News Items

  • news

    Visible to the public "Collide+Power Vulnerability Leaks Secrets Bit by Bit"

    Researchers in Austria and Germany have developed a power-monitoring side-channel attack that exposes sensitive data on modern computer chips. The Collide+Power attack analyzes the processor's power consumption to determine the contents of the CPU cache memory. It may expose encryption keys and other identifiers if an attacker has persistent access to the victim's hardware or to a cloud computing environment that shares hardware between tenants. The technique is described in a paper titled "Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels." Collide+Power is based on measuring how power usage varies when processing known data from the attacker and unknown data from the victim, and then inferring the unknown data based on differences between these measurements. This article continues to discuss the Collide+Power attack.

    The Register reports "Collide+Power Vulnerability Leaks Secrets Bit by Bit"

  • news

    Visible to the public "Researchers Claim US-Registered Cloud Host Facilitated State-Backed Cyberattacks"

    According to researchers at the cybersecurity company Halcyon, the US-registered cloud company Cloudzy provided web hosting and Internet services to over two dozen state-sponsored hacking groups and commercial spyware operators. In a recently published report, Halcyon noted that it had discovered Cloudzy to be "knowingly or unwittingly" serving as a command-and-control provider (C2P) for well-known state-sponsored hacking groups. C2Ps are Internet providers that enable hackers to host virtual private servers and other anonymized services for ransomware affiliates conducting cyberattacks and extortion. The groups that rely on Cloudzy include the China-backed espionage group APT10, North Korea-backed hacking group Kimsuky, and more. This article continues to discuss the facilitation of state-backed cyberattacks by a US-registered cloud company.

    TechCrunch reports "Researchers Claim US-Registered Cloud Host Facilitated State-Backed Cyberattacks"

  • news

    Visible to the public "Experts Discovered a Previously Undocumented Initial Access Vector Used by P2PInfect Worm"

    Cado Security has discovered a new variant of the peer-to-peer (P2P) worm known as the P2PInfect, which targets Redis servers with a previously undocumented initial access vector. In July, researchers at Palo Alto Networks Unit 42 found the new P2P worm targeting Redis servers running on both Linux and Windows. P2PInfect is more scalable and potent than other worms due to its ability to target Redis servers running on Linux and Windows operating systems. The worm is written in the Rust programming language and exploits the Lua sandbox escape vulnerability, tracked as CVE-2022-0543 with a CVSS score of 10.0, to target Redis instances. The Muhstik and Redigo botnets have previously exploited this vulnerability in attacks against Redis servers. The malware exploits CVE-2022-0543 to gain initial access and then drops an initial payload that establishes P2P communication to the P2P network. Over the past two weeks, researchers have identified over 307,000 unique public Redis systems, 934 of which may be vulnerable to infection. This article continues to discuss the new variant of the P2PInfect worm.

    Security Affairs reports "Experts Discovered a Previously Undocumented Initial Access Vector Used by P2PInfect Worm"

  • news

    Visible to the public "Possible Chinese Malware in US Systems a ‘Ticking Time Bomb’: Report"

    The Biden administration recently announced that it believes China has implanted malware in key US power and communications networks in a "ticking time bomb" that could disrupt the military in the event of a conflict. The Times reported that the malware potentially gave China's People's Liberation Army the ability to disrupt US military operations if Beijing were to move against Taiwan at some point. The systems affected, the Times said, could allow China not only to cut off water, power, and communications to US military bases but also to homes and businesses across the United States. The report comes two months after Microsoft warned that state-sponsored Chinese hackers had infiltrated critical US infrastructure networks. Microsoft pointed out Guam, a US Pacific territory with a vital military outpost, as one target but said malicious activity had also been detected elsewhere in the United States. Microsoft stated that the stealthy attack carried out since mid-2021 was likely aimed at hampering the United States in the event of a regional conflict.
    Authorities in Australia, Canada, New Zealand, and Britain warned at the same time that Chinese hacking was likely taking place globally, affecting an extensive range of infrastructure. The Times said the discovery of the malware sparked a series of meetings in the White House Situation Room involving top military, intelligence, and national security officials to track down and eradicate the code. The White House issued a statement Friday saying, "The Biden administration is working relentlessly to defend the United States from any disruptions to our critical infrastructure, including by coordinating interagency efforts to protect water systems, pipelines, rail and aviation systems, among others." Reports of the malware operation come at a particularly strained point in US-China relations, with China aggressively asserting its claim that Taiwan is Chinese territory and the US seeking to ban sales of sophisticated semiconductors to Beijing.

    SecurityWeek reports: "Possible Chinese Malware in US Systems a 'Ticking Time Bomb': Report"

  • news

    Visible to the public "Bedding Giant Tempur Sealy Takes Systems Offline Following Cyberattack"

    Bedding products giant Tempur Sealy has recently shut down certain systems after falling victim to a cyberattack. Based in Lexington, Kentucky, Tempur Sealy manufactures and sells mattresses, pillows, and other bedding products under brands such as Cocoon, Sealy, Stearns & Foster, and Tempus. The company stated that the cyberattack was identified on July 23, 2023, and triggered the activation of "incident response and business continuity plans." This included proactively shutting down some of the company's IT systems, resulting in the temporary interruption of the company's operations. The company has started the process of restoring its critical IT systems and has already resumed operations, but the company did not say to what capacity. The company noted that the forensic investigation remains ongoing, and it continues to work to determine whether this incident will have a material impact on its business, operations, or financial results. The company stated that it has yet to determine if any personal information was compromised during the attack and would provide required notifications should that be the case.

    SecurityWeek reports: "Bedding Giant Tempur Sealy Takes Systems Offline Following Cyberattack"

  • news

    Visible to the public "Researchers Unveil New Cipher System that Protects Computers Against Spy Programs"

    With the development of a new, highly efficient cipher for cache randomization, a group of international researchers has made significant progress in computer security. The cipher, designed by Rei Ueno, an assistant professor from the Research Institute of Electrical Communication at Tohoku University, addresses the threat of cache side-channel attacks, providing improved security and performance. Cache side-channel attacks pose a significant threat to today's computer systems because they can stealthily extract sensitive data, such as secret keys and passwords. These attacks exploit flaws in the operating principles of modern computers, making countermeasures difficult. Cache randomization is a promising countermeasure, but identifying a secure and efficient mathematical function for this purpose has remained challenging. Therefore, Ueno and his team developed SCARF, which is based on a comprehensive mathematical formulation and modeling of cache side-channel attacks. This article continues to discuss the SCARF system developed to combat cache side-channel attacks.

    Tohoku University reports "Researchers Unveil New Cipher System that Protects Computers Against Spy Programs"

  • news

    Visible to the public "Stremio Vulnerability Exposes Millions to Attack"

    Researchers at CyFox have discovered a Dynamic Link Library (DLL) planting/hijacking vulnerability in the popular media center application Stremio, which attackers could exploit to execute code on a victim's system, steal information, and more. DLLs are files that can be dynamically linked and shared by multiple programs simultaneously. They are essential to Windows and numerous applications, including Stremio. They house standard functions that are shared by multiple applications, preventing code duplication and reducing executable file size. In addition, DLLs grant access to system resources such as device divers, graphics processing, and networking. When a user launches a program on Windows, the program searches for and uses the required DLLs to function as intended. The flaw discovered by the researchers impacts version 4.4 of Stremio for Windows. It stems from the use of LoadLibraryA and LoadLibraryExA, two Windows Application Programming Interface (API) functions. The latter allows an attacker to place malicious DLLs in the application directory. This article continues to discuss findings regarding the Stremio vulnerability.

    Help Net Security reports "Stremio Vulnerability Exposes Millions to Attack"

  • news

    Visible to the public "Canon Warns of Wi-Fi Security Risks When Discarding Inkjet Printers"

    Canon is warning users of home, office, and large-format inkjet printers that the Wi-Fi connection settings stored in the devices' memories are not wiped during initialization, enabling access to the data for others. This vulnerability could pose a security and privacy risk to affected users if the printer memory is extracted by repair technicians, temporary users, or future buyers of the devices, allowing them to get their Wi-Fi network's connection information. Depending on the model and configuration, the information stored in a Canon printer may include the network SSID, password, network type, assigned IP address, MAC address, and network profile. This sensitive Wi-Fi connection information could help a malicious third party gain unauthorized access to a Canon printer user's network to which the printer was connected. The attacker can then access shared resources, steal data, or execute other privacy-invading attacks exploiting additional vulnerabilities. This article continues to discuss the Wi-Fi security risks that arise when discarding inkjet printers.

    Bleeping Computer reports "Canon Warns of Wi-Fi Security Risks When Discarding Inkjet Printers"

  • news

    Visible to the public "China's APT31 Suspected in Attacks on Air-Gapped Systems in Eastern Europe"

    A nation-state actor with ties to China is believed to have been behind a series of attacks against industrial organizations in Eastern Europe that occurred last year in an attempt to steal data from air-gapped systems. Researchers attributed the attacks with medium to high confidence to a hacking group called APT31, also known as Bronze Vinewood, Judgement Panda, and Violet Typhoon (formerly Zirconium), based on similarities in the observed techniques. The attacks involved over 15 different implants and their variants, classified into three broad categories based on their ability to establish persistent remote access, collect sensitive information, and send the collected data to actor-controlled infrastructure. According to researchers, one of the implant types appeared to be a sophisticated modular malware designed to profile removable drives and infect them with a worm to exfiltrate data from air-gapped industrial networks in Eastern Europe. This article continues to discuss APT31 attacks targeting industrial organizations in Eastern Europe to siphon data stored on air-gapped systems.

    THN reports "China's APT31 Suspected in Attacks on Air-Gapped Systems in Eastern Europe"

  • news

    Visible to the public "China's Volt Typhoon APT Burrows Deeper Into US Critical Infrastructure"

    The US military has been dealing with two significant cyber threats, one being the Chinese campaign called Volt Typhoon against military bases, and the other being an insider breach impacting Air Force and FBI communications. The Biden administration has confirmed that Volt Typhoon's malware is far more widespread than previously believed. Responders have discovered it within many networks that control the communications, power, and water supplying US military bases. These networks also affect ordinary businesses and individuals. It is difficult for investigators to determine the complete scale of the infestation. The Chinese state-aligned Advanced Persistent Threat (APT) behind Volt Typhoon, also known as Vanguard Panda, came to light after Microsoft uncovered Chinese cyber activity in Guam, the location of a US military base strategically critical to Taiwan's defense against Chinese aggression. This article continues to discuss China's Volt Typhoon APT as well as the insider breach affecting Air Force and FBI communications.

    Dark Reading reports "China's Volt Typhoon APT Burrows Deeper Into US Critical Infrastructure"

  • news

    Visible to the public "A Repository of Common Penetration Testing Weaknesses"

    Marisa Midler and Samantha Chaves, penetration testers with the Carnegie Mellon Software Engineering Institute's (SEI) Computer Emergency Response Team (CERT), have introduced a repository of penetration testing findings that is now publicly accessible on GitHub. The findings refer to the vulnerabilities and weaknesses discovered during a penetration test. The penetration testing findings repository is a collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses uncovered during a penetration test. For each finding, the repository includes default names, descriptions, remediation recommendations, references, mappings to multiple frameworks, and severity ratings. Standardization, streamlined reporting, comprehensiveness, and ease of navigation are the key goals of this repository and its structure. This article continues to discuss the repository of penetration testing findings.

    Carnegie Mellon University Software Engineering Institute reports "A Repository of Common Penetration Testing Weaknesses"

  • news

    Visible to the public "ASU Researcher Bridges Security and AI"

    The many advancements in Artificial Intelligence (AI) show that the technology is critical. In the realm of national security, experts are taking note of the impact of AI on the collective defense strategy. Paulo Shakarian, an associate professor of computer science in the School of Computing and Augmented Intelligence, part of the Ira A. Fulton Schools of Engineering at Arizona State University, is at the forefront of this important work, using his expertise in symbolic AI and neuro-symbolic systems, which are advanced forms of AI technology, to meet the needs of national security organizations. He has been invited to AI Forward, a series of workshops hosted by the US Defense Advanced Research Projects Agency (DARPA). Shakarian is one of 100 participants working to advance DARPA's initiative to explore new directions for AI research impacting various defense-related tasks, such as autonomous systems, intelligence platforms, military planning, big data analysis, and computer vision. This article continues to discuss Shakarian's work and insights on AI and security as well as DARPA's AI Forward initiative.

    Arizona State University reports "ASU Researcher Bridges Security and AI"

  • news

    Visible to the public "No Evidence Ransomware Victims With Cyber Insurance Pay Up More Often, UK Report Says"

    According to new research on the role of the insurance industry in driving the criminal ecosystem, there is no "compelling evidence" that victims of ransomware attacks with cyber insurance are more likely to make extortion payments than those without insurance. This independent study, sponsored by the UK's National Cyber Security Centre (NCSC) and the Research Institute for Sociotechnical Cyber Security, addresses concerns that the cyber insurance industry helps cybercriminals by covering ransom payments. Researchers from the Royal United Services Institute, the University of Kent, De Montfort University, and Oxford Brookes University conducted the study. While there is evidence that cyber insurance policies exfiltrated during attacks are used as leverage in negotiations and to increase ransom demands, the conclusion that ransomware operators deliberately target organizations with insurance has been overstated, according to the study. This article continues to discuss findings from the study on the role of cyber insurance in addressing the threats posed by ransomware.

    The Record reports "No Evidence Ransomware Victims With Cyber Insurance Pay Up More Often, UK Report Says"

  • news

    Visible to the public "Google: 'Vulnerabilities Persist Too Long on Android'"

    Google has published its annual report regarding zero-day vulnerabilities. In the report, Google's Threat Analysis Group (TAG) notes that patches are often unavailable to Android users for too long. The research group discovered 41 zero-day vulnerabilities in the wild. As the developer of Android, Google controls its own patch policy, whereas many smartphone manufacturers release their own version of the operating system. Examples include Samsung's OneUI and Nothing's NothingOS, but numerous others exist. After each Android update, there may be some delay between the release of a patch for "vanilla" Android, such as that found on Pixel smartphones, and the release of patches for Android offshoots. Google does not identify a specific vendor whose parch policy is not in order. This article continues to discuss key findings and observations from Google in regard to zero-day vulnerabilities.

    Techzine reports "Google: 'Vulnerabilities Persist Too Long on Android'"

  • news

    Visible to the public "Administration Launches National Cyber Workforce and Education Strategy to Address Cyber Workforce Needs"

    The Biden-Harris Administration has unveiled the National Cyber Workforce and Education Strategy (NCWES) to address immediate and long-term cyber workforce needs. Filling the many cyber positions in the US is a national security imperative. The NCWES emphasizes the urgent need to fill a vast number of vacant cyber positions. Many communities that are presently underrepresented in the cyber workforce do not see themselves in cyber jobs or are unaware of the opportunity to join this critical and expanding workforce. The new strategy is committed to empowering Americans to pursue cyber careers. The NCWES follows the publication of the President's National Cybersecurity Strategy, which outlined a vision for developing a digital environment that is aligned with values and adequately resourced to address today's complex threat environment. This article continues to discuss the purpose and pillars of the NCWES.

    HSToday reports "Administration Launches National Cyber Workforce and Education Strategy to Address Cyber Workforce Needs"

  • news

    Visible to the public "Hackers Exploit BleedingPipe RCE to Target Minecraft Servers, Players"

    It has recently been discovered that hackers are actively exploiting a "BleedingPipe" remote code execution vulnerability in Minecraft mods to run malicious commands on servers and clients, allowing them to take control of the devices. BleedingPipe is a vulnerability found in many Minecraft mods caused by the incorrect use of deserialization in the "ObjectInputStream" class in Java to exchange network packets between servers and clients. The adversaries send specially crafted network packets to vulnerable Minecraft mod servers to take over the servers. The threat actors can then use those hacked servers to exploit the flaws in the same Minecraft mods used by players that connect to the server, allowing them to install malware on those devices as well. In a new report by a Minecraft security community (MMPA), the researchers have found that the flaw impacts many Minecraft mods running on 1.7.10/1.12.2 Forge, which uses unsafe deserialization code.

    BleepingComputer reports: "Hackers Exploit BleedingPipe RCE to Target Minecraft Servers, Players"

  • news

    Visible to the public "Android Malware Steals User Credentials Using Optical Character Recognition"

    Researchers have uncovered malicious Android apps that use optical character recognition to steal credentials displayed on smartphone screens. The malware, dubbed CherryBlos by Trend Micro security researchers, has been embedded in at least four Android apps available outside of Google Play, particularly on sites promoting money-making scams. One of the apps was available on Google Play for nearly a month without the malicious CherryBlos payload. The researchers also found suspicious apps created by the same developers on Google Play, but they did not contain the payload. The apps concealed their malicious functionality with great care. This article continues to discuss findings regarding the CherryBlos malware.

    Ars Technica reports "Android Malware Steals User Credentials Using Optical Character Recognition"

  • news

    Visible to the public "FBI Says AI Is Making It Easier for Hackers to Write Malware"

    The FBI has further emphasized that Artificial Intelligence (AI) helps nearly every aspect of cybercriminal activity, from development to deployment, and this trend is continuing. On a recent media call, an FBI official suggested that free, customizable open source models are gaining popularity among hackers attempting to spread malware, conduct phishing attacks, and carry out other scams. There has also been a significant increase in the number of AI writers created by hackers specifically to target vulnerable Internet users. Generative AI offers much assistance in launching cyberattacks, due to its powerful coding capabilities. Now that tens of models have been trained to write and fix code, malware development is more accessible to those who previously lacked the skill. The FBI and other organizations have also observed content creation tools being used to write phishing emails and develop malicious websites. In addition, with the introduction of multimodal models such as GPT-4, hackers can create convincing deepfakes to coerce victims into handing over sensitive information, payment, and more. This article continues to discuss the FBI's warning regarding cybercriminals using AI to create and launch attacks.

    TechRadar reports "FBI Says AI Is Making It Easier for Hackers to Write Malware"

  • news

    Visible to the public "Weintek Weincloud Vulnerabilities Allowed Manipulation, Damaging of ICS Devices"

    Security researchers at TXOne Networks have discovered that several vulnerabilities in a Weintek product could have been exploited to manipulate and damage industrial control systems (ICS). The security holes impact Taiwan-based Weintek's Weincloud, a cloud-based product designed for remotely managing human-machine interfaces (HMIs) and operations. According to a recent advisory published by CISA, the affected product is used by organizations worldwide, particularly in the critical manufacturing sector. Weintek patched the vulnerabilities with an account API update, and no action is required from users. The TXOne researchers confirmed that exploitation no longer appears possible. Four types of security holes have been found in Weintek Weincloud, three of which have been assigned "high severity" ratings. The researchers noted that one of them could have been exploited to reset an account's password by using the corresponding JWT token. Another issue could have been leveraged to log in with testing credentials to the official website by abusing the registration functionality. The third high-severity flaw could be used to cause a DoS condition. The fourth issue, classified as "medium severity," could have been exploited for brute-force attacks.

    SecurityWeek reports: "Weintek Weincloud Vulnerabilities Allowed Manipulation, Damaging of ICS Devices"

  • news

    Visible to the public "Hackers Threaten to Auction off DNA Patient Records From Oklahoma Hospital"

    The Karakurt ransomware group is targeting the McAlester Regional Health Center in Oklahoma, claiming to have stolen over 126 GB of data from the facility, including DNA patient records. Karakurt announced its plans to publish samples and auction 117 GB of the hospital's sensitive data. The group claims that this cache contains at least 40 GB of stolen genetic DNA patient records. According to a report from Nature Reviews Genetics, stolen genetic material can be used for malicious purposes, including blackmail and/or profiting through fake paternity results as well as revealing predispositions to disease and existing medical conditions that could affect employment prospects, insurance premiums, and more. The US Cybersecurity and Infrastructure Security Agency (CISA) first profiled the Karakurt gang in an advisory released in June 2022. The threat actors are suspected to be an offshoot of the Russian-affiliated Conti group, notorious for its double extortion tactics and aggressive nature. CISA reported that the group uses various tactics, techniques, and procedures (TTPs), posing significant defense and mitigation challenges. This article continues to discuss the Karakurt ransomware group threatening to auction off DNA patient records from the McAlester Regional Health Center.

    Cybernews reports "Hackers Threaten to Auction off DNA Patient Records From Oklahoma Hospital"

  • news

    Visible to the public "AVRecon Botnet Leveraging Compromised Routers to Fuel Illegal Proxy Service"

    TheAVRecon botnet has been observed using compromised small office/home office (SOHO) routers since at least May 2021 as part of a multi-year campaign. Lumen Black Lotus Labs disclosed AVRecon earlier this month as malware capable of executing additional commands and stealing a victim's bandwidth for an illegal proxy service offered to other malicious actors. It has also surpassed QakBot in scale, having infiltrated more than 41,000 nodes in 20 countries. The malware has been used to establish residential proxy services to hide malicious activity, including password spraying, web-traffic proxying, and ad fraud. According to new research, AVRecon is the malware engine behind SocksEscort, a 12-year-old service that rents compromised residential and small business devices to cybercriminals seeking to cover their true location online. The connection is based on direct correlations between SocksEscort and the command-and-control (C2) servers of AVRecon. This article continues to discuss new findings regarding the AVRecon botnet.

    THN reports "AVRecon Botnet Leveraging Compromised Routers to Fuel Illegal Proxy Service"

  • news

    Visible to the public "Linux Version of Abyss Locker Ransomware Targets VMware ESXi Servers"

    The Abyss Locker operation has developed a Linux encryptor that targets VMware's ESXi Virtual Machine (VM) platform for enterprise-level attacks. As businesses migrate from individual servers to VMs for improved resource management, performance, and disaster recovery, ransomware groups develop encryptors that are specifically designed to target the platform. Considering that VMware ESXi is one of the most widely-used VM platforms, nearly every ransomware group has begun releasing Linux encryptors to encrypt all virtual servers on a device. Other ransomware operations that use Linux ransomware encryptors include Akira, Royal, Black Basta, LockBit, BlackMatter, AvosLocker, REvil, Hello Kitty, RansomEXX, and Hive, with most targeting VMware ESXi. This article continues to discuss the Linux version of Abyss Locker ransomware.

    Bleeping Computer reports "Linux Version of Abyss Locker Ransomware Targets VMware ESXi Servers"

  • news

    Visible to the public "Web Browsing Is the Primary Entry Vector for Ransomware Infections"

    Researchers at Palo Alto Networks discovered that in 2022, the most widely used ransomware delivery method was URL or web browsing. In 2021, it was email attachments (i.e., delivery via SMTP, POP3, and IMAP protocols), but in 2022, only 12 percent of attempts used this particular delivery channel. In 8.2 percent of ransomware infections recorded by the company in 2022, the primary entry vector was third-party applications. Palo Alto Networks has been tracking and analyzing ransomware-hosting URLs and hostnames. Based on a large, random sample (7,000 URLs out of 27,000 unique ones), they identified several techniques used by ransomware groups to prevent their websites from being identified, taken down, or blocked. The perpetrators have been observed rotating different URLs/hostnames to host the same ransomware or using the same URL to deliver different ransomware. Some attackers engage in both of these tactics. This article continues to discuss key findings regarding ransomware delivery URLs.

    Help Net Security reports "Web Browsing Is the Primary Entry Vector for Ransomware Infections"

  • news

    Visible to the public "Another AI Pitfall: Digital Mirroring Opens New Cyberattack Vector"

    "Digital twins" or Artificial Intelligence (AI) assistants trained to serve needs by learning about and, in some ways imitating users, can be turned against people in various ways. According to Ben Sawyer, a professor at the University of Central Florida, and Matthew Canham, the CEO of Beyond Layer Seven, despite the uproar over how Large Language Models (LLMs) will allow hackers to create increasingly sophisticated phishing emails, vishing calls, and bots, this type of activity is nothing new. There is already much discussion regarding the insecurity of LLMs, as both researchers and attackers experiment with breaking and manipulating them. Today's social engineering attacks rely on an attacker's ability to closely imitate familiar entities such as coworkers or brands. Sawyer and Canham believe that the future of social engineering will be defined by AI's ability to imitate people and manipulate subconscious preferences. This article continues to discuss how LLMs can be hacked as well as the use of AI to build digital personas to make it easier for malicious actors to create more convincing attacks.

    Dark Reading reports "Another AI Pitfall: Digital Mirroring Opens New Cyberattack Vector"

  • news

    Visible to the public "Pacific Northwest National Laboratory and The University of Texas at El Paso Collaborate to Strengthen Data Protection"

    Researchers are collaborating to enhance the privacy and security of sensitive data that may include Personally Identifiable Information {PII). Tony Chiang, Data Scientist at Pacific Northwest National Laboratory (PNNL), and Amy Wagler, Professor of Mathematical and Computational Sciences at the University of Texas at El Paso (UTEP), are leading the project. Data privacy and sharing remain a persistent challenge in today's technologically advanced world. The PNNL and UTEP project team wants to protect data from security breaches by creating a Generative Adversarial Network (GAN), or Machine Learning (ML) model, in which two neural networks compete using deep learning techniques to make more accurate predictions. The GAN will use synthetic data instead of real data. The model's discriminators will be incapable of distinguishing between the two data sets, making it impossible to identify and differentiate sensitive data from synthetic data, which is crucial in industries that deal with sensitive data, such as healthcare. This article continues to discuss the PNNL and UTEP project aimed at strengthening the protection of sensitive data.

    Pacific Northwest National Laboratory reports "Pacific Northwest National Laboratory and The University of Texas at El Paso Collaborate to Strengthen Data Protection"

  • news

    Visible to the public "Improving Cybersecurity: New Ways to Protect Data"

    Nektarios Tsoutsos, an assistant professor in the Department of Electrical and Computer Engineering in the College of Engineering at the University of Delaware, is developing new methods to protect data when cloud services are compromised. With support from the Faculty Early Career Development (CAREER) Program of the National Science Foundation (NSF), Tsoutsos will develop advanced cryptographic algorithms and programming strategies to protect user information for various applications. Tsoutsos and his lab will accelerate end-to-end encryption algorithm development to be simpler, usable, and easily integrated into existing computer programming paradigms. A part of the CAREER award will be used to advance Tsoutsos' work on homomorphic encryption, which enables end-to-end encryption in a way that allows data to be processed and analyzed without compromising its security. The initial work will focus on encrypted Machine Learning (ML) so that users can securely send their data to the cloud for complex analysis. This article continues to discuss Tsoutsos' work on developing advanced cryptographic algorithms and programming strategies to help safeguard user information.

    The University of Delaware reports "Improving Cybersecurity: New Ways to Protect Data"

  • news

    Visible to the public "Impact of Password Management Strategies on the Trust Enhancement in the Digital Era"

    According to research published in the International Journal of Business Performance Management, password management strategies can boost trust in digital services. The most significant barrier to password management is a lack of awareness among potential users, despite campaigns emphasizing the importance of using strong passwords for logins and not reusing passwords. The research is a call to action for digital service providers to encourage user adoption of a robust password management strategy. Nitin Bansal of the SBI School of Banking and Commerce and Krishna Nath Pandey of the Sunrise University, both in Rajasthan, India, surveyed over 400 individuals in the National Capital Region (NCR) of India to examine the adoption of digital services, security concerns, and how those who use digital services manage their logins and passwords. The survey found that people are becoming more willing to use digital services, but security concerns often prevent them from doing so. The research suggests that password management education can increase user trust and usage. This article continues to discuss the study on the impact of password management strategies on trust enhancement in the digital era.

    Inderscience reports "Impact of Password Management Strategies on the Trust Enhancement in the Digital Era"

  • news

    Visible to the public "Research Shows That Business Continuity Response Measures Are Not Keeping Pace With Cyber Threats"

    New research commissioned by Cohesity reveals that most businesses lack the cyber resilience strategies and data security capabilities necessary to address today's escalating cyber threats and maintain business continuity. In addition, cyber resilience efforts are not keeping up with cyber threats, as data security and recovery technology deficiencies reduce cyber insurance eligibility and amplify the repercussions of a successful cyberattack. Comparing the cybersecurity outlook for 2023 to 2022, 93 percent of respondents felt that ransomware attacks posed a greater threat to their industry in 2023. Nearly half of respondents (45 percent) said their company had fallen victim to a ransomware attack within the previous six months. Eighty percent are concerned about their organization's cyber resilience strategy and whether or not it can address cyber challenges and threats. When asked how long their organization would take to recover data and business processes after a cyberattack, over 95 percent of respondents said it would take longer than 24 hours, 71 percent said longer than four days, and 41 percent said longer than a week. This article continues to discuss key findings from the survey of 3,409 Information Technology (IT) and Security Operations (SecOps) decision-makers.

    Continuity Central reports "Research Shows That Business Continuity Response Measures Are Not Keeping Pace With Cyber Threats"

  • news

    Visible to the public "Field Campaign Assesses Vulnerabilities of 5G Networks"

    A team from the MIT Lincoln Laboratory traveled to Hill Air Force Base (AFB) near Salt Lake City, Utah, to assess the vulnerabilities of 5G networks. Fifth-generation, or 5G, mobile network technology is designed to provide higher data rates, ultralow latency, enhanced reliability, expanded configurability, increased network capacity, and connectivity between a greater number of users. The US Department of Defense (DOD) wants to incorporate these commercial advancements into their communications systems, but 5G lacks adequately robust security features. For military applications, wireless connectivity makes communications susceptible to unintended detection (i.e., identifying the presence of signals), unwarranted geolocation (i.e., determining the origin of signals), and intentional jamming (i.e., preventing the transmission and reception of signals). Before the DOD can fully leverage 5G technology, vulnerabilities in networking must be identified, quantified, and mitigated. This article continues to discuss the Lincoln Laboratory team assessing the vulnerabilities of 5G and developing potential solutions to make this technology resilient.

    MIT Lincoln Laboratory reports "Field Campaign Assesses Vulnerabilities of 5G Networks"

  • news

    Visible to the public "University of Rochester Updates Investigation Into Data Breach"

    On Tuesday, the University of Rochester sent an update to faculty, students, and staff regarding a June data breach impacting dozens of organizations through a third-party vendor MOVEit. A spokesperson from the University of Rochester stated that after an investigation, they determined the university's broad network security was not impacted. UR Medicine's eRecord, MyChart, and clinical applications were also secure. The spokesperson noted that the data breach may have exposed some of the personal information of students and employees, along with their spouses, domestic partners, and dependents. The university says all individuals directly impacted by the breach will receive a letter in the mail detailing the exact data that was compromised. The letters will be mailed no later than the week of July 31. The University of Rochester is also offering two years of free credit monitoring to anyone whose personal data was found to be compromised by the cybersecurity incident.

    WROC Rochester reports: "University of Rochester Updates Investigation Into Data Breach"

  • news

    Visible to the public "Sandia Helps Develop Digital Tool to Track Cloud Hackers"

    Sandia programmers are helping the US Cybersecurity and Infrastructure Security Agency (CISA) in its hunt for hackers and cyber terrorists through an innovative program that enlists Microsoft cloud users worldwide. In March, Untitled Goose Tool was announced via a CISA alert. Wellington Lee, a Sandia cybersecurity expert, was part of the team that created the free tool for tracking potentially malicious activities in Microsoft Azure, Azure Active Directory, and Microsoft Office 365 environments. Untitled Goose Tool is a suite of data collection tools capable of quickly scouring a virtual storage space for signs of a potentially malicious user accessing the data, collecting data on how they accessed the cloud space, and returning the data to CISA's security experts for assessment. This article continues to discuss the new toolset developed to quickly analyze and isolate unusual data in cloud computing environments.

    Sandia National Laboratories reports "Sandia Helps Develop Digital Tool to Track Cloud Hackers"

  • news

    Visible to the public "Cryptography May Offer a Solution to the Massive AI-Labeling Problem"

    The European Union (EU) will soon require some technology platforms to label their Artificial Intelligence (AI)-generated images, audio, and videos with "prominent markings" showing their synthetic origins. In addition, the White House wants major AI companies to disclose when their content was created using AI. However, identifying material created by AI is a significant technical challenge. According to researchers, the best available options, such as AI-powered detection tools and watermarking, are inconsistent, temporary, and occasionally inaccurate. C2PA is another approach that has recently garnered much interest. It is a relatively new open source Internet protocol that uses cryptography to encode information about the origins of a piece of content, or "provenance" information. The creators of C2PA compare the protocol to a nutrition label, except that it reveals the origin of the content and who or what created it. The project, which is part of the nonprofit Joint Development Foundation, was initiated by Adobe, Arm, Intel, Microsoft, and Truepic, who formed the Coalition for Content Provenance and Authenticity (from which the protocol gets its name). This article continues to discuss what C2PA is and how it is being used.

    MIT Technology Review reports "Cryptography May Offer a Solution to the Massive AI-Labeling Problem"

  • news

    Visible to the public "Zimbra Patches Exploited Zero-Day Vulnerability"

    Zimbra recently released patches for a cross-site scripting (XSS) vulnerability in Collaboration Suite that has been exploited in malicious attacks. The vulnerability is tracked as CVE-2023-37580 and was disclosed earlier this month when Zimbra recommended manual patching for version 8.8.15 of the popular email and collaboration solution. No CVE identifier had been issued for the flaw at the time, but Clement Lecigne from Google's Threat Analysis Group (TAG) said that in-the-wild exploitation had been observed. Zimbra recently announced software updates for Zimbra Collaboration Suite versions 8.8.15, 9.0.0, and 10.0.x. A fix for the exploited security bug was included in version 8.8.15 patch 41 of the solution. The company noted that the update resolves two other vulnerabilities in the suite, namely CVE-2023-38750, an issue leading to the exposure of internal JSP and XML files, and CVE-2023-0464, a bug "related to the verification of X.509 certificate chains that include policy constraints" in OpenSSL. Patches for the last two flaws were also included in the Zimbra Collaboration Suite versions 10.0.2 and 9.0.0 patch 34. CVE-2023-37580, however, only impacts version 8.8.15 of the solution.

    SecurityWeek reports: "Zimbra Patches Exploited Zero-Day Vulnerability"

  • news

    Visible to the public "North Korean Hackers Bag Another $100m in Crypto Heists"

    North Korea's infamous Lazarus hacking group has been linked to two new attacks on cryptocurrency firms which led to the theft of nearly $100m in virtual currency. CoinsPaid said in an update this week that $37.3m was stolen from the firm. The company claimed that despite the multimillion-dollar loss, customer funds remained intact, although it admitted that the platform's availability had suffered. Lazarus was also linked to an even bigger raid on crypto payments provider Alphapo last Sunday. Blockchain experts explained that Alphapo hot wallets had initially been drained of $23m in Ethereum, Tron, and Bitcoin. However, the experts updated that original estimate days later, revealing that an additional $37m in Tron and Bitcoin was found missing, bringing the total to $60m.

    Infosecurity reports: "North Korean Hackers Bag Another $100m in Crypto Heists"

  • news

    Visible to the public "Researchers Discover New Vulnerability in Large Language Models"

    Large Language Models (LLMs) apply deep learning techniques to process and generate text. This Artificial Intelligence (AI) technology has resulted in the development of open source and publicly accessible tools, such as ChatGPT, Claude, Google Bard, and more. Recent work has focused on aligning LLMs to prevent undesirable generation. For example, public chatbots will not generate inappropriate content if asked directly. Although attackers have been able to evade these measures, their strategy often requires significant human creativity, and the results have been found to be inconsistent. Researchers from the School of Computer Science (SCS) at Carnegie Mellon University (CMU), the CyLab Security and Privacy Institute, and the Center for AI Safety in San Francisco have discovered a new vulnerability, proposing a simple and effective attack method that can cause aligned LLMs to generate objectionable behaviors with a high success rate. In their study titled "Universal and Transferable Attacks on Aligned Language Models," CMU Associate Professors Matt Fredrikson and Zico Kolter, Ph.D. student Andy Zou, and CMU alum Zifan Wang discovered a suffix that, when attached to a wide range of queries, significantly increases the chance that both open and closed source LLMs will deliver affirmative responses to queries they would otherwise reject. This article continues to discuss the vulnerability found in LLMs.

    CyLab reports "Researchers Discover New Vulnerability in Large Language Models"

  • news

    Visible to the public "New Cybersecurity Advisory Warns About Web Application Vulnerabilities"

    The National Security Agency (NSA) collaborated with US and international cyber agencies to issue the Cybersecurity Advisory (CSA) titled "Preventing Web Application Access Control Abuse," which warns that vulnerabilities in web applications, including Application Programming Interfaces (APIs), may enable malicious actors to manipulate and access sensitive data. The partnering agencies, which include the Australian Cyber Security Centre (ACSC), the US Cybersecurity and Infrastructure Security Agency (CISA), and the NSA, provide vendors, designers, developers, and consumer organizations with guidance to mitigate Insecure Direct Object Reference (IDOR) vulnerabilities in web applications. IDOR vulnerabilities are web application access control flaws that allow malicious actors to modify, delete, or access sensitive data. The exploitation of these vulnerabilities could affect any web application, including those deployed in Software-as-a-Service (SaaS) used for cloud applications, private cloud models proprietary to the organization's infrastructure, and others. This article continues to discuss the CSA on preventing the abuse of access control vulnerabilities in web applications.

    NSA reports "New Cybersecurity Advisory Warns About Web Application Vulnerabilities"

  • news

    Visible to the public "Hackers Abusing Windows Search Feature to Install Remote Access Trojans"

    Hackers could exploit a legitimate Windows search feature to download arbitrary payloads from remote servers and compromise targeted systems with Remote Access Trojans (RATs) such as AsyncRAT and Remcos RAT. According to Trellix, the novel attack technique makes use of the "search-ms:" URI protocol handler, which allows applications and HTML links to launch custom local searches on a device. The technique also involves the "search:" application protocol, which is a mechanism for calling the desktop search application on Windows. Attackers are directing users to websites that exploit the 'search-ms' functionality through JavaScript on the page. This technique has been expanded to include HTML attachments. In such attacks, threat actors have been observed crafting deceptive emails with embedded hyperlinks or HTML attachments containing URLs redirecting users to compromised websites. This causes the execution of JavaScript that uses the URI protocol handlers to perform searches on a server under the attacker's control. This article continues to discuss the abuse of a legitimate Windows search feature by hackers to install RATs.

    THN reports "Hackers Abusing Windows Search Feature to Install Remote Access Trojans"

  • news

    Visible to the public "WordPress Ninja Forms Plugin Flaw Lets Hackers Steal Submitted Data"

    Three vulnerabilities in the popular WordPress form-building plugin Ninja Forms could enable attackers to escalate privileges and steal user data. Patchstack disclosed the three vulnerabilities to the plugin's developer, Saturday Drive, warning that they affect NinjaForms versions 3.6.25 and older. In response, the developer released version 3.6.26 to address the vulnerabilities. However, only about half of NinjaForms users have downloaded the most recent version, leaving around 400,000 websites vulnerable to attack. The first flaw discovered by Patchstack is a POST-based reflected cross-site scripting (XSS) vulnerability that allows unauthenticated users to escalate their privileges and steal information by tricking privileged users into visiting a specially-crafted webpage. The second and third vulnerabilities are access control issues on the plugin's form submissions export feature, allowing Subscribers and Contributors to export all the data users have submitted on a vulnerable WordPress site. This article continues to discuss the three vulnerabilities contained by the popular WordPress Ninja Forms plugin.

    Bleeping Computer reports "WordPress Ninja Forms Plugin Flaw Lets Hackers Steal Submitted Data"

  • news

    Visible to the public "Blocking Access to ChatGPT Is a Short Term Solution to Mitigate Risk"

    According to Netskope, for every 10,000 enterprise users, an enterprise organization faces around 183 incidents of sensitive data being posted to ChatGPT per month. Source code makes up the largest share of exposed sensitive data. Based on data from millions of enterprise users worldwide, researchers discovered that the use of generative Artificial Intelligence (AI) apps has increased by 22.5 percent over the past two months, thus increasing the likelihood of users disclosing sensitive information. Source code is posted to ChatGPT more frequently than any other form of sensitive data, according to Netskope. Other sensitive data shared in ChatGPT includes regulated data, such as financial data, healthcare data, and Personally Identifiable Information (PII). This article continues to discuss ChatGPT dominating the generative AI market, the AI chatbot being prone to source code exposure, and the safe adoption of AI apps.

    Help Net Security reports "Blocking Access to ChatGPT Is a Short Term Solution to Mitigate Risk"

  • news

    Visible to the public "Despite Post-Log4J Security Gains, Developers Can Still Improve"

    Developers are increasingly implementing security testing as part of the development pipeline. However, there is still room for improvement as only a minority of companies test software during development or before committing code. According to Snyk's annual 2023 State of Software Supply Chain Security report, while two-thirds of companies have security tools integrated into their software development systems, only 40 percent of firms have deployed security checks into the Integrated Development Environment (IDE), and 48 percent as part of the code committing stage. Forty percent of companies do not use supply chain technologies, such as a Static Analysis Security Tool (SAST) or a Software Composition Analysis (SCA) tool. According to Randall Degges, head of developer relations at Snyk, developers should perform at least three types of scans. They should scan custom code with SAST, check open source dependencies with an SCA tool, and analyze infrastructure files to detect insecure configuration. This article continues to discuss key findings and points from Snyk's annual 2023 State of Software Supply Chain Security report.

    Dark Reading reports "Despite Post-Log4J Security Gains, Developers Can Still Improve"

  • news

    Visible to the public "New Study Reveals Insights Into Insider Computer Abuse and Organizational Security"

    Insider Computer Abuse (ICA), also known as the unauthorized and intentional misuse of organizational information resources by insiders, remains a significant threat to the security of organizational information systems. Recent studies have shown that many employees would share confidential or regulated information under certain circumstances, despite efforts to discourage and penalize such behavior. In addition, a considerable number of security breaches involve insiders. These findings indicate that current security measures, which rely primarily on deterrence-based sanctions, are ineffective in addressing the ICA problem. A recent study titled "Going Beyond Deterrence: A Middle-Range Theory of Motives and Controls for Insider Computer Abuse," published by Information Systems Research, addressed the ongoing issue of ICA. The study aims to gain further insight into insiders' motivations and the controls that impact their behavior. The team behind the study proposed a middle-range theory of ICA, emphasizing the inherent tensions between insider motivations and organizational controls. They identified two types of personal motives that help explain why insiders may engage in ICA. This article continues to discuss insights from the study on ICA and organizational security.

    Louisiana State University reports "New Study Reveals Insights Into Insider Computer Abuse and Organizational Security"

  • news

    Visible to the public "Keeping Emergency Field Hospitals Cyber Secure"

    Field hospitals and emergency response Information Technology (IT) infrastructure are confronted with the same cybersecurity challenges as any other IT infrastructure, but the consequences can be fatal. Hackers and scammers attempting to exploit vulnerabilities during an emergency can disrupt critical healthcare services. Research in the International Journal of Emergency Management examines the growing concerns regarding the cybersecurity of medical devices, health data, and healthcare infrastructure as a whole. A team of researchers emphasizes that cyber threat actors target healthcare systems partly due to the invaluable data they hold. Weak defenses in these critical systems allow for unauthorized access and potential harm, such as launching ransomware or violating patient and healthcare worker privacy for monetary gain. The group highlights the need for immediate action to strengthen cybersecurity measures in field hospitals and emergency response operations. Advanced security technologies, regular vulnerability audits, and employee cybersecurity training require investment. This article continues to discuss key points from the study on the cybersecurity challenges faced by field hospitals.

    Inderscience reports "Keeping Emergency Field Hospitals Cyber Secure"

  • news

    Visible to the public "Researchers Demonstrate 'Unconditionally Secure' Quantum Digital Payments"

    New research from the University of Vienna may soon enable a completely secure, unhackable, and private digital payment system. In a recently published paper titled "Demonstration of quantum-digital payments," a team of researchers from the Vienna Center for Quantum Science and Technology demonstrated what may be the first "unconditionally secure" digital transaction system based on quantum mechanics. The researchers accomplished this by encrypting a payment transaction using a pair of quantum entangled photons. Through this entanglement, in which any change in the state of one photon is reflected in the state of the other photon, even when separated by distance, the researchers were able to ensure that the very nature of quantum mechanics thwarts any attempts to modify the transaction. This article continues to discuss the research on the first unconditionally secure digital transaction system.

    Cointelegraph reports "Researchers Demonstrate 'Unconditionally Secure' Quantum Digital Payments"

  • news

    Visible to the public "Concerns Grow about MFA Bypass Attacks"

    Multi-factor authentication (MFA) involves authentication factors such as passwords, fingerprints, and smartphones to secure systems and data. Security experts encourage consumers and organizations to adopt MFA, because it is more difficult for hackers to gain unauthorized access to systems when multiple authentication factors are required. However, cybercriminals are increasingly evading MFA with specially designed attacks. In February, Reddit discovered that its employees had been phished via email, which tricked them into providing the cybercriminals with their MFA credentials. According to James Quick, director of solutions and advisory for the Identity and Access Management (IAM) company Simeio, the attackers used convincing prompts directing employees to a website mimicking Reddit's intranet gateway. When employees entered their credentials and second-factor tokens, the criminals were able to gain access to the organization. MFA bypass attacks are increasing. Sapphire Cybersecurity reported that there were 40,942 MFA fatigue attacks in August 2022. Hackers have used MFA bypass techniques such as man-in-the-middle (MitM) attacks, MFA bypass phishing kits, stolen browser session cookies, MFA fatigue, and malicious OAuth applications. This article continues to discuss growing concerns regarding MFA bypass attacks.

    CACM reports "Concerns Grow about MFA Bypass Attacks"

  • news

    Visible to the public "This New Tool Could Protect Your Pictures From AI Manipulation"

    People can take a photo posted online and edit it with advanced generative Artificial Intelligence (AI) systems for malicious purposes. Due to the sophistication of these systems, it may be impossible to prove that the resulting image is fake. However, a new tool developed by MIT researchers called PhotoGuard could prevent this. It serves as a protective shield by altering photos in small invisible ways that prevent them from being manipulated. If someone attempts to use editing software based on a generative AI model such as Stable Diffusion to manipulate an image "immunized" by PhotoGuard, the result will appear unrealistic or warped. PhotoGuard addresses the issue of malicious image manipulation by these models. Discovering ways to detect and stop AI-powered manipulation has never been more important, as generative AI tools have made it faster and easier than ever before. In a voluntary pledge with the White House, major AI companies such as OpenAI, Google, and Meta committed to developing such methods to combat fraud and deception. PhotoGuard is a complementary technique to watermarking. This article continues to discuss the PhotoGuard tool created by researchers at MIT.

    MIT Technology Review reports "This New Tool Could Protect Your Pictures From AI Manipulation"

  • news

    Visible to the public Pub Crawl #76


    Pub_Crawl_web.jpgPub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers.

  • news

    Visible to the public "New Smartphone Vulnerability Discovered by Northeastern Ph.D. Student Reveals Hackers Could Track Your Location"

    According to Evangelos Bitsikas, a Ph.D. student at Northeastern University, a recently discovered vulnerability in text messaging may allow attackers to track a user's location. His research team found the flaw by applying a sophisticated Machine Learning (ML) program to data extracted from the relatively primitive SMS system that has dominated mobile phone texting since the 1990s. Bitsikas, who will formally present his research at the 32nd USENIX Security Symposium, explains that it is possible to locate a victim simply by knowing their phone number and having normal network access. Eventually, this leads to the user's global location being tracked. Bitsikas says that SMS security has marginally improved since its initial creation for 2G systems 30 years ago. When a user receives a text message, their phone automatically responds with a notification to the sender, which is essentially a delivery receipt. A hacker would send multiple text messages to the user's phone through Bitsikas' method. The timing of their automated delivery replies would allow the hacker to triangulate their location, regardless of whether the user's communications are encrypted. This article continues to discuss the possibility of hackers using ML to exploit a text messaging vulnerability.

    Northeastern University reports "New Smartphone Vulnerability Discovered by Northeastern Ph.D. Student Reveals Hackers Could Track Your Location"

  • news

    Visible to the public "8 Million People Hit by Data Breach at US Govt Contractor Maximus"

    U.S. government services contractor Maximus has recently disclosed a data breach warning that hackers stole the personal data of 8 to 11 million people during the recent MOVEit Transfer data-theft attacks. Maximus is a contractor that manages and administers U.S. government-sponsored programs, including federal and local healthcare programs and student loan servicing. The company employs 34,300 people and has an annual revenue of about $4.25 billion, with a presence in the U.S., Canada, Australia, and the United Kingdom. After investigating the breach, Maximus found no indication that the hackers progressed further than the MOVEit environment, which the company noted was immediately isolated from the rest of the corporate network. However, this limited access was enough to compromise a large number of individuals to whom the firm is now sending data breach notifications. The company stated that based on the review of impacted files to date, they believe those files contain personal information, including social security numbers, protected health information, and/or other personal information, of at least 8 to 11 million individuals to whom the company anticipates providing notice of the incident. Maximus currently plans to record an expense of approximately $15 million for the quarter ending on June 30, 2023, representing the company's best estimate of the total cost of the investigation and remediation activities related to the incident.

    BleepingComputer reports: "8 Million People Hit by Data Breach at US Govt Contractor Maximus"

  • news

    Visible to the public "Akira Ransomware Compromised at Least 63 Victims Since March, Report Says"

    According to researchers at the cybersecurity company Arctic Wolf, the recently discovered Akira ransomware actively targets small and medium-sized businesses (SMBs) worldwide, with the US and Canada as its primary targets. Since its discovery in March 2023, Akira has compromised at least 63 victims. The researchers also discovered additional evidence connecting the Akira group to threat actors affiliated with the infamous ransomware Conti operation. Arctic Wolf analyzed cryptocurrency transactions related to Akira and Conti and found that in at least three different transactions, Akira threat actors sent their ransom payments in full to Conti-affiliated addresses. When cryptocurrency wallets overlap in this manner, it suggests that the individual behind the address or wallet has either splintered off from the original group or is working with another group simultaneously, Arctic Wolf noted. Researchers observed that Akira is offered as a Ransomware-as-a-Service (RaaS), suggesting that the group responsible for maintaining the code may not be responsible for every attack. This article continues to discuss the Akira ransomware.

    The Record reports "Akira Ransomware Compromised at Least 63 Victims Since March, Report Says"

  • news

    Visible to the public "'Call of Duty' Players Are Being Hit With Self-Spreading Malware"

    Hackers are targeting Call of Duty players with a massive malware push that can self-replicate and spread through the game's multiplayer lobbies. The malware infection appears to have been sufficient for Activision to take the game offline. Some members of the Steam community attempted to examine the malware, which was discovered to have a match in Virus Total's database. Based on the findings, the malware appears to be a worm that exploits security flaws in the application's code. That ability enables it to evade traditional protections against code injection. Once the malware infects a lobby, it can run localized code on the machines of the users accessing that session. Currently, malware infections have only been reported for the 2009-launched Modern Warfare II. However, given that different Call of Duty games released around 2009 are likely to share most of the same multiplayer code, other games in the series may be vulnerable to the exploit. This article continues to discuss hackers' recent targeting of Call of Duty players.

    Tom's Hardware reports "'Call of Duty' Players Are Being Hit With Self-Spreading Malware"