus activity under the moniker "Zinc." Lazarus is known for using social engineering techniques as an initial access vector, such as posting fake LinkedIn profile ads to trick users into downloading malicious payloads. Volexity identified the campaign's backdoor as AppleJeus malware, a malicious application that the US federal government says North Korean hackers have been using to steal cryptocurrency since at least 2018. Microsoft attributes the campaign's activity to Telegram groups used to facilitate communication between VIP clients and cryptocurrency platforms, and says that the threat actor engineers tricked victims into opening an infected Excel file by soliciting comments on trading fee structures. Telegram has emerged as the preferred communication platform for cryptocurrency traders. The spreadsheet contains legitimate data on platform fees charged to users. By password-protecting the main sheet and providing the passphrase "dragon," the threat actor encourages victims to enable file macros. According to Microsoft, the weaponized Excel file runs an obfuscated macro that extracts a second spreadsheet, which then runs a macro that opens a PNG file from a cloud storage account. Three executables, including an encoded backdoor, are embedded in the PNG file. One of the files includes a malicious Dynamic Link Library (DLL) file that proxies through the legitimate DLL to decode and run the backdoor. This article continues to discuss the malicious campaign tricking high-volume traders into installing AppleJeus malware.

    GovInfoSecurity reports "Social Engineering Hackers Use Excel to Target Crypto VIPs"

  • news

    Visible to the public "Despite a Year of Warnings and Patching, Nearly 3 Out of 4 Organizations Still Vulnerable to Log4Shell"

    According to several security experts, the Log4Shell vulnerability will impact organizations for at least a decade. Those concerns appear to be justified, as a new report from Tenable finds that 72 percent of organizations are still vulnerable, even though it has been one of the most notable items in cybersecurity news for nearly a year. The vulnerability remains buried in many assets, especially legacy systems that are more difficult to address. It also continues to impact the organization as new unsecured devices are added. Information Technology (IT) staff are struggling to build bigger teams of professionals to keep up. The report does identify some areas where significant progress has been made. When Log4Shell was made public in December 2021, it was estimated that 10 percent of all business assets were vulnerable to it. Due to massive patching efforts, that figure has dropped to 2.5 percent as of October 2022. However, after being fully remedied, 29 percent of assets experienced the re-emergence of a Log4Shell vulnerability. This was the basis for security experts' predictions that Log4Shell would continue to be a problem throughout the rest of the 2020s. While an organization could achieve full remediation, vulnerable elements will gradually make their way back in through new software and devices over time. Although 28 percent of organizations now report full remediation, a 14-point increase from six months ago, these organizations may become vulnerable again if monitoring and patching efforts do not continue. All organizations are still potentially vulnerable, as the problem is still circulating and could resurface in the coming years. Engineering is currently the most remedied industry (45 percent), followed by legal services (38 percent). Reports of Log4Shell being exploited in the wild are relatively low in comparison to how prevalent it remains, indicating that attackers are having just as much difficulty locating buried weak points as internal IT teams. The Advanced Persistent Threat (APT) groups of China, Iran, and North Korea have all been observed making attempts, but with limited success thus far. This article continues to discuss the Log4Shell vulnerability and its expected long-term impact on organizations.

    CPO Magazine reports "Despite a Year of Warnings and Patching, Nearly 3 Out of 4 Organizations Still Vulnerable to Log4Shell"

  • news

    Visible to the public "JSON-Based SQL Injection Attacks Trigger Need to Update Web Application Firewalls"

    Security researchers have devised a generic SQL injection technique that circumvents multiple Web Application Firewalls (WAFs). WAF vendors have failed to add support for JSON inside SQL statements, allowing potential attackers to easily conceal their malicious payloads. The bypass method, discovered by Claroty's Team82 researchers, has been confirmed to work against WAFs from Palo Alto Networks, Amazon Web Services (AWS), Cloudflare, F5, and Imperva. Customers should update their WAF deployments now that these vendors have released patches. However, the technique may also work against WAF solutions from other vendors, so users should check with their service providers to see if they can detect and block such attacks. Claroty researchers developed this attack technique while investigating vulnerabilities in Cambium Networks' cnMaestro wireless device management platform, which can be deployed on-premises or in the cloud. Cambium's cloud service provides a separate isolated instance of the cnMaestro server for each customer and uses AWS as the backend. The researchers discovered seven flaws in cnMaestro, including a SQL injection flaw that allowed them to steal users' sessions, SSH keys, password hashes, tokens, and verification codes from the server database. SQL injection is a common and dangerous web application vulnerability that allows attackers to inject arbitrary SQL queries into requests, which the application then executes against the database with its own privileges. After confirming that their exploit worked on an on-premises deployment of cnMaestro, the researchers tried it on a cloud-hosted instance. They deduced from the server response that the request was most likely blocked by the AWS WAF, which identified it as malicious. The researchers decided to investigate how the AWS WAF detects SQL injection attempts by hosting their own vulnerable application on AWS and sending malicious requests to it. They concluded that the WAF identifies SQL syntax in two primary ways: searching for specific words in the request that it recognizes as SQL syntax and attempting to parse different parts of the request as valid SQL syntax. While most WAFs will use a combination of both methodologies and anything unique to the WAF, they share one flaw in that they both require the WAF to recognize SQL syntax. This article continues to discuss the newly discovered method that uses JSON syntax to deliver malicious payloads bypassing SQL injection protections in popular WAFs.

    CSO Online reports "JSON-Based SQL Injection Attacks Trigger Need to Update Web Application Firewalls"

  • news

    Visible to the public "Stolen Data of 3,000 Irish People Sold on Bot Markets, Study Claims"

    According to the cybersecurity firm NordVPN, at least 5 million people worldwide have had their online data stolen and sold on "bot markets." About 3,000 of those affected are from Ireland, while nearly 46,000 are from the UK. Bot markets are online marketplaces where hackers sell data stolen from their victims' devices via malware. According to NordVPN, data is typically sold in packets that include passwords, cookies, digital fingerprints, and other information that can help set up a digital identity. Bot markets differ from other dark web markets in that they collect large amounts of data about a single person in one location. In addition, they guarantee the buyer that the victim's information will be updated as long as the bot infects their device. NordVPN examined three major bot markets accessible via the surface web, compiling data with the assistance of third-party researchers. Cookies and login information were among the most common types of data sold on these markets. Researchers discovered 667 million stolen cookies, 87,000 digital fingerprints, 538,000 auto-fill forms, and 26.6 million logins for sale on the markets examined. There were 720,000 logins from Google accounts, 654,000 from Microsoft accounts, and 647,000 from Facebook. Hackers were also discovered taking screenshots from malware-infected devices. The most common types of data-stealing malware are RedLine, Vidar, Racoon, Taurus, and AZORult. Screen resolution, device information, browser preferences, and other information that makes a user unique are all part of a person's digital fingerprint. Hackers can use this information to make themselves appear legitimate. These bot markets provide a variety of ways to exploit a victim's data, such as connecting to someone's Facebook account and sending malicious content to other users. More sophisticated criminals purchase this information in order to target businesses with phishing attacks by impersonating employees. This article continues to discuss NordVPN's latest report on bot markets.

    Silicon Republic reports "Stolen Data of 3,000 Irish People Sold on Bot Markets, Study Claims"

  • news

    Visible to the public "67 Percent of Companies Lose Business Deals Over Security Strategy Concerns"

    According to new LogRhythm research, 67 percent of respondents say their company has lost a business deal due to a customer's lack of trust in their security strategy. Dimensional Research conducted the survey of 1,175 security professionals and executives from five continents, and found that 91 percent believe their company's security strategy and practices must now align with their customers' security policies and standards. Partners are also exercising a new level of due diligence, with 85 percent of respondents stating that their company must provide proof of meeting the security requirements of their partners. According to Andrew Hollister, CSO of LogRhythm, cybersecurity is now a business imperative due to the increasing complexity and severity of cyber threats that organizations face. Security incidents have the potential to significantly impact revenue, thus calling for executive leadership's attention and pushing more organizations to align on expectations internally and externally. The study also discovered that work-related stress for the security team is increasing in nearly seven out of ten companies, with 30 percent reporting a significant increase, implying that many businesses are attempting to do more with less due to budget constraints. Growing attack sophistication, increased responsibilities, and increased attack frequency are the leading causes of stress for security team members. When asked what would help relieve their stress, 42 percent said more experienced security team members, and 41 percent wanted more integrated security solutions. This article continues to discuss findings from LogRhythm's State of the Security Team 2022 Report.

    BetaNews reports "67 Percent of Companies Lose Business Deals Over Security Strategy Concerns"

  • news

    Visible to the public "Cisco Survey Reveals Increased Focus on Cybersecurity Resilience"

    According to a global survey of 4,700 Information Technology (IT) professionals conducted by Cisco, the most common types of incidents were network or data breaches (52 percent), followed by network or system outages (51 percent), ransomware events (47 percent), and Distributed Denial-of-Service (DDoS) attacks (46 percent). Sixty-two percent of organizations reported a security event that impacted business operations in the last two years, including IT and communications disruption (63 percent), supply chain disruption (43 percent), impaired internal operations (41 percent), and long-term brand damage (40 percent). Security resilience is now a high priority for 96 percent of respondents. According to Wendy Nather, Cisco's head of advisory CISOs, the survey revealed that organizations are changing their approach to cybersecurity as they deal with a chronic shortage of cybersecurity skills when attacks continue to increase in volume and sophistication. Cisco also ranked survey participants based on their overall resilience, finding that organizations with a mature zero-trust model have a 30 percent higher resilience score than those without such a model. Compared to organizations that did not have detection and response capabilities, advanced Extended Detection and Response (XDR) capabilities resulted in a 45 percent increase in resilience. Cloud-based Secure Access Service Edge (SASE) solutions improve organizations' security resiliency by 27 percent. Organizations with poor C-suite security support scored 39 percent lower than those with strong executive support, while businesses with an excellent security culture scored 46 percent higher on average. The precise location of IT resources appears to have little impact on cybersecurity resilience. Organizations that are primarily on-premises or primarily cloud-based had the highest and nearly identical security resilience scores. However, organizations in the early stages of transitioning from an on-premises to a hybrid cloud environment saw resilience scores drop by 9 percent to 14 percent, depending on how difficult the hybrid environments were to manage. This article continues to discuss findings from Cisco's survey of IT professionals on security resilience.

    Security Boulevard reports "Cisco Survey Reveals Increased Focus on Cybersecurity Resilience"

  • news

    Visible to the public "Consumers Prioritize Mobile App Security Over Features"

    Researchers at Appdome unveiled the results of a global survey that shares the views of 25,000 consumers in 11 countries on mobile app use and consumer expectations of mobile app security. The researchers found that more than half (53.5%) of consumers now prefer mobile apps to other digital channels. The researchers noted that approximately 62% of global consumers demand both the best features and security in their mobile experiences equally. On top of that, about 24% say protection against on-device security, fraud, malware threats, and attacks is more important than features. Only 13.7% prioritized features over security. The researchers stated that consumers made it clear that they will reward and promote brands who protect their mobile app data and will punish brands they perceive as not protecting the mobile apps. Many participants (70.4%) demand mobile app protections which go beyond the login screen and data protection and include anti-fraud and anti-malware protection built into the mobile app. Most (93.8%) would promote a brand if the mobile app protected their data and use. More than half (67.9%) would abandon a brand if they perceived that the mobile app did not protect against on-device threats, with 44% saying they would also tell their friends to abandon the brand. Many of the participants (73%) would abandon a brand if they experienced an unprotected hack or attack from an on-device threat, with 47.4% saying they would tell their friends to abandon the brand.

    Help Net Security reports: "Consumers Prioritize Mobile App Security Over Features"

  • news

    Visible to the public "Endor Labs Unveils New Research on Impact of Open-Source Software on Supply Chain Security"

    Endor Labs published "The State Of Dependency Management," which provides insight into the widespread but often unmonitored use of existing open-source software in application development, as well as the risks associated with this common practice. The research reveals that 95 percent of all vulnerabilities are found in transitive dependencies, which are open-source code packages that are not chosen by developers but are still pulled into projects indirectly. This is the first report from Station 9, Endor Labs' research capability that brings together researchers, academics, and thought leaders worldwide. Station 9's new report provides an analysis of the complexities underlying the reliance on open-source software, revealing how traditional methods of vulnerability remediation require far more scrutiny. According to the report, the issue is not necessarily the widespread use of existing open-source code in new applications. Instead, it is that only a small sampling of these software dependencies is selected by the developers involved. The remainder are transitive or indirect dependencies. This allows for significant vulnerabilities impacting both the security and development worlds. Most vulnerabilities are found in transitive dependencies, making it difficult for developers to assess the true impact of these issues or even whether they are reachable. A comparison of the two most popular community initiatives for identifying critical projects, Census II and OpenSSF Criticality Scores, reveals that determining criticality is complex. Seventy-five percent of Census II packages have a Criticality Score of less than 0.64. Organizations must determine which open-source projects are critical for them. Threat actors have benefited from dependency confusion in recent supply chain attacks, while the risk indicators covered in widely used initiatives typically do not detect these attacks. Fifty percent of the most popular Census II packages did not have a release date in 2022, and 30 percent had their most recent release before 2018. These have the potential to cause serious security and operational issues in the future. When upgrading to the most recent version of a package, there is still a 32 percent chance that it will contain known vulnerabilities, proving that new does not imply secure. This article continues to discuss key findings from Endor Labs' report on dependency management.

    Business Wire reports "Endor Labs Unveils New Research on Impact of Open-Source Software on Supply Chain Security"

  • news

    Visible to the public "Lighting Giant Acuity Brands Discloses Two Data Breaches"

    Lighting and building management giant Acuity Brands has recently publicly disclosed two data breaches it suffered in recent years, including one that may have involved ransomware. The Atlanta, Georgia-based firm employs roughly 13,000 people and has operations in North America, Europe, and Asia. Acuity Brands said it became aware of unauthorized access to its systems and data theft in early December 2021. The investigation into the incident revealed a separate, unrelated breach that occurred in October 2020, which also involved attempts to copy files from compromised systems. The company stated that an investigation revealed that the information compromised in the two incidents belonged to current and former employees and members of Acuity's health plan. There is no indication that customer information was stolen. The information affected included name, Social Security number, Acuity health plan information, driver's license number, financial account information, limited health information, and other details related to employment. Acuity stated that they first informed customers, partners, and others about the breach in December 2021, and the new notification is a follow-up to notify impacted associates and provide them with the necessary resources. Acuity Brands may be facing legal action as a result of these security incidents. A California-based class action law firm issued a press release on Wednesday, urging impacted individuals to get in touch.

    SecurityWeek reports: "Lighting Giant Acuity Brands Discloses Two Data Breaches"

  • news

    Visible to the public "Android App With Over 5M Downloads Leaked User Browsing History"

    According to the Cybernews research team, web Explorer - Fast Internet, an Android browsing app, left its Firebase instance open, exposing app and user data. Firebase is a mobile app development platform with numerous analytics, hosting, and real-time cloud storage features. Web Explorer - Fast Internet is a Google Play store browsing app with over five million downloads. It claims to increase browsing speed by 30 percent and has received an average user rating of 4.4 out of five stars from over 58,000 reviews. The open Firebase instance contained days' worth of redirect data, presented by user ID, including country, redirect initiating address, and redirect destination address. However, simply obtaining the data that Web Explorer - Fast Internet left exposed would not suffice, as a threat actor would also have to know where app developers keep additional user data. Cross-referencing the leaked data with additional information may amplify any harm done to the app's users. When the team discovered the open instance, they contacted Web Explorer - Fast Internet but had not received a response at the time of publication. However, the open Firebase instance has been closed and is no longer accessible. According to the team, with the instance closed, threat actors no longer have access to sensitive redirect data, which could have allowed them to de-anonymize Web Explorer - Fast Internet users' browsing activity with additional effort. Google Play store data reveals that the app was last updated on October 28, 2020, implying that hardcoded secrets are still present. This article continues to discuss the Android app Web Explorer - Fast Internet leaving its Firebase instance open, exposing sensitive data that malicious actors could use to check users' browsing history.

    Cybernews reports "Android App With Over 5M Downloads Leaked User Browsing History"

  • news

    Visible to the public "Supply Chain Web Skimming Attacks Hit Dozens of Sites"

    Security researchers at Jscrambler had recently discovered that a web skimming campaign running for the past year has already compromised over 40 e-commerce sites. The researchers revealed that "Group X," which exfiltrated card data to a server in Russia, used a novel supply-chain technique to compromise its victims. The researchers noted that the cybercriminals exploited a third-party JavaScript library called Cockpit, a free web marketing and analytics service that was discontinued in December 2014. The researchers stated that the adversaries acquired the domain name that hosted the library and used it to serve a skimming script via the same URL. By re-registering the defunct domain and configuring it to distribute malicious code, the attackers were able to compromise over 40 e-commerce websites. The researchers noted that it is not uncommon for web owners to fail to remove deprecated libraries like this from their sites, leading to dead links that can be compromised. The researchers stated that the problem lies with a lack of insight into third-party code and poor security practices. The researchers argued that most security teams don't have visibility into this third-party code running on their websites. They don't know if it's behaving as it should or misbehaving, whether accidentally or maliciously. The researchers noted that this security blind spot can create a false sense of confidence in one's assessment of risk. The researchers also admitted that some of the compromised sites may have been impacted due to the content management system or website generator service they were using, which automatically injected the third-party script into their pages. In that scenario, they may have been unable to remove the library from their site due to restricted permissions or lack of knowledge. Jscrambler also found two other web skimming groups. One, dubbed "Group Y," used a similar skimmer to Group X but attacked websites directly with the aim of injecting a script into their homepage. The third, "Group Z," apparently used a slightly modified script and server structure in its attacks.

    Infosecurity reports: "Supply Chain Web Skimming Attacks Hit Dozens of Sites"

  • news

    Visible to the public "Google Unearths Internet Explorer Zero-Day Exploited by North Korean Hackers"

    Google's Threat Analysis Group (TAG) discovered a zero-day exploit for an Internet Explorer (IE) vulnerability that was used to target South Korean users. TAG made the discovery in October 2022 and found malware in documents emailed to targets. The hidden malware in the documents took advantage of a vulnerability, tracked as CVE-2022-41128, in the browser's JScript engine. TAG attributed the attacks to North Korean government-backed actors known as APT37. APT37 has previously used IE zero-days to target users, with a preference for those based in South Korea, such as journalists, human rights activists, and North Korean defectors. The malware-infected document attempted to capitalize on public interest in a devastating accident that occurred in South Korea in October. Multiple South Korean submitters flagged the malware to Google's TAG by uploading the Microsoft Office document to VirusTotal, a Google-owned website that analyzes suspicious files, domains, or URLs. Researchers discovered that the document downloaded a Rich Text File (RTF) remote template before fetching HTML content. Since Microsoft Office renders HTML content with IE, this technique has been widely used to distribute IE exploits via Office files since 2017, according to TAG. Using this vector to deliver IE exploits does not require the target to use IE as its default browser or to chain the exploit with an EPM sandbox escape. The flaw stems from IE's JavaScript engine and can be exploited to execute arbitrary code when rendering an attacker-controlled website. The bug is caused by incorrect JIT optimization, which causes type confusion. TAG notified Microsoft of the vulnerability on October 31, 2022, and it was patched five days later, on November 8, 2022. This article continues to discuss the IE zero-day exploited by the North Korean threat actor APT37.

    ITPro reports "Google Unearths Internet Explorer Zero-Day Exploited by North Korean Hackers"

  • news

    Visible to the public "Apple to Roll Out New Set of Cybersecurity Features for Users"

    Apple has announced plans for new cybersecurity features aimed at helping users protect their data more effectively from hacking. The first feature Apple will include in the update is Advanced Data Protection, which will be made available through iCloud, Apple's cloud-based file storage service. According to Apple, Advanced Data Protection will allow users to use end-to-end encryption to protect files they store in iCloud. End-to-end encryption enables users to encrypt files before uploading them to a cloud service, ensuring that the operator of the cloud service cannot access the original, unencrypted version of the file. Apple's iCloud service already offers end-to-end encryption for 14 different types of data. With the Advanced Data Protection feature, Apple will extend end-to-end encryption to nine more data types, including files from its Photos and Notes apps. However, due to technical constraints, the feature will not be available for iCloud Mail, Contacts, and Calendar services. The Advanced Data Protection feature debuted together with another new feature called iMessage Contact Key Verification. This feature is intended to address the increased risk of cyberattacks that journalists, human rights activists, and government officials face. According to Apple, iMessage Contact Key Verification allows a user to verify an iMessage contact's identity using a password called a Contact Verification Code. Furthermore, the feature notifies users if Apple detects hackers attempting to eavesdrop on their conversations. iMessage Contact Key Verification is designed to prevent advanced threats such as state-sponsored cyberattacks. The third cybersecurity feature announced by Apple is Security Keys for Apple ID, which will allow users to log into their Apple ID accounts using a hardware security key. A hardware security key is a two-factor authentication (2FA) device that often takes the form of a USB drive, providing a more secure option than traditional login credentials such as passwords. This article continues to discuss the new cybersecurity features Apple will roll out for users.

    SiliconANGLE reports "Apple to Roll Out New Set of Cybersecurity Features for Users"

  • news

    Visible to the public "Investment Fraud Gang May Have Made $500m"

    Security researchers at Group-IB have uncovered a prolific investment fraud group that may have made half a billion dollars in profits over the past four years. Named "CryptosLabs" after a scam website template it used, the group's fake investment scheme is built on a highly organized group of "kingpins," sales agents, developers, and call-center operators. The researchers noted that victims are lured by messages left on investment forums or advertising on social media and search engines. The researchers stated that the gang spoofed at least 40 popular European brands from the banking, fintech, crypto, and asset management industries to add legitimacy to their offerings. If victims clicked on an ad, they would be taken to one of 300 spoofed domains hosted on 70 servers, which usually impersonate well-known financial and asset management companies. After leaving their details on the phishing sites, the victims would be contacted by phone by a call-center scammer pretending to be a personal manager from the investment division of the relevant spoofed company. They would be provided with credentials to log in to the trading portal and asked to pay a $210-315 deposit to start investing in stocks, crypto, and NFTs. The researchers noted that victims would be shown fake growth curves and stats to keep them investing, with all the money heading to the scammers. If a victim wanted to leave, they'd be required to pay a fee to receive their non-existent funds, which also goes to the fraudsters. All the victims of CryptosLabs are from French-speaking parts of Europe: France, Luxembourg, and Belgium.

    Infosecurity reports: "Investment Fraud Gang May Have Made $500m"

  • news

    Visible to the public "Hacker Fails for the Win"

    Douglas McKee, director of vulnerability research at Trellix, struggled to extract passwords from a medical patient-monitor device that he was probing for vulnerabilities. The GPU password-cracking tool he had used to lift the layers of credentials required to dissect the device had returned an empty result. When he read the medical device's documentation a few months later, he realized the passwords had been right there in print the whole time. Since the passwords were also hardcoded into the system, his failed password-cracking process turned out to be overkill. Later, he and his team discovered bugs in the device that enabled them to falsify patient data on the monitor device. According to McKee, failing to read documentation is a common mistake made by security researchers wanting to delve deeper into the hardware and software they are studying and reverse-engineering. In a presentation titled "Fail Harder: Finding Critical 0-Days Despite Ourselves," McKee and his colleague Philippe Laulheret, senior security researcher at Trellix, shared some mistakes or miscalculations they made in their hacking projects that can serve as useful lessons for security researchers. This article continues to discuss some mistakes made by security researchers in some of their key vulnerability discoveries that can serve as lessons for other researchers.

    Dark Reading reports "Hacker Fails for the Win"

  • news

    Visible to the public "Cybercriminals Are Scamming Each Other, Tipping off Law Enforcement"

    Cybercriminals are scamming each other and using arbitration to settle disputes about the scams. Sophos experts investigated two Russian-language cybercrime forums with Access-as-a-Service (AaaS) listings, as well as an English-language cybercrime forum and marketplace specializing in data leaks. All three were discovered to have their own arbitration rooms. The practice of cybercriminals scamming each other is lucrative even though this resolution process occasionally results in mayhem among the "plaintiffs and defendants," with some accused criminals disappearing or calling the complainants themselves "rippers." Researchers looked at 600 scams over the course of a year that cost threat actors a combined total of more than $2.5 million on just these three forums, with claims ranging from $2 to $160,000. They discovered a sub-economy of cybercriminals while looking into scams, including not just lower-level criminals but some of the most well-known ransomware organizations. These scams are not always just done for money since rivalries and personal grudges were found to be common. They also discovered instances where cybercriminals would scam the scammers who had scammed them. In one instance, they discovered a trolling competition set up to exact revenge on a scammer who was attempting to trick users into paying $250 to become a member of a fake underground forum. The "contest winner" took home $100. The researchers also found that the arbitration processes left a wealth of untapped intelligence behind, which security experts and law enforcement could use to better understand and combat the actions of cybercriminals. This article continues to discuss observations made from the exploration of cybercriminal sites.

    Help Net Security reports "Cybercriminals Are Scamming Each Other, Tipping off Law Enforcement"

  • news

    Visible to the public  "COVID-bit: New Covert Channel to Exfiltrate Data from Air-Gapped Computers"

    An unusual data exfiltration method uses a previously unknown covert channel to leak sensitive data from air-gapped systems. According to Dr. Mordechai Guri, the head of R&D in the Cyber Security Research Center at Ben Gurion University of the Negev in Israel and the head of Offensive-Defensive Cyber Research Lab, the information is exfiltrated from the air-gapped computer over the air to a distance of 2 m and more. A nearby insider or spy can pick up the data with a mobile phone or laptop. The method called COVID-bit uses malware installed on the machine to generate electromagnetic radiation in the 0-60 kHz frequency band, which is then transmitted and picked up by a stealthy receiving device in close physical proximity. This is made possible by utilizing modern computers' dynamic power consumption and manipulating the momentary loads on CPU cores. COVID-bit is Dr. Guri's fourth technique developed this year, following SATAn, GAIROSCOPE, and ETHERLED, all of which are designed to jump over air gaps and harvest confidential data. Despite their high level of isolation, air-gapped networks can be compromised by a variety of strategies, such as infected USB drives, supply chain attacks, and rogue insiders. However, due to the lack of Internet connectivity, exfiltrating the data after breaching the network is difficult, thus requiring that attackers devise special methods to deliver the information. The COVID-bit is one such covert channel used by malware to transmit information through electromagnetic emissions from a component known as a Switched-Mode Power Supply (SMPS) and encoding the binary data using a mechanism called Frequency-Shift Keying (FSK). This article continues to discuss the new COVID-bit data exfiltration method.

    THN reports "COVID-bit: New Covert Channel to Exfiltrate Data from Air-Gapped Computers"

  • news

    Visible to the public "Hackers Use New Fantasy Data Wiper in Coordinated Supply Chain Attack"

    In supply chain attacks affecting organizations in Israel, Hong Kong, and South Africa, the Iranian Agrius Advanced Persistent Threat (APT) hacking group is employing a new 'Fantasy' data wiper. The campaign began in February and reached its peak in March 2022, infiltrating an Information Technology (IT) support services firm, a diamond wholesaler, a jeweler, and a Human Resources (HR) consulting firm. Agrius used a new wiper called Fantasy in this campaign, which was hidden inside a software suite created by an Israeli vendor. This software is widely employed in the diamond industry. According to ESET analysts, Fantasy is an evolution of the threat actor's previous campaign wiper, 'Apostle.' Wipers are a type of malware that deletes data from compromised computers, resulting in digital destruction and business disruption. On February 20, 2022, the Agrius APT breached a South African diamond industry organization, dropping credential harvesters like MiniDump and SecretsDump on its network to steal account credentials. The Fantasy data wiper is a 32-bit Windows executable. Upon execution, it obtains a list of all drives and their directories, with the exception of the Windows folder. Fantasy overwrites each file's content with random data, resets the timestamps to midnight 2037, and deletes it. This procedure attempts to keep the files from being recovered using data recovery software. Fantasy then deletes registry keys in HKCR, clears all WinEventLogs, deletes the Windows SystemDrive folder, and goes to sleep for two minutes. After another 30-second delay, the wiper overwrites the master boot record, deletes itself, and reboots the system. This article continues to discuss the Agrius APT hacking group and its use of the new Fantast data wiper in supply chain attacks.

    Bleeping Computer reports "Hackers Use New Fantasy Data Wiper in Coordinated Supply Chain Attack"

  • news

    Visible to the public "LiDAR Sensors Have Fixable Security Vulnerability"

    A large blindspot in front of an approaching autonomous vehicle's LiDAR system can be created by shining expertly timed lasers. This attack can hide moving pedestrians and other obstacles. A group of researchers from the University of Florida, the University of Michigan, and the University of Electro-Communications in Japan discovered this security flaw, which tricks LiDAR sensors into deleting data about pedestrians and obstacles. The team also offered upgrades and fixes to keep LiDAR sensors safe from malicious attacks. According to Yulong Cao, a Ph.D. student at the University of Michigan, LiDAR sensors work by firing laser pulses and calculating the distance from the sensor and potential obstacles in the car trajectory based on the timing of returned signals. However, due to the noisy signals in the real world, LiDAR sensors used in autonomous vehicles typically prioritize the first/strongest signals received and filter out signals returned too soon (i.e., close reflections). By generating laser pulses to imitate fake returned signals closer to the LiDAR sensor, attackers can induce the automatic discard of returned signals from real pedestrians or cars on the road far away. Since the sensor automatically filters out the fake signals, the attack goes unnoticed, and real obstacles are no longer perceived. The LiDAR still receives genuine data from the obstacle, but it is automatically discarded because the sensor only sees the researchers' fake reflections. The group used moving vehicles and robots to demonstrate the attack, with the attacker device located about 15 feet away on the side of the road. However, this can theoretically be accomplished from a greater distance using more sophisticated equipment. The technology involved is simple, but the laser must be perfectly timed to the LiDAR sensor, and moving vehicles must be carefully tracked to keep the laser pointing in the right direction. Updates to LiDAR sensors or software that interprets raw data should address this security flaw, and the researchers recommend that manufacturers begin teaching software to look for the indicative signatures of spoofed reflections added by a laser attack. This article continues to discuss the demonstrated attack that can hide objects and fool autonomous vehicles' obstacle detectors by using the automatic transformation and filtering processes of LiDAR sensor data integrated with autonomous driving frameworks.

    Laser Focus World reports "LiDAR Sensors Have Fixable Security Vulnerability"

  • news

    Visible to the public "Cyberspace in Space: The Out-Of-This-World Challenges Ahead"

    Satellites and the space-based services they provide are critical to modern society, as they support telecommunications, the Global Positioning System (GPS), and accessible Internet connections for millions of people worldwide. In space, security is a persistent issue that is likely to get worse. Attacks launched against ViaSat and Starlink Internet services in Ukraine this year included jamming, GPS spoofing, and other cyberattacks. The flow of information is disrupted by jamming Starlink connections, which could be critical in a conflict. Although limited in scope, anti-satellite weapons (ASAT) are real. According to a University of Oxford research paper on satellite cybersecurity, as space systems become more interconnected and computationally complex, new concerns about the threat of cyberattacks have arisen. The US Department of Defense (DOD) pointed out the People's Republic of China as one threat. According to an in-depth research paper on China's military power, space is on the agenda, with electronic warfare as part of that strategy. A successful cyberattack on a satellite could have serious ramifications. Blocking communications with the satellite, for example, could disrupt critical communications and services for millions of people on the ground. A cyberattack could change a satellite's course to disrupt or permanently damage it. While there may be rules and conventions prohibiting governments from conducting full-scale cyberattacks on satellites operated by other nations in space, the war in Ukraine shows that disrupting satellite communications is not entirely off the table. Although cyberattacks against satellites appear unlikely in the near future, anything built with Internet of Things (IoT) connectivity can be accessed via the Internet, potentially including satellites. This article continues to discuss cyber threats facing space systems.

    ZDNet reports "Cyberspace in Space: The Out-Of-This-World Challenges Ahead"

  • news

    Visible to the public "Cyberattacks Threaten Global Security"

    The US is engaged in a quiet but potentially devastating intelligence, cyber, and information war, with China, Russia, Iran, and North Korea posing the greatest threats to national security. That was the topic of a webinar hosted by Arizona State University's (ASU) Center on the Future of War titled "Confronting Current and Future Cybersecurity Threats." As computers have evolved, they have become increasingly entwined in everything, from information on a computer desktop to military weapons, according to Rob Joyce, the director of the National Security Agency's (NSA) cybersecurity directorate. Part of the agency's mission is to collaborate with allies, private industry, and academics to increase awareness and cooperation as well as advance the state of cybersecurity. Joyce was joined by professors Robert Schmidle and Daniel Rothenberg. Rothenberg questioned whether a devastating and fundamentally destabilizing cyberattack in American society is imminent and unavoidable. Joyce responded by citing the 2021 ransomware attack on the Colonial Pipeline that was caused by a single compromised password and resulted in severe fuel shortages. A cyberattack on the US government would have far-reaching consequences, affecting thousands of partner companies, defense contractors, subcontractors, and others. The ecosystem is made up of 30,000 cleared companies that work as subcontractors and 300,000 companies that feed into the defense department. Therefore, there is a massive amount of technical surface that adversaries can exploit in order to steal information, manipulate data, and more. Joyce stated that anything from municipal governments to businesses that are attacked is a national security issue. Computers are used and required in hospitals, classrooms, and manufacturing facilities alike. Joyce emphasized that criminals are aware of the resources people rely on, and they can take advantage of them. This article continues to discuss Joyce's key points regarding combatting current and future cybersecurity threats.

    Arizona State University reports "Cyberattacks Threaten Global Security"

  • news

    Visible to the public "A Faster Way to Preserve Privacy Online"

    Searching the Internet can expose information that a user would prefer to keep private. For example, when someone searches for medical symptoms online, they may be disclosing their health conditions to Google, an online medical database such as WebMD, and possibly hundreds of these companies' advertisers and business partners. Researchers have long been developing techniques that allow users to search for and retrieve information from a database privately. However, these methods are still too slow to be used effectively. Therefore, MIT researchers developed a method for retrieving private information approximately 30 times faster than comparable methods. Their method allows users to search an online database without disclosing their query to the server. Furthermore, it is driven by a simple algorithm that would be easier to implement than previous work's more complicated approaches. Their method could allow for private communication by preventing a messaging app from knowing what users are saying or who they are communicating with. It could also be used to retrieve relevant online advertisements without advertising servers learning about a user's preferences. The MIT researchers devised Simple PIR, a protocol in which the server performs much of the underlying cryptographic work before a client sends a query. This preprocessing step generates a data structure that contains compressed information about the database contents and is downloaded by the client before sending a query. The data structure serves as a hint to the client about what is contained in the database. Once the client has this hint, it can make an infinite number of queries, and these queries will be much smaller in terms of both the size of the messages sent by the user and the work that the server needs to do. To reduce the size of the hint, the researchers created a second technique called Double PIR, which essentially involves running the Simple PIR scheme twice. This article continues to discuss the fast method developed by MIT researchers to enable users to search for information without revealing their queries.

    MIT News reports "A Faster Way to Preserve Privacy Online"

  • news

    Visible to the public "Fortinet Patches High-Severity Authentication Bypass Vulnerability in FortiOS"

    Cybersecurity solutions provider Fortinet recently announced patches for multiple vulnerabilities across its products, including a high-severity authentication bypass impacting FortiOS and FortiProxy. Tracked as CVE-2022-35843 (CVSS score of 7.7), the authentication bypass was identified in the SSH login component of FortiOS. Fortinet noted that the bug can only be triggered when Radius authentication is used. Fortinet noted that an authentication bypass by assumed-immutable data vulnerability in the FortiOS SSH login component may allow a remote and unauthenticated attacker to login into the device via sending a specially crafted Access-Challenge response from the Radius server. The vulnerability impacts FortiOS versions 7.2.x, 7.0.x, 6.4.x, 6.2.x, and 6.0.x, and FortiProxy versions 7.0.x, 2.0.x, and 1.2.x. Patches were included in FortiOS versions 7.2.2, 7.0.8, and 6.4.10 and in FortiProxy versions 7.0.7 and 2.0.11. This week, Fortinet also announced patches for two medium-severity vulnerabilities in FortiADC (Application Delivery Controller), which ensures application availability, optimization, and security. Fortinet noted that the first bug (CVE-2022-33876) cumulates multiple input validation issues leading to information disclosure via crafted HTML requests, while the second (CVE-2022-33875) is described as an improper neutralization of special elements leading to SQL injection. Several low-severity vulnerabilities have also been resolved.

    SecurityWeek reports: "Fortinet Patches High-Severity Authentication Bypass Vulnerability in FortiOS"

  • news

    Visible to the public "Security and Access Are Top Issues for Data Engineers"

    Over half (54 percent) of those who participated in Immuta's third annual State of Data Engineering Survey say one of their biggest challenges is securing data with appropriate access rights. While nearly 60 percent believe their organizations should place a greater emphasis on data security. According to the survey, 89 percent of organizations are missing out on business opportunities due to data access bottlenecks. Data is increasingly being recognized as a critical business resource, but organizations surveyed report using only 58 percent of their data in decision-making. The disconnect between security and access negatively impacts data engineers' daily lives, with 40 percent reporting that managing data access burns them out. According to Matthew Carroll, CEO of Immuta, as data moves from on-premises to the cloud, this disconnect between data security and access harms organizations' data-driven initiatives and business outcomes. It increases their risk of data leaks and breaches. CISOs must become modern data stack enablers to better support data teams in bridging these disconnects. This calls for more collaboration between security and data leaders and their teams in order to effectively balance security and access. More than half (63 percent) of data professionals say they do not have complete visibility into who has access to what data. Responses to which team is responsible for validating policy compliance with regulations vary greatly between the Information Technology (IT) team (40 percent), security team (14 percent), data team (14 percent), compliance team (12 percent), privacy team (12 percent), and legal team (9 percent), thus demonstrating the lack of a standardized process across organizations. This article continues to discuss key findings from Immuta's third annual State of Data Engineering Survey.

    BetaNews reports "Security and Access Are Top Issues for Data Engineers"

  • news

    Visible to the public  "New Go-based Zerobot Botnet Exploiting Exploiting Dozens of IoT Vulnerabilities to Expand its Network"

    Zerobot is a new Go-based botnet that has been observed in the wild spreading by exploiting nearly two dozen security flaws in Internet of Things (IoT) devices and other software. According to Fortinet FortiGuard Labs researcher Cara Lin, the botnet contains several modules, including self-replication, attacks for various protocols, and self-propagation. It also uses the WebSocket protocol to communicate with its command-and-control (C2) server. The campaign, which is said to have begun after November 18, 2022, targets the Linux operating system in order to gain control of vulnerable devices. The name Zerobot comes from a propagation script that, depending on the microarchitecture implementation, is used to retrieve the malicious payload after gaining access to a host. The malware is intended to attack a variety of CPU architectures, including i386, amd64, arm, arm64, mips, mips64, mips64le, mipsle, ppc64, ppc64le, riscv64, and s390x. To date, two versions of Zerobot have been discovered. One was used prior to November 24, 2022, with basic functions, and an updated variant with a self-propagating module to breach other endpoints using 21 exploits. TOTOLINK routers, Zyxel firewalls, F5 BIG-IP, Hikvision cameras, FLIR AX8 thermal imaging cameras, D-Link DNS-320 NAS, and Spring Framework are among the systems affected. Upon initialization in the compromised machine, Zerobot connects to a remote C2 server and waits for further instructions to execute arbitrary commands and launch attacks against various network protocols such as TCP, UDP, TLS, HTTP, and ICMP. This article continues to discuss findings surrounding the novel Go-based Zerobot botnet.

    The Hacker News reports "New Go-based Zerobot Botnet Exploiting Exploiting Dozens of IoT Vulnerabilities to Expand its Network"

  • news

    Visible to the public "Trellix Predicts Heightened Hacktivism and Geopolitical Cyberattacks in 2023"

    The cybersecurity firm Trellix has released its annual threat predictions report for 2023. Trellix Advanced Research Center forecasts an increase in geopolitically motivated attacks across Asia and Europe, as well as hacktivism driven by tensions between opposing political parties and vulnerabilities in core software supply chains. According to John Fokker, Trellix's Head of Threat Intelligence, analyzing current trends is important, but being predictive in cybersecurity is critical. While organizations focus on near-term threats, it is essential to have a proactive posture by looking beyond the horizon. Global political events and the adoption of new technology will result in the emergence of novel threats from more sophisticated threat actors. Geopolitical factors will continue to drive misinformation campaigns and cyberattacks coordinated with kinetic military activity. When groups of loosely organized individuals fueled by propaganda band together for a common cause, they will increase their use of cyber tools to express their rage and cause disruption around the world. Both threat actors and security researchers will increase their research into underlying software frameworks and libraries, which will result in a rise in breaches related to software supply chain issues. Teens and young adults will become increasingly involved in cybercrime, from large-scale attacks on businesses and governments to low-level crimes against family, friends, peers, and strangers. Outsourcing malware creation and operation, malware diversification, and the use of leaked source code will make attribution of cyberthreats to specific threat actors increasingly difficult. There will be a significant increase in advanced cyber actors disrupting critical infrastructure in vulnerable targets. Weaponized phishing attacks will become more common across popular business communication services and apps such as Microsoft Teams, Slack, and others. This article continues to discuss threat predictions made by Trellix for 2023.

    AP News reports "Trellix Predicts Heightened Hacktivism and Geopolitical Cyberattacks in 2023"

  • news

    Visible to the public "New Zealand Government Hit by Ransomware Attack on IT Provider"

    The New Zealand government recently confirmed being impacted by a ransomware attack on managed service provider (MSP) Mercury IT, which has disrupted businesses and public authorities in the country. Mercury IT is a small business with only 25 employees and provides cybersecurity, IT, telecoms, and support services for multiple organizations in the country. On December 1, private health insurer Accuro announced that a cyberattack on Mercury IT prevented access to core systems, saying that it had no evidence that data might have been compromised.

  • news

    Visible to the public "Vast Majority of xIoT Devices Out of Compliance With Industry Best Practices"

    Phosphorus Labs reported that 99 percent of Extended Internet of Things (xIoT) device passwords violate industry best practices. The study discovered that 68 percent of xIoT devices have high-risk or CVSS scores of 8-10. According to the report, 80 percent of security teams are unable to identify the majority of their xIoT devices. According to Bud Broomhead, CEO of Viakoo, the issues identified by Phosphorus are genuine, but the solutions are not so simple. Broomhead stated that knowing that IoT devices are functioning properly through service assurance is also a component of hardening and securing devices. Discovering IoT devices and assessing their vulnerabilities is critical, but it is also a problem that has already been solved by leading vendors such as Armis, Forescout, Nozomi, and others. More emphasis should be placed on adding unique IoT and IoT application data to discovery and configuration management database solutions, so that records of historical operations can be used to harden and secure IoT systems. Phosphorus Labs' new findings should concern leaders from supply chain to engineering. The percentage of vulnerable devices is a direct result of designing without regard for security or lifecycle. Security requirements must sit alongside functional requirements and be considered when a product is conceptualized. This article continues to discuss xIoT devices being out of compliance with industry best practices.

    SC Media reports "Vast Majority of xIoT Devices Out of Compliance With Industry Best Practices"

  • news

    Visible to the public "ChatGPT Shows Promise of Using AI to Write Malware"

    It can take at least an hour for even the most skilled hackers to write a script to exploit a software vulnerability and infiltrate their target. However, a machine may soon be able to do it in seconds. Brendan Dolan-Gavitt, a computer security researcher, wondered if he could instruct OpenAI's ChatGPT tool, which allows users to interact with an Artificial Intelligence (AI) chatbot, to write malicious code. He asked the model to solve a simple capture-the-flag challenge and was surprised by the results. ChatGPT correctly identified a buffer overflow vulnerability in the code and wrote code to exploit the flaw. The model would have solved the problem perfectly if it hadn't been for a minor error in the number of characters in the input. Dolan-Gavitt presented ChatGPT with a basic challenge that would be presented to students near the beginning of a vulnerability analysis course. The fact that it failed does not inspire confidence in large language models, which serve as the foundation for AI bots to respond to human inquiries. Dolan-Gavitt prompted the model to re-examine the answer after spotting the error, and ChatGPT got it right. ChatGPT is currently far from perfect in terms of code writing and exemplifies many of the shortcomings of relying on AI tools to write code. Nonetheless, as these models become more sophisticated, they are likely to play a significant role in writing malicious code. Large language models, such as OpenAI's, rely on massive amounts of data scraped from the Internet and books before employing statistical tools to predict the most likely ways to complete queries or answer questions. That data includes "tens of millions of public repositories" of computer code from sites like StackExchange and GitHub forums, giving the model the ability to mimic the skills of trained programmers. Large language models pose a double-edged sword regarding cybersecurity risks. These models can generate malicious code, but they are prone to error and risk inserting vulnerable code. This article continues to discuss ChatGPT showing promise of using AI to write malware and the risks posed by large language models writing malicious code.

    CyberScoop reports "ChatGPT Shows Promise of Using AI to Write Malware"

  • news

    Visible to the public "Over 75 Vulnerabilities Patched in Android With December 2022 Security Updates"

    Google recently announced the December 2022 Android updates with patches for over 75 vulnerabilities, including multiple critical remote code execution (RCE) flaws. The most severe of the RCE bugs is CVE-2022-20411, an issue in Android's System component that could be exploited over Bluetooth. Two other critical-severity RCE flaws (CVE-2022-20472 and CVE-2022-20473) were resolved in the Framework component. Google also patched a critical information disclosure (CVE-2022-20498) in the System component. Google noted that all four issues were resolved as part of the 2022-12-01 security patch level, which addresses a total of 41 vulnerabilities in Android Runtime (1), Framework (20), Media framework (1), and System (19). Most of the addressed security defects are high-severity flaws, with escalation of privilege being the most common type. Information disclosure and denial-of-service (DoS) issues were also resolved. Google noted that an additional 35 high-severity vulnerabilities were resolved as part of the 2022-12-05 security patch level in Kernel, Imagination Technologies, MediaTek, Unisoc, and Qualcomm components. Devices using a security patch level of 2022-12-05 or newer include patches for all the vulnerabilities above and those resolved with previous Android security updates. Google stated that a total of 151 Pixel-specific vulnerabilities were resolved this month. Most of the bugs are medium-severity escalation of privilege issues, with numerous information disclosure bugs addressed as well. Pixel devices running a security patch level of 2022-12-05 include patches for all vulnerabilities described in the December 2022 Android security bulletin and the 151 bugs mentioned above.

    SecurityWeek reports: "Over 75 Vulnerabilities Patched in Android With December 2022 Security Updates"

  • news

    Visible to the public "New Corvus Insurance Data Reveals Ransomware and Fraudulent Funds Transfer Represent More Than Half of All Claims"

    Corvus Insurance published the findings of its third Corvus Risk Insights Index, which is a compilation of industry trends and data analysis. The findings of the report are drawn from data sources used by Corvus to power its underwriting and risk mitigation measures that help its policyholders in improving their cybersecurity posture. The company's proprietary Information Technology (IT) security scanning technology and claims reporting are among these sources. The report compares the top cyber risks in the ever-changing threat landscape. Corvus discovered that Fraudulent Funds Transfer (FFT) continues to cause significant losses for organizations, accounting for 36 percent of all claims in Q3 2022. FFT refers to an attack in which threat actors use social engineering techniques to trick employees or vendors into transferring funds to the wrong accounts. In 2022, FFT and ransomware are leading causes of cyber loss, accounting for more than half of all claims combined. The rising number of FFT incidents indicates a continued vulnerability to Business Email Compromise (BEC). Although the proportion of ransomware incidents targeting the US decreased in early 2022, average claim costs remained high, nearly three times that of an FFT claim. FFT accounts for 70 percent of all BEC-related claims, demonstrating that it is the most efficient method for threat actors to monetize social engineering attacks. BEC accounted for more than 4 in 10 claims in H2 2021, rising by about 10 percent to 45 percent in H1 2022. According to Corvus, third-party breaches increased by 66 percent in 2022, with a 20 percent increase in the share of third-party ransomware attacks. While there were fewer ransomware claims in the first half of 2022, a higher percentage of claims involved data exfiltration, a tactic used to gain leverage over victim businesses. The threat of stolen data extends beyond the victim's IT system, as it can harm an organization's brand reputation and increase liability for sensitive information exposure. This article continues to discuss key findings from Corvus Insurance's third Corvus Risk Insights Index.

    Business Wire reports "New Corvus Insurance Data Reveals Ransomware and Fraudulent Funds Transfer Represent More Than Half of All Claims"

  • news

    Visible to the public "Antwerp's City Services Down After Hackers Attack Digital Partner"

    Antwerp, Belgium, is working to restore digital services that were disrupted by a cyberattack on its digital provider. The outage has impacted services used by citizens, schools, daycare centers, and law enforcement, all of which have been operating intermittently. An investigation is ongoing, but the limited information available points to a ransomware attack by an unknown threat actor. According to Het Laatste Nieuws (HLN), the hackers were able to disrupt Antwerp's services after breaching the servers of Digipolis, the city's digital partner that provides administrative software. The publication also notes that almost all Windows applications have been impacted. Some departments' phone service was also down. Alexandra d'Archambeau, a councilor from the Wilrijk district, stated that the city's email service was unavailable. According to De Standaard, it received confirmation from an unknown actor that ransomware was the source of the disruption. The city's reservation system has also been shut down, preventing residents from receiving their identity cards. In addition, only travel cards could be collected. The Antwerp Healthcare Company (Zorgbedrijf Antwerpen), which provides residential care services to seniors in the province, was among the services affected by the attack. According to Johan De Muynck, general manager of Zorgbedrijf, the attack rendered the software that tracked who should receive medication inoperable. This compelled the staff at 18 residential care facilities to switch to pen and paper and rely on traditional paper prescriptions for the seniors who required them. This article continues to discuss how a cyberattack has impacted the city of Antwerp, Belgium.

    Bleeping Computer reports "Antwerp's City Services Down After Hackers Attack Digital Partner"

  • news

    Visible to the public "Open-Source Tool for Security Engineers Helps Automate Access Reviews"

    ConductorOne made their identity connectors open-source in a project called Baton, which is available on GitHub. Each connector enables developers to extract, normalize, and interact with workforce identity data such as user accounts, permissions, roles, groups, resources, and more, allowing them to audit infrastructure access, begin automating user access reviews, and enforce the principle of least privilege. Understanding user permissions across internal applications and infrastructure is a time-consuming process that involves downloading or screenshotting each app, improvised python scripting, inconsistent spreadsheets of unstructured data, and a never-ending cycle of that data becoming stale. Security engineers are responsible for obtaining this identity data in order to secure infrastructure access, conduct user access reviews, and investigate security incidents. It is difficult to complete any of those tasks without much manual effort and time if you do not have access to identity data in a standardized format. Engineers spent over two years building Baton with the belief that identity data should be visible, understandable, extensible, and usable by anyone. The connectors enable the automation of data extraction from applications such as access details into a single, standardized output file that can be extended to any identity security or governance project. For example, with the connectors, one can run user access reviews on all GitHub repositories without manually going through each one, compare AWS production role changes over a set period of time, identify all of the resources and user permissions in a MySQL or Postgres database, or receive an alert whenever a contractor is added to an Okta LDAP group. This article continues to discuss the identity connectors open-sourced by ConductorOne to help security engineers.

    Help Net Security reports "Open-Source Tool for Security Engineers Helps Automate Access Reviews"

  • news

    Visible to the public "Russia's Second-Largest Bank VTB Bank Under DDoS Attack"

    The state-owned VTB Bank, Russia's second-largest financial institution, has reported the largest Distributed Denial-of-Service (DDoS) attack in its history. The pro-Ukraine collective IT Army of Ukraine has claimed responsibility for the DDoS attacks as the hacktivist group announced the offensive activity on its Telegram channel in November. The attack is causing issues for the bank's customers, who are unable to access the bank's website or mobile app. However, the bank also stated that the attack did not compromise customer data. Cyberattacks on the infrastructure of government and private Russian entities increased following the start of the invasion of Ukraine. Most of the attacks are carried out by pro-Ukraine hacktivists, while pro-Russian groups such as the Killnet collective target organizations and governments worldwide that have offered support to Kyiv. VTB confirmed that, despite the majority of the malicious traffic originating from outside Russia, the attacks also originated from Russian IP addresses. The financial institution reported the Russian IP addresses to law enforcement in order for them to be taken over. This article continues to discuss the DDoS attack faced by VTB Bank.

    Security Affairs reports "Russia's Second-Largest Bank VTB Bank Under DDoS Attack"

  • news

    Visible to the public "Russian Hackers Spotted Targeting US Military Weapons and Hardware Supplier"

    A Russia-connected state-sponsored hacking group has been linked to attack infrastructure that spoofs the Microsoft login page of Global Ordnance, a legitimate US-based military weapons and hardware supplier. Recorded Future attributed the new infrastructure to TAG-53, a threat activity group also known as Blue Callisto, Callisto, COLDRIVER, SEABORGIUM, and TA446 in the cybersecurity community. Based on previous public reporting on overlapping TAG-53 campaigns, it is likely that this credential harvesting activity is enabled in part by phishing, according to a report by Recorded Future's Insikt Group. The cybersecurity firm discovered 38 domains, nine of which had references to UMO Poland, Sangrail LTD, DTGruelle, Blue Sky Network, the Commission for International Justice and Accountability (CIJA), and the Russian Ministry of Internal Affairs. The themed domains are suspected to be an attempt by the adversary to masquerade as legitimate parties in social engineering campaigns. Furthermore, the threat actor has been linked to a spear-phishing operation targeting Ukraine's Ministry of Defense that coincided with the start of Russia's military invasion of the country earlier in March. This article continues to discuss Russian hackers targeting a US-based military weapons and hardware supplier.

    THN reports "Russian Hackers Spotted Targeting US Military Weapons and Hardware Supplier"

  • news

    Visible to the public  "For Cyberattackers, Popular EDR Tools Can Turn into Destructive Data Wipers"

    Many trusted Endpoint Detection and Response (EDR) technologies may contain a flaw that allows attackers to cause products to erase almost all data on installed systems. Or Yair, a SafeBreach security researcher who discovered the flaw, tested 11 EDR tools from various vendors and discovered that six of them, from a total of four vendors, were vulnerable. Microsoft Windows Defender, Windows Defender for Endpoint, TrendMicro ApexOne, Avast Antivirus, AVG Antivirus, and SentinelOne were all vulnerable. Prior to Yair disclosing the issue at the Black Hat Europe conference on December 7, three of the vendors assigned formal CVE numbers to the bugs and issued patches for them. Yair published proof-of-concept (POC) code dubbed Aikido that he created to demonstrate how a wiper could manipulate a vulnerable EDR into wiping almost any file on the system, including system files, with only the permissions of an unprivileged user. He estimated that the wiper would be effective against hundreds of millions of endpoints running vulnerable EDR versions. The vulnerability is related to how some EDR tools delete malicious files. There are two critical events in the deletion process. There is a time when the EDR flags a file as malicious and another time when the file is actually deleted, which may require a system reboot. According to Yair, between these two events, an attacker can use what are known as NTFS junction points to direct the EDR to delete a different file than the one that it identified as malicious. NTFS junction points are similar to symbolic links, which are shortcut files to other folders and files on a system, except that the junctions are used to connect directories on different local volumes on a system. This article continues to discuss the vulnerability that could manipulate EDR products into becoming data wipers.

    Dark Reading reports "For Cyberattackers, Popular EDR Tools Can Turn into Destructive Data Wipers"

  • news

    Visible to the public "Applying AI Techniques in Cybersecurity, Counterterrorism, and International Security"

    Artificial Intelligence (AI) has shown promise as a valuable tool for protecting against malicious actors. AI has been used to help predict terrorist attacks, destabilize terrorist networks, and mitigate cyberattacks in real-time. A newly established Northwestern University lab will assist in developing and deploying AI technologies that will serve as solutions to global threats. The new Northwestern Security and AI Lab (NSAIL) is conducting AI research relevant to cybersecurity, counterterrorism, and international security issues. V.S. Subrahmanian, Walter P. Murphy Professor of Computer Science in Northwestern Engineering and a faculty fellow at the Northwestern Roberta Buffett Institute for Global Affairs, along with his collaborators, recently presented a number of NSAIL projects aimed at addressing issues at the ever-changing intersection of AI and security. The Northwestern Cyber Early Warning System (NCEWS) is a decision model system being developed by the lab to manage known and zero-day vulnerabilities. NCEWS, which builds and improves on a previous system developed by Subrahmanian, mines ongoing discussions about a given vulnerability using an ensemble of predictors and a combination of natural language methods and social network analysis. NSAIL also developed a model called DIPS (Detected, Infected, Susceptible, and Patched) to predict how badly a network will be affected by a new piece of malware through the use of a human health model for cybersecurity. The team looked at false alarm rates to see what percentage of alarms raised by security products are legitimate, whether the lab can predict which alerts are true, and what percentage of true alarms are missed. While AI plays a significant role in cyber defense, Subrahmanian expressed concern about how hackers will use AI to learn how defenses are used and predict whether a defender will detect a planned attack. He also discussed how hackers could use AI to create previously unknown types of malware, attack graphs, and deepfake-enabled phishing vectors. This article continues to discuss recently highlighted NSAIL projects that apply AI in cybersecurity, counterterrorism, and international security.

    Northwestern University reports "Applying AI Techniques in Cybersecurity, Counterterrorism, and International Security"

  • news

    Visible to the public "Flaw in Aged Boa Web Server Threatens Supply Chain"

    Microsoft retired the Boa web server in 2005, but it is still widely used. The company recently revealed that malicious actors in attacks against the energy industry have exploited a vulnerability in the server's open-source component. This development further highlights the supply chain's ongoing vulnerability to attacks. While investigating electrical grid intrusion activity involving common Internet of Things (IoT) devices as the vector used to gain a foothold in Operational Technology (OT) networks and deploy malicious payloads, Microsoft discovered a vulnerable component on all IP addresses published as indicators of compromise (IOCs). The company also found evidence of a supply chain risk that could affect millions of organizations and devices. The ability to collect information undetected before an attack in critical infrastructure networks allows attackers to have a greater impact once the attack is launched, potentially disrupting operations that can cost millions of dollars and affect millions of people. The compromised component was tracked down to the Boa web server. According to Microsoft researchers, the component in question is commonly used to access device settings, management consoles, and sign-in screens. Different vendors continue to implement Boa across various IoT devices and popular Software Development Kits (SDKs). The inclusion of Boa in popular SDKs could be attributed to its continued development in IoT devices. Vulnerable components such as Boa and SDKs are often distributed to customers within devices, adding to supply chain vulnerabilities. Without developers managing the Boa web server, known vulnerabilities could allow attackers to silently gain network access by gathering data from files. Furthermore, those impacted may be unaware that their devices use the decommissioned Boa web server and that firmware updates and patches do not address its known vulnerabilities. This article continues to discuss the flaw in the discontinued Boa web server posing a supply chain risk to IoT and OT environments.

    Security Boulevard reports "Flaw in Aged Boa Web Server Threatens Supply Chain"

  • news

    Visible to the public  "Georgia Tech and PNNL Launch Joint Cybersecurity Institute"

    The Georgia Institute of Technology (Georgia Tech) and the Pacific Northwest National Laboratory (PNNL) announced the formation of a joint institute, the Institute for Cybersecurity and Resilient Infrastructure Studies (ICARIS), to focus on critical infrastructure cybersecurity innovation. The institute's mission is to be a leading national resource that provides the technologies, testbeds, and talent required to secure the nation's critical infrastructure. Although the scope of the cyber threat against critical infrastructure is understood, capabilities to address the threat are dispersed across numerous organizations, involving various academic, government, and industry stakeholders. Furthermore, there needs to be more qualified personnel who understand both cybersecurity and the underlying physical systems. This collaboration will use the complementary strengths of Georgia Tech and PNNL, catalyze new and exciting research directions, and serve as a national resource for all infrastructure sectors. The primary goals of ICARIS are to perform translational research and development that moves innovative concepts towards implementation into operational environments, develop the future workforce, and provide advice and solutions to communities, states, federal agencies, and businesses. In addition, the institute will provide guidance on technology development roadmaps for critical infrastructure sectors while influencing a whole-of-government cybersecurity approach for these sectors, directly supporting national strategies such as the White House's Industrial Control Systems Cybersecurity Initiative. According to Georgia Tech Research Institute (GTRI) Director James Hudgens, the partnership will provide a distinct value proposition based on three areas of expertise that Georgia Tech and PNNL can uniquely combine, which include threat intelligence and assessments, deep technical understanding of cybersecurity and engineering domains such as electric power systems, and the ability to translate threat-informed technologies and technical knowledge into operational impact. This article continues to discuss the new collaboration between Georgia Tech and PNNL focused on critical infrastructure cybersecurity innovation.

    Georgia Tech reports "Georgia Tech and PNNL Launch Joint Cybersecurity Institute"

  • news

    Visible to the public "Scattered Spider Cybercrime Group Targets Mobile Carriers via Telecom, BPO Firms"

    Security researchers at CrowsStrike are warning that a threat actor tracked as "Scattered Spider" is targeting telecommunications and business process outsourcing (BPO) companies in an effort to gain access to mobile carrier networks and perform SIM swapping. The researchers noted that Scattered Spider is a financially-motivated threat actor and has been observed increasingly targeting the telecoms industry since June 2022, setting up persistence mechanisms and even reverting implemented mitigations to regain access to the compromised networks. According to the researchers, Scattered Spider has been relentlessly trying to gain access to victim networks, typically performing daily operations once access has been obtained. The researchers noted that the threat actor was seen deploying virtual private network (VPN) and remote monitoring and management (RMM) tools. After successfully containing Scattered Spider's intrusion into one organization, the threat actor moved to a different company in the same vertical, using the same tactics, techniques, and procedures (TTPs). The researchers stated that in all observed intrusions, the adversary attempted to leverage access to mobile carrier networks from a Telco or BPO environment. In two investigations, SIM swapping was performed by the adversary. The researchers noted that for initial access, the threat actor leveraged social engineering, including via phone calls and SMS and Telegram messages impersonating IT staff, to trick victims into entering their credentials on a phishing page or downloading and installing an RMM tool controlled by the attackers. The threat actors would also engage with the victims directly to obtain their one-time password (OTP) if multi-factor authentication (MFA) was enabled or relied on MFA push-notification fatigue.

    SecurityWeek reports: "Scattered Spider Cybercrime Group Targets Mobile Carriers via Telecom, BPO Firms"

  • news

    Visible to the public "Swiss Government Wants to Implement Mandatory Duty to Report Cyberattacks"

    The Swiss government has recently asked its Parliament to amend the Information Security Act to make it mandatory for critical infrastructure providers to report cyberattacks to the National Cyber Security Centre (NCSC). Doing this will be aimed at shedding light on hackers and sounding the alarm more widely on cyber threats in the country. The Swiss government stated that successful cyberattacks can have far-reaching consequences for the availability and security of the Swiss economy. The government noted that the general public, authorities, and companies are exposed to the risk of cyberattacks daily and that there is currently no overall picture of what attacks have taken place because reporting to the NCSC is voluntary. Matt Masden at Tanium stated that "visibility is power" when protecting against advanced, sophisticated threats.

    Infosecurity reports: "Swiss Government Wants to Implement Mandatory Duty to Report Cyberattacks"

  • news

    Visible to the public "Organizations Failing to Unlock the Full Potential of Zero Trust"

    Over 90 percent of organizations migrating to the cloud have or are in the process of implementing a zero trust architecture. However, according to a new Zscaler study, only 22 percent of global Information Technology (IT) decision-makers are 'fully confident' that their organization is maximizing the potential of their cloud infrastructure, presenting an opportunity for zero trust. Furthermore, according to the global survey of over 1,900 senior IT decision-makers, 68 percent believe that secure cloud transformation is impossible with legacy network security infrastructures and that Zero Trust Network Access (ZTNA) has clear advantages over legacy firewalls and Virtual Private Networks (VPNs). The top cloud concerns are security, access, and complexity, making a strong case for zero trust to overcome these obstacles. When asked about legacy network and security infrastructures, 54 percent believe VPNs or perimeter-based firewalls are either ineffective at preventing cyberattacks or provide inadequate visibility into application traffic and attacks. IT leaders predict that in the next 12 months, their organizations' employee base will continue to embrace the various work style options available to them, which are divided into full-time office workers (38 percent), fully remote (35 percent), and hybrid (27 percent). However, organizations may still be unprepared to deal with the ever-changing mix of hybrid working requirements. Employee user experience is one of the primary reasons for implementing a hybrid work infrastructure based on zero trust. More than half (52 percent) agree that implementing zero trust would help address inconsistent access experiences for on-premise and cloud-based applications and data. Forty-six percent believe it would address productivity loss due to network access issues, and 39 percent believe it would allow employees to access applications and data from personal devices. This article continues to discuss Zscaler's key findings on the state of zero trust transformation.

    BetaNews reports "Organizations Failing to Unlock the Full Potential of Zero Trust"