News Items

  • news

    Visible to the public "Are We Taking Patient Privacy as Seriously as We Ought to Be?"

    Anita Allen, University of Pennsylvania professor of law and philosophy, kicked off the 2022 HIMSS Healthcare Cybersecurity Forum with a discussion on patient privacy in an era of widespread data sharing. Allen wanted to use her expertise in law and bioethics to address issues of great concern in healthcare and technology, with a focus on data exchange and patient privacy. Allen's keynote talk focused on the shifting narrative of data sharing and privacy. Health data privacy attitudes are rapidly shifting, and disclosure is becoming the new norm. People are increasingly disclosing personal health information via wearables, social media, and other technologies, she said, and researchers and the government are actively encouraging this sharing. However, the desire for privacy is highly personal and should not be underestimated. According to Allen, the new narrative may be favored by larger companies and the government who believe that sharing data is the better path to health, but privacy interests may be lightly treated by those pushing the new narrative forward, and it warrants further consideration. She mentioned the All of Us Research Project, which is part of the National Institutes of Health's Precision Medicine Initiative, as a new narrative project. It is creating a database based on 1 million diverse Americans from all walks of life who will disclose their phenotypic and genetic health data. This data is for a government database as a research source, but it is unclear what exactly what the data will be used for. Allen believes that much reflection is required, and that striking a balance between the interests in privacy and in disclosure presents a challenge. This article continues to discuss key points made by Allen on patient data privacy.

    HealthcareITNews reports "Are We Taking Patient Privacy as Seriously as We Ought to Be?"

  • news

    Visible to the public "Gen Z Internet Users "Normalize" Cybercrime - Report"

    A new study conducted by researchers at the University of East London (UEL) has found that a large proportion of young internet users are engaging in some form of cyber-related crimes, including money muling, digital piracy, and posting hate speech. The research was financed by the bloc's Horizon fund and undertaken in collaboration with Europol's cybercrime center. It polled 8000 16 to 19-year-olds across the region about 20 types of online behavior. The researchers found that around half engaged in behavior considered to be criminal in most jurisdictions.

  • news

    Visible to the public "FCC's Proposal to Strengthen Emergency Alert Security Might Not Go Far Enough"

    The US Federal Communications Commission (FCC) issued a Notice of Proposed Rulemaking (NPRM) in October to bolster the security of the nation's Emergency Alert System (EAS) and Wireless Emergency Alerts (WEA). These systems alert the public about emergencies via AM, FM, and satellite radio, as well as through broadcast, cable, and satellite TV on their televisions, radios, and wireless phones. Although EAS participants are required to broadcast presidential alerts, they do so voluntarily for state and local EAS alerts. The NPRM proposes that broadcasters and cable companies must report incidents of unauthorized access to their EAS equipment to the FCC within 72 hours. It also proposes requiring wireless providers that deliver emergency alerts to certify on an annual basis that they have a cybersecurity risk management plan in place and have implemented adequate security measures for their alerting systems. Furthermore, it proposes that wireless providers transmit adequate authentication information to ensure that consumer devices only display valid alerts. Malicious actors exploiting vulnerabilities in the nation's EAS have been a source of concern for years, and it is not entirely theoretical. The FCC describes incidents that have raised concern about what might happen if an attacker breached one or more emergency alert providers. The most well-known of these incidents was the 2018 "zombie attack" warning that was broadcasted over multiple Midwest television stations, a prank made possible by the stations' failure to change the default passwords on their EAS equipment. Ken Pyle, a security researcher at CYBIR, released some research, prompting the commission to issue this latest NPRM. Pyle discovered a flaw in an EAS encoder and decoder, specifically the Monroe Electronics R189 One-Net DASDEC EAS device, which is widely used by EAS providers. The flaw could allow attackers to gain access to credentials, devices, and servers, enabling them to send false messages and lock out legitimate users, effectively disabling all responses. This article continues to discuss the FCC's proposal to strengthen emergency alert security and the need for next-generation technology to take EAS security to the next level.

    CSO Online reports "FCC's Proposal to Strengthen Emergency Alert Security Might Not Go Far Enough"

  • news

    Visible to the public "Amnesty International Canada Says It Was Hacked by Beijing"

    The Canadian branch of Amnesty International recently announced that it was the target of a cyberattack sponsored by China. The human rights organization said it first detected the breach on October 5th and hired forensic investigators and cybersecurity experts to investigate. Amnesty International stated that the searches in their systems were specifically and solely related to China and Hong Kong, as well as a few prominent Chinese activists. The hack left the organization offline for nearly three weeks. U.S. cybersecurity firm Secureworks stated that there was no attempt to monetize the access, and "a threat group sponsored or tasked by the Chinese state" was likely behind the attack because of the nature of the searches, the level of sophistication, and the use of specific tools that are distinctive of China-sponsored actors. In August, the cybersecurity firm Recorded Future listed Amnesty and the International Federation for Human Rights among organizations that Chinese hackers were targeting through password-stealing schemes designed to harvest credentials.

    SecurityWeek reports: "Amnesty International Canada Says It Was Hacked by Beijing"

  • news

    Visible to the public "Iran-Backed Hackers Linked to Espionage Campaign Targeting Journalists and Activists"

    According to Human Rights Watch, hackers backed by the Iranian government targeted human rights activists, journalists, diplomats, and politicians working in the Middle East as part of an ongoing social engineering and credential phishing campaign. Human Rights Watch said the espionage campaign was carried out by APT42, an Iran-backed hacking group first identified by cybersecurity firm Mandiant in September. According to Mandiant, APT42, also known as TA453, Phosphorus, and Charming Kitten, helps Iran's Islamic Revolutionary Guard Corps gather intelligence and has launched more than 30 confirmed operations against various non-profit, education, and government targets worldwide since 2015. Human Rights Watch said it first learned about APT42's latest espionage campaign after one of its employees received suspicious WhatsApp messages from someone claiming to work for a Lebanon-based think tank. The advocacy group discovered a link in the message that directed the recipient to a fraudulent login page that captured their email address and multi-factor authentication (MFA) code. Human Rights Watch identified 18 additional victims who had been targeted as part of the same campaign in its analysis, which was conducted in collaboration with Amnesty International's Security Lab. Of the 18 victims, 15 confirmed that they had received the same WhatsApp messages between September 15 and November 25. On November 23, a second Human Rights Watch staff member received the same WhatsApp messages as the other targets from the same number. Following its investigation, Human Rights Watch is urging Google to strengthen its Gmail account security warnings in order to better protect its most vulnerable users, including journalists and human rights defenders, after discovering inadequacies in Google's security measures. This article continues to discuss an espionage campaign attributed to APT42 that has been targeting activists, journalists, diplomats, and politicians working in the Middle East.

    TechCrunch reports "Iran-Backed Hackers Linked to Espionage Campaign Targeting Journalists and Activists"

  • news

    Visible to the public "Two Million Android Malware Apps Discovered on Google Play"

    More than two million people have been tricked into installing new Android malware, phishing, and adware apps from the Google Play store. Dr. Web antivirus detected the apps that appear to be useful utilities and system optimizers but are the source of performance issues, advertisements, and poor user experience. TubeBox, which is still available on Google Play, is one of the apps with one million downloads. The TubeBox app consistently displays errors when attempting to redeem collected prizes, despite promising users monetary rewards for watching movies and advertisements on the app. According to the researchers, users who complete the final withdrawal stage never receive the money because the entire thing is a ploy to keep users on the app as long as possible so they can view advertisements and bring in money for the app's creators. There were four adware apps that emerged on Google Play in October 2022 but have been taken down. These include 'Bluetooth device auto connect,' 'Bluetooth & Wi-Fi & USB driver,' 'Volume, Music Equalizer,' and 'Fast Cleaner & Cooling Master.' These apps take Firebase Cloud Messaging instructions and load the URLs listed in them, resulting in the fraudulent display of advertisements on the affected devices. Remote operators may have also configured an infected device to act as a proxy server in Fast Cleaner & Cooling Master, which had a low download volume. Threat actors may use this proxy server to route their own traffic through the compromised device. Dr. Web also discovered several loan scam apps on Google Play with an average of 10,000 downloads that claimed to have a direct connection to Russian banks and investment firms. These apps were promoted through malicious advertising on other apps, promising guaranteed investment returns. The apps direct users to phishing websites where their personal information is collected. This article continues to discuss the discovery of two million Android malware apps on Google Play.

    CyberIntelMag reports "Two Million Android Malware Apps Discovered on Google Play"

  • news

    Visible to the public "Russian Hackers Use Western Networks to Attack Ukraine"

    Security researchers at Lupovis have discovered that Russian hackers are using their presence inside the networks of organizations in the UK, US, and elsewhere to launch attacks against Ukraine. The researchers set up a series of decoys on the web to lure Russian threat actors so they could study their tactics, techniques, and procedures (TTPs). This included fake "honeyfile" documents leaked to cybercrime forums and spoofed to contain what appeared to be critical usernames, passwords, and other information. The researchers noted that other decoys included insecurely configured web portals designed to mimic Ukrainian political and governmental sites and "high interaction and ssh services." The latter were configured to accept the fake credentials from the web portals. The researchers stated that the exercise highlighted just how primed and ready Russian threat actors are to seize on any evidence of Ukrainian targets. Some 50-60 human actors interacted with just five decoys, with many of them reaching the honeypots within just a minute of them going live. The researchers noted that the duped hackers attempted to carry out a variety of attacks, ranging from reconnaissance of the lure information to conscripting them into DDoS botnets and exploitation of SQL injection and other bugs. The researchers stated that the most concerning finding from their study is that Russian cyber-criminals have compromised the networks of multiple global organizations, including a Fortune 500 business, over 15 healthcare organizations, and a dam monitoring system. The researchers stated that these organizations were based in the UK, France, the US, Brazil, and South Africa, and Russian criminals are rerouting through their networks to launch cyberattacks on Ukraine, which effectively means they are using these organizations to carry out their dirty work. The researchers hypothesized that the threat actors may be Russian cybercriminals rather than state actors. The researchers noted that given that their research shows over 15 healthcare organizations had been compromised by Russian criminals, this could suggest the attackers are working under the radar on their networks and using their access to launch attacks on other institutions. The researchers stated that once they are discovered, they then launch ransomware attacks on the healthcare organizations' systems or perform data breaches. This would suggest attackers are maximizing every tool in their arsenal to compromise an organization before moving on to their next victim.

    Infosecurity reports: "Russian Hackers Use Western Networks to Attack Ukraine"

  • news

    Visible to the public "Four Indicted After Hacking US Businesses, Filing False Tax Returns"

    Four men from the UK and Sweden have been indicted on several charges in connection with an alleged attempt to hack into the computers of several US businesses and file fraudulent tax returns using stolen personal information. On November 30, three of the men were arrested in London. On December 1, a fourth man was arrested in Malmo, Sweden. All four are now facing extradition proceedings in their respective countries, and if convicted in US courts, they face up to 20 years in federal prison. According to the indictment, they gained access to the computers by using the xDedic Marketplace, a website where hackers sold access to compromised systems all over the world and offered personal information belonging to US residents. In 2019, the FBI, Internal Revenue Service (IRS), and Department of Justice (DoJ) shut down the marketplace. The investigation into the suspects was led by the IRS Cyber Crimes Unit, FBI, and DoJ, with assistance from law enforcement in Canada, the UK, and Sweden. The indictments were issued on the same day that law enforcement agencies from 25 countries joined forces with Europol to arrest 2,469 people accused of money laundering between mid-September and the end of November. The US collaborated with several countries in Europe, South America, and Asia to disrupt the large-scale operation, which centered on dismantling a network of money mules used to launder money stolen in various scams. During the two-month operation, more than 17.5 million Euros were intercepted. This article continues to discuss the indictment of four men based in the UK and Sweden on charges related to attempted hacking of US businesses' computers and the filing of false tax returns using stolen information.

    The Record reports "Four Indicted After Hacking US Businesses, Filing False Tax Returns"

  • news

    Visible to the public "Economic Uncertainty Will Greatly Impact the Spread of Cybercrime"

    Norton has released its top cyber trends to watch in 2023, highlighting that the economy will have the most influence on the spread of cybercrime next year. According to experts, the pressures associated with economic uncertainty and rising costs will create an ideal environment for scammers to prey on people when they are most vulnerable. Cybercriminals will continue to trick victims into handing over personal information, emptying their bank accounts, or paying for products or services that never arrive. There will be an increase in financial-based scams, such as assistance scams that impersonate government assistance programs in order to steal Personally Identifiable Information (PII) and shopping deal scams offering low-cost products in order to steal information or cash out without delivering the order. Companies that operate with fewer employees will see an increase in data breaches and ransomware attacks. Scammers will continue to use Artificial Intelligence (AI) in their criminal activities as the technology becomes more accessible and user-friendly. As language and video AI models improve, scammers can use deepfakes to impersonate real people in real-time, tricking people into disclosing financial and personal information. Cybercriminals are devising new methods to circumvent standard multi-factor authentication (MFA) technologies. Companies that continue to use ineffective two-factor authentication (2FA) practices expose themselves and their customers to serious data breaches, which can result in massive consumer data leaks. There will be more data breaches, making it even more important to encourage people to use unique, complex passwords across all of their accounts. This article continues to discuss how the economy will impact the spread of cybercrime next year and other top cyber trends expected in 2023.

    Help Net Security reports "Economic Uncertainty Will Greatly Impact the Spread of Cybercrime"

  • news

    Visible to the public "Wiper, Disguised as Fake Ransomware, Targets Russian Orgs"

    CryWiper is a new malicious program that functions similarly to crypto-ransomware. It overwrites and renames files before dropping a text file containing a ransom note and a Bitcoin address. However, the program deletes the contents of a victim's files. Researchers have found that the program currently targets Russian organizations but could easily be used against companies and organizations in other countries. According to the researchers, the camouflaged wiper program continues a trend of ransomware being used as a wiper, either intentionally or inadvertently. Wiper malware, which deletes critical data, has become a significant threat to both the private and public sectors. Russian agencies have used wipers in the conflict with Ukraine in an attempt to disrupt the country's critical services and defensive coordination. A decade ago, Iran used the Shamoon wiper program to encrypt and render inoperable over 30,000 hard drives at Saudi Aramco, the state-owned oil conglomerate of rival Saudi Arabia. CryWiper appears to be original malware, but the destructive malware employs the same Pseudo-Random Number Generator (PRNG) algorithm as IsaacWiper, a program used to attack public-sector organizations in Ukraine. Several Xorist ransomware variants and the Trojan-Ransom.MSIL.Agent family used the same email address in the note left by the CryWiper after its data corruption, but Trellix believes this was done to cause confusion. This article continues to discuss the CryWiper program aimed at Russian targets.

    Dark Reading reports "Wiper, Disguised as Fake Ransomware, Targets Russian Orgs"

  • news

    Visible to the public "Hackers Hijack Linux Devices Using PRoot Isolated File Systems"

    In Bring Your Own File System (BYOF) attacks, hackers are abusing the open-source Linux PRoot utility to provide a consistent repository of malicious tools that work across multiple Linux distributions. A BYOF attack occurs when threat actors create a malicious file system on their devices containing a standard set of attack tools. This file system is then downloaded and mounted on infected machines, resulting in a preconfigured toolkit that can be used to further compromise a Linux system. According to Sysdig, the attacks typically result in cryptocurrency mining, though more dangerous scenarios are possible. The researchers also warn about how simple it could be to scale malicious operations against Linux endpoints of all kinds using this novel technique. PRoot is an open-source utility that combines the commands 'chroot,' 'mount --bind,' and 'binfmt misc' to allow users to create an isolated root file system within Linux. PRoot processes are normally restricted to the guest file system. However, QEMU emulation can be used to mix host and guest program execution. Furthermore, programs running within the guest file system can use the host system's built-in mount/bind mechanism to access files and directories. Sysdig discovered attacks that use PRoot to install a malicious file system on already compromised systems that have network scanning tools, the XMRig cryptocurrency miner, and their configuration files. This article continues to discuss the abuse of PRoot in BYOF attacks on Linux devices.

    Bleeping Computer reports "Hackers Hijack Linux Devices Using PRoot Isolated File Systems"

  • news

    Visible to the public "New BMC Supply Chain Vulnerabilities Pose Threat to Server, Cloud Computing Ecosystem"

    Researchers discovered three different security flaws in American Megatrends Inc. (AMI) MegaRAC Baseboard Management Controller (BMC) software, posing a threat to technology supply chains and major Information Technology (IT) hardware brands that support cloud computing. According to Eclypsium, a firmware and hardware security company, the identified vulnerabilities, which range in severity from medium to critical, can lead to Remote Code Execution (RCE) and unauthorized device access with superuser privilege. Malicious hackers can take exploit them by gaining access to remote management interfaces, such as Redfish, to take control of the systems and harm cloud infrastructure. Vulnerabilities in a component supplier impact many hardware vendors, which can then affect many cloud services, according to Vladislav Babkin, an Eclypsium security researcher. As a result, these vulnerabilities can endanger servers and hardware that an organization directly owns and the hardware that supports the cloud services it uses. MegaRackBMC is used by many server manufacturers, including AMD, Ampere Computing, ASRock, Asus, ARM, Dell EMC, Gigabyte, Hewlett-Packard Enterprise, Huawei, Inspur, Lenovo, NVidia, Qualcomm, Quanta, and Tyan. According to Eclypsium researchers, additional, undiscovered brands are likely similarly vulnerable. BMCs are specialized service processors that are designed to remotely control hardware settings and monitor host systems, even when the machines are turned off. These capabilities have made BMCs a lucrative target for threat actors wanting to plant highly persistent malware that can withstand reinstallation of operating systems and a complete hard drive wipe. This article continues to discuss findings regarding the BMC supply chain vulnerabilities.

    SC Magazine reports "New BMC Supply Chain Vulnerabilities Pose Threat to Server, Cloud Computing Ecosystem"

  • news

    Visible to the public "Open-Source Ransomware Toolkit Cryptonite Turns Into Accidental Wiper Malware"

    Due to its poor architecture and programming, an open-source ransomware toolkit called Cryptonite has been observed in the wild with wiper capabilities. Cryptonite, unlike other ransomware strains, is not for sale on the cybercriminal underground and was previously distributed for free by an actor known as CYBERDEVILZ via a GitHub repository. The source code and forks have since been removed. The malware, written in Python, uses the Fernet module of the cryptography package to encrypt files with a ".cryptn8" extension. However, a new sample examined by Fortinet FortiGuard Labs was discovered to lock files with no way to decrypt them, essentially acting as a destructive data wiper. This does not appear to be a deliberate action on the part of the threat actor, but rather the result of a lack of quality assurance, which causes the program to crash when attempting to display the ransom note after the encryption process has been completed. The problem with this flaw is that due to the ransomware's design simplicity, there is no way to recover the encrypted files if the program crashes or is even closed, according to Fortinet researcher Gergely Revay. This article continues to discuss Cryptonite accidentally turning into wiper malware.

    THN reports "Open-Source Ransomware Toolkit Cryptonite Turns Into Accidental Wiper Malware"

  • news

    Visible to the public "Darknet Markets Generate Millions in Revenue Selling Stolen Personal Data, Supply Chain Study Finds"

    According to a study conducted by researchers from the University of South Florida and Georgia State University, stolen data products, like most legal commodities, pass through a supply chain that includes producers, wholesalers, and consumers. However, this supply chain is linked by multiple criminal organizations operating in illegal underground marketplaces. The supply chain for stolen data starts with producers, who are hackers exploiting vulnerable systems to steal sensitive information such as credit card numbers, bank account information, and Social Security numbers. The stolen data is advertised by wholesalers and distributors who sell it. Consumers buy the data and use it to commit various types of fraud, such as fraudulent credit card transactions, identity theft, and phishing attacks. The trafficking of stolen data between producers, wholesalers, and consumers is made possible by darknet markets, which are websites that look like regular eCommerce sites but can only be accessed with special browsers or authorization codes. On 30 darknet markets, the researchers discovered thousands of vendors selling tens of thousands of stolen data products. Over an eight-month period, these vendors generated more than $140 million in revenue. The researchers conducted the most comprehensive systematic examination of stolen data markets that they are aware of in order to better understand the size and scope of this illicit online ecosystem. They began by identifying 30 darknet markets that advertised stolen data products. Then, for eight months, from September 1, 2020, to April 30, 2021, they extracted information about stolen data products from the markets on a weekly basis. This data was then used to calculate the number of vendors selling stolen data products, the number of stolen data products advertised, the number of products sold, and the amount of revenue generated. In total, 2,158 vendors advertised at least one of the 96,672 product listings across the 30 marketplaces. Marketplaces had an average of 109 unique vendor aliases and 3,222 product listings for stolen data products. There were 632,207 recorded sales across these markets, generating a total revenue of $140,337,999. This article continues to discuss the study on the generation of millions in revenue in darknet markers selling stolen personal data.

    The Conversation reports "Darknet Markets Generate Millions in Revenue Selling Stolen Personal Data, Supply Chain Study Finds"

  • news

    Visible to the public "Binance Freezes $3 Million Worth of Crypto Stolen in Ankr Hack"

    After Ankr, the hacking of the Web3 infrastructure provider, Binance, one of the last remaining cryptocurrency giants, froze nearly $3 million in cryptocurrency. Ankr stated that $5 million in Binance coin was stolen from the platform. The provider plans to compensate all users for their losses. Helio, another platform, confirmed that it was also targeted in a related attack. According to Binance CEO Changpeng Zhao, the platform was suspending Ankr token withdrawals, and the Ankr attack involved the hacking of a developer's private key. Ankr is a distributed node operator for proof-of-stake networks that allows users to stake their tokens without purchasing the necessary hardware. Someone used the developer's private key to mint six quadrillion aBNBc, Ankr's cryptocurrency. The hacker then exchanged aBNBc for other assets, including about 4.5 million USDC, a cryptocurrency pegged to the US dollar, which it then exchanged for ETH. The hacker transferred approximately $3 million of the stolen funds to Tornado Cash, a popular mixing service used by cybercriminals and nation-states to conceal the source of funds and convert cryptocurrency to fiat currency. The service ensures that the source of the funds is untraceable, providing complete asset privacy. The hacker's wallet now contains more than $1 million in Ethereum, $29,000 in Binance coin, and more than $775,000 in Polygon. It was unclear how much money was stolen in the attack after another cryptocurrency platform, Helio, stated that it had been compromised in connection with Ankr's incident. This article continues to discuss Binance freezing about $3 million worth of cryptocurrency after Ankr was hacked.

    The Record reports "Binance Freezes $3 Million Worth of Crypto Stolen in Ankr Hack"

  • news

    Visible to the public "GAO Calls for Action to Improve Critical Infrastructure IoT and OT Cybersecurity"

    According to the Government Accountability Office (GAO), federal agencies in charge of critical infrastructure cybersecurity have not conducted risk assessments for Operational Technology (OT) and Internet of Things (IoT) systems and devices. Electronic systems, including IoT and OT devices and systems, are used in critical infrastructure sectors to deliver essential services such as electricity and healthcare. However, these industries are facing an increase in cybersecurity threats. In 2021, the FBI's Internet Crime Complaint Center (IC3) received 649 complaints indicating that organizations in the critical infrastructure sector had been victims of a ransomware attack. The center showed that 14 of the 16 critical infrastructure sectors had at least one member who reported being a victim of a ransomware attack in 2021. Recent events have underscored the nation's significant IoT and OT cyber threats, as well as the wide range of consequences that these attacks pose. For example, the Department of Justice (DoJ) reported in June 2022 that a Russian botnet was targeting various IoT and OT devices, including time clocks, routers, audio/video streaming devices, smart garage door openers, Industrial Control Systems ICSs, and more. Millions of devices were hacked, and victims ranged from individuals to large corporations. A joint agency alert issued in July 2022 stated that a North Korean ransomware attack targeted healthcare and public health sector organizations, specifically hitting electronic health records services, diagnostics services, imaging services, and intranet services. The Department of Homeland Security's (DHS) Cybersecurity and Infrastructure Security Agency (CISA) and the National Institute of Standards and Technology (NIST) have issued guidance and provided resources to help federal agencies and private entities in managing the cybersecurity risks associated with IoT and OT. CISA published guidance, launched programs, issued alerts and advisories on vulnerabilities affecting IoT and OT devices, and formed OT working groups. Furthermore, the Federal Acquisition Regulatory Council is considering revisions to the Federal Acquisition Regulation (FAR) in order to better manage IoT and OT cybersecurity risks. This article continues to discuss key points from GAO's report on critical infrastructure cybersecurity and the need to better secure Internet-connected devices.

    HSToday reports "GAO Calls for Action to Improve Critical Infrastructure IoT and OT Cybersecurity"

  • news

    Visible to the public "Black Proxies Enable Threat Actors to Conduct Malicious Activity"

    Security researchers at DomainTools have discovered that threat actors are using criminal proxy networks to obfuscate their illegal activities by hiding behind hijacked IP addresses and using the same to create an appearance of legitimacy. The researchers stated that while these networks were initially used as part of botnets, their lucrative nature has turned them into their own criminal enterprises. The researchers noted that they spotted a new and particularly dangerous proxy service called "Black Proxies," which is being marketed to other cybercriminals for its reliability, scope, and vast number of IP addresses. Black Proxies market themselves as having over 1,000,000 residential and other proxy IP addresses worldwide. The researchers stated that the scope and scale of these new offerings show just how large their claimed pool of IP space is. Upon further examination through the service, their pool of IP addresses listed in the Fall of 2022 "online" comes in at just over 180,000 IPs, which is still a factor larger than the traditional services based on other types of tactics and botnets. According to the researchers, the Black Proxies' scale is significant because of not only their focus on both the traditional forms of IP proxying but also their use of compromised websites for their services.

    Infosecurity reports: "Black Proxies Enable Threat Actors to Conduct Malicious Activity"

  • news

    Visible to the public "Weak Connected Medical Device Security Increases Cyberattack Threats"

    Medical device security remains a concern for healthcare organizations as the threat of cyberattacks continues to grow in the industry. The medical Internet of Things (IoT) has improved healthcare by making it more convenient, efficient, and patient-centered, but it is also a weak link in data security. Many Internet-connected devices with IoT sensors, such as glucose monitors, insulin pumps, and defibrillators, have insufficient security defenses, posing risks to healthcare facilities and patients. According to Capterra's 2022 Medical IoT Survey, which included over 150 respondents, medical facilities with more than 75 percent of connected medical devices face a 24 percent higher risk of cyberattack than practices with less than 50 percent of connected devices. Cyberattacks are becoming more common with the widespread use of connected medical devices. Forty percent of healthcare organizations have between 51 percent and 70 percent of their medical devices connected to the Internet via Wi-Fi or hardwiring. Zach Capers, senior security analyst at Capterra, states that as a healthcare organization connects more medical devices to its network, its attack surface expands. In addition, connected medical devices are often left unmonitored for security flaws, and because they run on a diverse set of software and hardware platforms, monitoring with a single tool is difficult. Capterra researchers said connected medical devices are typically developed with security as an afterthought, providing attackers with an easy entry point into the hospital network. These cyberattacks may also jeopardize the privacy of medical data. According to the survey findings, 48 percent of all healthcare cyberattacks have an impact on patient care, and 67 percent have an impact on the security of Personal Health Information (PHI). This article continues to discuss findings from Capterra's 2022 Medical IoT Survey.

    HealthITSecurity reports "Weak Connected Medical Device Security Increases Cyberattack Threats"

  • news

    Visible to the public "Integration, Legacy Tech and Lack of Skills Prevent Implementation of Security Solutions"

    According to a study for BlackFog, conducted by Sapio Research, 50 percent of over 400 Information Technology (IT) security decision-makers in the US and UK have been prevented from adopting a new cybersecurity solution because of integration issues or challenges posed by legacy infrastructure. The study also reveals that 32 percent say a lack of skills within their team to support a new product would also prevent them from deploying new solutions. The proliferation of tools is an issue, as security teams are now using, on average, 20 tools to combat cybersecurity threats, with 22 percent of those surveyed using more than 31 tools. People are also looking for other jobs due to a lack of resources, as indicated by 22 percent of CISOs and IT security decision-makers polled saying they would consider leaving their current position due to a lack of funds to invest in cutting-edge technology. On the bright side, there is evidence of maturity regarding strategies for sourcing and selecting the right tools, with the overwhelming majority, 89 percent, believing they can clearly determine the right new solutions to solve their organization's cybersecurity needs. This article continues to discuss key findings from the survey of IT security decision-makers in the US and UK regarding the adoption of new cybersecurity solutions.

    BetaNews reports "Integration, Legacy Tech and Lack of Skills Prevent Implementation of Security Solutions"

  • news

    Visible to the public "Google Patches Ninth Chrome Zero-Day of 2022"

    Google recently announced an emergency Chrome 108 update to patch a zero-day vulnerability in the browser, the ninth to be fixed this year. The high-severity security bug is tracked as CVE-2022-4262 and is described as a type confusion in the browser's V8 JavaScript engine. Google noted that it is aware that an exploit for CVE-2022-4262 exists in the wild. The vulnerability was identified by the Google Threat Analysis Group. Google said that the flaw could allow a remote attacker to potentially exploit heap corruption via a crafted HTML page. Google noted that type confusion flaws exist because a block of memory is used by a different algorithm than the one that was supposed to consume it. In Chrome, such issues could lead to deliberate code flow deviations, allowing attackers to achieve remote code execution (RCE) when untrusted code is served from a malicious page. Patches for this vulnerability have been included in Chrome 108.0.5359.94 for Mac and Linux and in Chrome 108.0.5359.94/.95 for Windows. Google is advising users to update to a patched iteration as soon as possible.

    SecurityWeek reports: "Google Patches Ninth Chrome Zero-Day of 2022"

  • news

    Visible to the public  "Report Finds Software Supply Chain Attacks Show No Sign of Slowing Down"

    According to a new report from Reversing Labs, software supply chain attacks show no signs of slowing or decreasing nearly two years after the SolarWinds hack. The report highlights that attacks leveraging malicious open-source modules have continued to increase in the commercial sector. Since 2020, there has been an exponential increase in supply chain attacks, followed by a slower but steady rise in 2022. The popular open-source repository Node Package Manager (NPM) is a favorite among hackers. From January to October, 7,000 malicious package uploads to NPM were detected, a nearly 100-fold increase over the 75 malicious packages discovered in 2020 and a 40 percent increase in malicious packages discovered in 2021. One attack detailed in August by Reversing Labs involved over two dozen NPM packages containing obfuscated JavaScript. The malicious packages were designed to steal data from individuals who used applications or websites where the malicious packages were installed. The Python Package Index (PyPI), was also discovered to be flooded with tainted open-source modules designed to mine cryptocurrency, plant malware, and more. The attacks matched what researchers saw in 2021, when attackers often used dependency confusion and typosquatting tactics. Secrets exposed through open-source repositories maintained internally or by third-party contractors impacted high-profile organizations such as Samsung and Toyota Motor. This article continues to discuss key findings from Reversing Labs' new report on supply chain attacks.

    SiliconANGLE reports "Report Finds Software Supply Chain Attacks Show No Sign of Slowing Down"

  • news

    Visible to the public "Rackspace Hosted Exchange Still Offline Over Security Issue"

    Thousands of Rackspace customers worldwide are still experiencing Microsoft Exchange Server outages, which the managed services company attributes to a security incident. Rackspace says it will shut down its hosted Exchange service indefinitely while it investigates the specific problem, which has not yet been identified publicly. Rackspace, based in Texas, is the world's largest managed cloud provider, with over 300,000 customers worldwide, including two-thirds of the world's 100 largest publicly traded companies. Rackspace has advised all affected customers to migrate to Microsoft 365 as a temporary solution and has offered them Microsoft Exchange Plan 1 licenses until further notice at no extra cost. MAPI/RPC, POP, IMAP, SMTP, ActiveSync, and the Outlook Web Access interface used to access Hosted Exchange instances for online email management are among the services impacted by its Hosted Exchange offering remaining offline. While the company has yet to release details about the security incident, British cybersecurity expert Kevin Beaumont believes evidence suggests Rackspace was running Microsoft Exchange servers that were still vulnerable to the two ProxyNotShell flaws. Microsoft patched the pair of Exchange zero-day vulnerabilities in early November, after they were publicly disclosed in late September and were known to be exploited in the wild by a threat actor with Chinese origin indicators. According to Beaumont, research using the Internet of Things (IoT) devices search engine Shodan indicates that Rackspace was using at least some Exchange clusters with build numbers from August, which predate Microsoft's patches. This article continues to discuss Rackspace going offline due to a security incident.

    BankInfoSecurity reports "Rackspace Hosted Exchange Still Offline Over Security Issue"

  • news

    Visible to the public "Cyber Safety Review Board Turns Its Sights on Lapsus$ Extortion Group in Latest Review"

    According to officials at the Department of Homeland Security (DHS), the Cyber Safety Review Board (CSRB), a federal board tasked with studying major hacks and their consequences, will focus its next review on the Lapsus$ criminal extortion group. The federal board, led by DHS and comprised of top federal cybersecurity officials and private sector experts, will investigate the group's tactics for breaking into the networks of some of the world's largest organizations, and will develop "actionable recommendations" to protect organizations, customers, and employees. The first report from the board focused on the Log4j vulnerability. In this next case, they will focus on a highly successful group of hackers who have gained access to high-level accounts at major corporations through various phishing and vishing schemes. Secretary of Homeland Security Alejandro Mayorkas said the review would focus on helping the public defend against innovative social engineering tactics and support the role of international partnerships in combating cybercriminals as cyber threats evolve. The decision to focus on Lapsus$ is the latest effort by the US and its international allies to increase pressure on the hacking and extortion group following a string of successful and high-profile breaches over the past year. Seven alleged members of the group, all between the ages of 16 and 21, were arrested in London in March, while the FBI issued a public alert the same month seeking tips on the group and its members. The Cybersecurity and Infrastructure Security Agency (CISA), the FBI, and other federal agencies already routinely collaborate on public advisories and alerts focusing on specific hacking groups, the tactics they employ, and how to defend against their attacks. Board members stated that a Lapsus$ review by the CSRB would be different from those developments due to the board's unique public-private composition and its ability to obtain cooperation from victim companies in order to obtain insights. This article continues to discuss the Lapsus$ criminal extortion group being the focus of the CSRB's latest review.

    SC Media reports "Cyber Safety Review Board Turns Its Sights on Lapsus$ Extortion Group in Latest Review"

  • news

    Visible to the public "French Hospital Halts Operations After Cyberattack"

    According to local reports, a hospital in the Parisian suburb of Versailles was forced offline over the weekend, leading to the cancellation of all operations and the transfer of some patients. The Andre-Mignot hospital in Chesnay-Rocquencourt, Yvelines, was affected by a cyberattack at 9 pm local time on Saturday evening, turning some computer screens black. The hospital stated that six patients have been transferred from the facility's intensive care and neonatal units to nearby hospitals as staff struggle to maintain care levels and keep outpatient services running. Health minister, Francois Braun, stated that the attack has led to a "total reorganization of the hospital," with extra staff needed in intensive care because several critical machines require monitoring more closely as they are no longer networked. The attack on the 700-bed hospital looks to be the work of ransomware actors. If so, it follows a major ransomware attack on another facility near Paris in September this year. The Centre Hospitalier Sud Francilien (CHSF) in Corbeil-Essonnes was forced back to pen and paper after being hit with a $10m ransom demand by the LockBit 3.0 group.

    Infosecurity reports: "French Hospital Halts Operations After Cyberattack"

  • news

    Visible to the public "Microsoft: Russia Increasingly Timing Cyberattacks With Missile Strikes in Ukraine"

    According to Microsoft, Russia is increasingly combining cyberattacks against Ukraine with conventional weaponry, such as missiles, in a multi-pronged offensive approach that could extend beyond the conflict's borders. Microsoft found that 55 percent of the 50 or so Ukrainian organizations hit by Russian malware since February support critical infrastructure such as energy, water, emergency services, and healthcare, all of which have been the target of intense missile strikes. In recent months, impacted organizations have largely been in and around the areas of the country's most intense physical conflict, such as Kyiv and the south. Microsoft has pointed to mounting evidence that Russia seeks to launch cyberattacks outside of Ukraine as cyber and kinetic attacks continue to line up. In addition to the ongoing bombardment of Ukrainian targets, these have caused strategic damage to the country's supporters. Attacks on European countries may be carried out to disrupt supply chains critical to maintaining support for Ukraine, according to Microsoft, citing recent warnings about the Prestige ransomware targeting Poland as evidence that such a campaign has already begun. Microsoft has warned that attacks on Ukraine's Critical National Infrastructure (CNI) will most likely continue throughout the winter. At the end of October, missile strikes left 80 percent of Kyiv without running water and 10 million premises without power, causing particular concern as Ukraine enters its coldest months. Russian cyberattacks on Ukraine have largely been carried out by the IRIDIUM threat group, which has close ties to Russia's Main Intelligence Directorate, known as the GRU. This article continues to discuss Russia combining cyberattacks with missile strikes against Ukraine.

    ITPro reports "Microsoft: Russia Increasingly Timing Cyberattacks With Missile Strikes in Ukraine"

  • news

    Visible to the public "Chinese-Linked Hackers Stole Millions in COVID-19 Relief Benefits: Secret Service"

    Secret Service officials recently announced that hackers from a cybercriminal group linked to the Chinese government stole at least $20 million from the U.S. in COVID-19 relief benefits, the first known instance of foreign, state-sponsored actors tied to pandemic fraud. The officials noted that APT41 is a "Chinese state-sponsored, cyber threat group that is highly adept at conducting espionage missions and financial crimes for personal gain." Since the rollout of pandemic money in 2020, billions have been stolen by fraudulent actors across the U.S.

  • news

    Visible to the public "The Largest Mobile Malware Marketplace Identified by Resecurity in the Dark Web"

    Resecurity, a cybersecurity firm that protects major Fortune 500 companies, has discovered a new underground dark web marketplace geared toward mobile malware developers and operators. The marketplace is known as "In The Box," and it has been available for cybercriminals in the TOR network since at least the beginning of May 2020, but it has since evolved from a private cybercriminal service into the largest marketplace known today for the number of unique tools and web-injects offered for sale. Web-injects are implanted in mobile malware to intercept credentials for banking, payment systems, social media, and email, but these malicious tools also collect other sensitive information such as credit card information, address details, phone numbers, and other Personally Identifiable Information (PII). The Man-in-The-Browser (MiTB) attacks and web-injects designed for traditional PC-based malware such as Zeus, Gozi, and SpyEye are driving this trend. Cybercriminals have successfully applied the same approach on mobile devices because modern digital payments are highly interconnected regarding consumer mobile applications. According to Resecurity, the "In The Box" marketplace could be the largest and most significant catalyst for mobile device banking theft and fraud. The quality, quantity, and scope of the available malicious arsenal highlight the significance of the findings. Cybercriminals are currently selling over 1,849 malicious scenarios designed for major financial institutions, eCommerce, payment systems, online retailers, and social media companies from over 45 countries, including the US, the UK, Canada, Brazil, Colombia, Mexico, Saudi Arabia, Bahrain, Turkey, and Singapore. Cybercriminals have targeted organizations such as Amazon, PayPal, Citi, Bank of America, Wells Fargo, and DBS Bank. In November 2022, the actor organized a major update of nearly 144 injects and improved their visual design. This article continues to discuss the new underground marketplace in the dark web oriented towards mobile malware developers and operators.

    Security Affairs reports "The Largest Mobile Malware Marketplace Identified by Resecurity in the Dark Web"

  • news

    Visible to the public "How Companies Time Data Leak Disclosures"

    Millions of people's personal data, such as passwords, credit card information, or health information, fall into the hands of unauthorized individuals due to hacking or data processing errors by companies every year. From financial losses to identity theft, the consequences for those affected can be significant. Companies in many countries are required by law to report such incidents to regulatory authorities and notify their customers. As a result, such leaks are often made public. In such cases, a quick response is required to limit the spread of the stolen data and avoid abuse. However, the deadlines set by law allow companies to be flexible in their disclosure timing. In the EU, any data leak that poses a risk to the individuals concerned must be reported within 72 hours. In the US, reporting deadlines range from 30 to 90 days, depending on the state. When Jens Foerderer, a professor of innovation and digitalization at the Technical University of Munich (TUM), and Sebastian Schuetz, a professor of information systems and business analytics at Florida International University (FIU), examined such incidents, they discovered that share prices were relatively unresponsive to data breach announcements. According to Foerderer, leaks harm a company's image and cause customers to lose trust, which should result in a sharp drop in stock market valuation. Their hypothesis was that other news had diverted investors' attention. Using information obtained from the non-profit Identity Theft Resource Center (ITRC), they identified the time of disclosure of over 8,000 data leaks of publicly traded US companies between 2008 and 2018. Then they compared the timing to the dates on which many companies presented their quarterly results. The study backs up the researchers' hypothesis that there was a significantly higher incidence of data breach disclosures on days when other news dominated the headlines. In the case of severe data breaches stemming from internal negligence or errors, as well as leaks of health information or personal identity data, there was a particularly strong correlation between the general news situation and the disclosure date. This article continues to discuss the research on how companies time data leak disclosures.

    Help Net Security reports "How Companies Time Data Leak Disclosures"

  • news

    Visible to the public "SOC Turns to Homegrown Machine Learning to Catch Cyber-Intruders"

    The information security team at a French bank discovered that an internally developed Machine Learning (ML) model trained on log data could detect three new types of data exfiltration undetectable by rules-based security appliances. The team extracted features from daily summary data stored in log files and used them to find anomalies in the bank's web traffic. According to Carole Boijaud, a cybersecurity engineer with Credit Agricole Group Infrastructure Platform (CA-GIP), the study focused on how to better detect data exfiltration by attackers, and it resulted in the identification of attacks that the company's previous system had missed. In order to identify the most important features to track in their analysis, the cybersecurity engineering team used a data-analysis technique called clustering. The popularity of domains, the number of times systems reached out to specific domains, and whether the request used an IP address or a standard domain name were among the most important features. The team used an "isolation forest" technique to find outliers in the data after selecting the features that are most significant in classifications. The isolation forest algorithm divides data into several logical trees based on their values and then analyzes the trees to identify outliers. This method scales easily to handle many features and is relatively light in terms of processing. Initially, the model learned to detect three types of exfiltration attacks that the company would not have detected using existing security appliances. Overall, nearly half of the exfiltration attacks were detectable with a low false-positive rate. This article continues to discuss the ML system that helped a French bank detect three types of exfiltration attacks missed by current rules-based systems.

    Dark Reading reports "SOC Turns to Homegrown Machine Learning to Catch Cyber-Intruders"

  • news

    Visible to the public "BlackProxies Proxy Service Increasingly Popular Among Hackers"

    A new residential proxy market is gaining popularity among hackers, cybercriminals, phishers, scalpers, and scammers, with access to a million claimed proxy IP addresses being sold globally. DomainTools analysts who have been watching the emergence of these services spotted the new platform, reporting that 'BlackProxies' is one of the fastest-growing newcomers in the space. A new entity claiming such a large pool of available proxies is a significant development, given that law enforcement has shut down several large proxy providers in recent years, including RESNET and INSORG. Proxies are online servers that accept and forward requests for other devices on the Internet, causing a connection to appear to originate from their IP address while concealing the true initiator. Residential proxies use home users' IP addresses rather than a data center's address space, making them ideal for running shopping bots or blending in with regular website traffic. Residential users may become proxies voluntarily in exchange for money. However, in many cases, they become proxies involuntarily as a result of malware infections on their computers, Internet of Things (IoT) devices, and modems. Cybercriminals use residential proxies to increase the efficiency of their illegal operations while hiding from law enforcement and blockers. In August 2022, the FBI issued a warning about a growing trend of cybercriminals using residential proxies to conduct large-scale credential-stuffing attacks without being tracked, flagged, or blocked. This article continues to discuss the scale and operation of the new BlackProxies residential proxy market.

    Bleeping Computer reports "BlackProxies Proxy Service Increasingly Popular Among"

  • news

    Visible to the public "North Korean Hackers Spread AppleJeus Malware Disguised as Cryptocurrency Apps"

    Recent discoveries from Volexity reveal that the Lazarus Group threat actor has been seen using fake cryptocurrency apps as a lure to distribute a previously undocumented variant of the AppleJeus malware. According to researchers, this activity is notable for targeting cryptocurrency users and organizations through malicious Microsoft Office documents containing an AppleJeus malware variant. The North Korean government is known to employ a three-pronged strategy by using malicious cyber activity that is planned to gather information, carry out attacks, and generate illegal revenue for the country subject to sanctions. According to the 2021 Annual Threat Assessment published by US intelligence agencies, North Korea has engaged in cyber theft against financial institutions and cryptocurrency exchanges around the world, potentially stealing hundreds of millions of dollars to fund government priorities, including its nuclear and missile programs. This article continues to discuss the delivery of AppleJeus malware by the Lazarus Group through fake cryptocurrency apps.

    THN reports "North Korean Hackers Spread AppleJeus Malware Disguised as Cryptocurrency Apps"

  • news

    Visible to the public "Cybersecurity Risks of Automotive OTA"

    Vehicle Original Equipment Manufacturers (OEMs) will contact vehicle owners remotely about Operating System (OS) updates that add new features and/or fixes, as well as software bugs and vulnerabilities, similar to how smartphones do. All of this must be done securely, but over-the-air technology (OTA) is still relatively immature regarding safety-critical applications. The Advanced Driver Assistance Systems (ADAS), as well as the electronic dashboard, powertrain, and infotainment systems, are all controlled by software in modern vehicles. Through OTA updates, vehicles could operate more efficiently, benefit from improved Electronic Vehicle (EV) battery performance, and stay current with technology for longer. These updates can be delivered directly from OEMs or via vehicle dealers. Honda recalled 608,000 vehicles in the US in 2020 to fix software bugs that were causing instruments to display incorrect speed information and other errors with rear-view camera video. Updates are broadly classified into two types: critical and non-critical. Important updates have a direct impact on engine and powertrain performance and safety, while non-critical updates, for example, add new features to infotainment systems. However, OTA has some drawbacks. According to the National Highway Traffic Safety Administration (NHTSA), Tesla recalled more than 40,00 Model S and Model X vehicles built between 2017 and 2021 in October 2022 due to a software update issue. A different issue was caused by an OTA firmware release intended to update the calibration values of the electronic power assist steering system. After hitting a pothole or a bump, some vehicle owners experienced a loss of power steering ability, which required another OTA update to correct. Another challenge is that implementing security in any market is difficult, particularly in complex systems like automotive, where the use of third-party Intellectual Property (IP) is increasing. That IP can take the form of software or hardware, and if it is poorly designed or integrated, or is so complex that it can never be verified and debugged properly, it can open the door to cyberattacks. This article continues to discuss the cybersecurity risks of automotive OTA technology.

    Semiconductor Engineering reports "Cybersecurity Risks of Automotive OTA"

  • news

    Visible to the public  "AI Tools Could Boost Social Media Users' Privacy"

    According to researchers at the University of Edinburgh, by fighting Artificial Intelligence (AI) with AI, digital assistants could help prevent users from unknowingly revealing their views on social, political, and religious issues. Their findings imply that automated assistants could provide users with real-time advice on how to modify their online behavior in order to mislead AI opinion-detection tools and keep their opinions private. The study is the first to show how Twitter users can hide their opinions from opinion-detecting algorithms that help authoritarian governments or fake news sources target them. Previous research has focused on steps that social media platform owners can take to improve privacy, though the team notes that such actions can be difficult to enforce. Data from over 4,000 Twitter users in the US was used by Edinburgh researchers and academics from New York University Abu Dhabi. The team used the data to examine how AI can predict people's opinions based on their online activities and profile. They also tested designs for an automated assistant to help Twitter users keep their views on potentially divisive topics private. Their findings suggest that a tool could assist users in hiding their views on their profiles by identifying key indicators of their opinions, such as accounts they follow and interact with. This article continues to discuss the team's study on how AI can help strengthen social media users' privacy.

    University of Edinburgh reports "AI Tools Could Boost Social Media Users' Privacy"

  • news

    Visible to the public "To Fill the Cybersecurity Skills Gap, the Sector Needs to Boost Diversity"

    The global cybersecurity skills gap and the lack of diversity in the cybersecurity workforce are the two main issues facing the cybersecurity sector. According to research, 3.4 million additional people are required to close the global cybersecurity workforce gap. A World Economic Forum survey found that 59 percent of businesses would struggle to respond to a cybersecurity incident because of the skills gap. According to data from 2022, the issue is getting worse as the workforce gap widened by 26.2 percent from 2021 to 2022. There is a noticeable lack of diversity in the cybersecurity industry. In Science, Technology, Engineering, and Math (STEM) fields, women are generally underrepresented, and in cybersecurity specifically, they account for only about 24 percent of the workforce. About 26 percent of cybersecurity professionals are minorities. According to Fortinet's research into the cybersecurity skills gap, it negatively affects businesses by raising the possibility of security breaches, which can result in financial and reputational losses. With nearly $600 billion, or one percent of the global GDP, lost to cybercrime each year, cybersecurity incidents are having a greater impact on the world economy than ever before. Research also reveals that the number of new ransomware variants discovered in the first half of 2022 increased by almost 100 percent compared to the prior six months. Many people might think they cannot work in cybersecurity because they lack the necessary experience or technical training, but there are opportunities in the cybersecurity industry for almost everyone, as people can acquire the technical skills they need to pursue careers in the field by completing training programs and earning certifications. This article continues to discuss the need for diversity in the cybersecurity workforce, what could be holding potential candidates back, and making cybersecurity training more accessible for everyone.

    World Economic Forum reports "To Fill the Cybersecurity Skills Gap, the Sector Needs to Boost Diversity"

  • news

    Visible to the public "Android Phone Makers' Encryption Keys Stolen and Used in Malware"

    Although Google develops its open-source Android mobile Operating System (OS), the Original Equipment Manufacturers (OEMs) that make Android smartphones, such as Samsung, play a significant role in customizing and securing the OS for their devices. However, a recent discovery made public by Google reveals that several digital certificates used by vendors to authenticate essential system applications were recently compromised and have already been used to certify malicious Android apps. Similar to nearly every other computer OS, Google's Android is built with a "privilege" model. As a result, the software running on an Android phone, from third-party apps to the OS itself, is limited as much as possible and only given system access based on their needs. This enables the photo editing app to access the camera roll while preventing a game from covertly collecting all of a user's passwords. Digital certificates signed with cryptographic keys enforce the entire structure. Attackers can give their own software access to resources it should not be allowed to have if the keys are stolen. According to Google, manufacturers of Android-based devices have implemented mitigations, rotating keys, and automatically distributing updates to users' phones. Additionally, the company has implemented scanner detections to look for malware that tries to exploit the compromised certificates. Google says there is no proof that the malware was on the Google Play Store, indicating that it spread through third parties. Through a group known as the Android Partner Vulnerability Initiative, information about the threat was disclosed, and action was coordinated to address it. An attacker would be able to develop malware that has numerous permissions by abusing the compromised platform certificates without having to trick users into giving them permission. Lukasz Siewierski, an Android reverse engineer, provided some malware samples from his Google report that exploited the stolen certificates. Among other manufacturers whose certificates were compromised, they list Samsung and LG as two of them. This article continues to discuss the compromise of digital certificates by vendors to validate critical system applications.

    Wired reports "Android Phone Makers' Encryption Keys Stolen and Used in Malware"

  • news

    Visible to the public  "US Cyber Command, DARPA Initiate Rapid Cyber Capability Prototyping and Integration Pilot"

    A pilot program launched by the Defense Advanced Research Projects Agency (DARPA) and the US Cyber Command (CYBERCOM) aims to put new cyber capabilities in the hands of cyber operators more quickly. By developing a user-directed, incremental, and iterative pipeline for the creation, proving, adoption, and delivery of those capabilities into the software ecosystem of CYBERCOM, the Constellation pilot program will facilitate the flow of new cyber capabilities resulting from high-risk, high-reward cyber science and technology research. According to Mike Clark, Director of Cyber Acquisition and Technology at the CYBERCOM, innovation is at the heart of the command's strategy, which is why CYBERCOM and DARPA are collaborating more closely than ever to develop emerging tactical and strategic cyber capabilities and integrate them into operational warfighting platforms. Therefore, Constellation's success depends on speeding up the transfer of technology from DARPA research and development to CYBERCOM for operational use. In order to overcome the difficulties the Department of Defense (DOD) encounters when developing software systems, such as rapidly evolving technology, acceptance, and usability for both expert and non-expert providers, it is crucial to foster an agile-style pipeline from research to operations. In order to close the gap between science and technology, Constellation will provide a framework, develop mechanisms, and procure the necessary personnel, contracts, relationships, research, development, and operational warfighting capabilities. It will also provide feedback to the science and technology community on the changing nature of cyber threats and mission requirements. This article continues to discuss the goals of the new Constellation pilot program.

    HSToday reports "US Cyber Command, DARPA Initiate Rapid Cyber Capability Prototyping and Integration Pilot"

  • news

    Visible to the public "Florida State Tax Website Bug Exposed Filers' Data"

    A researcher discovered that a security flaw on the Florida Department of Revenue website exposed the bank account and Social Security numbers of at least hundreds of taxpayers. By changing the portion of the website address that contains the taxpayers' application number, Kamran Mohsin said the security flaw, which has since been fixed, allowed him or anyone else who was logged in to the state's business tax registration website to access, modify, and delete the personal data of business owners whose information is on file with the state's tax authority. According to Mohsin, application numbers are sequential, making it possible for anyone to compile data on taxpayers by simply increasing the application number by one digit. There were over 713,000 applications in the system. A server vulnerability called Insecure Direct Object Reference (IDOR) exposes files or data stored on the server because there are insufficient or no security controls in place. It is similar to having a key that opens a mailbox and every other mailbox in a neighborhood. In comparison to other bugs, IDOR vulnerabilities have the advantage of typically being quickly fixed at the server level. Mohsin provided screenshots of the website bug, showing examples of names, residential and commercial addresses, bank account and routing numbers, Social Security numbers, and other special tax identifiers used for submitting paperwork to the state and federal governments. Scammers and cybercriminals often target tax identifiers, such as Social Security numbers, to file false tax returns and steal tax refunds, costing taxpayers billions of dollars annually. On October 27, Mohsin contacted the Florida Department of Revenue, which gave him an email address to report the vulnerability. Soon after the flaw was reported, it was fixed. According to the Florida Department of Revenue, the vulnerability was fixed four days after Mohsin reported it, and two unnamed security firms have verified the website's security. This article continues to discuss the exposure of taxpayers' data by the Florida Department of Revenue website.

    TechCrunch reports "Florida State Tax Website Bug Exposed Filers' Data"

  • news

    Visible to the public "Vanuatu Struggles Back Online After Cyberattack"

    Vanuatu's government recently stated that it was slowly getting its communications back online following a cyberattack that knocked out emergency services, emails, and phone lines for weeks. Chief information officer Gerard Metsan stated that 70 percent of the government network had now been restored, including crucial emergency lines for ambulance, police, and fire services. He did not give details of which services remained affected but said all government departments were back online after some hardware was replaced. Government servers and websites on the Pacific island nation had been out since November 6, when suspicious activity was first detected. The cyberattack knocked out online services, email, and network-sharing systems, in many cases forcing officials to use other platforms to communicate. Vanuatu's newly elected Prime Minister Ishmael Kalsakau stated that experts from Australia were called in to help and that it remained unclear who was behind the cyberattack. Kalsakau noted that data analysis of the hackers showed "persistent traffic" from Europe, Asia, and the United States, "but these indications could be misleading." The prime minister could not say whether the attack was state-sponsored, adding it was also too early to determine the full extent of the damage. The experts from Australia believe that the cyberattack came through a non-secure government website managed by third parties and workstations with known security weaknesses. Police are currently investigating whether locals helped assist the hackers. The small South Pacific nation of 315,000 had limited ability to deal with the problem, and Kalsakau said safeguards were being installed in the network to reduce the risk of another cyberattack.

    SecurityWeek reports: "Vanuatu Struggles Back Online After Cyberattack"

  • news

    Visible to the public "Three Innocuous Linux Vulnerabilities Chained to Obtain Full Root Privileges"

    Qualys' Threat Research Unit recently showed how a new Linux vulnerability could be chained with two other apparently harmless flaws to gain full root privileges on an affected system. The researchers stated that the new vulnerability, tracked as CVE-2022-3328, is a race condition in Snapd, a Canonical-developed tool used for the Snap software packaging and deployment system. Specifically, the flaw impacts the "snap-confine" program used by Snapd to construct the execution environment for Snap applications. The researchers noted that the affected program is present by default in Ubuntu, whose developers described CVE-2022-3328 as a high-severity flaw that can be exploited for local privilege escalation and arbitrary code execution. Qualys researchers have shown how CVE-2022-3328 could be combined with other innocuous vulnerabilities for a high-impact attack. The researchers chained CVE-2022-3328 (this issue was introduced in February 2022 by the patch for a flaw tracked as CVE-2021-44731) with two recently discovered issues affecting Multipathd. The researchers noted that Multipathd is a daemon in charge of checking for failed paths that is running as root in the default installation of Ubuntu and other distributions. The researchers stated that Multipathd is affected by an authorization bypass issue that can be exploited by an unprivileged user to issue privileged commands to Multipathd (CVE-2022-41974) and a symlink attack (CVE-2022-41973) that can be used to force the execution of malicious code. The researchers noted that chaining the Snapd vulnerability with the two Multipathd flaws can allow any unprivileged user to gain root privileges on a vulnerable device. The researchers have verified the vulnerability, developed an exploit, and obtained full root privileges on default installations of Ubuntu. The vulnerability is not exploitable remotely, but the researchers warn that it's dangerous because it can be exploited by an unprivileged user.

    SecurityWeek reports: "Three Innocuous Linux Vulnerabilities Chained to Obtain Full Root Privileges"

  • news

    Visible to the public "'CryWiper' Trojan Disguises as Ransomware"

    Researchers have discovered a new wiper Trojan disguised as a ransomware payload in the wild. CryWiper, named after the distinctive '.cry' extension it appends to files, appears to be a new ransomware strain at first glance. The victims' devices appear to be encrypted, and a ransom note is left demanding money be sent to a bitcoin wallet address, but the files are corrupted beyond repair. Evidence shows that the malware is a wiper that corrupts all but the most critical system files, overwriting each with data generated by a pseudo-random number generator. When CryWiper is installed on a victim's system, it sends the name of the victim's device to a command-and-control (C2) server and waits for an activation command to launch an attack. This uses a similar methodology to ransomware, with functions such as deleting volume shadow copies to prevent file restoration and scheduling itself in Windows Task Scheduler to restart every five minutes. CryWiper also disables MS SQL, MySQL, MS Active Directory, and MS Exchange services, allowing files associated with them to be corrupted. A wiper is made to randomly destroy systems or otherwise cause havoc on a victim's device. Wipers are a component of a malware arsenal that has served as the foundation of the growing threat against critical national infrastructure, and they have been widely used by Russia in its cyberwar against Ukraine. The ransom text file contains an email address that has been in use since 2017, making it associated with a number of previous ransomware families. No group has yet been definitively linked by an identification. This article continues to discuss the CryWiper Trojan that has been disguised as ransomware.

    ITPro reports "'CryWiper' Trojan Disguises as Ransomware"

  • news

    Visible to the public "Cyber Extortion Dominates the Threat Landscape"

    Cyber extortion affects businesses of all sizes worldwide, with 82 percent of cases observed being small businesses, up from 78 percent last year. According to Orange Cyberdefense's latest Security Navigator report, there was a noticeable slowdown in cybercrime at the start of the Ukraine war, but the intensity quickly increased again. For example, the number of cyber extortion victims in East Asia and South East Asia has increased by 30 percent and 33 percent, respectively, in the last six months. Furthermore, from 2021 to 2022, victim volumes increased by 18 percent in the EU, 21 percent in the UK, and 138 percent in the Nordic countries. However, volumes fell by 8 percent in North America and 32 percent in Canada. Small businesses are targeted four and a half times more than medium and large businesses combined, while the public sector accounts for the fifth highest proportion of incidents in Orange's CyberSOCs. The manufacturing sector remains the most vulnerable to cyber extortion, despite ranking fifth among industries most willing to pay ransoms, according to the research. Criminals in this sector are compromising conventional Information Technology (IT) systems rather than the more specialized Operational Technology (OT). In 2021, 547 Android vulnerabilities and 357 iOS vulnerabilities were reported. In comparison, only 24 percent of iOS vulnerabilities have a low attack complexity. Due to the ecosystem's uniformity, the findings show that a higher number of iPhone users are vulnerable when a security issue is first disclosed. Users migrate to a new version quickly, with 70 percent updating within 51 days of the patch's release. Since the Android ecosystem is more fractured, devices are often left open to more old exploits, while fewer may be vulnerable to new exploits. This article continues to discuss key findings from Orange Cyberdefense's latest Security Navigator report.

    BetaNews reports "Cyber Extortion Dominates the Threat Landscape"

  • news

    Visible to the public "Google: After Using Rust, We Slashed Android Memory Safety Vulnerabilities"

    Google appears to be reaping the benefits of its decision to use Rust for new code in Android in order to reduce memory-related flaws. Memory safety flaws in Android have been reduced by more than half, a significant achievement coinciding with Google's transition from C and C++ to the memory-safe programming language Rust. This is the first year that memory safety flaws have not been the most common type of security flaw, and it comes a year after Google made Rust the default language for new code in the Android Open Source Project (AOSP). Other memory-safe languages used by Google for Android include Java and the Java-compatible Kotlin. Although C and C++ remain dominant languages in AOSP, Android 13 is the first version in which most of the new code is written in memory-safe languages. Rust now accounts for approximately 21 percent of new code after Google adopted it for AOSP in April 2021. This year, the Linux kernel project designated Rust as the new official second language to C. Android 10 from 2019 had 223 memory safety bugs, while Android 13 has 85 known memory safety issues. Memory safety vulnerabilities have dropped from 76 percent to 35 percent of Android's total vulnerabilities during that time, according to Android security software engineer Jeffrey Vander Stoep. Google is seeing a decrease in critical and remotely exploitable flaws as memory safety vulnerabilities decline. The Android team intends to increase its use of Rust, but there are no plans to abandon C and C++ for system programming. Stoep does point out that correlation does not imply causation, but the percentage of memory safety security bugs, which dominate high severity bugs, closely matches the languages used for new code. According to Google, security tools such as fuzzing have also had a significant impact on memory safety bugs. This article continues to discuss the reduction of memory-related flaws after Google decided to use Rust for new code in Android.

    ZDNet reports "Google: After Using Rust, We Slashed Android Memory Safety Vulnerabilities"

  • news

    Visible to the public "Russian Hackers Steal 50 Million Passwords From 111 Countries Using Infostealer Malware"

    Group-IB found almost three dozen groups of Russian hackers using the stealer-as-a-service model to spread infostealer malware. An infostealer is a type of malware that collects browser credentials, payment card numbers, and cryptocurrency wallet credentials and sends them to threat actor-controlled servers. According to the researchers, the threat groups have infected 890,000 user devices with infostealers, stealing 50 million passwords in the first seven months of 2022, which is an increase of 80 percent over the previous period. Furthermore, threat actors stole 2,117,626,523 cookie files, 113,204 cryptocurrency wallets, and 103,150 credit cards. The digital risk protection team at Group-IB discovered that 34 groups of Russian hackers used Raccoon and Redline infostealer malware to steal passwords from Steam, Roblox, Amazon, PayPal, cryptocurrency wallets, and credit card information. PayPal and Amazon are the most targeted, accounting for 16 percent and 13 percent of all stolen data, respectively. The report discovered that Russian hackers coordinated their hacking activities through Russian-speaking Telegram groups with an average of 200 active members, most of whom were previously involved in Classiscam. Although they communicate in Russian, they target victims in 111 countries, mainly the US, Brazil, India, Germany, and Indonesia. Redline was ranked as the most popular malware by Group-IB researchers, with the variant being used by 23 of 34 groups. Raccoon infostealer malware came in second place, with only eight groups using it, while custom infostealers have only three groups dedicated to them. Group administrators provide their employees with both Redline and Raccoon infostealers and claim a cut of the stolen data or profits. Some organizations employ up to three infostealer malware variants, while others employ only one. Cybercriminals can rent malware from the dark web for as little as $150-200 per month. This article continues to discuss Group-IB's findings regarding groups of Russian hackers spreading infostealer malware.

    CPO Magazine reports "Russian Hackers Steal 50 Million Passwords From 111 Countries Using Infostealer Malware"

  • news

    Visible to the public "New DuckLogs Malware Service Claims Having Thousands of 'Customers'"

    A new Malware-as-a-Service (MaaS) operation called 'DuckLogs' is providing low-skilled attackers with easy access to multiple modules for data theft, keystroke logging, clipboard data access, and remote access to the compromised host. DuckLogs is completely web-based and claims that thousands of cybercriminals have paid a subscription to generate and launch over 4,000 malware builds. Some customers appear to receive additional services from the operators, such as assistance in distributing the payload, a tool for dropping files, and an extension changer. According to the web panel, over 2,000 cybercriminals are using the malicious platform, and the current victim count exceeds 6,000. DuckLogs primarily consists of an information stealer and a Remote Access Trojan (RAT), but it also includes over 100 individual modules that target specific applications. The RAT component includes functions for retrieving and running files from the command-and-control (C2) server, displaying a crash screen, shutting down, restarting, logging out, or locking the device, and opening URLs in the browser. Other DuckLogs modules include keystroke logging to steal sensitive information, a clipper, and a screenshot tool. The malware also supports Telegram notifications, encrypted logs and communication, code obfuscation, process hollowing to launch payloads in memory, a persistence mechanism, and a Windows User Account Control bypass, according to Cyble researchers. The web-based panel is currently available on four clearnet domains and appears to provide powerful payload-building features, including the ability to add modules and functions to the final malware build. This article continues to discuss findings surrounding the new DuckLogs MaaS.

    Bleeping Computer reports "New DuckLogs Malware Service Claims Having Thousands of 'Customers'"

  • news

    Visible to the public  "Hackers Exploiting Redis Vulnerability to Deploy New Redigo Malware on Servers"

    A previously unknown Go-based malware is targeting Redis servers with the intent of taking control of infected systems and likely establishing a botnet network. According to cloud security firm Aqua, the attacks involve exploiting a critical security vulnerability in the open-source, in-memory, key-value store Redigo, which was disclosed earlier this year. The vulnerability, tracked as CVE-2022-0543 and assigned a CVSS score of 10.0, is related to a case of sandbox escape in the Lua scripting engine that could be exploited to gain Remote Code Execution (RCE). This is not the first time the flaw has been actively exploited. in March 2022, Juniper Threat Labs discovered attacks carried out by the Muhstik botnet to execute arbitrary commands. The Redigo infection chain is similar in that the adversaries search for exposed Redis servers on port 6379 to gain initial access before downloading a shared library called "exp lin.so" from a remote server. This library file comes with an exploit for CVE-2022-0543 to execute a command in order to retrieve Redigo from the same server, in addition to taking steps to mask its activity by simulating legitimate Redis cluster communication over port 6379. According to Aqua researcher Nitzan Yaakov, the dropped malware mimics Redis server communication, allowing the adversaries to conceal communications between the targeted host and the command-and-control (C2) server. This article continues to discuss the exploitation of the Redis vulnerability to deploy Redigo malware on servers.

    THN reports "Hackers Exploiting Redis Vulnerability to Deploy New Redigo Malware on Servers"

  • news

    Visible to the public "Mitsubishi Electric PLCs Exposed to Attacks by Engineering Software Flaws"

    Security researchers at industrial cybersecurity firm Nozomi Networks have recently discovered three vulnerabilities in Mitsubishi Electric's GX Works3 engineering workstation software that could be exploited to hack safety systems. GX Works3 is the configuration and programming software provided by Mitsubishi Electric for its MELSEC iQ-F and iQ-R programmable logic controllers (PLCs). The three security holes discovered are tracked as CVE-2022-29831, CVE-2022-29832, and CVE-2022-29833 and could allow an attacker to obtain information from GX Works3 project files to compromise connected safety CPU modules. The researchers noted that the project files for these modules are encrypted, and a user-configured username and password are required to open them. However, the researchers discovered hardcoded passwords, cleartext storage, and insufficient credential protection issues that expose these credentials and other sensitive information. The researchers noted that a threat actor could obtain a project file from a misconfigured file server, from a shared computer, or by intercepting unprotected communications. Once they have the file, they can exploit the vulnerabilities to obtain information needed to hack industrial control systems (ICS). According to the researchers, an attacker could abuse the first two issues and obtain confidential information included in the project file about the project itself, as well as about the usernames of the accounts registered on the related safety CPU module. The researchers noted that if an asset owner has opted to re-use the same credentials for accessing the safety CPU module to also protect the related project file, a much more dangerous scenario would occur. In this situation, an attacker may chain all three issues and obtain a remarkably powerful attack primitive that would allow them to directly access the safety CPU module. This would give them the potential opportunity to compromise it and, therefore, disrupt the managed industrial process. Mitsubishi has yet to release patches and has only provided mitigations and workarounds. Nozomi has not made public any technical information in an effort to prevent potential exploitation by malicious actors.

    SecurityWeek reports: "Mitsubishi Electric PLCs Exposed to Attacks by Engineering Software Flaws"

  • news

    Visible to the public "Financial Organizations More Prone to Accidental Data Leakage"

    Netwrix has released additional findings from its global 2022 Cloud Security Report for the financial and banking sectors. Financial institutions are much more concerned about users who have legitimate access to their cloud infrastructure than other industries surveyed. In this sector, 44 percent believe their own IT staff is the greatest threat to cloud data security, while 47 percent are concerned about contractors and partners, compared to 30 percent and 36 percent in the other verticals polled. Phishing is the most common type of attack reported by all sectors. On the other hand, ninety-one percent of financial institutions say they can detect phishing within minutes or hours, compared to 82 percent of respondents in other verticals. Financial organizations are more likely than other industries to experience accidental data leakage, with 32 percent of them reporting this type of security incident in the last 12 months, compared to an average of 25 percent. This is a valid reason for them to be concerned about users who may inadvertently disclose sensitive information. To address this threat, organizations should adopt a zero-standing privilege approach in which elevated access rights are granted only when and for as long as they are required, according to Dirk Schrader, VP of security research at Netwrix. This article continues to discuss key findings from the 2022 Cloud Security Report.

    Help Net Security reports "Financial Organizations More Prone to Accidental Data Leakage"

  • news

    Visible to the public "Artifact Poisoning in GitHub Actions Imports Malware via Software Pipelines"

    When an attacker submits changes to an open-source repository on GitHub, downstream software projects that include the most recent version of a component may compile updates containing malicious code. According to Legit Security, a software supply chain security firm, this "artifact poisoning" vulnerability could affect software projects that use GitHub Actions, a service for automating development pipelines, by triggering the build process when a change in a software dependency is detected. Legit Security simulated an attack on the project that manages Rust, causing the project to recompile using a customized and malicious version of the popular GCC software library. According to Liav Caspi, chief technology officer of Legit Security, the problem likely affects a large number of open-source projects because maintainers typically run tests on contributed code before analyzing it themselves. He describes it as a common pattern nowadays. Many open-source projects today run a slew of tests to validate a change request because the maintainer does not want to have to review the code first. Instead, it runs tests automatically. The attack makes use of the automated build process provided by GitHub Actions. The vulnerable pattern in the Rust programming language could have allowed an attacker to execute code in a privileged manner as part of the development pipeline, stealing repository secrets and potentially tampering with code. Any GitHub user can create a fork that generates an artifact, then inject it into the repository's build process and modify its output. Another type of software supply chain attack in which an attacker modifies the build output. This article continues to disucss artifact poisoning in GitHub Actions.

    Dark Reading reports "Artifact Poisoning in GitHub Actions Imports Malware via Software Pipelines"

  • news

    Visible to the public "Cuba Ransomware Actors Pocket $60m"

    The US Cybersecurity and Infrastructure Security Agency (CISA) has warned of the continued threat posed by the Cuba ransomware variant, which has made its affiliates and developers $60m as of August. CISA revealed in a new alert that the ransomware had compromised at least 100 entities worldwide, having doubled its victim count in the US since last December. CISA noted that the group and its affiliates mainly target financial services, government, healthcare, critical manufacturing, and IT companies. CISA stated that, disappointingly, ransoms are increasingly being paid. The group has demanded $145m to date in recorded attacks. CISA said that threat actors use one of several tried-and-tested techniques to gain initial access: phishing campaigns, vulnerability exploitation, compromised credentials, and remote desktop protocol (RDP) tools. Once inside, the ransomware itself is distributed via a loader known as "Hancitor." CISA noted, however, since spring this year, the group has modified some of its tactics, techniques, and procedures (TTPs). CISA stated that it uses a dropper that writes a kernel driver to the file system called ApcHelper.sys, in order to terminate any security products running on victims' machines. It also exploits CVE-2022-24521 to steal system tokens and elevate privileges and CVE-2020-1472 to gain domain administrator privileges.

    Infosecurity reports: "Cuba Ransomware Actors Pocket $60m"

  • news

    Visible to the public "NATO Launches Massive Cyber-Defense Exercise"

    This week, NATO kicked off its Cyber Coalition 22 exercise to enhance cyber resilience among its members. NATO brought together 1000 defenders from 26 member countries plus Finland and Sweden, Georgia, Ireland, Japan, Switzerland, and the EU, as well as participants from industry and academia. NATO stated that the five-day exercise is designed to pose real-life challenges to participants, such as cyberattacks on power grids and NATO assets, with a view to enhancing their ability to defend networks and collaborate in cyberspace.