News Items

  • news

    Visible to the public "WordPress Ninja Forms Plugin Flaw Lets Hackers Steal Submitted Data"

    Three vulnerabilities in the popular WordPress form-building plugin Ninja Forms could enable attackers to escalate privileges and steal user data. Patchstack disclosed the three vulnerabilities to the plugin's developer, Saturday Drive, warning that they affect NinjaForms versions 3.6.25 and older. In response, the developer released version 3.6.26 to address the vulnerabilities. However, only about half of NinjaForms users have downloaded the most recent version, leaving around 400,000 websites vulnerable to attack. The first flaw discovered by Patchstack is a POST-based reflected cross-site scripting (XSS) vulnerability that allows unauthenticated users to escalate their privileges and steal information by tricking privileged users into visiting a specially-crafted webpage. The second and third vulnerabilities are access control issues on the plugin's form submissions export feature, allowing Subscribers and Contributors to export all the data users have submitted on a vulnerable WordPress site. This article continues to discuss the three vulnerabilities contained by the popular WordPress Ninja Forms plugin.

    Bleeping Computer reports "WordPress Ninja Forms Plugin Flaw Lets Hackers Steal Submitted Data"

  • news

    Visible to the public "Blocking Access to ChatGPT Is a Short Term Solution to Mitigate Risk"

    According to Netskope, for every 10,000 enterprise users, an enterprise organization faces around 183 incidents of sensitive data being posted to ChatGPT per month. Source code makes up the largest share of exposed sensitive data. Based on data from millions of enterprise users worldwide, researchers discovered that the use of generative Artificial Intelligence (AI) apps has increased by 22.5 percent over the past two months, thus increasing the likelihood of users disclosing sensitive information. Source code is posted to ChatGPT more frequently than any other form of sensitive data, according to Netskope. Other sensitive data shared in ChatGPT includes regulated data, such as financial data, healthcare data, and Personally Identifiable Information (PII). This article continues to discuss ChatGPT dominating the generative AI market, the AI chatbot being prone to source code exposure, and the safe adoption of AI apps.

    Help Net Security reports "Blocking Access to ChatGPT Is a Short Term Solution to Mitigate Risk"

  • news

    Visible to the public "Despite Post-Log4J Security Gains, Developers Can Still Improve"

    Developers are increasingly implementing security testing as part of the development pipeline. However, there is still room for improvement as only a minority of companies test software during development or before committing code. According to Snyk's annual 2023 State of Software Supply Chain Security report, while two-thirds of companies have security tools integrated into their software development systems, only 40 percent of firms have deployed security checks into the Integrated Development Environment (IDE), and 48 percent as part of the code committing stage. Forty percent of companies do not use supply chain technologies, such as a Static Analysis Security Tool (SAST) or a Software Composition Analysis (SCA) tool. According to Randall Degges, head of developer relations at Snyk, developers should perform at least three types of scans. They should scan custom code with SAST, check open source dependencies with an SCA tool, and analyze infrastructure files to detect insecure configuration. This article continues to discuss key findings and points from Snyk's annual 2023 State of Software Supply Chain Security report.

    Dark Reading reports "Despite Post-Log4J Security Gains, Developers Can Still Improve"

  • news

    Visible to the public "New Study Reveals Insights Into Insider Computer Abuse and Organizational Security"

    Insider Computer Abuse (ICA), also known as the unauthorized and intentional misuse of organizational information resources by insiders, remains a significant threat to the security of organizational information systems. Recent studies have shown that many employees would share confidential or regulated information under certain circumstances, despite efforts to discourage and penalize such behavior. In addition, a considerable number of security breaches involve insiders. These findings indicate that current security measures, which rely primarily on deterrence-based sanctions, are ineffective in addressing the ICA problem. A recent study titled "Going Beyond Deterrence: A Middle-Range Theory of Motives and Controls for Insider Computer Abuse," published by Information Systems Research, addressed the ongoing issue of ICA. The study aims to gain further insight into insiders' motivations and the controls that impact their behavior. The team behind the study proposed a middle-range theory of ICA, emphasizing the inherent tensions between insider motivations and organizational controls. They identified two types of personal motives that help explain why insiders may engage in ICA. This article continues to discuss insights from the study on ICA and organizational security.

    Louisiana State University reports "New Study Reveals Insights Into Insider Computer Abuse and Organizational Security"

  • news

    Visible to the public "Keeping Emergency Field Hospitals Cyber Secure"

    Field hospitals and emergency response Information Technology (IT) infrastructure are confronted with the same cybersecurity challenges as any other IT infrastructure, but the consequences can be fatal. Hackers and scammers attempting to exploit vulnerabilities during an emergency can disrupt critical healthcare services. Research in the International Journal of Emergency Management examines the growing concerns regarding the cybersecurity of medical devices, health data, and healthcare infrastructure as a whole. A team of researchers emphasizes that cyber threat actors target healthcare systems partly due to the invaluable data they hold. Weak defenses in these critical systems allow for unauthorized access and potential harm, such as launching ransomware or violating patient and healthcare worker privacy for monetary gain. The group highlights the need for immediate action to strengthen cybersecurity measures in field hospitals and emergency response operations. Advanced security technologies, regular vulnerability audits, and employee cybersecurity training require investment. This article continues to discuss key points from the study on the cybersecurity challenges faced by field hospitals.

    Inderscience reports "Keeping Emergency Field Hospitals Cyber Secure"

  • news

    Visible to the public "Researchers Demonstrate 'Unconditionally Secure' Quantum Digital Payments"

    New research from the University of Vienna may soon enable a completely secure, unhackable, and private digital payment system. In a recently published paper titled "Demonstration of quantum-digital payments," a team of researchers from the Vienna Center for Quantum Science and Technology demonstrated what may be the first "unconditionally secure" digital transaction system based on quantum mechanics. The researchers accomplished this by encrypting a payment transaction using a pair of quantum entangled photons. Through this entanglement, in which any change in the state of one photon is reflected in the state of the other photon, even when separated by distance, the researchers were able to ensure that the very nature of quantum mechanics thwarts any attempts to modify the transaction. This article continues to discuss the research on the first unconditionally secure digital transaction system.

    Cointelegraph reports "Researchers Demonstrate 'Unconditionally Secure' Quantum Digital Payments"

  • news

    Visible to the public "Concerns Grow about MFA Bypass Attacks"

    Multi-factor authentication (MFA) involves authentication factors such as passwords, fingerprints, and smartphones to secure systems and data. Security experts encourage consumers and organizations to adopt MFA, because it is more difficult for hackers to gain unauthorized access to systems when multiple authentication factors are required. However, cybercriminals are increasingly evading MFA with specially designed attacks. In February, Reddit discovered that its employees had been phished via email, which tricked them into providing the cybercriminals with their MFA credentials. According to James Quick, director of solutions and advisory for the Identity and Access Management (IAM) company Simeio, the attackers used convincing prompts directing employees to a website mimicking Reddit's intranet gateway. When employees entered their credentials and second-factor tokens, the criminals were able to gain access to the organization. MFA bypass attacks are increasing. Sapphire Cybersecurity reported that there were 40,942 MFA fatigue attacks in August 2022. Hackers have used MFA bypass techniques such as man-in-the-middle (MitM) attacks, MFA bypass phishing kits, stolen browser session cookies, MFA fatigue, and malicious OAuth applications. This article continues to discuss growing concerns regarding MFA bypass attacks.

    CACM reports "Concerns Grow about MFA Bypass Attacks"

  • news

    Visible to the public "This New Tool Could Protect Your Pictures From AI Manipulation"

    People can take a photo posted online and edit it with advanced generative Artificial Intelligence (AI) systems for malicious purposes. Due to the sophistication of these systems, it may be impossible to prove that the resulting image is fake. However, a new tool developed by MIT researchers called PhotoGuard could prevent this. It serves as a protective shield by altering photos in small invisible ways that prevent them from being manipulated. If someone attempts to use editing software based on a generative AI model such as Stable Diffusion to manipulate an image "immunized" by PhotoGuard, the result will appear unrealistic or warped. PhotoGuard addresses the issue of malicious image manipulation by these models. Discovering ways to detect and stop AI-powered manipulation has never been more important, as generative AI tools have made it faster and easier than ever before. In a voluntary pledge with the White House, major AI companies such as OpenAI, Google, and Meta committed to developing such methods to combat fraud and deception. PhotoGuard is a complementary technique to watermarking. This article continues to discuss the PhotoGuard tool created by researchers at MIT.

    MIT Technology Review reports "This New Tool Could Protect Your Pictures From AI Manipulation"

  • news

    Visible to the public Pub Crawl #76


    Pub_Crawl_web.jpgPub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers.

  • news

    Visible to the public "New Smartphone Vulnerability Discovered by Northeastern Ph.D. Student Reveals Hackers Could Track Your Location"

    According to Evangelos Bitsikas, a Ph.D. student at Northeastern University, a recently discovered vulnerability in text messaging may allow attackers to track a user's location. His research team found the flaw by applying a sophisticated Machine Learning (ML) program to data extracted from the relatively primitive SMS system that has dominated mobile phone texting since the 1990s. Bitsikas, who will formally present his research at the 32nd USENIX Security Symposium, explains that it is possible to locate a victim simply by knowing their phone number and having normal network access. Eventually, this leads to the user's global location being tracked. Bitsikas says that SMS security has marginally improved since its initial creation for 2G systems 30 years ago. When a user receives a text message, their phone automatically responds with a notification to the sender, which is essentially a delivery receipt. A hacker would send multiple text messages to the user's phone through Bitsikas' method. The timing of their automated delivery replies would allow the hacker to triangulate their location, regardless of whether the user's communications are encrypted. This article continues to discuss the possibility of hackers using ML to exploit a text messaging vulnerability.

    Northeastern University reports "New Smartphone Vulnerability Discovered by Northeastern Ph.D. Student Reveals Hackers Could Track Your Location"

  • news

    Visible to the public "8 Million People Hit by Data Breach at US Govt Contractor Maximus"

    U.S. government services contractor Maximus has recently disclosed a data breach warning that hackers stole the personal data of 8 to 11 million people during the recent MOVEit Transfer data-theft attacks. Maximus is a contractor that manages and administers U.S. government-sponsored programs, including federal and local healthcare programs and student loan servicing. The company employs 34,300 people and has an annual revenue of about $4.25 billion, with a presence in the U.S., Canada, Australia, and the United Kingdom. After investigating the breach, Maximus found no indication that the hackers progressed further than the MOVEit environment, which the company noted was immediately isolated from the rest of the corporate network. However, this limited access was enough to compromise a large number of individuals to whom the firm is now sending data breach notifications. The company stated that based on the review of impacted files to date, they believe those files contain personal information, including social security numbers, protected health information, and/or other personal information, of at least 8 to 11 million individuals to whom the company anticipates providing notice of the incident. Maximus currently plans to record an expense of approximately $15 million for the quarter ending on June 30, 2023, representing the company's best estimate of the total cost of the investigation and remediation activities related to the incident.

    BleepingComputer reports: "8 Million People Hit by Data Breach at US Govt Contractor Maximus"

  • news

    Visible to the public "Akira Ransomware Compromised at Least 63 Victims Since March, Report Says"

    According to researchers at the cybersecurity company Arctic Wolf, the recently discovered Akira ransomware actively targets small and medium-sized businesses (SMBs) worldwide, with the US and Canada as its primary targets. Since its discovery in March 2023, Akira has compromised at least 63 victims. The researchers also discovered additional evidence connecting the Akira group to threat actors affiliated with the infamous ransomware Conti operation. Arctic Wolf analyzed cryptocurrency transactions related to Akira and Conti and found that in at least three different transactions, Akira threat actors sent their ransom payments in full to Conti-affiliated addresses. When cryptocurrency wallets overlap in this manner, it suggests that the individual behind the address or wallet has either splintered off from the original group or is working with another group simultaneously, Arctic Wolf noted. Researchers observed that Akira is offered as a Ransomware-as-a-Service (RaaS), suggesting that the group responsible for maintaining the code may not be responsible for every attack. This article continues to discuss the Akira ransomware.

    The Record reports "Akira Ransomware Compromised at Least 63 Victims Since March, Report Says"

  • news

    Visible to the public "'Call of Duty' Players Are Being Hit With Self-Spreading Malware"

    Hackers are targeting Call of Duty players with a massive malware push that can self-replicate and spread through the game's multiplayer lobbies. The malware infection appears to have been sufficient for Activision to take the game offline. Some members of the Steam community attempted to examine the malware, which was discovered to have a match in Virus Total's database. Based on the findings, the malware appears to be a worm that exploits security flaws in the application's code. That ability enables it to evade traditional protections against code injection. Once the malware infects a lobby, it can run localized code on the machines of the users accessing that session. Currently, malware infections have only been reported for the 2009-launched Modern Warfare II. However, given that different Call of Duty games released around 2009 are likely to share most of the same multiplayer code, other games in the series may be vulnerable to the exploit. This article continues to discuss hackers' recent targeting of Call of Duty players.

    Tom's Hardware reports "'Call of Duty' Players Are Being Hit With Self-Spreading Malware"

  • news

    Visible to the public "CardioComm Takes Systems Offline Following Cyberattack"

    Canadian heart monitoring and medical electrocardiogram solutions provider CardioComm recently announced it has taken systems offline following a cyberattack. The company stated that the cyberattack impacted its production server environments and has an impact on its business operations. Visitors to the company's website are informed that CardioComm services are currently offline. The company noted that business operations will be impacted for several days and potentially longer depending on how quickly they are able to restore its data and re-establish its production server environments. According to CardioComm, it has no evidence that customer health information was compromised in the attack, mainly because its software runs on each client's systems. CardioComm noted that it does not collect patient health information from its clients. The incident, the company noted, might also impact its ability to finalize required filings in response to a Cease Trade Order issued by the Ontario Securities Commission, which resulted in the suspension of its shares trading, imposed by the TSX Venture Exchange. Although CardioComm did not share details on the type of cyberattack it fell victim to, it is possible that ransomware might have been involved. CardioComm provides hospital, physician, and consumer device software for recording, analyzing, and managing electrocardiograms for the diagnosis of cardiac patients.

    SecurityWeek reports: "CardioComm Takes Systems Offline Following Cyberattack"

  • news

    Visible to the public "Multiple Security Issues Identified in Peloton Fitness Equipment"

    Security researchers at Check Point have discovered that internet-connected Peloton fitness equipment is plagued with numerous security issues that could allow attackers to obtain device information or deploy malware. The researchers analyzed the software running on the Peloton Treadmill and revealed exposure to security risks associated with Android devices that are not updated to the most recent platform iterations, as well as risks posed by attackers with physical access to the device. The treadmill runs Android 10, which does not contain patches for more than 1,000 vulnerabilities that have been addressed in the operating system over the past three years. Furthermore, the device was found to have USB debugging enabled, meaning that an attacker with physical access could retrieve a list of all installed packages and could also obtain shell access, compromising the treadmill completely. The researchers noted that an attacker could use specific commands to exfiltrate data from the treadmill, or they could exploit the existing applications, which are compiled using different SDK versions. Applications can also be fetched for reverse engineering and for extracting secrets. According to the researchers, some applications on the device incorporate rooting detection mechanisms, but an attacker could use certain techniques to identify further vulnerabilities in the applications at runtime. Additionally, the researchers identified hardcoded sensitive information on the device, such as a license key for a text-to-speech voice service. The service could be abused for denial-of-service (DoS). The researchers noted that certain unprotected services were also identified on the treadmill, potentially allowing malicious applications to escalate privileges and gain access to sensitive data or to abuse broadcast receivers and send the device into an infinite loop, preventing updates. The researchers also discovered "differences in the signature scheme of the installed apps," which could potentially expose the device to malicious attacks. The researchers stated that the treadmill operating system includes numerous standard APIs that can be exploited to execute Android code, allowing attackers to carry out nefarious actions from a networking perspective and take advantage of the device's always-on nature. Moreover, the presence of a webcam and microphone makes the treadmill vulnerable to eavesdropping attacks if malware is installed. The researchers were able to sideload a mobile remote access tool (MRAT) on the device, gaining full access to the treadmill's functionality, including audio recording, taking photos, accessing geolocation, and abusing the network stack. According to the researchers, the compromised device also provided "full access to the local area network," which could be leveraged for additional malicious activities. After being informed of these issues, Peloton told the researchers that "they meet expected security measures for Android-based devices," pointing out that physical access is required for exploitation.

    SecurityWeek reports: "Multiple Security Issues Identified in Peloton Fitness Equipment"

  • news

    Visible to the public "EPSS Vulnerability Scores Can Help Focus on Key Patches, Says Study"

    According to a study by Rezilion, the new Machine Learning (ML)-based Exploit Prediction Scoring System (EPSS) can help overcome the limitations of existing vulnerability tracking systems. Researchers at Rezilion say that the leading vulnerability tracking systems, such as the Common Vulnerability Scoring System (CVSS) and the catalog of Known Exploited Vulnerabilities (KEV) maintained by the US Cybersecurity and Infrastructure Security Agency (CISA), do not effectively predict the severity and exploitability of a vulnerability. The study says that relying solely on a CVSS severity score to evaluate the risk of individual vulnerabilities is equivalent to randomly selecting vulnerabilities for remediation. This article continues to discuss points and findings from Rezilion's study regarding EPSS and issues with CVSS and KEV.

    CSO Online reports "EPSS Vulnerability Scores Can Help Focus on Key Patches, Says Study"

  • news

    Visible to the public "DepositFiles Exposed Config File, Jeopardizing User Security"

    DepositFiles is a service that claims to be the ideal location to store and share files. However, researchers discovered DepositFiles' publicly hosted environment configuration (config) file, a critical record of how to run software. The file exposed payment service credentials, Abuse and Support email credentials, and more. Due to this exposure, the service's clients are at risk of having their Personal Identifiable Information (PII), files, and passwords stolen. Researchers noted that attackers could also target the company with malware, ransomware, and unauthorized access to business payment systems. They believe that the environment configuration file was exposed beginning in February 2023 based on the indexing of another sensitive file. This article continues to discuss DepositFiles' environment configuration file being left accessible and the potential impact of this exposure.

    Security Affairs reports "DepositFiles Exposed Config File, Jeopardizing User Security"

  • news

    Visible to the public "NCSC Publishes New Guidance on Shadow IT"

    The UK's leading cybersecurity agency NCSC has released new guidance for system owners and technical staff on managing shadow IT in their organization. Shadow IT refers to the devices and services employees use for work without the IT department knowing. They could include smart devices, servers, virtual machines, cloud storage, and unapproved messaging or collaboration tools. The NCSC stated that since these are not accounted for by asset management nor aligned with corporate IT processes or policy, they're a risk to organizations. NCSC argued that given the potentially serious repercussions of shadow IT, technical teams should focus on finding where it exists in the organization and address the underlying causes of it. The NCSC shared both organizational mitigations and technical solutions to the shadow IT challenge. The latter includes network access controls, asset management, network scanners, unified endpoint management, and Cloud Access Security Broker (CASB) tools.

    Infosecurity reports: "NCSC Publishes New Guidance on Shadow IT"

  • news

    Visible to the public "Infostealer Incidents More Than Doubled in Q1 2023"

    In the first quarter of 2023, the number of incidents involving infostealer malware more than doubled compared to last year, mainly targeting Windows, Linux, and macOS. According to a recent study by Uptycs, most of the perpetrators behind infostealer malware use Telegram as a platform for command-and-control (C2) and data exfiltration. Infostealer malware targets victims by stealing passwords, login credentials, and other sensitive information. Following the collection of personal information, the stealer sends it to the malicious actor's C2 system. Uptycs' examination of the dark web revealed that RedLine has the largest market share, followed by Raccoon and the RecordBreaker stealer. Newcomer Meta, Vidar, Cryptbot, and AZORult are other widely-used infostealers. This article continues to discuss key findings from Uptycs' latest report on infostealers.

    SC Magazine reports "Infostealer Incidents More Than Doubled in Q1 2023"

  • news

    Visible to the public "Cybersecurity Performance Goals: Sector-Specific Goals"

    Now that the cross-sector Cybersecurity Performance Goals (CPGs) have been published, the US Cybersecurity and Infrastructure Security Agency (CISA) is collaborating with Sector Risk Management Agencies (SRMAs) to develop Sector-Specific Goals (SSGs) for each critical infrastructure sector. In most cases, these goals will consist of either new, unique additional goals with direct applicability to a given sector or materials to help sector constituents implement the existing cross-sector CPGs effectively. Developing SSGs will involve providing examples of recommended infrastructure and entity-specific actions. Since there are 16 critical infrastructure sectors with varying requirements, CISA will tackle this effort in phases. CISA will first work with the Energy, Financial Services, Information Technology (IT), and Chemical sectors. In addition, CISA will work with the Water/Wastewater sector, Healthcare sector, and K-12 subsector throughout the year to determine how organizations in these sectors/subsector can improve their cybersecurity posture by implementing the existing set of cross-sector goals. This article continues to discuss the cross-sector CPGs and SSGs.

    CISA reports "Cybersecurity Performance Goals: Sector-Specific Goals"

  • news

    Visible to the public "Supply Chain Attack Hits NHS Ambulance Trusts"

    A cyberattack on an NHS supplier has recently left two ambulance trusts serving millions of people without access to electronic patient records. Swedish healthcare IT firm Ortivus said in a statement that an attack on July 18 left affected UK customers using its hosted data center. Ortivus noted that electronic patient records are currently unavailable and are, until further notice, handled using manual systems. No patients have been directly affected. The company stated that no other systems have been attacked, and no customers outside of those in the hosted data center have been affected. Ortivus noted that it is currently working in close collaboration with the affected customers to restore the systems and recover data. The affected customers are the ones using MobiMed ePR, electronic patient record systems in a hosted environment. BBC claimed that South Central Ambulance Service (SCAS) and South Western Ambulance Service (SWASFT) are both affected by the incident. Neither trust has released any information publicly about the incidents. Although Ortivus claimed no patients have been directly affected, if ambulances turn up without the ability to access patient records, it's likely that the standard of care will suffer. The two trusts are said to serve around 12 million people in the south of England.

    Infosecurity reports: "Supply Chain Attack Hits NHS Ambulance Trusts"

  • news

    Visible to the public "Hackers Target Apache Tomcat Servers for Mirai Botnet and Crypto Mining"

    As part of a new campaign designed to deliver the Mirai botnet malware and cryptocurrency miners, misconfigured and inadequately secured Apache Tomcat servers are being targeted. Over 800 attacks were detected against Aqua's Tomcat server honeypots over a two-year period, with 96 percent of the attacks linked to the Mirai botnet. Twenty percent (or 152) of these attack attempts involved the use of a web shell script named "neww" that originated from 24 different IP addresses, with 68 percent of them coming from a single IP address (104.248.157[.]218). Nitzan Yaakov, a security researcher at Aqua, explained that the threat actor scanned for Tomcat servers and launched a brute force attack against them, attempting to obtain access to the Tomcat web application manager by entering different credential combinations. After establishing a foothold, threat actors have been observed deploying a WAR file containing a malicious web shell class designed to listen for remote requests and execute arbitrary commands on the Tomcat server. This article continues to discuss hackers targeting Apache Tomcat servers in a new campaign aimed at delivering the Mirai botnet malware and cryptocurrency miners.

    THN reports "Hackers Target Apache Tomcat Servers for Mirai Botnet and Crypto Mining"

  • news

    Visible to the public "Almost 40% Of Ubuntu Users Vulnerable to New Privilege Elevation Flaws"

    Two recently introduced Linux vulnerabilities in the Ubuntu kernel make it possible for unprivileged local users to acquire elevated privileges on a large number of devices. Ubuntu is one of the most popular Linux distributions, particularly in the US, with an estimated 40 million users. Two vulnerabilities tracked as CVE-2023-32629 and CVE-2023-2640, discovered by Wiz researchers, were recently introduced into the operating system, affecting about 40 percent of Ubuntu's users. CVE-2023-2640 is a high-severity (CVSS v3 score: 7.8) vulnerability in the Ubuntu Linux kernel that allows a local attacker to gain elevated privileges. CVE-2023-32629 is a medium-severity (CVSS v3 score: 5.4) vulnerability in the Linux kernel memory management subsystem, where a race condition when accessing VMAs may result in use-after-free, allowing arbitrary code execution by a local attacker. This article continues to discuss the discovery and impact of the Linux vulnerabilities.

    Bleeping Computer reports "Almost 40% Of Ubuntu Users Vulnerable to New Privilege Elevation Flaws"

  • news

    Visible to the public "SEC Adopts New Cybersecurity Incident Disclosure Rules for Companies"

    The Securities and Exchange Commission (SEC) has adopted rules requiring registrants to disclose material cybersecurity incidents they experience and to annually disclose material information regarding their cybersecurity risk management, strategy, and governance. In addition, the Commission adopted rules requiring foreign private issuers to disclose similar information. The new rules will require registrants to disclose on the new Item 1.05 of Form 8-K any cybersecurity incident they deem material, along with a description of the nature, scope, and timing of the incident, as well as its material impact or reasonably likely material impact on the registrant. A registrant is generally required to submit an Item 1.05 Form 8-K within four business days after determining that a cybersecurity incident is material. This article continues to discuss the new cybersecurity incident disclosure rules adopted by SEC for companies.

    Help Net Security reports "SEC Adopts New Cybersecurity Incident Disclosure Rules for Companies"

  • news

    Visible to the public "'Nitrogen' Ransomware Effort Lures IT Pros via Google, Bing Ads"

    Hackers are planting "malvertisements" for widely-used Information Technology (IT) tools on search engines in an attempt to lure IT professionals and conduct ransomware attacks in the future. The scheme involves pay-per-click advertisements on Google and Bing, which link to compromised WordPress sites and phishing pages that resemble download pages for software such as AnyDesk, Cisco AnyConnect, TreeSize Free, and WinSCP. Unsuspecting visitors end up downloading the intended software along with a Python package containing initial access malware, which the attackers then use to launch additional payloads. Sophos researchers have dubbed the campaign "Nitrogen." Several technology companies and nonprofits in North America have already been affected. Although none of the known cases have been successful, the researchers found that hundreds of brands have been co-opted for this type of malvertising across multiple campaigns in the past few months. This article continues to discuss findings and observations regarding the malicious Nitrogen campaign.

    Dark Reading reports "'Nitrogen' Ransomware Effort Lures IT Pros via Google, Bing Ads"

  • news

    Visible to the public "Google Announces Inaugural Cohort in Cybersecurity Initiative"

    Researchers at Cornell Tech and the Cornell Ann S. Bowers College of Computing and Information Science are part of the first cohort of participants from four institutions to receive funding from the Google Cyber New York City (NYC) Institutional Research Program. The Google-funded effort aims to improve online privacy, safety, and security standards while also establishing NYC as a hub for cybersecurity research. In collaboration with Google, seven projects from Cornell faculty that combine basic research with computer innovations to provide solutions to cybersecurity issues in society have been selected. Each team will receive funding and access to Google Cloud Platform credits for up to three years while working with a Google sponsor. One of the inaugural projects from Cornell focuses on the theoretical foundations of post-quantum cryptography, cryptographic methods that enable a traditional computer to defend itself against attacks from a quantum computer (i.e., one that uses the quantum states of subatomic particles to store information and that can solve complex problems). As quantum computing technology progresses, the significance of this work grows. This article continues to discuss the projects from Cornell faculty that have been selected to provide solutions to cybersecurity issues.

    Cornell University reports "Google Announces Inaugural Cohort in Cybersecurity Initiative"

  • news

    Visible to the public "Researchers Uncover Fake Base Stations in Cellular Networks Using Machine Learning"

    Cellular networks are essential for various applications, including phone calls and Internet access. However, the growth of fake base stations in cellular networks, sometimes known as stingrays, cell-site simulators, or IMSI catchers, poses a major security threat with potentially severe consequences. Attackers can use fake base stations as stepping stones for different multi-step attacks, including signal counterfeiting, numb attacks, detach/downgrade attacks, energy depletion attacks, and panic attacks. These attacks can cause significant harm to individuals, businesses, and even governments. Therefore, security researchers at Purdue University's Department of Computer Science led a recent study demonstrating how high-quality datasets could be used to detect fake base stations in cellular networks using Machine Learning (ML) algorithms. This article continues to discuss the security researchers' work on high-quality datasets that could be used to detect fake base stations in cellular networks using ML algorithms.

    Purdue University reports "Researchers Uncover Fake Base Stations in Cellular Networks Using Machine Learning"

  • news

    Visible to the public "A Defense Against Attacks on Unmanned Ground and Aerial Vehicles"

    A University of Texas at Arlington (UTA) engineering researcher is developing defenses to prevent cyberattacks targeting networks of self-driving cars and Unmanned Aerial Vehicles (UAVs). Animesh Chakravarthy, associate professor in the Department of Mechanical and Aerospace Engineering (MAE), is the Principal Investigator (PI) on a US Department of Defense (DOD) grant titled "Resilient Multi-Vehicle Networks." If hackers discover a way to compromise 10 out of 100 self-driving cars in a given area, they could affect all 100 cars because the 10 compromised vehicles would have a domino effect on the other vehicles, Chakravarthy explained. Therefore, it is necessary to make these vehicle networks resistant to such attacks. This article continues to discuss the UTA research team investigating ways to thwart cyberattacks on networks of self-driving cars and UAVs.

    The University of Texas at Arlington reports "A Defense Against Attacks on Unmanned Ground and Aerial Vehicles"

  • news

    Visible to the public "Hacktivism: Is It Fashionable Again or Just a Sly Cover?"

    Reports of "hacktivism" are rising, with 2022 seeing a significant resurgence in the area, primarily fueled by the Russia-Ukraine conflict. According to Radware data, from February 18 to April 18 this year, hacktivists claimed over 1,800 Distributed Denial-of-Service (DDoS) attacks across 80 Telegram channels. Since the Russia-Ukraine conflict, hacktivism has experienced a resurgence, with loosely affiliated groups of partisans or volunteers being pitted against nation-states. Some well-known hacktivist groups include the IT Army, Guacamaya, and SiegedSec. The infamous pro-Russian entity NoName057(16) engages in targeted DDoS campaigns across multiple sectors in NATO countries. CyberArmyofRussia_Reborn (CARR) has been identified by Mandiant as a Russian hacktivist group conducting DDoS attacks against Ukraine. KillNet, a prominent pro-Russian hacktivist group, consistently targets the US and Europe with DDoS attacks. It may appear that these types of groups are becoming more prevalent, but cybersecurity experts paint a more nuanced picture, noting that it is unclear whether the practice is becoming more widespread, if the term is being redefined, or if it is being used as a cover for more traditional malicious activity in cyberspace, such as ransomware and cyber espionage. This article continues to discuss notable hacktivist groups, the potential use of hacktivism as a cover, and the future of such activity.

    SC Magazine reports "Hacktivism: Is It Fashionable Again or Just a Sly Cover?"

  • news

    Visible to the public "Decoy Dog Malware Upgraded to Include New Features"

    Security researchers at Infoblox have released crucial updates on the "Decoy Dog" remote access trojan (RAT) toolkit in a new threat report published today. Decoy Dog was initially discovered and disclosed in April 2023. Decoy Dog has proven to be more sophisticated than previously thought, using DNS for command-and-control (C2), and is suspected to be employed in ongoing nation-state cyberattacks. The researchers noted that after the disclosure of the toolkit, threat actors responded swiftly, adapting their systems to maintain access to compromised devices. The researchers stated that the malware has also expanded its reach, with at least three different actors now operating it. Though based on the open-source RAT Pupy, Decoy Dog is a new and previously unknown malware with advanced capabilities to persist on compromised devices. The researchers noted that the malware can now move victims to different controllers, maintaining communication with compromised machines for extended periods. Some victims have remained in contact with a Decoy Dog server for over a year.

    Infosecurity reports: "Decoy Dog Malware Upgraded to Include New Features"

  • news

    Visible to the public "Sneaky Python Package Security Fixes Help No One – Except Miscreants"

    According to computer security researchers, Python security fixes are often implemented through "silent" code commits without an associated Common Vulnerabilities and Exposures (CVE) identifier. That is not ideal, they argue, because attackers like exploiting undisclosed vulnerabilities in unpatched systems. In addition, developers who are not security experts may not notice that an upstream commit is targeting an exploitable vulnerability relevant to their code. Therefore, application developers may not realize that a Python package could have a major flaw due to little or no announcement about it, and not incorporate a patched version into their code. Malicious actors could take advantage of this by exploiting those non-publicized vulnerabilities. In a paper titled "Exploring Security Commits in Python," a team of researchers from George Mason University and Dougherty Valley High School propose a solution, which is a database of security commits called PySecDB. The database would increase the community's visibility of Python code repairs. This article continues to discuss the proposed security commits database aimed at making Python code repairs more visible to the community.

    The Register reports "Sneaky Python Package Security Fixes Help No One - Except Miscreants"

  • news

    Visible to the public "No, Criminals Are Not in Love With VPNs, Expert Insists"

    CrowdSec analyzed data on malicious Internet Protocol (IP) addresses and discovered that most malicious activity stems from Russia, the US, and India. Over one million IP addresses in each of these countries have been reported as malicious. However, CrowdSec emphasized that this number does not necessarily indicate the attacker's nationality but rather the "localization" of a compromised asset. Scanning makes up for the majority of malicious activity, indicating that a threat actor is actively searching the Internet for vulnerabilities they can exploit for unauthorized access, Distributed Denial-of-Service (DDoS) attacks, or other types of attacks. Nearly 60 percent of malicious IP addresses are involved in scanning, while over 23 percent are attempting to exploit known vulnerabilities. The third most prevalent threat is brute force, with threat actors targeting the most common and weak passwords, which are typically set by default. With the widespread adoption of Internet Protocol version 6 (IPv6), cybersecurity experts have begun noting an increase in the number of new threats associated with IPv6 addresses. This article continues to discuss key findings from the CrowdSec Majority Report for Q2 2023.

    Cybernews reports "No, Criminals Are Not in Love With VPNs, Expert Insists"

  • news

    Visible to the public "CISA: Most Cyberattacks on Governments, Critical Infrastructure Involve Valid Credentials"

    According to a new report from the US Cybersecurity and Infrastructure Security Agency (CISA), more than half of all cyberattacks against government agencies, critical infrastructure organizations, and state-level government bodies involved legitimate accounts. CISA collaborated with the US Coast Guard (USCG) in 2022 to conduct 121 Risk and Vulnerability Assessments (RVAs) on federal civilian agencies, high-priority private and public sector critical infrastructure operators, and select state, local, tribal, and territorial stakeholders. According to Gabriel Davis, a federal lead for risk operations at CISA, these assessments are designed to test an organization's defenses and allow the government to explore how they would respond to a sophisticated attack. They also provide CISA with information about how hackers operate. A new report of their findings reveals that threat actors conducted their most successful attacks using standard techniques involving phishing and default credentials. In 54 percent of successful attacks studied, valid credentials, including those from former employee accounts that have not been disabled in addition to default administrator accounts, were used. This article continues to discuss key findings from the RVAs.

    The Record reports "CISA: Most Cyberattacks on Governments, Critical Infrastructure Involve Valid Credentials"

  • news

    Visible to the public "Over 900,000 MikroTik Routers Exposed to Critical Bug"

    Security researchers at VulnCheck have warned that hundreds of thousands of routers produced by Latvian networking equipment maker MikroTik are vulnerable to a critical bug that could enable attackers to remotely control affected devices. The researchers noted that remote and authenticated attackers can use CVE-2023-30799 to get a root shell on MikroTik RouterOS routers. The vulnerability itself was first disclosed in June 2022 but only assigned a CVE after VulnCheck published new exploits. The researchers noted that a patch is now available, but the researchers claimed that around 472,000 RouterOS devices globally are still vulnerable via their web management interface, with the figure rising to more than 920,000 if exploitation happens via the Winbox management client. The vulnerability itself is a privilege escalation bug with a CVSS score of 9.1. The researchers stated that a remote and authenticated attacker can escalate privileges from admin to super-admin on the Winbox or HTTP interface. The attacker can abuse this vulnerability to execute arbitrary code on the system. The researchers warned that although exploitation of the bug requires authentication, this is easier than one might think. VulnCheck claimed around 60% of RouterOS users are still running a default admin user.

    Infosecurity reports: "Over 900,000 MikroTik Routers Exposed to Critical Bug"

  • news

    Visible to the public "Education Sector Has Highest Ransomware Victim Count"

    According to security researchers at Sophos, the education sector recorded a higher share of ransomware victims than any other in 2022. During the study, the researchers conducted interviews with 400 IT and cybersecurity leaders globally, split evenly across schools and higher education institutions. The researchers found that 79% of higher and 80% of "lower" education institutions were compromised by ransomware over the past year, up from 64% and 56% in 2021, respectively. The researchers noted that exploits and compromised credentials accounted for 77% of ransomware attacks against higher education organizations and 65% of attacks against lower education organizations. Breaches stemming from compromised credentials (37%/36%) accounted for a much bigger share than the cross-industry average of 29%. The researchers stated that the lack of adoption of multi-factor authentication (MFA) technology in the education sector makes them even more at risk of this method of compromise. Interestingly, the researchers noted that the education sector had one of the highest rates of ransom payment, with over half (56%) of higher education victims and 47% of schools paying up. This may account for why the sector is so frequently targeted by threat actors. Another possible factor is the fact that higher education institutions are less likely to maintain backups than the cross-sector average (63% versus 70%).

    Infosecurity reports: "Education Sector Has Highest Ransomware Victim Count"

  • news

    Visible to the public "Rust-based Realst Infostealer Targeting Apple macOS Users' Cryptocurrency Wallets"

    Realst is a new malware family targeting Apple macOS systems. A third of the samples are already designed to infect macOS 14 Sonoma, the upcoming major release of the operating system. The malware is written in the Rust programming language and is distributed as fake blockchain games. It can empty cryptocurrency wallets as well as steal stored passwords and browser data from Windows and macOS devices. Realst was first found in the wild by the security researcher known as iamdeadlyz. Phil Stokes, a security researcher at SentinelOne, noted that Realst Infostealer is spread via malicious websites advertising fake blockchain games with names such as Brawl Earth, WildWorld, Dawnland, Destruction, Evolion, Pearl, Olymp of Reptiles, and SaintLegend. Each variation of the bogus blockchain game has its own website and associated Twitter and Discord accounts. This article continues to discuss the capabilities and distribution of the Realst malware.

    THN reports "Rust-based Realst Infostealer Targeting Apple macOS Users' Cryptocurrency Wallets"

  • news

    Visible to the public "ALPHV Ransomware Adds Data Leak API in New Extortion Strategy"

    The ALPHV ransomware group, also known as BlackCat, is attempting to increase the pressure on their victims to pay a ransom by providing an Application Programming Interface (API) for their leak site in order to increase the visibility of their attacks. This action follows the recent breach of Estee Lauder, which resulted in the beauty company disregarding the threat actor's attempts to negotiate a ransom payment. Multiple researchers recently observed that the ALPHV/BlackCat data leak site added a new page with instructions on how to use their API to get timely updates about new victims. The malware research group VX-Underground warned of the new section on the gang's site. However, the "feature" appears to have been partially available to a limited audience for months. The ransomware group published API calls that could be used to fetch information about new victims added to their leak site or updates starting on a specific date. This article continues to discuss the ALPHV/BlackCat ransomware gang providing an API for their leak site to increase visibility for their attacks.

    Bleeping Computer reports "ALPHV Ransomware Adds Data Leak API in New Extortion Strategy"

  • news

    Visible to the public "Zero Trust Rated as Highly Effective by Businesses Worldwide"

    According to Beyond Identity, 82 percent of experts are currently working on implementing zero trust, and 16 percent plan to do so within the next 18 months. Over 90 percent of those working on zero trust cited the 2022 Federal Zero Trust Strategy as their primary motivator. Respondents were asked what authentication capabilities are necessary to attain zero trust. Fifty-three percent of respondents cited codeless capability as the most important element of a zero trust network. In addition, the respondents agreed that being passwordless and ensuring that each device satisfies certain security thresholds are almost of equal importance. Respondents viewed the maintenance of policy at each authentication point as equally critical to network security as protection against social engineering techniques. According to Jasson Casey, CTO of Beyond Identity, the findings of this study indicate that zero trust is the end goal now more than ever, and that it requires a concerted and coordinated effort to achieve. This article continues to discuss key findings from Beyond Identity's survey regarding the implementation of zero trust principles.

    Help Net Security reports "Zero Trust Rated as Highly Effective by Businesses Worldwide"

  • news

    Visible to the public "ChatGPT, Other Generative AI Apps Prone to Compromise, Manipulation"

    Users of applications involving Large Language Models (LLMs) similar to ChatGPT must be aware of the possible risks. Researchers warn that an attacker who develops untrusted content for the Artificial Intelligence (AI) system could compromise any information or recommendations generated by the system. The attack could enable job applicants to circumvent resume-checking applications, disinformation specialists to force a news summary bot to only give a specific point of view, or malicious actors to turn a chatbot into a willing participant in their fraud. In a session titled "Compromising LLMs: The Advent of AI Malware," a group of computer scientists will demonstrate that indirect prompt-injection (PI) attacks are possible because applications connected to ChatGPT and other LLMs often treat consumed data in the same manner as user queries or commands. Attackers can take control of the user's session by inserting specially crafted information as comments into documents or web pages that an LLM will parse. This article continues to discuss researchers finding that AI applications involving LLMs could be compromised by attackers using natural language to trick users.

    Dark Reading reports "ChatGPT, Other Generative AI Apps Prone to Compromise, Manipulation"

  • news

    Visible to the public "Why Computer Security Advice Is More Confusing Than It Should Be"

    A new study identifies a key issue with developing computer security guidelines and outlines basic steps that would likely make computers safer. This research puts the computer security guidelines provided to employees by businesses and government agencies under the microscope. These guidelines are supposed to help employees protect personal and employer data as well as minimize the risks associated with threats such as malware and phishing. Brad Reaves, corresponding author of the new study and assistant professor of computer science at North Carolina State University, has observed that some of the online computer security advice he has read is confusing, misleading, or incorrect. The research looked into who is developing these guidelines, what they have based their guidance on, their process, and areas of improvement. Researchers conducted 21 in-depth interviews with professionals responsible for writing the computer security guidelines used by organizations. The main takeaway is that the people who develop these guidelines aim to provide as much information as possible, which is good in theory, but the writers do not prioritize the most crucial suggestions, or they do not deprioritize the less important points. This article continues to discuss key points and findings from the study of computer security advice.

    North Carolina State University reports "Why Computer Security Advice Is More Confusing Than It Should Be"

  • news

    Visible to the public "OpenAI, Google and More Agree to White House List of Eight AI Safety Assurances"

    Some of the largest US-based generative Artificial Intelligence (AI) companies plan to watermark their content, according to a White House fact sheet released on July 21. Amazon, Anthropic, Google, Inflection, Meta, Microsoft, and OpenAI have agreed to eight voluntary commitments concerning the use and oversight of generative AI, including watermarking. This agreement follows a March statement expressing the White House's concerns about the misuse of AI. In addition, the agreement comes at a time when regulators are finalizing procedures for managing generative AI's impact on technology and how people interact with it since ChatGPT brought AI content to the public's attention in November 2022. This article continues to discuss the eight AI safety commitments and how government regulation of AI could discourage malicious actors.

    TechRepublic reports "OpenAI, Google and More Agree to White House List of Eight AI Safety Assurances"

  • news

    Visible to the public SoS Musings #75 - A Major Threat to Businesses: Point-of-Sale (PoS) Attacks

    SoS Musings #75 -

    A Major Threat to Businesses: Point-of-Sale (PoS) Attacks

  • news

    Visible to the public Cybersecurity Snapshots #44 - Data Travel is the Organization's Next Big Cybersecurity Challenge

    Cybersecurity Snapshots #44 -

    Data Travel is the Organization's Next Big Cybersecurity Challenge

  • news

    Visible to the public Cyber Scene #82 - Breaking News, Cyber and China

    Cyber Scene #82 -

    Breaking News, Cyber and China

  • news

    Visible to the public "New AI Phishing Tool FraudGPT Tied to Same Group Behind WormGPT"

    FraudGPT, a new Artificial Intelligence (AI) bot discovered being sold on different dark web marketplaces and Telegram accounts, is used exclusively for offensive purposes, such as spear-phishing, cracking tools, and carding. John Bambenek, principal threat researcher at Netenrich, which discovered FraudGPT, noted that his team believes the threat actor behind it is likely the same group that operates WormGPT, another AI phishing tool recently reported by SlashNext. According to Bambenek, Netenrich is currently unaware of any active attacks launched through FraudGPT tools. FraudGPT appears to focus more on short-duration, high-volume attacks such as phishing, whereas WormGPT is more focused on longer-duration attacks involving malware and ransomware. This article continues to discuss the new AI bot FraudGPT, believed to come from the same group that developed the WormGPT tools.

    SC Media reports "New AI Phishing Tool FraudGPT Tied to Same Group Behind WormGPT"

  • news

    Visible to the public "Maritime Cyberattack Database Launched by Dutch University"

    The NHL Stenden University of Applied Sciences in the Netherlands recently launched a database tracking cyberattacks and other cyber incidents impacting the maritime sector. The Maritime Cyber Attack Database, or MCAD, currently tracks more than 160 incidents recorded since 2001. The university noted that the database is publicly accessible at maritimecybersecurity[.]nl, and it's continuously updated and improved. The project is led by Dr. Stephen McCombie, professor of maritime IT security at NHL Stenden. The database was created in collaboration with students, using open-source information. McCombie stated that the goal of the project is to raise awareness and provide data for future maritime cybersecurity research. The database will also be used to analyze subsets of the data and highlight trends. McCombie noted that the Maritime Cyber Attack Database can also be used to create realistic cyber incident simulations. The database currently includes many attacks involving ransomware, as well as insider incidents and spoofing attacks. Incidents have been recorded worldwide, but many impacted ports are around Europe, East Asia, and the United States.

    SecurityWeek reports: "Maritime Cyberattack Database Launched by Dutch University"

  • news

    Visible to the public "The Promise of Watermarking AI Content"

    A group of major technology companies recently made an announcement about watermarking Artificial Intelligence (AI)-generated content. However, cybersecurity researchers already suggest this new approach has flaws. Amazon, Anthropic, Google, Inflection, Meta, Microsoft, and OpenAI met with the White House to discuss how they can mitigate the risks associated with the AI they create. They promised to invest in cybersecurity and AI-generated content watermarking. Dr. Florian Kerschbaum, a professor of computer science and member of the Cybersecurity and Privacy Institute at the University of Waterloo, explained that the watermarking technology pitched by the companies embeds a secret message within the content's code. The idea is that the message cannot be removed without also removing the content. Kerschbaum notes, however, that there are still some uncertainties in the scientific foundations of watermarking. Malicious actors may be able to remove a watermark, and the issue of digital watermarks has fascinated scientists for decades. This article continues to discuss concerns and questions regarding watermarking AI-generated content.

    The University of Waterloo reports "The Promise of Watermarking AI Content"

  • news

    Visible to the public "Pacific Premier Says Vendor Hit by MOVEit Data Breach"

    Pacific Premier Bancorp recently announced that a cybersecurity incident at a third-party vendor has led to a data leak of its clients, becoming the latest victim of the MOVEit hack. The company noted that the client data compromised contained social security numbers, account numbers, and other personally identifiable information. The bank did not disclose the scale of the data breach but said it is working with the vendor to notify the potentially affected parties and regulatory agencies.

    Reuters reports: "Pacific Premier Says Vendor Hit by MOVEit Data Breach"

  • news

    Visible to the public "1st Source Says 450,000 Records Affected in Client Data Breach"

    Recently, commercial and consumer bank 1st Source Corp announced that it was affected by a security breach that involved a popular file transfer tool, MOVEit. The data breach has impacted about 450,000 records. The company stated that a third party had gained access to data of its commercial and individual clients earlier this month, adding that it was in the process of identifying and notifying individual clients affected. MOVEit, made by Massachusetts-based Progress, allows organizations to securely transfer files and data between business partners and customers.

    U.S. News reports: "1st Source Says 450,000 Records Affected in Client Data Breach"

  • news

    Visible to the public "Hacker Claims to Have Stolen Sensitive Medical Records from Egypt's Ministry of Health"

    Security researchers at SOCRadar recently found that an "established" threat actor claimed to be in possession of two million data records stolen from the Egyptian Ministry of Health and Population. The allegation was made on the hacker forum Popurler. The researchers stated that according to the threat actor's post, the database includes comprehensive, personal patient information, including names, IDs, decision and national numbers, phone numbers, addresses, procedure classification details, diagnoses, and details on the treatment. The hacker provided a sample of the dataset, encompassing data on 1000 people to support the claim. The researchers noted that this threat actor, "known for selling databases that allegedly belonged to Indonesian entities last week, also directed potential buyers to contact them through the Telegram messaging app. Evidence points to financial gain as the primary motivation behind these actions."

    Infosecurity reports: "Hacker Claims to Have Stolen Sensitive Medical Records from Egypt's Ministry of Health"