News Items

  • news

    Visible to the public "Nearly Three-Quarters of Firms Suffer Downtime from DNS Attacks"

    Researchers at IDC compiled interviews with over 100 global organizations with more than 500 employees and put their findings in the "2022 Global DNS Threat Report." During the research, the researchers found that hybrid working and cloud migration during the course of the pandemic has led to a surge in DNS-related attacks, with application downtime and data theft a significant consequence. The researchers also found that 88% of organizations suffered DNS-related attacks over the past year, at an average of seven per responding company. These include DNS tunneling, phishing, malware, zero-day exploits, DDoS attacks, DNS hijacking, and cloud misconfiguration abuse. All categories saw an increase in the frequency of attacks over the previous year. The researchers stated that IT teams often overlook the DNS layer because firewalls are set to allowlist traffic. However, its near ubiquity in modern IT environments and insecure design make it a popular vector for attack. According to the NCSC, almost all cyberattacks use DNS at some point in their lifecycle. The researchers argued that the risks associated with DNS have only grown during the pandemic. The researchers stated that the survey results show that the number and size of DNS-related attacks remain very high, and cybercriminals are using all available tools to gain access to networks, disrupt operations, and steal data by leveraging vulnerabilities and cloud misconfigurations. Some 70% of respondents said they suffered application downtime due to DNS attacks, both related to in-house and cloud-based applications. A quarter (24%) had customer data or sensitive IP stolen. Succesful DNS attacks cost victims on average $942,000 per attack. This is virtually unchanged from the $950,000 cited in last year's report.

    Infosecurity reports: "Nearly Three-Quarters of Firms Suffer Downtime from DNS Attacks"

  • news

    Visible to the public "Twice as Many Healthcare Organizations Now Pay Ransom"

    According to new research conducted by Sophos, global healthcare organizations (HCOs) experienced a 94% year-on-year surge in ransomware attacks last year, with almost twice as many electing to pay their extorters. The researchers found that two-thirds of HCOs were hit by ransomware last year, up from just a third in 2020. Sophos claimed this surge was down to the popularity of ransomware-as-a-service on the cybercrime underground. However, it could also result from the increased willingness of HCOs to pay their attackers. The researchers noted that some 61% paid a ransom in 2021, up from just 34% a year previously. Sophos claimed that the high cost of remediation, and the impact of operational outages, coupled with the increased sophistication of attacks on the sector, could explain this jump. Just 2% of respondents paid a ransom and got all their data back. The researchers stated that healthcare saw the highest increase in the volume of cyberattacks (69%) and the complexity of cyberattacks (67%) compared to the cross-sector average of 57% and 59%, respectively. In terms of the impact of these cyberattacks, healthcare was the second most affected sector (59%) compared to the global average of 53%. HCOs hit by ransomware recorded a major impact to their business: 94% said it impaired their ability to operate, and 90% that it caused loss of revenue. On average, it took victim organizations one week to recover. The researchers noted that the problem is exacerbated because many HCOs are finding it more challenging to obtain cyber insurance. Only 78% are covered versus 83% across all sectors.

    Infosecurity reports: "Twice as Many Healthcare Organizations Now Pay Ransom"

  • news

    Visible to the public "Mobile Threat Volumes Slump 58% in a Year"

    Security researchers at Kaspersky have discovered that the volume of mobile threats detected globally fell by nearly nine million from Q1 2021 to the first three months of 2022. The researchers stated that in total, 6,463,414 mobile malware, adware, and "riskware" attacks were blocked in the first quarter of 2022, down from over 15 million in Q1 2021. The number of malicious installation packages detected also fell during the period by 64%, to reach just 516,617. The researchers noted that the largest group of threat types was "risk tool" apps, which accounted for nearly half (49%) of the total. Next came adware, accounting for around 17% of all mobile threats. However, the researchers noted that both of these categories experienced a decline in numbers, unlike Trojans, whose share increased 10 percentage points to reach almost 15%. The variants with the greatest impact were Mobtes (44%), Piom (33%), and Boogr (14%). Mobile banking Trojans also saw a spike in detections of over 113% since Q1 2021, to reach almost 54,000. Most of this increase was traced to the Trojan-Banker.AndroidOS. Bray family, whose share accounted for 81% of all mobile banking Trojans detected.

    Infosecurity reports: "Mobile Threat Volumes Slump 58% in a Year"

  • news

    Visible to the public "EnemyBot Malware Targets Web Servers, CMS Tools and Android OS"

    EnemyBot, a rapidly evolving IoT malware, is targeting content management systems (CMS), web servers, and Android devices. Researchers at AT&T Alien labs believe that the threat actor group "Keksec" is behind the malware distribution. The researchers stated that services such as VMware Workspace ONE, Adobe ColdFusion, WordPress, PHP Scriptcase, and more are being targeted as well as IoT and Android devices. The researchers noted that the malware is rapidly adopting one-day vulnerabilities as part of its exploitation capabilities. After the researchers analyzed the malware's codebase, they found that EnemyBot borrows generously from code used by other botnets such as Mirai, Qbot, and Zbot. The Keksec group distributes the malware by targeting Linux machines and IoT devices. This threat group was formed back in 2016 and includes several botnet actors. The researchers found four main sections of the malware. The first section is a python script 'cc7.py', used to download all dependencies and compile the malware into different OS architectures (x86, ARM, macOS, OpenBSD, PowerPC, MIPS). After compilation, the researchers noted that a batch file "update.sh" is created and used to spread the malware to vulnerable targets. The second section is the main botnet source code, which includes all the other functionality of the malware, excluding the main part, and incorporates source codes of the various botnets that can combine to perform an attack. The third module is obfuscation segment "hide.c" and is compiled and executed manually to encode/decode the malware strings. The researchers noted that a simple swap table is used to hide strings, and "each char is replaced with a corresponding char in the table." The last segment includes a command-and-control (CC) component to receive vital actions and payloads from attackers. After further analysis, the researchers revealed a new scanner function to hunt vulnerable IP addresses and an "adb_infect" function that is used to attack Android devices. The researchers advise organizations to properly configure firewalls and focus on reducing Linux server and IOT devices' exposure to the internet. The researchers also recommend organizations monitor the network traffic, scan the outbound ports and look for suspicious bandwidth usage. Software should be updated automatically and patched with the latest security update.

    Threatpost reports: "EnemyBot Malware Targets Web Servers, CMS Tools and Android OS"

  • news

    Visible to the public "Magniber Ransomware Now Targets Windows 11 Machines"

    Magniber ransomware was initially discovered in 2017 and has been recently upgraded to target Windows 11 machines, according to researchers at 360 Total Security. The researchers stated that the attack volume of the ransomware increased significantly since May 25th, and some of its dissemination package names have been updated, including a 'win10-11_system_upgrade_software.msi' file. The researchers noted that the ransomware itself hasn't changed much, but the fact that it can now infect multiple versions of Windows operating systems could mean an increase in infections. Magniber infects machines thanks to an attack vector that looks like a Windows update. These malicious files are commonly found in downloads from forums, cracked software, and fake websites. Once downloaded and executed, the ransomware uses the RSA+AES to encrypt files, in which RSA uses 2048 bits. According to the researchers, every victim is shown an independent payment page where they are asked to pay a ransom of 0.09 Bitcoin (currently $2,848) within five days, or the ransom will be doubled. If the ransom is not paid within an unspecified amount of time, the link will reportedly become invalid. The researchers stated that Magniber infected a considerable number of machines earlier this year.

    Infosecurity reports: "Magniber Ransomware Now Targets Windows 11 Machines"

  • news

    Visible to the public "Microsoft Confirms Exploitation of 'Follina' Zero-Day Vulnerability"

    Microsoft has confirmed that Windows is affected by a zero-day vulnerability after researchers warned of exploitation in the wild. The vulnerability is now tracked as CVE-2022-30190. A researcher who uses the online moniker "nao_sec" recently reported finding a malicious Word file designed to execute arbitrary PowerShell code. The file was uploaded to VirusTotal from Belarus. Kevin Beaumont was among the first to analyze the exploit and decided to name it "Follina" because the malicious file references 0438, which is the area code for the Italian village of Follina. Since April, Microsoft had known about the vulnerability when it was notified by "CrazymanArmy" of the Shadow Chaser Group, a research team focusing on APT hunting and analysis. Microsoft initially classified the vulnerability as "not a security related issue," despite the researcher informing the company in April that a sample exploiting it had been seen in the wild. Microsoft later informed the researcher that the "issue has been fixed," but a patch does not appear to be available. Follina was initially described as a Microsoft Office zero-day vulnerability, but Microsoft says it actually affects the Microsoft Support Diagnostic Tool (MSDT), which collects information that is sent to Microsoft support. Microsoft explained that a remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, delete data, or create new accounts in the context allowed by the user's rights. Microsoft noted that unlike other exploits involving documents, this attack does not rely on macros, and the malicious code is executed even if macros are disabled. Researchers stated that exploitation works against Office Pro Plus, Office 2013, Office 2016, Office 2019, and Office 2021. According to Microsoft, the vulnerability affects Windows 7, Windows 8.1, Windows 10, Windows 11, Windows Server 2008, Windows Server 2012, Windows Server 2016, Windows Server 2019, and Windows Server 2022. Microsoft has released guidance for this remote code execution vulnerability, including workarounds and information on new Defender updates designed to detect and block files and behavior associated with the threat.

    SecurityWeek reports: "Microsoft Confirms Exploitation of 'Follina' Zero-Day Vulnerability"

  • news

    Visible to the public "Turkish Airline Exposes Flight and Crew Info in 6.5TB Leak"

    Researchers at SafetyDetectives recently discovered that a low-cost Turkish airline accidentally leaked personal information of flight crew alongside source code and flight data after misconfiguring an AWS bucket. The researchers found the cloud data store was left wide open on February 28. The researchers traced some of the leaked information to Electronic Flight Bag (EFB) software developed by Pegasus Airlines. EFBs are information management tools designed to optimize the productivity of airline crews by providing essential reference materials for their flight. The researchers found almost 23 million files on the bucket, totaling around 6.5TB of leaked data. The data included over three million files containing sensitive flight data such as flight charts and revisions, insurance documents, details of issues found during pre-flight checks, and info on crew shifts. Over 1.6 million files contained personally identifiable information (PII) on the airline crew, including photos and signatures. Source code from Pegasus's EFB software was also found in the trove, including plain text passwords and secret keys. The researchers stated that with millions of files containing recent and possibly relevant flight data, unfortunately, an attacker could have numerous options to cause harm if they found PegasusEFB's bucket. Crew members could also be the subject of coercion by organized crime groups, while the information contained in the data store could help bad actors identify weaknesses in airport and airline security. The researchers stated that, at the moment, there is no indication that any malicious actors found the trove before the research team did. After notifying Pegasus Airlines on March 1, the researchers noted that the leak was remediated around three weeks later.

    Infosecurity reports: "Turkish Airline Exposes Flight and Crew Info in 6.5TB Leak"

  • news

    Visible to the public "U.S. Academic Credentials Displayed in Public and Dark Web Forums"

    The cyber division of the Federal Bureau of Investigation (FBI) has recently warned universities and colleges located in the U.S. that higher education credentials have been advertised for sale on online criminal marketplaces and publically accessible sites. As of January 2022, Russian cyber-criminal forums offered access to credentials from several universities and colleges across the country, with prices ranging from a few to multiple thousands of dollars. In May 2021, over 36,000 email and password combinations (some of which may have been duplicates) for email accounts ending in .edu were found on a publicly available instant messaging platform. The FBI warned that the exposure of such sensitive credential and network access information could lead to cyberattacks against individual users or affiliated organizations, particularly in the case of privileged user accounts. The FBI explained that credential harvesting against organizations is often caused by spear-phishing, ransomware, or other cyber intrusion tactics. To mitigate these threats, the FBI called for colleges, universities, and all academic entities to establish and maintain strong relationships with the FBI Field Office in their region. Moreover, the FBI also recommended that academic entities keep all systems and software up-to-date, implement user training programs and phishing exercises for students and faculty members, and implement strong password hygiene measures.

    Infosecurity reports: "U.S. Academic Credentials Displayed in Public and Dark Web Forums"

  • news

    Visible to the public "There Are Systems 'Guarding' Your Data in Cyberspace – But Who Is Guarding the Guards?"

    A "zero-trust" approach is the current best practice in secure technology architecture followed by large businesses and organizations. Zero-trust security is an approach that requires users to prove their authenticity every time they access data or a network application. In addition, every interaction must be verified through a central entity. Absolute trust is then placed in the verification system. Therefore, an attacker can gain full access by compromising this mechanism. To address this problem, "decentralization" eliminates any single point of failure. Work from researchers at RMIT University investigates and develops the algorithms needed to set up an effective decentralized verification system. Their work aims to help secure digital identities and strengthen the security of the verification processes that many of us use. The researchers refined and validated algorithms that can be used to create a decentralized verification system, which would make hacking significantly more difficult. Their industry collaborator, TIDE, developed a prototype system using the validated algorithms. When a user creates an account on an Identity and Access Management (IAM) system, they select a password, which the system encrypts and stores for later use. However, even in encrypted form, stored passwords are appealing targets. Furthermore, while Multi-Factor Authentication (MFA) is useful for authenticating a user's identity, it can be defeated by attackers. If passwords could be verified without being saved in this manner, attackers would no longer have a clear target. Decentralization comes into play here. Instead of putting trust in a single central entity, decentralization puts trust in the network as a whole, which can exist independently of the IAM system. The mathematical basis of the algorithms that support decentralized authority ensures that no single node can act independently. This article continues to discuss the work on the algorithms required to set up an effective decentralized verification system.

    The Conversation reports "There Are Systems 'Guarding' Your Data in Cyberspace - But Who Is Guarding the Guards?"

  • news

    Visible to the public "How Randomly Moving Electrons Can Improve Cyber Security"

    A team of researchers from the Indian Institute of Science (IISc) has developed a record-breaking True Random Number Generator (TRNG) to improve data encryption and provide enhanced security for sensitive digital data such as credit card details, passwords, and more. Only authorized individuals with access to a cryptographic "key" can decode encrypted data. To avoid hacking, the key must be unpredictable and thus randomly generated. Typically, cryptographic keys are generated on computers through Pseudorandom Number Generators (PRNGs), which use mathematical formulae or pre-programmed tables to generate numbers that appear random but are not. A TRNG, on the other hand, generates random numbers from naturally unpredictable physical processes, making it more secure. IISc's breakthrough TRNG device generates random numbers using the random motion of electrons. It contains an artificial electron trap made by stacking atomically-thin layers of materials such as black phosphorus and graphene. The current measured from the device increases when an electron is trapped and decreases when it is released. As electrons move in and out of the trap randomly, the measured current also changes randomly. The change's timing determines the generated random number. You cannot precisely predict when the electron is going to enter the trap, so there is an inherent randomness embedded in this process. The device's performance on the standard tests for cryptographic applications designed by the US National Institute of Standards and Technology (NIST) exceeded the researchers' expectations. This article continues to discuss the importance of random number generation in encryption and IISc's TRNG new device.

    IISc reports "How Randomly Moving Electrons Can Improve Cyber Security"

  • news

    Visible to the public "CISA Publishes 5G Security Evaluation Process Plan"

    The Cybersecurity and Infrastructure Security Agency (CISA) has recently published a new five-step 5G Security Evaluation Process to help companies improve their security posture before deploying new 5G applications. The new guidelines include information about relevant threat frameworks, 5G system security standards, industry security specifications, federal security guidance documents, and methodologies to conduct cybersecurity assessments of 5G systems. The report said that 5G networks are designed to be more secure than 4G. However, the complexity of 5G networks, with new features, services, and an anticipated massive increase in the number and types of devices they will serve, expands the threat surface and can make defining the system boundary challenging. CISA called upon agencies and organizations to review the new report before June 27, 2022. The feedback will be utilized to assess the need for further security recommendations and guidance publications for federal agency adoptions of 5G technologies.

    Infosecurity reports: "CISA Publishes 5G Security Evaluation Process Plan"

  • news

    Visible to the public "S&T Hackathon Addresses Emerging Threats to Critical Infrastructure"

    The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) issued a warning in late March that critical US infrastructure sectors could be targeted by Russian cyberattacks. The rapid development of new information and communication technologies, as well as their inevitable integration with critical infrastructure, has increased the risk of digital attacks and other new challenges, thus calling for more preparation. The Science and Technology Directorate (S&T) recently collaborated with the Center for Accelerating Operational Efficiency (CAOE), a DHS Center of Excellence (COE) led by Arizona State University, in an effort to help the country prevent possible cyberattacks. The effort brought Subject Matter Experts (SMEs) and students from four other university-led DHS Centers of Excellence (COEs) together to address real-life problem scenarios and identify practical solutions to current critical infrastructure risks and emerging threats. The third annual Grand Challenge Hackathon, held both in-person and virtually in late February, paired students with homeland security, critical infrastructure, criminal investigations, cybersecurity, and counterterrorism professionals, providing them with a specialized learning environment and allowing them to explore and solve real-life homeland security problem sets. Through this, the students were encouraged to consider pursuing careers in the homeland security science and engineering fields. S&T Program Manager Eleanore Hajian said these hackathons are unique because they allow students to develop their skills in critical research, communication, and team building while simultaneously learning more about the Department of Homeland Security's goals and operations. A total of 73 undergraduate and graduate-level students from across the five COEs and their affiliated universities participated in the hackathon, with students forming their own teams. This article continues to discuss the goals and winning solutions of the S&T Hackathon.

    DHS reports "S&T Hackathon Addresses Emerging Threats to Critical Infrastructure"

  • news

    Visible to the public "Microsoft Finds Major Security Flaws in Pre-Installed Android Apps"

    Bug hunters at Microsoft have discovered several high-severity vulnerabilities in a mobile framework used in pre-installed Android System apps. The researchers warn that exploitation could have allowed the implantation of a persistent backdoor on Android devices. A total of four documented vulnerabilities were found and fixed in a mobile framework owned by mce Systems, an Israeli company that provides software to mobile carriers. The bug hunters stated that coupled with the extensive system privileges that pre-installed apps have, these vulnerabilities could have been attack vectors for attackers to access system configuration and sensitive information. The bug hunters warned that some of the affected apps cannot be fully uninstalled or disabled without gaining root access to the device. The four flaws are CVE-2021-42598, CVE-2021-42599, CVE-2021-42600, and CVE-2021-42601. Details on the bugs were shared with the affected vendor last September 2021, and Microsoft said mce Systems sent an urgent framework update to the impacted providers and released fixes for the issues. There currently have been no reported signs of these vulnerabilities being exploited in the wild. The researchers also warned that several additional mobile carriers were found using the vulnerable framework with their respective apps, suggesting that additional providers still undiscovered could be impacted.

    SecurityWeek reports: "Microsoft Finds Major Security Flaws in Pre-Installed Android Apps"

  • news

    Visible to the public "Twitter to Pay $150m Fine to Resolve Data Privacy Violations"

    Twitter has agreed to pay a $150m fine to settle a federal privacy suit over privacy data violations. Twitter reportedly was collecting phone numbers and email addresses for account security measures and then using the information for advertising purposes without letting users know. Associate Attorney General Vanita Gupta stated that this practice affected more than 140 million Twitter users while boosting Twitter's primary source of revenue. The violation was recorded between May 2013 to September 2019 and violated a 2011 consent order between the Federal Trade Commission (FTC) and Twitter that prevented the company from misrepresenting how it used individuals' contact information. The complaint that was filed by the U.S. District Court for the Northern District of California also alleged that Twitter falsely claimed to comply with the European Union-US and Swiss-US Privacy Shield Frameworks. The social media giant said it will comply with the court's decision, pay the fine and introduce a comprehensive privacy and information security program, which will include independent security audits every two years until 2042. Twitter will also have to notify U.S. customers who joined its platform before September 17, 2019, about the settlement and provide them with options for protecting their privacy and security in the future.

    Infosecurity reports: "Twitter to Pay $150m Fine to Resolve Data Privacy Violations"

  • news

    Visible to the public "Fronton IoT Botnet Packs Disinformation Punch"

    The Fronton botnet can do far more than execute Distributed Denial-of-Service (DDoS) attacks. It can also track social media trends and launch fitting propaganda. The Fronton DDoS-focused botnet first made headlines in March of 2020, when a hacktivist group called Digital Revolution said it obtained documents claiming to be from 0day Technologies, which is allegedly a contractor for Russia's Federal Security Service. According to the cybersecurity firm Nisos, Fronton malware goes beyond delivering DDoS attacks as it can also be used to create massive numbers of social media accounts aimed at shaping opinion via social media manipulation. Further examination of Fronton-related documents reveals that DDoS is only one of the botnet's many capabilities. Fronton has been determined to be a system created for coordinated inauthentic activity on a vast scale. Researchers say Fronton also serves as a backbone infrastructure for disinformation on social media. DDoS attacks and disinformation operations are carried out by the malware using an army of infected Internet of Things (IoT) devices. This system incorporates SANA, a web-based dashboard that allows users to mass-produce and deploy trending social media events. The system creates these events, which it refers to as 'newsbreaks,' by using the botnet as a geographically distributed transport. SANA allows users to create fake social media identities with generated email and phone numbers. These fake accounts are then used to distribute content throughout social networks, blogs, and forums. The platform also allows users to adjust the number of likes, comments, and reactions. This article continues to discuss findings surrounding the Fronton IoT botnet's capabilities.

    Threatpost reports "Fronton IoT Botnet Packs Disinformation Punch"

  • news

    Visible to the public "Programming Languages: How Google Is Improving C++ Memory Safety"

    Google's Chrome team is exploring the use of heap scanning to decrease memory-related security flaws in Chrome's C++ codebase, but the method takes up a lot of memory unless newer ARM hardware is used. Google cannot simply replace Chrome's existing C++ code with memory-safe Rust, so it is working on ways to increase the memory safety of C++ by scanning heap-allocated memory. Chrome engineers have discovered how to make C++ safer to reduce memory-related security flaws such as buffer overflow and Use-After-Free (UAF), which make up 70 percent of all software security flaws. C++ does not guarantee that memory is always accessed with the most up-to-date structure information. Therefore, Google's Chrome team has been experimenting with using a "memory quarantine" and heap scanning to prevent the reuse of memory that is still reachable. According to Google, the idea behind ensuring temporal safety with quarantining and heap scanning is to prevent reusing memory until it has been proven that there are no more (dangling) pointers referring to it. This article continues to discuss Google's efforts towards improving C++ memory safety.

    ZDNet reports "Programming Languages: How Google Is Improving C++ Memory Safety"

  • news

    Visible to the public "Identity-Based Attacks on Organizations Surged in 2021"

    Identity-based attacks and living-off-the-land (LotL) behaviors were the top two threats to organizations in 2021, according to a report recently released by Blumira. The new data was derived from an analysis of Blumira's security detections across 230 organizations' log datasets. One of the most important discoveries was that identity attacks increased. Identity-driven techniques made up three out of Blumira's top five findings at 60 percent. Jim Simpson, CEO of Blumira, pointed out that the last few years accelerated transformation in the modern workplace regarding how people use tools to access and perform work activities. Threat actors are well aware that such changes often introduce security vulnerabilities, especially when it comes to maintaining identities. Simpson emphasized that the growth in identity-based attacks calls on organizations to improve towards having better visibility across their environments, particularly in cloud and hybrid ones. This article continues to discuss the observed increase in identity-based attacks against organizations.

    SC Magazine reports "Identity-Based Attacks on Organizations Surged in 2021"

  • news

    Visible to the public "What is Keeping Automotive Software Developers up at Night?"

    Security researchers at Perforce Software released the results of its annual State of Automotive Software Development survey conducted in partnership with Automotive IQ. Close to 600 automotive development professionals across the globe provided responses to current practices and emerging trends within the industry. The researchers stated that key findings suggest a growing concern for automotive software security while the automotive vehicle market continues to evolve rapidly. The increasing amount of software installed in vehicles can lead to more safety and security considerations during the development process. In fact, 76% of automotive developers have adopted or are in the process of adopting a shift-left strategy to identify software security and safety vulnerabilities as early as possible. The researchers also found that automotive developers' top three leading concerns are safety (34%, a decrease of 9% from last year), security (27%, an increase of 5% over last year), and quality (25%, a rise of 4% over last year). Of those most concerned with safety, 46% said their biggest concerns are the difficulties and time required to fulfill every ISO 26262 requirement. The researchers stated that autonomous, semi-autonomous, electric, and connected vehicle development is also significantly impacting development teams. The majority of teams are working on autonomous and semi-autonomous components (82%, an increase of 38% over last year), electric components (87%, an increase of 39% over last year), and connectivity components (83%, an increase of 34% over last year) to some degree. Another notable finding was that 86% use a coding standard to ensure safe, secure, and reliable code, with 46% of those surveyed using a static code analysis tool to aid in compliance, and 31% use a SAST tool to ensure secure software.

    Help Net Security reports: "What is Keeping Automotive Software Developers up at Night?"

  • news

    Visible to the public "Survey Evidences Leaders Lack Confidence in Cyber-Risk Management"

    Security researchers at Marsh have discovered that leaders of cybersecurity, IT, risk management, insurance, and finance companies are losing confidence in the ability of their organizations to ward off ransomware attacks. The researchers surveyed more than 660 cyber-risk decision-makers. In 2019, 19.7% of those surveyed said they were highly confident in their capacity to manage cyber-risk compared to 19% in 2022. The researchers noted that this demonstrates that leaders' perspectives have changed little over the course of three years. Less than half of those surveyed (43%) stated that their organization has conducted a risk assessment of vendors and supply chains. The researchers noted that this finding indicates that companies are falling behind in their cybersecurity strategies when it comes to assessing the threats faced by vendors and supply chains during a time when attacks are on the rise. In 2019, a mere three in 10 survey participants (30%) stated that their company used quantitative methods to measure exposure to cyber risk. This figure increased to just four in 10 respondents in 2022 (38%). The use of quantitative methods in assessing cyber risk is critical as it helps determine volatility.

    Infosecurity reports: "Survey Evidences Leaders Lack Confidence in Cyber-Risk Management"

  • news

    Visible to the public "BlackCat/ALPHV Ransomware Asks $5 Million to Unlock Austrian State"

    The BlackCat ransomware gang, also known as ALPHV, has targeted the Austrian federal state Carinthia, demanding $5 million to unlock encrypted computer systems. The threat actor allegedly locked thousands of workstations during the attack, causing significant operational interruption to government services. Carinthia's website and email service are temporarily down, and the government cannot issue new passports or traffic fines. Furthermore, the cyberattack has hindered the processing of COVID-19 tests and contact tracing through the region's administrative offices. However, according to Gerd Kurath, a spokesperson of the state, the attacker's demands will not be met. According to the representative, there is currently no proof that BlackCat stole any data from the state's systems. The state's current plan is to restore the workstations using available backups. In November 2021, the ALPHV/BlackCat ransomware gang emerged as one of the more advanced ransomware operations. They are a rebranded version of the DarkSide/BlackMatter group that carried out the Colonial Pipeline attack last year. The FBI issued a warning that BlackCat had compromised at least 60 entities globally. The attack on Carinthia and the hefty ransom demands suggest that the threat actor is focusing on organizations that can pay a considerable sum of money to have their systems decrypted and avoid further financial losses due to lengthened operational disruption. This article continues to discuss the BlackCat/ALPHV ransomware attack on Carinthia and the history of this ransomware gang.

    Bleeping Computer reports "BlackCat/ALPHV Ransomware Asks $5 Million to Unlock Austrian State"

  • news

    Visible to the public "A Quarter of World's Internet Users Rely on Infrastructure That Is Susceptible to Attack"

    A large-scale study conducted by computer scientists at the University of California San Diego found that nearly a quarter of the world's Internet users reside in countries more vulnerable than previously thought to attacks on Internet infrastructure. Findings show that many of the at-risk countries are in the Global South. Alexander Gamero-Garrido, the paper's first author, said the team sought to investigate the Internet's topology in order to identify weak links that, if compromised, could expose an entire nation's traffic. The topology of the Internet can vary considerably around the globe. In developed countries such as the US, many Internet Service Providers (ISPs) compete to serve a large number of users. These networks are directly connected to each other and exchange content, a process called direct peering. All of the ISPs can also connect directly to the global Internet infrastructure. However, as Gamero-Garrido pointed out, a large portion of the Internet does not function with peering agreements for network connectivity. In countries that are still developing, most users rely on a handful of providers for Internet access, one of which serves an overwhelming majority of users. Furthermore, those providers rely on a small number of companies known as transit autonomous systems to access the global Internet and traffic from other countries. The researchers discovered that these transit autonomous system providers are often state-owned. Countries with this type of Internet infrastructure are particularly vulnerable to attacks because only a few transit autonomous systems have to be crippled. These countries are also vulnerable if the main ISP has an outage. This article continues to discuss findings from the study on quantifying nations' exposure to traffic observation and selective tampering.

    UC San Diego reports "A Quarter of World's Internet Users Rely on Infrastructure That Is Susceptible to Attack"

  • news

    Visible to the public "Verifiable Searchable Symmetric Encryption for Conjunctive Keyword Queries in Cloud Storage"

    Searchable Symmetric Encryption (SSE) enables secure outsourcing of encrypted databases to cloud storage, while maintaining searchable features. Most of the various SSE schemes assume the server is honest but curious, while the server could be trustless in the real world. Given the possibility of a malicious server not performing the queries honestly, Verifiable SSE (VSSE) techniques are designed to guarantee the verifiability of the search results. Existing VSSE schemes, on the other hand, are either limited to single-keyword searches or suffer high computational costs during verification. Therefore, a research team led by Joseph K. Liu, has proposed a new VSSE construction that supports conjunctive keyword queries, which is an improvement of a recent VSSE solution. The team's proposed VSSE scheme is based on a privacy-preserving hash-based accumulator, using Symmetric Hidden Vector Encryption (SHVE), a well-established cryptographic primitive. This article continues to discuss SSE schemes, VSSE schemes, and the new proposed VSSE construction for conjunctive keyword queries in cloud storage.

    SCIENMAG reports "Verifiable Searchable Symmetric Encryption for Conjunctive Keyword Queries in Cloud Storage"

  • news

    Visible to the public "Report Explores Child’s Data Safety Legislation Across 50 Countries"

    Comparitech has released a new report exploring legislation about child data collection in the world's top 50 countries by gross domestic product (GDP). The researchers assessed 23 different aspects of these policies to assess whether specific legislation was in place for children's online data or not. Aspects examined included requirements for privacy policies, parental consent and authority, and restrictions on who had access to the data internally. All the aspects were then assigned a score, and countries were ranked based on the collective score they achieved. The researchers stated that of the 50 countries on the list, 18 were entirely lacking legislation to address the collection and processing of children's data online. The researchers noted that in the nations where specific safeguards for processing children's data were present, the legal system allowed for loopholes for government treatment of children's data, for instance, for public safety. Additionally, none of the countries on the list had rules against the online government surveillance of children. The researchers stated that in terms of the nations that ranked higher, France was at the top, with 34.5 out of 44 points. The country scored two points higher than the rest of the EU as its legislation allowed children to be, in some cases, involved in the consent process alongside their parent/guardian. Other countries in the European Union (except Switzerland) ranked 32.5, mainly due to the safeguards on children's data provided by the General Data Protection Regulation (GDPR). As far as the US is concerned, the country scored 29.5, presenting a lack of comprehensive children's data protection. According to the researchers, COPPA legislation established some safeguards, but these seem to be currently scarcely followed by many Android developers.

    Infosecurity reports: "Report Explores Child's Data Safety Legislation Across 50 Countries"

  • news

    Visible to the public "Exposed: The Threat Actors Who Are Poisoning Facebook"

    Cybernews researchers' investigation of the Facebook 'Is That You?' video phishing scam, which has been active since 2017, has resulted in the discovery of a 'cybercriminal stronghold.' Every day, threat actors perform this phishing scam to infect the social network with malicious links. The investigation also identified at least five suspects, all of whom are believed to reside in the Dominican Republic. Following a tip from cyber investigator Aidan Raney, the Cybernews team found that thousands of phishing links had been distributed via a sophisticated network spanning the social media platform's back channels. Using the threat actors' own information, the team was able to gain access to a website proven to be the command-and-control (C2) center for most of the gang's phishing attempts. All pertinent information has been turned over to authorities for further investigation. Meanwhile, Facebook users are urged to create complex passwords, enable Multi-Factor Authentication (MFA), and be on the lookout for any unusual social media messages, even if they appear to come from contacts. This article continues to discuss findings from the Cybernews research team's investigation of the infamous 'Is That You?' phishing scam.

    Cybernews reports "Exposed: The Threat Actors Who Are Poisoning Facebook"

  • news

    Visible to the public "Most Organizations do Not Follow Data Backup Best Practices"

    Security researchers at Apricorn announced new findings from a survey, which revealed that while the majority of organizations have data backup plans in place, data for many are at risk. The researchers surveyed almost 400 veteran IT security practitioners in industries such as healthcare, IT, education, financial services, and manufacturing about security practices around remote and hybrid work, focusing on data resiliency. Most of the respondents (93%) say they have a ransomware readiness plan, but significant knowledge gaps exist with regard to adequate backup and cyber resilience practices. The researchers stated that 26% of participants view the cloud as too risky for data backup, but only one in three back up to both the cloud and to encrypted hardware storage devices. Most participants (82%) want their organizations to require encrypted hardware USB usage, but only 34% have mandated such a policy. Additionally, only 20% back up in real time, and only 18% employ the long-established best practice for backup, the 3-2-1 method. During the research, it was discovered that two years into the pandemic, 81% of respondents agree that remote and hybrid work are now standard practices within their organizations. However, 20% are not circling back to address security holes that exist as a result of the rapid changes made to accommodate work-from-home and remote work policies at the start of the pandemic. Of the 80% of participants that are going back to address pandemic-rushed policies, only 41% are addressing integration and enforcement of new technologies such as external USB storage devices, hardware storage, and encryption. And only 34% have put a policy in place to mandate encrypted USB storage devices for protecting data on the move. The researchers also found that 25% of respondents noted that the strict hybrid work policies they put in place are not being adhered to by employees, despite 82% of them continually reinforcing those policies to employees. Additionally, 60% of respondents do not back up their data or devices in advance of working remotely.

    Help Net Security reports: "Most Organizations do Not Follow Data Backup Best Practices"

  • news

    Visible to the public "Multiple Flights Across India Grounded After SpiceJet Airline Hit With Ransomware"

    India's SpiceJet airline has revealed that its systems were hit with a ransomware attack, delaying flights and leaving many stranded at airports. According to SpiceJet, the incident impacted several flights, specifically at airports where restrictions are put in place for night operations. Although the company claims that its IT team has contained the attack to a large extent and fixed the situation, flights are still impacted by the incident, leading to delays. SpiceJet is India's second-largest airline, carrying nearly 12 million domestic passengers a month. Based in Delhi and Hyderabad, the airline has over 630 flights each day and serves 54 Indian cities as well as 15 other international destinations. This is not the first time the airline has had a cybersecurity problem. In 2020, a security researcher was able to hack into SpiceJet's systems and gain access to personal information belonging to 1.2 million passengers, including some government leaders. This article continues to discuss the ransomware attack on the SpiceJet airline that left passengers stranded and other cybersecurity issues previously faced by the airline.

    The Record reports "Multiple Flights Across India Grounded After SpiceJet Airline Hit With Ransomware"

  • news

    Visible to the public "Cyber Authority Issues Warning About New Ransomware Attack on Smart Cash Registers"

    The Israel National Cyber Directorate (INCD) has issued a warning to retailers across the country about a new and pervasive cyber ransomware attack targeting smart cash register software, which is said to be difficult to detect. According to the INCD, the large-scale ransomware operation restricts access to the software and demands a fee for it to be restored. The attack is aimed at software companies providing services for storing cash registers. The attack method involves displaying a message on the cash register screen that appears to be a real system notification from the management interface (screen connect). When the message is clicked, the malware is launched, locking the cash register and preventing it from functioning. The INCD applauded software vendors for warning their customers not to click on the imitated system message, which is assisting in mitigating some of the damage. The directorate advises stores that use the product and organizations that provide services in the sector to reset passwords and avoid clicking on suspicious messages and links, even if they appear to come from a trusted business partner. This article continues to discuss the INCD's warning about ransomware attacks on smart cash registers.

    CyberIntelMag reports "Cyber Authority Issues Warning About New Ransomware Attack on Smart Cash Registers"

  • news

    Visible to the public "Critical Vulnerabilities Found in Open Automation Software Platform"

    Cisco's Talos research and threat intelligence unit discovered several critical and high-severity vulnerabilities in the Open Automation Software Platform. Open Automation Software is a US-based company that provides connectivity solutions for ICS or IoT devices, databases, and custom applications. The company's Open Automation Software (OAS) Platform, powered by a universal data connector, can be used to move data between PLCs from different vendors, from a PLC to a database, or from a database into a visualization. The researchers discovered that the OAS Platform is affected by eight vulnerabilities that an attacker can exploit for arbitrary code execution, DoS attacks, obtaining sensitive information, and other purposes. The vendor was informed about the vulnerabilities in March and April and released patches last week. The researchers stated that two vulnerabilities have been assigned a "critical" severity rating based on their CVSS score. This includes CVE-2022-26082, a file write vulnerability that can be exploited for remote code execution using specially crafted network requests, and CVE-2022-26833, which allows an attacker to authenticate as the default user with a blank username and password sent to a certain endpoint. The researchers stated that the five high-severity issues are related to the cleartext transmission of sensitive data, the exposure of sensitive information to unauthenticated attackers that can send specially crafted network requests, loss of communications triggered by a malicious request, and the creation of user accounts and custom security groups using unauthenticated configuration messages.

    SecurityWeek reports: "Critical Vulnerabilities Found in Open Automation Software Platform"

  • news

    Visible to the public "Three-quarters of Security Pros Believe Current Cybersecurity Strategies Will Shortly Be Obsolete"

    Security researchers at Crossword Cybersecurity Plc surveyed more than 200 CISOs and senior cybersecurity professionals and found that 40% of respondents said their current cybersecurity strategy will likely be outdated in just two years. A further 37% said this would happen in three years. The researchers stated that due to the increasing number of cyberattacks coupled with constant tech innovation means, companies must continuously update their cybersecurity strategies. More than three-fifths (61.4%) of participants marked themselves as "fairly confident" in their ability to thwart cyberattacks. The researchers noted that less than half (44%) of respondents said they had the means necessary to protect their organization against immediate and mid-term risk, alongside tech trends. The researchers stated that boards must make sure CISOs have the budget necessary to get short-term issues under control and then begin planning a long-term business-wide strategy. The researchers noted that cybersecurity pros presently believe companies are predominantly focused on short-term priorities, namely software verification and ransomware attacks. In the next 12 months, three-quarters of respondents stated that software verification would be a crucial focus, while 69% of those surveyed said they would transition to the cloud. Additionally, two-thirds (67%) of participants said they would focus on handling the threat of ransomware attacks.

    Infosecurity reports: "Three-quarters of Security Pros Believe Current Cybersecurity Strategies Will Shortly Be Obsolete"

  • news

    Visible to the public "Quanta Servers Caught With 'Pantsdown' BMC Vulnerability"

    A critical firmware vulnerability has been discovered in several popular Quanta Cloud Technology (QCT) server models that power hyperscale data center operations and cloud provider infrastructure. The vulnerability puts them at risk of attacks that gain complete control of the server and can spread across multiple servers on the same network. According to new research published by Eclypsium, the QCT models are vulnerable to the "Pantsdown" vulnerability (CVE-2019-6260), a flaw found in 2019 that affects Baseboard Management Controller (BMC) technology on many firmware stacks used in modern servers. BMCs are minicomputers housed within servers that include their own power supply, firmware, memory, and networking stack. They enable remote administrators to control the server to manage low-level hardware settings, update host operating systems, and manage virtual hosts, applications, or data on the system. Servers are often managed through BMCs using Intelligent Platform Management Interface (IPMI) controlled groups that share the same password, making it easier to move across systems once one BMC is compromised. That type of privilege makes BMCs attractive targets for attackers when flaws like these emerge. This article continues to discuss the Pantsdown BMC vulnerability present in QCT servers.

    Dark Reading reports "Quanta Servers Caught With 'Pantsdown' BMC Vulnerability"

  • news

    Visible to the public "Hackers Compromised Synapse X Scripting Engine To Inject Trojan Code Into Roblox Game"

    In March 2022, researchers at Avanan discovered that hackers inserted Trojan code in the Synapse X scripting engine used to generate Roblox cheat codes. Roblox is a popular game, with over 50 million daily active users worldwide. Hackers were found installing a self-executing program that dropped three executable library files (DLLs) into the Windows system folder. One of the malicious files contains Trojan code and might be referenced by Windows to run persistently as a Windows service or background process. The infected Trojan file, which is hidden in the Windows system folder, can corrupt or erase data and interact with hackers. These privileges could enable hackers to launch additional payloads or encrypt data with ransomware. Avanan detected the Trojan code file in a customer's OneDrive folder, which was most likely uploaded by mistake. The researchers warned that the malware infection in the game could pose major cybersecurity concerns, particularly to unsecured devices. As employees may mistakenly copy the malicious files from infected devices, the Trojan code creates a corporate cybersecurity risk. Furthermore, children playing the Roblox game on their parents' work computers could install the compromised Synapse X scripting engine to gain cheat codes. This article continues to discuss the discovery of a Trojan file hidden inside the legitimate Synapse X scripting tool and the Roblox game maker's response to the exploit reported by Avanan.

    CPO Magazine reports "Hackers Compromised Synapse X Scripting Engine To Inject Trojan Code Into Roblox Game"

  • news

    Visible to the public "'Beam Me Up:' Nation's First Quantum Drone Provides Unrivaled Security"

    Florida Atlantic University's (FAU) Warner A. Miller, Ph.D., together with Qubitekk and L3Harris, is leading the US in efforts to deliver the first drone-based, mobile quantum network to smoothly maneuver around buildings, inclement weather, and terrain and quickly adjust to changing environments. The US Office of the Secretary of Defense (OSD) entrusted FAU to develop the project in collaboration with Qubitekk, a leader in manufacturing entangled photon sources and other hardware for networking quantum processors and sensors. The network consists of a ground station, drones, lasers, and fiber optics to share quantum-secured information. Arthur Herman, Ph.D., senior fellow and director of the Quantum Alliance Initiative at Hudson Institute and one of the nation's top quantum experts in defense, energy, and technology issues, highlighted that this contract award is a significant step forward for creating hack-proof quantum communication networks, which will eventually span the globe, including space. Quantum distribution offers a secure communication method for sending information between shared parties. This article continues to discuss the project on developing the nation's first drone-based mobile quantum network for unhackable wireless communication.

    FAU reports "'Beam Me Up:' Nation's First Quantum Drone Provides Unrivaled Security"

  • news

    Visible to the public SoS Musings #61 - Security and Privacy Labeling

    SoS Musings #61 -

    Security and Privacy Labeling

  • news

    Visible to the public Cyber Scene #68 - Looking Inward

    Cyber Scene #68 -

    Looking Inward

  • news

    Visible to the public Cybersecurity Snapshots #30 - The Water Sector Needs to Take Cybersecurity Seriously

    Cybersecurity Snapshots #30 -

    The Water Sector Needs to Take Cybersecurity Seriously

  • news

    Visible to the public Spotlight on Lablet Research #30 - An Automated Synthesis Framework for Network Security and Resilience

    Spotlight on Lablet Research #30 -

    An Automated Synthesis Framework for Network Security and Resilience

  • news

    Visible to the public "IBM Develops AI-Powered z16 to Help Thwart Quantum Cyber Attacks"

    IBM recently unveiled its next-generation system called IBM z16. The system has an integrated on-chip Artificial Intelligence (AI) accelerator for delivering latency-optimized inferencing. With IBM z16, clients will be able to analyze real-time transactions at scale. IBM z16 is especially valuable for mission-critical workloads such as credit card, health care, and financial transactions. Inference is the process of calculating a specific outcome by running live data points through a Machine Learning (ML) model. In financial transactions, for example, the outcome could be a numerical score that can detect fraud. While beneficial, inference is frequently too slow to run all transactions at scale without compromising service standards. IBM z16 is intended to make those limitations obsolete. With z16, IBM built an AI accelerator on the IBM Telum processor. As a result, banks can now analyze fraud on a vast scale during transactions. IBM z16 can process 300 billion inference requests per day with a latency of just one millisecond. As claims can be processed more quickly, z16 may alleviate the frustration of dealing with fraudulent credit card transactions for consumers. Low latency inference equals less revenue loss for retailers and card issuers. Consumer turnover is less likely with improved inference since there are fewer incorrect charge declines and better customer service. IBM z16 uses lattice-based cryptography, which is a quantum-safe technique that creates security primitives. These primitives aid in protecting data and systems from existing and future threats. IBM z16's secure boot and quantum-safe cryptography can assist clients in mitigating potential quantum-computing risks, including 'harvest now, decode later' attacks, which can result in extortion, intellectual property theft, and the exposure of sensitive data. This article continues to discuss the capabilities and expectations of IBM z16.

    Security Intelligence reports "IBM Develops AI-Powered z16 to Help Thwart Quantum Cyber Attacks"

  • news

    Visible to the public "Organizations Urged to Fix 41 Vulnerabilities Added to CISA’s Catalog of Exploited Flaws"

    This week, the Cybersecurity and Infrastructure Security Agency (CISA) has added 41 vulnerabilities to its catalog of known exploited flaws. CISA has urged all organizations to remediate these vulnerabilities promptly to "reduce their exposure to cyberattacks." Federal Civilian Executive Branch (FCEB) agencies are required by law to remediate all vulnerabilities in the catalog by the specified due date. The newly added vulnerabilities span six years, with the oldest disclosed in 2016. This is a Microsoft Internet Explorer information disclosure vulnerability named CVE-2016-0162. The most recent vulnerability added to the catalog was a Cisco IOS XR open port vulnerability (CVE-2022-20821), which was fixed last week. This vulnerability allows attackers to connect to the Redis instance on the open port and allow access to the Redis instance that is running within the NOSi container. The Windows elevation of privileges vulnerability CVE-2020-0638 was disclosed in 2020 but was still being utilized by the Conti ransomware gang for their attacks on corporate networks this year. Other notable vulnerabilities that were newly added to the catalog include two Android Linux Kernel flaws: CVE-2021-1048 and CVE-2021-0920. These are only known to be used in limited attacks against Android devices. The rest of the flaws added to the catalog relate to software products from Cisco, Microsoft, Apple, Google, Mozilla, Facebook, Adobe, and Webkit GTK software products. These range from 2018 to 2021. Federal agencies are required to patch the 21 vulnerabilities added on May 23 by June 13, while the 20 added on May 24 must be fixed by June 14.

    Infosecurity reports: "Organizations Urged to Fix 41 Vulnerabilities Added to CISA's Catalog of Exploited Flaws"

  • news

    Visible to the public  "New Tool in the Fight Against Hackers"

    Mathematicians at the University of Copenhagen made an advancement toward a new type of security identification that could help protect data from cybercriminals. They solved a mathematical puzzle that enables the use of a person's geographical location as a personal ID. This ID is secure against cyberattacks, including the most advanced ones. The researchers used the laws of quantum physics to develop a new security protocol that uses a person's geographical location to ensure they are communicating with the correct person. It is called position-based quantum encryption and can be used to ensure that a person is communicating with an actual bank representative when the bank calls and asks a customer to make changes to their account. The researchers' approach to securing a person's location involves combining the information in a single quantum bit (qubit) and classical bits. Both types of bits are required to send a message that cybercriminals cannot read, hack, or manipulate. Both types are also needed to confirm if a person is at a bank's office or in a faraway country. The qubit serves as a lock on the message because of the role of Heisenberg's Uncertainty Principle in quantum physics that causes quantum information to be disrupted and unable to be decoded when trying to measure it. The researchers say their new method is useful because it only needs one quantum bit for position verification. Unlike other quantum technologies, this new advancement can be applied today as suitable quantum sources that can send a qubit of light already exist. This article continues to discuss the single-qubit position verification protocol that is secure against multi-qubit attacks and why this method could soon be applicable.

    Science Daily reports "New Tool in the Fight Against Hackers"

  • news

    Visible to the public "Alleged Cybercrime Ringleader Arrested in Nigeria"

    Recently an unnamed Nigerian man was arrested over his alleged role in leading a cybercrime group that specialized in phishing and business email compromise (BEC). Interpol announced that the arrest was a result of an international operation involving law enforcement and several cybersecurity companies. In December 2021, Nigerian police arrested 11 people believed to be involved in BEC schemes. They were allegedly part of an activity cluster tracked as SilverTerrier, which has been active since at least 2014 and which is composed of hundreds of threat actors involved in BEC attacks. SilverTerrier cybercrime group has targeted tens of thousands of companies and individuals worldwide with fake emails designed to trick victims into wiring money to bank accounts they control. The 37-year-old, who was the leader of the SilverTerrier, fled Nigeria last year before authorities could apprehend him, but he was detained in March 2022 while attempting to enter Nigeria. Palo Alto Networks stated that this individual's alias had been used to register more than 240 domains, including 50 that were used for malware command and control. The company noted that he shares social media connections with several of the people arrested last year, and he appears "well connected" with other known BEC actors.

    SecurityWeek reports: "Alleged Cybercrime Ringleader Arrested in Nigeria"

  • news

    Visible to the public "New Project to Help Identify and Predict Insider Threats"

    Insider attacks remain one of the most serious security issues faced by large businesses. Anyone accessing a company's data can pose a threat, including current and former employees, business partners, and contractors. Insider threats have become more common in recent years, at a high cost to businesses. Jingrui He, Associate Professor at the University of Illinois Urbana-Champaign, is tackling this issue with a new project that aims to detect and predict insider threats. The C3.ai Digital Transformation Institute has awarded her a three-year, $200,000 grant for her project, "Multi-Facet Rare Event Modeling of Adaptive Insider Threats." According to He, her team's goal is to answer the question, "How can we detect and model the rare and adaptive insider threats in big organizations based on multimodal data, such as computer logon and logoff activities, email exchanges, and web browsing history?" The team will integrate the information from multimodal data to detect outliers and rare category types of insider threats. Then they will study the adaptive behaviors of insider threats and propose dynamic update techniques based on the models they develop. This article continues to discuss the new project on the identification and prediction of insider threats.

    The University of Illinois Urbana-Champaign reports "New Project to Help Identify and Predict Insider Threats"

  • news

    Visible to the public "GoodWill Ransomware Demands People Help the Most Vulnerable"

    Security researchers at CloudSEK have discovered a "ransomware with a cause." The researchers warned that GoodWill ransomware could lead to both temporary and permanent loss of company data. In addition, the ransomware could lead to a complete shutdown of operations and revenue loss. The researchers were able to trace the email address provided by the ransomware group back to an India-based IT security solutions and services company that provides end-to-end managed security services. GoodWill ransomware was identified by CloudSEK researchers in March 2022. The ransomware operators are allegedly interested in promoting social justice rather than conventional financial reasons. The researchers stated that if the GoodWill ransomware affects a system, every single document, photo, video, database, and file becomes encrypted, after which users can no longer access the data without a decryption key. The actors then suggest that victims perform three socially driven activities in exchange for the decryption key: donate new clothes to the homeless, record the action and post it on social media; take five less fortunate children to Dominos, Pizza Hut, or KFC for a treat, take pictures and videos and post them on social media; and provide financial assistance to anyone who needs urgent medical attention but cannot afford it, at a nearby hospital, record audio, and share it with the operators. The researchers noted that should the target carry out these three tasks, the ransomware asks them to share a message on Facebook or Instagram, demonstrating "how you transformed yourself into a kind human being by becoming a victim of a ransomware called GoodWill." Once verified, the person orchestrating this invasive event will reportedly provide those affected with a decryption kit to recover the stolen data.

    Infosecurity reports: "GoodWill Ransomware Demands People Help the Most Vulnerable"

  • news

    Visible to the public  "Messages Sent Through Zoom Can Expose People to Cyberattack"

    A researcher from Google Project Zero discovered four vulnerabilities affecting Zoom. The four vulnerabilities range from 5.9 to 8.1 in severity. The researcher noted that the vulnerabilities could be exploited to compromise users over chat by sending specially crafted Extensible Messaging and Presence Protocol (XMPP) messages and executing malicious code. The bugs include CVE-2022-22784 (CVSS score: 8.1) improper XML parsing in Zoom Client for Meetings; CVE-2022-22785 (CVSS score: 5.9) improperly constrained session cookies in Zoom Client for Meetings; CVE-2022-22786 (CVSS score: 7.5) update package downgrade in Zoom Client for Meetings for Windows; CVE-2022-22787 (CVSS score: 5.9) insufficient hostname validation during server switch in Zoom Client for Meetings. The researcher stated that the issue at the core of these vulnerabilities is the ability of a cyberattacker to find inconsistencies between XML parsers in the software's client and server. When this happens, XMPP stanzas can be sent to the victim of the attack. This allows hackers to take advantage of software updates, weaponizing the process and delivering an outdated, less secure version of Zoom to prospective targets through a malicious server. The researcher stated that Microsoft systems with Zoom are the most susceptible to these vulnerabilities. However, Android, iOS, macOS, and Linux are all vulnerable to CVE-2022-22784, CVE-2022-22785, and CVE-2022-22787. Zoom advises downloading the latest version of the app (5.10.0).

    Infosecurity reports: "Messages Sent Through Zoom Can Expose People to Cyberattack"

  • news

    Visible to the public "68% of Legal Sector Data Breaches Caused by Insider Threats"

    According to figures from the Information Commissioner's Office (ICO), more than two-thirds (68%) of data breaches at UK law firms are caused by insiders. ICO Data focused on Q3 2021 was analyzed by researchers from NetDocuments. The researchers found that just 32% of breaches in this sector were caused by outside threats, such as external malicious actors. The researchers stated that the dominance of insider breaches during this period is believed to be linked to the "great resignation," whereby workers are changing jobs at an unprecedented rate amid the COVID-19 pandemic. In industries like law, there is the danger of staff taking company data with them as they leave their roles. The researchers also found that over half (54%) of data breaches in the legal sector were due to human error in this period. This included documents being emailed or posted to the wrong recipient, failure to redact or use bcc on correspondence, and hardware misconfiguration. Linked to this, 52% of breaches occurred from sharing data with the wrong person via email, post, or verbally. The researchers noted that one in 10 (10%) incidents were attributed to data loss, such as loss/theft of devices containing personal data or of paperwork left in an insecure location. The researchers stated that it is clear that law firms need to be extra vigilant and take proactive steps to gain control over how files are accessed and what users can do with them while at the same ensuring their staff remain productive.

    Information Security reports: "68% of Legal Sector Data Breaches Caused by Insider Threats"

  • news

    Visible to the public "Schools Should Prep for Ransomware With Response and Comms Plans, Experts Say"

    Experts further highlight that better incident response plans and transparency with the public can help K-12 schools reduce the damage of cyberattacks. Doug Levin, co-founder and national director of the K12 Security Information eXchange, explained during GovExec's May 18 Cybersmart TV segment that the education sector faces various cyber challenges, including ransomware, targeted phishing scams, data breaches, and Denial-of-Service (DoS) attacks. Ransomware actors have been increasingly targeting K-12 schools since 2019. According to Levin, the most commonly reported incident faced by K-12 schools involves cybercriminals exfiltrating data about students and staff to boost their payoff demands. In addition to raising awareness, experts say schools need better incident response strategies. Very few educational organizations have plans in place that are designed to deal with cyberattacks. Plans should also cover how to communicate with stakeholders. Schools are encouraged to be transparent about security breaches as there have been districts that received poor headlines for hiding relatively minor occurrences. Others that experienced more damaging attacks gained the trust of parents and teachers by being more transparent about the incidents. This article continues to discuss cybersecurity threats facing K-12 schools and how school districts can mitigate the impact of cyberattacks.

    GCN reports "Schools Should Prep for Ransomware With Response and Comms Plans, Experts Say"

  • news

    Visible to the public "Screencastify Fixes Bug That Would Have Let Rogue Websites Spy on Webcams"

    Screencastify, a Chrome extension used for capturing and sharing videos from websites, was discovered to be vulnerable to a cross-site scripting (XSS) flaw that could have enabled arbitrary websites to trick people into unknowingly activating their webcams. A malicious actor could then download the resulting video from the victim's Google Drive account. Software developer Wladimir Palant, co-founder of ad amelioration biz Eyeo, has shared his findings of the XSS bug, which Screencastify's developers fixed in February. Palant claims the browser extension remains a threat since the code trusts several partner subdomains, and an XSS issue on any of those sites might be exploited to harm Screencastify users. Palant's proof-of-concept (PoC) exploit involved locating an XSS flaw in the Screencastify code, which was not difficult because they are prevalent. XSS is the second most common issue in the OWASP Top 10 and is found in almost two-thirds of all applications. This article continues to discuss the Screencastify Chrome extension XSS vulnerability and how it still poses a risk to users.

    The Register reports "Screencastify Fixes Bug That Would Have Let Rogue Websites Spy on Webcams"

  • news

    Visible to the public "Chaos Ransomware Builder Linked to Onyx and Yashma Variants"

    Researchers recently reported new findings surrounding the Chaos ransomware builder. The study revealed a family tree that links it to both the Onyx and Yashma ransomware variants. The BlackBerry research and intelligence team said there are signs linking the Chaos malware to Onyx and Yashma, which surfaced during a discussion between a recent victim and the threat group behind Onyx ransomware. The discussion occurred on the threat actor's leak site. The researchers say someone claiming to be the creator of the Chaos ransomware builder's kit joined the conversation, and revealed that Onyx was constructed based on the author's own Chaos v4.0 Ransomware Builder. The author then promoted the most current version of the Chaos ransomware line, which is now renamed Yashma. According to BlackBerry researchers, what makes Chaos-Yashma dangerous is its flexibility and widespread availability. Since the software is initially marketed and distributed as a malware builder, any threat actor who acquires it can mimic the threat organization behind Onyx, building their own ransomware strains and targeting specific victims. This article continues to discuss the linking of Onyx and Yashma ransomware with the Chaos ransomware builder, as well as the growth of ransomware tooling.

    SC Media reports "Chaos Ransomware Builder Linked to Onyx and Yashma Variants"

  • news

    Visible to the public "Cybersecurity Community Warned of Fake PoC Exploits Delivering Malware"

    Researchers discovered fake proof-of-concept (PoC) exploits that appear to have been created by threat actors to deliver malware to members of the cybersecurity community. On May 19, researchers revealed that GitHub was hosting malware disguised as PoC exploits for two Windows vulnerabilities Microsoft fixed with its April 2022 Patch Tuesday updates. The fake PoC exploits, which GitHub has since removed, were delivered as executable files that, when run, can open a backdoor to the system. The PoC exploits claimed to target CVE-2022-24500 and CVE-2022-26809, both of which can be used for Remote Code Execution (RCE) on Windows systems. Although there is no indication that the flaws have been used in attacks, some cybersecurity companies warn that they could pose a serious risk. For example, CVE-2022-26809 is suspected to be wormable. The threat intelligence company Cyble analyzed the fake PoC exploits, determining that threat actors were likely using them against members of the infosec community. Cyble also found posts on cybercrime forums in which the exploits were being discussed. The fake PoC exploits, which appeared to have been created by the same threat actor, were .NET binaries packed with an open-source application protector called ConfuserEx. Once executed, they displayed fake messages showing a failed attempt to exploit CVE-2022-24500 or CVE-2022-26809. Following the execution of this routine, the files executed a covert PowerShell command that delivered the Cobalt Strike Beacon payload, which may be used to download further malware and migrate laterally. This article continues to discuss the discovery of fake PoC exploits being used to deliver malware.

    Security Week reports "Cybersecurity Community Warned of Fake PoC Exploits Delivering Malware"

  • news

    Visible to the public "Vishing Cases Reach All Time High"

    Researchers from Agari and PhishLabs have discovered that vishing (voice phishing) cases have increased almost 550 percent over the last twelve months (Q1 2022 to Q1 2021). In Q1 2022, Agari and PhishLabs detected and mitigated hundreds of thousands of phishing, social media, email, and dark web threats targeting many enterprises and brands. According to the researchers, vishing attacks have overtaken business email compromise (BEC) as the second most reported response-based email threat since Q3 2021. The researchers stated that by the end of the year, more than one in four of every reported response-based threat was a vishing attack, and this makeup continued through Q1 2022. Hybrid vishing campaigns continue to generate stunning numbers, representing 26.1% of the total share in volume so far in 2022. During their research, the researchers also found that social media impersonation attacks are on the rise. Since Q2 2021, the volume of brand impersonations increased by 339%, and executive impersonations by 273%. Credential theft email scams continue to be the most common email threat type reported by employees, contributing to nearly 59% of all threat types encountered.

    Help Net Security reports: "Vishing Cases Reach All Time High"

  • news

    Visible to the public "SwRI Creates Cyber Threat Detection System"

    Researchers at the Southwest Research Institute (SwRI) developed an Intrusion Detection System (IDS) for Industrial Control Systems (ICS) aimed at helping government and industry improve the detection of cyber threats to industrial networks in critical infrastructure. The IDS, funded by SwRI, addresses emerging cyber threats faced in the continuously changing industrial automation ecosystem. The team applied algorithms to scan for cyber threats across network protocols that transmit industrial control data for natural gas pipelines, manufacturing robots, and more, which led to the development of the IDS for ICS. The design of ICS historically did not consider security as there was the benefit of having an air gap to enable ICS to operate securely without a connection to IT networks. However, it is no longer an option to unplug industrial networks from IT networks for modern automation systems that depend on Internet of Things (IoT) devices to transmit large amounts of data. Connecting IoT devices and other hardware leaves industrial networks vulnerable. Malicious actors could launch attacks via a vulnerable IoT device, network protocols, and outdated software. The SwRI team focused their research on scanning for cyberattacks over the Modbus/TCP protocol, which utilities and industry have used in Supervisory Controls and Data Acquisition (SCADA) systems equipment for decades. The algorithms they developed were applied in testing the recognition of normal Modbus/TCP traffic and identifying cyberattack vectors, such as data fuzzing/manipulation, address probing, and out-of-band timing. Their algorithms classify data packets as "regular" if they originate from an uncompromised industrial control device or "attack" if the source is an unexpected or compromised device. This article continues to discuss SwRI's research and development of the IDS system for ICS.

    TRR reports "SwRI Creates Cyber Threat Detection System"