News Items

  • news

    Visible to the public "Strong Password Policy Isn't Enough, Study Shows"

    Security researchers at Specops Software analyzed a database of more than 800 million known-breached passwords and found that 83% of the passwords met basic security standards set by five different standards agencies. The researchers stated that minimum password lengths prescribed by NIST, HITRUST for HIPPS, PCI, ICO for GDPR, and Cyber Essentials for NCSC ranged from seven to 10 and included requirements for password complexity, special characters, and numbers. None of the requirements were enough to keep compliant passwords off the breached list. Darren James stated that what the data is showing is that there is an excellent reason why some regulatory recommendations now include a compromised password check. Darren noted that complexity and other rules might help, but the most compliant password in the world doesn't do anything to protect your network if it's on a hacker's compromised password list.

    Dark Reading reports: "Strong Password Policy Isn't Enough, Study Shows"

  • news

    Visible to the public "IBM is Helping These Schools Build up Their Ransomware Defenses"

    IBM announced on Tuesday that it has expanded a program to improve the cybersecurity defenses of public schools with $5 million in grants. IBM stated that $5 million of in-kind grants would be awarded to public schools, including K-12 institutions in the United States. While IBM's existing grants program has previously focused on US schools, the scheme has now expanded to other countries. IBM said these programs are necessary to "help address cybersecurity resiliency in schools, including against ransomware." IBM noted that six grants are being awarded to US school districts. In addition, four grants are destined for Brazil, Costa Rica, Ireland, and the United Arab Emirates. Each award is worth $500,000, bringing the total to $5 million in resources and hours. IBM teams will work with schools to audit existing defenses and create playbooks for incident response. In addition, they will address cybersecurity awareness and training for staff, students, and parents and develop a management-level strategic plan for handling communication in the aftermath of a cyberattack. According to research by Emsisoft, more than 1,000 educational establishments in the US alone suffered a ransomware attack in 2021, including school districts, colleges, and universities. Charles Henderson, head of IBM Security X-Force, stated that for schools, a significant barrier to strengthening their cybersecurity posture often comes down to constrained budgets.

    ZDNet reports: "IBM is Helping These Schools Build up Their Ransomware Defenses"

  • news

    Visible to the public "New Countermeasure Against Unwanted Wireless Surveillance"

    Smart devices are intended to make our lives easier, but at the same time, they can serve as a conduit for passive eavesdropping. Researchers from the Max Planck Institute for Security and Privacy, the Horst Gortz Institute for IT Security at Ruhr-Universitat Bochum (RUB), and the Cologne University of Applied Sciences have developed a novel system for protecting privacy in wireless communication to prevent possible surveillance of the movement profile within one's home. Their approach is based on the technology of Intelligent Reflective Surfaces (IRS). To counter the method known as "adversarial wireless sensing," the team investigated the use of IRS, a forward-looking technology for establishing intelligent wireless environments. With this technology, many reflective elements are distributed over a surface, and their reflective behavior can be individually and electronically adjusted. This allows the elements to manipulate the incident radio waves dynamically. IRS can be configured to reflect signals in a specific direction. The researchers are the first to propose IRS as a practical countermeasure against passive wireless eavesdropping attacks. Their system called "IRShield" uses a specially designed algorithm that creates a random IRS configuration, thus disguising the wireless channels so that attackers can no longer read information about movements in the room from the signal. IRShield is designed to be a standalone privacy-friendly extension for plug-and-play integration into existing wireless infrastructures. This article continues to discuss the capabilities and testing of the IRShield system.

    RUB reports "New Countermeasure Against Unwanted Wireless Surveillance"

  • news

    Visible to the public "A 'Whale' of a Threat Evolves in the Financial Industry to Steal Sensitive Data"

    In cybersecurity, "whaling" refers to cybercriminals targeting high-level executives to steal the most privileged information and obtain access to the most sensitive data. According to Tonia Dudley, strategic adviser at Cofense, these whaling attempts typically begin with a phishing email. The FBI revealed that high-level whaling attacks cost businesses more than $12.5 billion in losses in 2021. Dudley pointed out that the themes observed across many campaigns were typically finance-related as they involved invoices, purchase orders, or quotes. Dudley added that Cofense has seen fewer attachments reaching the inbox for users to interact with, but HTML and HTM files have been observed consistently making it through security filters. Whaling campaigns are increasingly leveraging multiple stages in their attacks. For example, the first stage could begin with a link to a file-sharing cloud site such as Google, Dropbox, or DocuSign. Once the file has been downloaded, embedded files or links to pages will run the second stage, which might contain anything from a credential login page to malware leading to an entry point for a ransomware attack. This article continues to discuss the threat of whaling attacks against the financial industry.

    SC Media reports "A 'Whale' of a Threat Evolves in the Financial Industry to Steal Sensitive Data"

  • news

    Visible to the public "PyPI Served Malicious Version of Popular 'Ctx' Python Package"

    Researchers at Sonatype, SANS Institute, and an independent researcher have discovered that a popular Python package was compromised recently and replaced with a malicious version designed to help the attacker obtain AWS credentials. The researchers stated that two libraries appear to have been targeted in the attack, but only one of them may have had a more significant impact. The Python package named Ctx, which has, on average, 22,000 downloads per week, was compromised on the Python Package Index (PyPI) on May 14. The last Ctx update prior to this attack was uploaded to PyPI in December 2014, but new versions were published on and after May 14. The investigation by the researchers revealed that the original maintainer's domain name expired, and the attacker registered the domain on May 14. With access to the domain, they could have created an email address to which the password reset link would be sent. The Ctx versions uploaded by the attacker, 0.1.2 (this was also the last version of the original), 0.2.2, and 0.2.6 included functionality to steal data and upload it to a remote location controlled by the attacker. The researchers noted that targeted data in one version included AWS access key ID, computer name, and AWS secret access key when a dictionary is created. Another malicious version of Ctx targeted all environment variables. The second compromised library discovered by the researchers was the PHPass portable PHP password hashing framework. The original PHPass was deleted in September 2021, along with its original developer's account. The developer's username became available, and it was claimed by the attacker, giving them access to the project's GitHub account. The researchers noted that both impacted libraries have been taken down. While the malicious Ctx version may have impacted many users, PHPass appears to have had only a handful of installations in recent weeks. The researchers saw evidence that suggested the two incidents are related.

    SecurityWeek reports: "PyPI Served Malicious Version of Popular 'Ctx' Python Package"

  • news

    Visible to the public "Senate Report: US Government Lacks Comprehensive Data on Ransomware"

    According to a new report by the United States Senate Committee on Homeland Security & Governmental Affairs, the US government lacks comprehensive data on ransomware attacks, including how much is lost in payments. The report presented the findings of a 10-month investigation into the growing threat of ransomware. It cited FBI figures showing that the agency had received 3729 ransomware complaints with adjusted losses of more than $49.2m. However, it was stated that even these figures "likely drastically underestimate the actual number of attacks and ransom payments made by victims and related losses." Following numerous interviews with federal law enforcement and regulatory agencies, in addition to private companies that assist ransomware victims with extortion demands, the report concluded that there is a lack of data on this surging attack vector at the government level. It was noted that changing this is vital because "more data is needed to better understand and combat these attacks." In addition, it noted that this information will assist the investigation and prosecution of ransomware threat actors. The committee also emphasized the significant threat ransomware poses to US national security. According to the committee's report, the committee stated that data reporting and collection on ransomware attacks and payments is fragmented and incomplete. This is partly due to two separate federal agencies, the Cybersecurity and Infrastructure Security Agency (CISA) and the FBI, hosting different websites that each claim to host the government's one-stop location for reporting ransomware attacks. While the agencies state they share data with each other, companies that handle ransomware incident responses questioned the effectiveness of such communication channels' impact on assisting victims of an attack. The investigation also highlighted the growing role of cryptocurrencies, particularly Bitcoin, in ransomware attacks, which "has become a near-universal form of ransom payment." The committee noted that the decentralized nature of these currencies makes it challenging for law enforcement to identify and arrest the perpetrators, particularly foreign-based groups. Therefore, the committee recommended the prioritization of data collection on ransomware attacks as a crucial means of addressing increased national security threats.

    Infosecurity reports: "Senate Report: US Government Lacks Comprehensive Data on Ransomware"

  • news

    Visible to the public "Verizon DBIR: Healthcare Cyberattacks Increase, Insider Threats Remain"

    Verizon's 2022 Data Breach Investigations Report (DBIR) revealed a growth in cyberattacks across all sectors, including healthcare. Verizon discovered a 13 percent spike in ransomware year-over-year, representing an increase that is more significant than the previous five years combined. Researchers analyzed 23,896 security incidents, 849 of which were faced by the healthcare industry. In healthcare, 571 of the detected cyber events resulted in confirmed data leakage. Last year's Verizon report revealed that researchers observed 655 healthcare incidents, with 472 resulting in confirmed data disclosures. Although insider threats are prevalent in healthcare, external threats accounted for 61 percent of threat actors, a percentage that did not change by one percentage point from the previous year's report. The top three patterns did not change, but the order did. In the healthcare sector, basic web application attacks have surpassed other errors as the leading cause of breaches. Basic web application attacks, miscellaneous errors, and system intrusions accounted for 76 percent of all healthcare breaches. This article continues to discuss key findings from Verizon's DBIR regarding healthcare cyberattacks and threats.

    HealthITSecurity reports "Verizon DBIR: Healthcare Cyberattacks Increase, Insider Threats Remain"

  • news

    Visible to the public "Hospital Cyberattack Compromises Data From Decades Ago"

    A December cyberattack on a Canadian healthcare organization compromised a wide range of data, including patient information dating back to 1996 and personnel vaccination records from last year. Some of the compromised data came from a non-profit organization of affiliated clinicians. Arnprior Regional Health (ARH), which includes a hospital, long-term health facility, and other healthcare services in Arnprior, Ontario, Canada, claims it learned of unauthorized access to its IT system on December 21, 2021, during which data was stolen. According to ARH, the incident impacted 13 different categories of data, including several groupings of information regarding colonoscopies, COVID-19 and flu vaccinations, emergency room and in-patient satisfaction surveys, and patients on waiting lists. Individuals' personal and health information that could have been compromised included name, date of birth, health card number, time of visit, procedure and diagnosis, and demographics, depending on the category of data affected. This article continues to discuss the December cyberattack faced by ARH and recommendations for protecting legacy data.

    InfoRiskToday reports "Hospital Cyberattack Compromises Data From Decades Ago"

  • news

    Visible to the public "RansomHouse: Bug Bounty Hunters Gone Rogue?"

    A new cybercrime group that calls itself RansomHouse is attempting to carve out a niche of the cyber extortion market for itself by hitting organizations, stealing their data, and offering to delete it and provide a full report on how and what vulnerabilities were exploited in the process if the organization pays their demands. Researchers at Cyberint stated that RansomHouse's sole purpose is not to act as another ransomware group but rather to act as a pentesting/bug bounty group that forces their services on whoever does not take organizational security seriously enough. The group does not encrypt the organization's data, they just steal it and promise to delete it if they get paid. If the victim doesn't pay up, they either attempt to sell the stolen data or leak it online for everyone to see if no one is interested in buying. The researchers stated that the no-encryption approach is a technique they have seen on the rise lately, although its effect is not always what the threat groups might hope for. The researchers noted that overall, this technique will not work on every organization, and it depends on what type of data was stolen. For example, this technique will have a much higher success rate on organizations that are working on secret projects or patents rather than a company whose leak contains a minor number of customers' information. The researchers stated that by analyzing the contents of the group's Telegram channels, they believe the group might have a blue and red team background and might even be disgruntled bug bounty hunters.

    Help Net Security reports: "RansomHouse: Bug Bounty Hunters Gone Rogue?"

  • news

    Visible to the public "Microsoft: Credit Card Skimmers Are Changing Their Tactics to Remain Undetected"

    According to Microsoft, card-skimming malware is increasingly using malicious PHP software on web servers to modify payment sites and avoid browser safeguards activated by JavaScript code. Card skimming has been fueled in recent years by Magecart malware that uses JavaScript code to inject scripts into checkout sites and transmit malware that captures and steals credit card information. Injecting JavaScript into front-end processes was "very conspicuous," according to Microsoft, because it may have triggered browser defenses like Content Security Policy (CSP), which prohibits external scripts from loading. By attacking web servers with malicious PHP scripts, malicious actors identified a less noisy technique. Microsoft discovered two malicious image files on a Magento-hosted server in November 2021, one of which was a fake browser favicon. The images contained an embedded PHP script, which did not run by default on the compromised web server. Instead, in order to target customers, the PHP script only begins once cookies validate that the web administrator is not currently signed in. The PHP script got the URL of the current page and searched for the keywords "checkout" and "one page," which are connected to Magneto's checkout page. The FBI recently issued a warning about new incidents of card-skimming cybercriminals infecting US corporate checkout sites with web shells that allow backdoor remote access to the web server via malicious PHP. According to Sucuri, PHP skimmers targeting backend web servers accounted for 41 percent of new credit card-skimming malware found in 2021. This article continues to discuss observations surrounding credit-skimming cybercriminals' tactics.

    CyberIntelMag reports "Microsoft: Credit Card Skimmers Are Changing Their Tactics to Remain Undetected"

  • news

    Visible to the public "Cisco Warns of Exploitation Attempts Targeting New IOS XR Vulnerability"

    Cisco recently informed its customers that it is aware of in-the-wild exploitation attempts targeting a new vulnerability affecting its IOS XR software. The flaw, tracked as CVE-2022-20821, was discovered by Cisco during the resolution of a support case. The vulnerability, which has a "medium severity" rating based on its CVSS score of 6.5, can allow a remote, unauthenticated attacker to access a Redis instance that is running within a container named "NOSi." Cisco noted that the issue affects the health check RPM in IOS XR software and is related to the TCP port 6379, which the RPM opens by default on activation. Cisco stated that an attacker could exploit this vulnerability by connecting to the Redis instance on the open port. A successful exploit could allow the attacker to write to the Redis in-memory database, write arbitrary files to the container filesystem, and retrieve information about the Redis database. Cisco noted that given the configuration of the sandboxed container that the Redis instance runs in, a remote attacker would be unable to execute remote code or abuse the integrity of the Cisco IOS XR Software host system. The vulnerability only impacts Cisco 8000 series routers running IOS XR 7.3.3 with the health check RPM active. A patch is included in version 7.3.4. Cisco has provided instructions for determining if a device is vulnerable and detailed information for applying workarounds.

    SecurityWeek reports: "Cisco Warns of Exploitation Attempts Targeting New IOS XR Vulnerability"

  • news

    Visible to the public "US Car Giant General Motors Hit by Cyberattack Exposing Car Owners' Personal Info"

    General Motors (GM), a US automobile manufacturer, announced that it was hit by a credential stuffing attack last month that exposed customer information and allowed hackers to redeem rewards points for gift cards. GM said they detected the malicious login activity between April 11-29, 2022. GM stated that there is no evidence that the log in information was obtained from GM based on the investigation to date. GM noted that they believe that unauthorized parties gained access to customer login credentials that were previously compromised on other non-GM sites and then reused those credentials on the customer's GM account. The personal information of affected customers includes first and last names, personal email addresses, home addresses, usernames and phone numbers for registered family members tied to the account, last known and saved favorite location information, currently subscribed OnStar package (if applicable), family members' avatars and photos (if uploaded), profile pictures and search and destination information. Other information available to hackers included car mileage history, service history, emergency contacts, and Wi-Fi hotspot settings (including passwords). GM advised users to reset their passwords, and that affected individuals should request credit reports from their banks and place a security freeze if required. GM also confirmed that hackers redeemed customer reward points for gift cards in some instances.

    Infosecurity reports: "US Car Giant General Motors Hit by Cyberattack Exposing Car Owners' Personal Info"

  • news

    Visible to the public  "Towards Having Your Privacy and Security and Exchanging Crypto Too"

    A team of researchers wrote a new paper outlining a new protocol for better privacy and security protections when exchanging cryptocurrencies. Currently, if two people or entities want to exchange one cryptocurrency for another, they can do so directly between themselves, but there is always the risk that one of the two parties will be dishonest and not keep their end of the deal. Another option is to have a third-party exchange service mediate the transaction. However, the concern remains as to whether the exchange service is an adversary seeking to steal coins from both parties. There is also the problem of confidentiality. For example, if an e-commerce website only takes one cryptocurrency and you only have coins in a different cryptocurrency, you will need to convert your coins to the appropriate currency before making a purchase. The exchange required for this conversion can reveal sensitive information. The new study proposes a protocol to address these concerns about security and privacy. The protocol is universal, thus allowing for cross-exchanges between all present and future cryptocurrencies. Without relying on third parties, the swap protocol ensures that the exchange will be performed honestly or not at all, guaranteeing that no one will maliciously lose coins. Finally, the protocol allows for the simultaneous exchange of different types of cryptocurrency, such as Bitcoin, Ethereum, Dogecoin, and more. This article continues to discuss the study on the secure exchange of coins across all blockchains.

    CyLab reports "Towards Having Your Privacy and Security and Exchanging Crypto Too"

  • news

    Visible to the public "Scientists Create New Method to Kill Cyberattacks in Less Than a Second"

    Researchers at Cardiff University have developed a new method for automatically detecting and killing cyberattacks on laptops, desktops, and smart devices in less than a second. The method, which uses Artificial Intelligence (AI) and Machine Learning (ML) in a novel way, has been found to successfully protect up to 92 percent of files on a computer from being corrupted, with malware removal taking only 0.3 seconds on average. According to the researchers, this is the first demonstration of a system that can both detect and wipe out malware in real-time. The new approach, developed in collaboration with Airbus, is based on monitoring and predicting malware behavior rather than more standard antivirus methods that analyze how malware looks. It is feasible to rapidly predict how malware will behave further down the line in less than a second by training computers to execute simulations on specific pieces of malware. When a piece of the malware is flagged, the next step is to remove it, which is where the new research comes in. To test the novel detection system, the researchers set up a virtual computing environment to mimic a number of regularly used laptops, each of which could run up to 35 programs at once to simulate usual behavior. Thousands of malware samples were then used to test the AI-based detection approach. This article continues to discuss the team's new method capable of automatically detecting and killing malware in under a second.

    Cardiff University reports "Scientists Create New Method to Kill Cyberattacks in Less Than a Second"

  • news

    Visible to the public Pub Crawl #62


    Pub_Crawl_web.jpgPub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers.

  • news

    Visible to the public "Hackers Compromised Some Zola User Accounts to Buy Gift Cards"

    Zola, a wedding planning startup that allows couples to create websites, budgets, and gift registries, recently discovered that hackers gained access to user accounts but has denied a breach of its systems. The incident first came to light over the weekend after Zola customers took to social media to report their accounts had been hijacked. Some Zola customers reported that hackers had depleted funds held in their Zola accounts, while others said they had thousands of dollars charged to their credit cards. A Zola spokesperson stated that the accounts had been breached due to a credential stuffing attack, where existing sets of exposed or breached usernames and passwords are used to access accounts on different websites that share the same set of credentials. Zola said fewer than 0.1% of accounts were compromised but would not say specifically how many users that equates to. Zola said it temporarily suspended its iOS and Android apps during the incident and reset all user passwords out of an "abundance of caution.

    TechCrunch reports: "Hackers Compromised Some Zola User Accounts to Buy Gift Cards"

  • news

    Visible to the public "Conti Ransomware Operation Shut Down After Brand Becomes Toxic"

    Security researchers at AdvIntel have discovered that the Conti ransomware operation has undergone some significant organizational structure changes in the past months after the brand became toxic due to its affiliation with the Russian government. While the group appeared to be very active, researchers stated that the group has been in the process of shutting down the Conti brand and switching to a different organizational structure that involves multiple subgroups. The researchers noted that the downfall of the Conti brand was when Conti pledged to support Russia. With sanctions mounting against Russia and their declaration of support, the cybercriminals could be considered a payment to Russia and implicitly a violation of sanctions. The researchers stated that many victims of Conti were prohibited from paying the ransom. Other victims and companies who would have negotiated ransomware payments were more ready to risk the financial damage of not paying the ransom than they were to make payments to a state-sanctioned entity. Instead of suddenly disappearing like REvil tried to do, Conti has decided to gradually shift to a new strategy put into practice well before the Conti brand would be shut down. The researchers stated that the Conti operation was officially shut down on May 19, when their site's admin panel and negotiations service went offline, and the rest of the infrastructure was reset. However, before the shutdown, the group continued to appear active and made a grand exit by hacking into the systems of Costa Rica, claiming that their goal was to overthrow the government. Currently, the Conti brand has been terminated, and the group's leaders have switched to what AdvIntel describes as a "network organizational structure" that is more "horizontal and decentralized" compared to the previous hierarchy, which has been described as "rigid." The researchers noted that the new structure will be a coalition of several equal subdivisions, some of which will be independent and some existing within another ransomware collective. However, they will all be united by internal loyalty to both each other and the Conti leadership, especially Conti project frontman 'reshaev', the cybersecurity firm explained. The researchers stated that the Conti network now includes fully autonomous groups, such as Karakurt, Black Basta, and BlackByte, which do not use data-encrypting malware and instead only rely on the theft of valuable information to extort victims. The new Conti network also includes semi-autonomous groups that use locker malware, such as AlphV (BlackCat), HIVE, HelloKitty (FiveHands), and AvosLocker.

    SecurityWeek reports: "Conti Ransomware Operation Shut Down After Brand Becomes Toxic"

  • news

    Visible to the public  "Hackers Can Hack Your Online Accounts Before You Even Register Them"

    According to security researchers, hackers can hijack online accounts before users even register them. This is possible through the exploitation of vulnerabilities that have already been resolved on popular websites, including Instagram, LinkedIn, Zoom, WordPress, and Dropbox. Of the 75 analyzed popular online services, at least 35 were found to be vulnerable to account pre-hijacking attacks, according to Andrew Paverd, a researcher at the Microsoft Security Response Center (MSRC), and Avinash Sudhodanan, an independent security researcher. The type and severity of these attacks vary, but they all arise from poor security policies followed by the websites. First, a hacker must know a target's email address for a pre-hijacking attack to work, which is easy to obtain through email correspondence or data breaches faced by companies. Next, the attacker uses the target's email address to create an account on a vulnerable website, hoping that the victim will ignore the notification sent to their inbox as spam. Finally, the attacker either waits for the victim to sign up for the site or tricks them into doing so. During this process, there are five different attacks that threat actors can perform, including the classic-federated merge (CFM), the unexpired session (US) ID, the trojan identifier (TID), the unexpired email change (UEC), and the non-verifying (NV) identity provider (IDP) attack. This article continues to discuss the researchers' findings surrounding the performance and potential impact of the pre-hijacking attacks.

    BC reports "Hackers Can Hack Your Online Accounts Before You Even Register Them"

  • news

    Visible to the public "Anonymous Declares Cyberwar on Pro-Russian Hacker Gang Killnet"

    Hacktivist group Anonymous has recently announced that it is launching a cyberwar against pro-Russian group Killnet, which recently attacked European institutions. Last week, Killnet attacked the websites of various Italian institutions and government ministries, including the superior council of the judiciary, its customs agency, its foreign affairs, education ministries, and cultural heritage ministries. Killnet also launched attacks in early May, targeting Italy's upper house of parliament, the National Health Institute (ISS), and the Automobile Club d'Italia. Shortly. after Anonymous declared a cyberwar against Killnet on Twitter, they announced on Twitter that the official Killnet site was taken offline. This news comes a few days after cybersecurity agencies in the US, UK, Australia, Canada, and New Zealand warned organizations beyond Ukraine's borders that pro-Russian hackers may soon target them.

    Infosecurity reports: "Anonymous Declares Cyberwar on Pro-Russian Hacker Gang Killnet"

  • news

    Visible to the public "Ransomware Hackers Steal Personal Data of 500,000 Students and Staff in Chicago"

    It has recently been discovered that the personal information of more than half a million Chicago Public Schools (CPS) students and staff was leaked in a ransomware attack last December, and the breach wasn't reported until April. On Friday, the district said that technology vendor Battelle for Kids notified CPS of the breach on April 25. CPS stated that a server used to store student and staff information was breached, and four years' worth of records were accessed. CPS said that 495,448 student and 56,138 employee records were accessed from 2015-16 through 2018-2019 school years. Student information involved in the breach included students' names, schools, dates of birth, gender, CPS identification numbers, state student identification numbers, class schedule information, and scores on course-specific assessments. Employee information included names, employee identification numbers, school and course information, emails, and usernames. CPS noted that the affected information did not include Social Security numbers, financial information, health data, current course or schedule information, home addresses and course grades, standardized test scores, or teacher evaluation scores.

    Infosecurity reports: "Ransomware Hackers Steal Personal Data of 500,000 Students and Staff in Chicago"

  • news

    Visible to the public "International Experts Forecast Food Cyber Risks for AG-Tech"

    Researchers at Flinders University in Australia, in collaboration with King Abdulaziz University in Saudi Arabia and Aix-Marseille University in France, have identified cybersecurity risks in the use of smart ag-tech. According to King Abdulaziz University lead author Professor Abel Alahmadi, smart sensors and systems are utilized to monitor crops, plants, the environment, water, soil moisture, and diseases. The transition to digital agriculture will increase the quality and quantity of food available to the world's growing population, which is expected to reach 10.9 billion by 2100. However, the researchers warn that this advancement in production, genetic modification for drought-resistant crops, and other technology is vulnerable to cyberattack, especially if the ag-tech sector does not take necessary safeguards like other corporate or defense sectors. Dr. Saeed Rehman of Flinders University says the rise in Internet connectivity and smart low-power devices has facilitated the digitalization of many labor-intensive food production jobs, including modern techniques for accurate irrigation, soil, and crop monitoring using drone surveillance, but we cannot disregard digital agriculture security threats, particularly potential side-channel attacks specifically against ag-tech applications. This article continues to discuss the researchers' study on cybersecurity threats and side-channel attacks against digital agriculture.

    Food Magazine reports "International Experts Forecast Food Cyber Risks for AG-Tech"

  • news

    Visible to the public "Ransomware Still Winning: Average Ransom Demand Jumped by 45 Percent"

    Group-IB has released its "Ransomware Uncovered 2021/2022" guide to the evolution of the number one threat. According to the findings of the second edition of the research, the ransomware empire's winning streak continued, with the average ransom demand increasing by 45 percent to $247,000 in 2021. Since 2020, ransomware gangs have gotten greedier. Hive demanded a record-breaking ransom of $240 million ($30 million in 2020). Hive and Grief rose to the top ten gangs based on the number of victims publicized on Dedicated Leak Sites (DLS). Ransomware has become more sophisticated, as evidenced by the victim's downtime, which climbed from 18 days in 2020 to 22 days in 2021. Ransomware-as-a-Service (RaaS) programs began offering affiliates custom tools for data exfiltration in order to simplify and streamline operations. The double extortion tactic became even more common as sensitive victim data was exfiltrated to obtain the ransom in 63 percent of the cases examined. Ransomware groups posted data belonging to almost 3,500 victims on DLS during Q1'2021 and Q1'2022. The majority of enterprises whose data was released on DLS by ransomware operators in 2021 were based in the US, Canada, and the UK, with the manufacturing, real estate, and professional services industries being the most affected. The most aggressive gangs were Lockbit, Conti, and Pysa, with 670, 640, and 186 victims uploaded to DLS. This article continues to discuss key findings from Group-IB's recent ransomware report.

    Help Net Security reports "Ransomware Still Winning: Average Ransom Demand Jumped by 45 Percent"

  • news

    Visible to the public "Snake Keylogger Spreads Through Malicious PDFs"

    Researchers at HP Wolf Security have discovered a campaign that combines a malicious PDF file and a 22-year-old Office bug to spread the Snake Keylogger malware. According to the researchers, the campaign's goal is to trick victims with an attached PDF file purporting to contain details on a remittance payment. Instead, it executes the information-stealing malware while employing various evasion techniques to escape detection. Although Microsoft Office formats continue to be popular, this operation demonstrates how attackers are also employing weaponized PDF documents to infect systems. According to researchers at Fortinet, Snake Keylogger is a.NET-based malware that first appeared in late 2020 and is designed to steal sensitive information from a victim's device, such as saved credentials, keystrokes, screenshots of the victim's screen, and clipboard data. This article continues to discuss the new PDF-based threat campaign spreading the Snake Keylogger malware.

    Threatpost reports "Snake Keylogger Spreads Through Malicious PDFs"

  • news

    Visible to the public "Partial Patching Still Provides Strong Protection Against APTs"

    According to an analysis conducted by researchers from the University of Trento, Italy, organizations that always upgrade to the most recent versions of all of their software have nearly the same risk of being compromised in cyber-espionage campaigns as those that just apply specific patches after a vulnerability is reported. A quantitative analysis of data from 350 Advanced Persistent Threat (APT) campaigns carried out by the researchers between 2008 and 2020 reveals that organizations with a purely reactive software update strategy had roughly the same risk exposure to advanced cyberattacks as those that kept up to date on everything. This is despite the fact that the subjects applied only 12 percent of the updates that firms that always updated instantly deployed. The findings show that the same is true for organizations that may apply updates to fix vulnerabilities based on information they have gotten in advance, such as by paying for zero-day information. When it comes to breach risk, even these entities do not have a considerable advantage over those that patch only on a reactive basis. Although this conflicts with traditional wisdom, the study results represent two realities: 1) APTs tend to be reactive, and 2) time-to-patch metrics are important. The researchers discovered that APTs targeted publicly reported vulnerabilities more frequently than zero-days in an analysis of 350 campaigns dating back to 2008 (containing information on vulnerabilities exploited, attack vectors, and affected software products). They also shared or targeted the same known vulnerabilities in their campaigns. Between 2008 and 2020, the researchers discovered 86 different APT organizations that exploited 118 unique vulnerabilities in their campaigns. Only Stealth Falcon, APT17, Equation, Dragonfly, Elderwood, FIN8, DarkHydrus, and Rancor leveraged exclusive vulnerabilities in their campaigns. This means IT teams can prioritize flaws known to be APT favorites to eliminate the majority of the risk of compromise. This article continues to discuss key findings from the study regarding patching strategies, their risk exposure, and the issue of patch prioritization.

    Dark Reading reports "Partial Patching Still Provides Strong Protection Against APTs"

  • news

    Visible to the public "Differential Privacy the Correct Choice for the 2020 US Census"

    The US Census Bureau has always sought to strike a balance between the accuracy and privacy of its decennial census data. The accuracy of this data is especially important in high-impact use cases such as budget allocation and redistricting. Census data privacy, on the other hand, is required by law and is critical for protecting vulnerable populations and guaranteeing a high response rate. The Census Bureau has moved to a new de-identification approach called Differential Privacy (DP) because of major privacy concerns regarding its previous de-identification method, swapping. DP is a mathematical concept that injects small random changes, known as noise, into data to keep people's personal information private. There have been concerns that this noise may artificially deflate minority group populations, resulting in funding cuts. Therefore, a team of researchers at Columbia Engineering's Department of Computer Science studied these claims, questioning whether this risk is unique to DP. They compared DP algorithms to swapping algorithms in both theoretical and empirical studies. Their findings support the Census Bureau's decision to use DP as a de-identification strategy for the 2020 Census and show that swapping results in low accuracy for minority groups. In addition, swapping was found to place a disproportionate privacy burden on minority groups, whereas DP gives a stronger guarantee. The researchers found that the additional inaccuracy introduced by swapping is more damaging than DP. They demonstrated that when swapping is implemented with enough privacy, its accuracy is no better than, and often worse than, DP. For more diverse counties, and especially more so for minorities, swapped data is more inaccurate; however, this is not the case for DP. This article continues to discuss findings from the Columbia Engineering researchers' study on the impact of DP and swapping on privacy preservation and minority representation in the US census.

    Newswise reports "Differential Privacy the Correct Choice for the 2020 US Census"

  • news

    Visible to the public "Cryptography in the Blockchain Era"

    Blockchains have sparked a lot of interest, not only because they enable the creation of new financial instruments but also because they provide alternative solutions to challenges in fault-tolerant distributed computing and cryptographic protocols. Miners maintain and build blockchains, which are used in various situations, the most well-known of which is as a distributed ledger that records all transactions between users in cryptocurrency systems like bitcoin. Many of these protocols are based on a "proof of work" (PoW), which has been widely used in cryptography and security literature for over 20 years in a number of settings, including spam mitigation, sybil attacks, and Denial-of-Service (DoS) prevention. Its involvement in the design of blockchain protocols is likely its most significant application. When miners receive new transactions, the data is entered into a new block, but adding additional blocks to the chain requires solving a PoW. A PoW is a bitcoin transaction validation algorithm generated by bitcoin miners competing to create new bitcoin by being the first to solve a complex mathematical puzzle. Solving this puzzle requires the use of expensive computers and a lot of electricity. Once a miner discovers a solution to a puzzle, they broadcast the block to the network for other miners to verify. Those who successfully solve a puzzle are rewarded with a predetermined amount of bitcoin. Despite advances in understanding the PoW primitive, determining the exact properties required to prove the security of bitcoin and associated protocols has been difficult. All existing instances of the primitive have been based on idealized assumptions. Therefore, a team of researchers at Texas A&M University has identified and proven the concrete properties. Then they used those properties to build blockchain protocols that are both secure and safe. The researchers demonstrated that such PoWs could defeat adversaries and environments while owning less than half of the network's computational power, with their novel algorithms. This article continues to discuss the research on cryptography in the blockchain.

    Texas A&M University reports "Cryptography in the Blockchain Era"

  • news

    Visible to the public "Cyber Security: Global Food Supply Chain at Risk From Malicious Hackers"

    Experts warn that modern "smart" farm machinery is vulnerable to hacking, putting global supply chains at risk. It is anticipated that hackers would exploit weaknesses in agricultural technology used to grow and harvest crops. John Deere, the agricultural manufacturing giant, claims it is now working to rectify any flaws in its software. According to a new report from the University of Cambridge, autonomous crop sprayers, drones, and robotic harvesters can all be hacked. Smart technology has grown in use to improve the efficiency and productivity of farms. For example, until recently, the labor-intensive harvesting of delicate food crops like asparagus was out of reach of machines. The new generation of agricultural robots employs Artificial Intelligence (AI) to reduce human participation. They may assist in filling a labor shortage or enhance yield, but there is growing concern over the inherent security risk, compounding worries about food-supply systems already jeopardized by the war in Ukraine and the COVID-19 pandemic. Chris Chavasse, co-founder of Muddy Machines, which is testing an autonomous asparagus-harvesting robot named Sprout, pointed out the possibility that malicious actors anywhere in the world could try to take control of these machines and force them to do whatever they want or simply stop them from working. He stated that someone might try to drive Sprout into a hedge or a ditch, or prohibit it from functioning. Therefore, they are working with security professionals to address any security vulnerabilities. Although asparagus farming is unlikely to be a primary target, Chavasse believes hackers might endanger mission-critical agricultural infrastructure. This article continues to discuss the vulnerability of the global food supply chain to cyberattacks.

    BBC reports "Cyber Security: Global Food Supply Chain at Risk From Malicious Hackers"

  • news

    Visible to the public "Email is The Riskiest Channel For Data Security"

    New research from Tessian and the Ponemon Institute reveals that nearly 60% of organizations experienced data loss or exfiltration caused by an employee mistake on email in the last 12 months. More than half (67%) of IT security practitioners said email was the riskiest channel for data loss in organizations. This was closely followed by cloud file-sharing services (62%) and instant messaging platforms (57%). The researchers surveyed 614 IT security practitioners around the globe. During their research, the researchers also found that employee negligence by not following policies was the leading cause of data loss incidents (40%). More than a quarter (27%) of data loss incidents are caused by malicious insiders. The researchers noted that it takes up to three days for security and risk management teams to detect and remediate a data loss and exfiltration incident caused by a malicious insider on email. Almost a quarter (23%) of organizations experience up to 30 security incidents involving employees' use of email every month (for example, an email was sent to an unintended recipient). The most common types of confidential and sensitive information lost or intentionally stolen include customer information (61%), intellectual property (56%), and consumer information (47%). The researchers found that user-created data (sensitive email content, text files, M&A documents), regulated data (credit card data, Social Security numbers, national ID numbers, employee data), and intellectual property were identified as the three types of data that are most difficult to protect from data loss.

    Help Net Security reports: "Email is The Riskiest Channel For Data Security"

  • news

    Visible to the public "QNAP Warns of Deadbolt Ransomware Targeting NAS Devices"

    QNAP is alerting customers that attackers are using known vulnerabilities in previous versions of the company's software for some of its Network-Attached Storage (NAS) devices to launch Deadbolt ransomware. The company has published an advisory stating that its internal incident response team had detected a new wave of ransomware attacks in recent days. Deadbolt ransomware criminals have already targeted QNAP devices in the past, claiming to have a zero-day in the NAS software. The most recent attacks have targeted Internet-facing devices running QTS software versions 4.3.6 and 4.4.1. According to the QNAP Product Security Incident Response Team (QNAP PSIRT), the attack targeted NAS systems running QTS 4.3.6 and QTS 4.4.1, with the most affected models being the TS-x51 and TS-x53 series. QNAP advises all NAS customers to verify and upgrade QTS to the most recent version as soon as possible, and to avoid exposing their NAS device to the Internet. This article continues to discuss the QNAP's warning regarding attackers' targeting of QNAP NAS devices to install Deadbolt ransomware.

    Decipher reports "QNAP Warns of Deadbolt Ransomware Targeting NAS Devices"

  • news

    Visible to the public "Department of Justice Announces New Policy for Charging Cases under the Computer Fraud and Abuse Act"

    The US Department of Justice (DoJ) has announced that its policy on violations of the Computer Fraud and Abuse Act (CFAA) has been revised. For the first time, the policy states that good-faith security research should not be charged. According to the DoJ, good-faith security research means accessing a computer only for purposes of good-faith testing, investigation, and/or correction of a security flaw or vulnerability, where such activity is carried out in a way that avoids harming individuals or the public. The information derived from good-faith security research activity must also primarily promote the security or safety of the class of devices, machines, or online services to which the accessed computer belongs, or those who use such devices, machines, or services. Deputy Attorney General Lisa O. Monaco highlighted computer security research as a key driver of stronger cybersecurity. Monaco said the department has never been interested in charging good-faith computer security research as a crime. The announcement enhances cybersecurity by giving clarity for good-faith security researchers who identify vulnerabilities for the common good. However, the new policy recognizes that claiming to be undertaking security research does not give individuals acting in bad faith a pass. For example, identifying flaws in devices to extort their owners, even if disguised as "research," is not done in good faith. The policy instructs prosecutors to consult with the Criminal Division's Computer Crime and Intellectual Property Section (CCIPS) concerning specific applications of this criteria. All federal prosecutors who want to pursue cases under the CFAA must follow the new policy and consult with CCIPS before proceeding. This article continues to discuss the new policy for charging cases under the CFAA and what it means for cybersecurity research.

    DoJ reports "Department of Justice Announces New Policy for Charging Cases under the Computer Fraud and Abuse Act"

  • news

    Visible to the public "Two Business-Grade Netgear VPN Routers Have Security Vulnerabilities That Can’t be Fixed"

    Netgear has admitted that multiple security vulnerabilities in its business-grade BR200 and BR500 VPN routers can't be fixed due to technical limitations outside of their control and is offering users a free or discounted replacement router. Netgear's BR200 and BR500 VPN routers provide features such as a site-2-site VPN connection, a firewall, remote configuration and monitoring, and more. The vulernarbilites were reported to Netgear by security researcher Joel St. John. Netgear did not go into detail about the vulnerabilities but mentioned that in order to be exploited, these vulnerabilities require the computer managing the router to visit a malicious website or click a malicious link while accessing the router's management GUI. The vulnerabilities score a high 7.1 on the CVSS (3.0) scale. The company says it is possible to mitigate the risk of exploitation by isolating the network using VLANs for enhanced security, using the router's MAC access control lists (ACLs) to restrict router management to specific computers. Organizations can also make sure that the computer used to access the router's management GUI is equipped with anti-virus, anti-malware, and anti-phishing software.

    Help Net Security reports: "Two Business-Grade Netgear VPN Routers Have Security Vulnerabilities That Can't be Fixed"

  • news

    Visible to the public ""Alarming" Surge in Conti Group Activity This Year"

    Security researchers at Ivanti, Cyber Security Works, and Cyware have discovered that there was an "alarming" surge in activity by the Conti ransomware gang in the first three months of 2022. The researchers observed a 7.6% rise in the number of vulnerabilities tied to ransomware in Q1 2022. The researchers also found that the Conti group exploited most of these (19/22). The researchers also saw a 7.5% increase in APT groups associated with ransomware, a 6.8% increase in actively exploited and trending vulnerabilities, and a 2.5% increase in ransomware families in Q1. The researchers stated that there are signs that ransomware operators are becoming more targeted and sophisticated in their approach. Worryingly, the researchers found that more than 3.5% of ransomware vulnerabilities are being missed by scanners, further exposing organizations to risks. Gaps also exist within the National Vulnerability Database (NVD), the Common Attack Pattern Enumeration and Classification (CAPEC) list by The MITRE Corporation, and the Known Exploited Vulnerabilities (KEVs) catalog by the US Cybersecurity and Infrastructure Security Agency (CISA), according to the researchers.

    Infosecurity reports: ""Alarming" Surge in Conti Group Activity This Year"

  • news

    Visible to the public "Researchers Spot Supply Chain Attack Targeting GitLab CI Pipelines"

    Security researchers at SentinelLabs are calling attention to a software chain supply attack targeting Rust developers with malware aimed directly at infecting GitLab Continuous Integration (CI) pipelines. The researchers dubbed the campaign, CrateDepression, and it combines typosquatting and the impersonation of a known Rust developer to push a malicious 'crate' hosted on the Rust dependency community repository. A crate is a compilation unit in Rust. The researcher stated that the malicious crate was swiftly flagged and removed, but the researchers found a second-stage payload exclusively built to Gitlab CI pipelines, signaling a risk of further larger-scale supply-chain attacks. The researchers noted that given the nature of the victims targeted, this attack would serve as an enabler for subsequent supply-chain attacks at a larger-scale relative to the development pipelines infected. The researchers stated that an infected machine is inspected for the GITLAB_CI environment variable in an attempt to identify Continuous Integration (CI) pipelines for software development. On those systems, the adversaries pull a next-stage payload built on the 'red-teaming' post-exploitation framework Mythic. This second-stage payload contains a switch with a large array of tasking options, including the ability to capture screenshots, keyboard strokes, and the uploading and downloading of files. On macOS, the operator can choose to persist by either or both of a LaunchAgent/Daemon and a LoginItem. During the investigation, the researchers found 15 iterative versions of the malicious 'rustdecimal' as the adversaries tested different approaches and refinements. The researchers noted that while the ultimate intent of the attacker(s) is unknown, the intended targeting could lead to subsequent larger-scale supply-chain attacks depending on the GitLab CI pipelines infected.

    SecurityWeek reports: "Researchers Spot Supply Chain Attack Targeting GitLab CI Pipelines"

  • news

    Visible to the public "Microsoft Detects Massive Surge in Linux XorDDoS Malware Activity"

    According to Microsoft, the activity of the stealthy and modular malware strain used by hackers to infiltrate Linux devices and compose a Distributed Denial-of-Service (DDoS) botnet has increased by 254 percent in the last six months. This malware is known as XorDDoS or XOR DDoS because it uses XOR-based encryption when communicating with command-and-control (C2) servers and is used to execute DDoS attacks. Microsoft revealed that the botnet's success stems from its extensive use of a variety of evasion and persistence techniques that enable it to remain stealthy and difficult for security teams to remove. The Microsoft 365 Defender Research Team found that XorDDoS is capable of obfuscating its activities, circumventing rule-based detection mechanisms, using anti-forensic techniques to break process tree-based analysis, and more. In recent campaigns, XorDDoS was observed overwriting sensitive files with a null byte to hide malicious activities from analysis. XorDDoS is known for compromising vulnerable Linux system architectures in SSH brute-force attacks. It uses a shell script that tries to log in as root using different passwords against thousands of Internet-exposed computers until it finds a match. In addition to launching DDoS attacks, the malware's operators use the XorDDoS botnet to install rootkits, maintain access to compromised devices, and drop additional malicious payloads. This article continues to discuss findings surrounding the surge in XorDDoS activity.

    Bleeping Computer reports "Microsoft Detects Massive Surge in Linux XorDDoS Malware Activity"

  • news

    Visible to the public "Web Trackers Caught Intercepting Online Forms Even Before Users Hit Submit"

    According to a new study published by experts from KU Leuven, Radboud University, and the University of Lausanne, users' email addresses are being exfiltrated to tracking, marketing, and analytics domains before they are sent and without prior consent from the users. The study crawled 2.8 million pages from the top 100 websites and discovered that 1,844 websites permitted trackers to capture email addresses before form submission in the European Union, compared to 2,950 when the same set of websites was viewed from the US. Furthermore, it was discovered that 52 websites were collecting passwords in the same way, an issue that has subsequently been addressed as a result of responsible disclosure. Some of the top third-party tracker domains to which email addresses have been communicated are LiveRamp, Taboola, Adobe, Verizon, Yandex, Meta Platforms, TikTok, Salesforce, Listrak, and Oracle, while Yandex, Mixpanel, and LogRocket top the list in the password-grabbing category. This article continues to discuss the interception of online forms by web trackers before users click submit.

    THN reports "Web Trackers Caught Intercepting Online Forms Even Before Users Hit Submit"

  • news

    Visible to the public "Unglitching the System: Advancement in Predicting Software Vulnerabilities"

    A new study conducted by researchers from Monash University proposes the most effective way to accurately predict vulnerabilities contained by software code and improve cybersecurity. Software vulnerabilities are common in all systems developed with source code, resulting in various issues such as deadlock, hacking, and system failure. Therefore, early vulnerability detection is crucial for securing software systems. The researchers developed the 'LineVul' approach, which boosted accuracy in predicting software vulnerabilities by over 300 percent while spending only half the typical amount of time and effort compared to current best-in-class prediction tools. LineVul can also protect against the top 25 most damaging and prevalent source code flaws, and it could be used to improve cybersecurity in any application developed using source code. According to research co-author Dr. Chakkrit Tantithamthavorn, LineVul can predict the most crucial areas of vulnerability and pinpoint the actual position of vulnerabilities down to the line of code. This article continues to discuss the LineVul approach to predicting software vulnerabilities and how it can strengthen applications against cyberattacks.

    Monash University reports "Unglitching the System: Advancement in Predicting Software Vulnerabilities"

  • news

    Visible to the public "MITRE Creates Framework for Supply Chain Security"

    MITRE has developed a prototype framework for Information and Communications Technology (ICT) that defines and quantifies supply chain risks and security concerns, including software. The prototype framework called System of Trust (SoT) is essentially a standard process for evaluating suppliers, supplies, and service providers. Cybersecurity teams can use it to assess a supplier or product. MITRE is known in the cybersecurity industry for leading the Common Vulnerabilities and Exposures (CVE) system, which catalogs known software vulnerabilities. It is also best known for the ATT&CK framework that maps the common actions threat groups take to infiltrate networks and breach systems. The SoT framework currently covers 12 top-level risk areas that firms should examine during their acquisition process, ranging from financial stability to cybersecurity standards. Over 400 questions cover various topics, including whether the supplier is correctly and thoroughly tracking software components, as well as their integrity and security. Each risk is assigned a score based on data measurements and a scoring system. The data scores indicate a supplier's strengths and weaknesses in relation to various risk categories. The trustworthiness of a software supplier could then be assessed more quantitatively. This article continues to discuss MITRE's SoT prototype framework and how it goes hand in hand with Software Bill of Materials (SBOM) programs.

    Dark Reading reports "MITRE Creates Framework for Supply Chain Security"

  • news

    Visible to the public "Phishers Add Chatbot to the Phishing Lure"

    Researchers at Trustwave SpiderLabs have discovered a new approach being taken by phishers to increase victim engagement and confidence: the addition of an interactive chatbot. The phishers hope that this reluctant acceptance of chatbots will help lower the attention of the target victim. The researchers noted that the basic lure is the common failed DHL delivery, and if the victim falls for it, the victim is not immediately directed to the phishing site. Instead, the 'please follow our instructions' results in the delivery of a PDF with a 'fix delivery' button. If the victim clicks the button, he or she is sent to another website where the phishing chain begins with the introduction of a chatbot that promises to fix the delivery but really harvests personal data. If the target accepts the chatbot, it continues the engagement by showing the victim a photo of the damaged package and asks for details on how to deliver it. If the victim asks to schedule delivery, a false CAPTCHA is presented to increase confidence further. In the next stage, the chatbot asks for a delivery address and time. An unspecified password is also requested. The researchers noted that it really doesn't matter what password is entered, it could be a DHL account password or the user's email account, the phisher steals it anyway, along with the delivery address and the user's email address (which they already have). The phishing has begun but is not complete. The chatbot explains that the additional delivery attempt is an additional service that requires payment, so a credit card payment page is displayed. The amount asked for is small. Paying for the fake redelivery gives up the phisher's real target, bank card details.

    SecurityWeek reports: "Phishers Add Chatbot to the Phishing Lure"

  • news

    Visible to the public "Half of IT Leaders Store Passwords in Shared Docs"

    According to new research by identity management vendor Hitachi ID, nearly half (46%) of IT and security leaders still store corporate passwords in office documents like spreadsheets, exposing their organization to significant cyber risk. It is estimated that each employee might have as many as 70-100 passwords and "decentralized secrets" that attackers could use to gain access to and move through an organization. The researchers stated that although nearly all (94%) respondents claimed they require password management training, with 63% saying they do so more than once a year, many appear not to be following their own advice. Just 30% of respondents said they use company-provided password managers, and some even resort to pen and paper. The researchers stated that the findings raise an important question about how effective password management training is when nearly half the organizations still store passwords in spreadsheets and other documents, and 8% write them on sticky notes. The researchers noted that insecure passwords are still a leading cause of cyberattacks, and education alone is clearly not enough.

    Infosecurity reports: "Half of IT Leaders Store Passwords in Shared Docs"

  • news

    Visible to the public "New Solution Aims to Address Quantum Security Threats"

    Quantum computing will significantly increase computing power. However, that capability poses a threat to cryptographic systems, potentially jeopardizing global data. To solve the problem, QuSecure is introducing an industry-first end-to-end post-quantum cybersecurity (PQC) software-based solution that protects encrypted communications and data with quantum resilience. Leading experts, including Arthur Herman, senior fellow and director of the Hudson Institute's Quantum Alliance Initiative, think that a Cryptographically Relevant Quantum Computer (CRQC) will be ready within the next three to five years. A CRQC is a quantum computer capable of breaking current cryptography and exposing the world's encrypted conversations and data. Nation-state attackers are also suspected to be stealing encrypted data today, using a 'steal now, decode later' approach to capture global encrypted data that will be decrypted retroactively once a CRQC is available. QuSecure's new QuProtect solution enables quantum-resilient cryptography at any time, on any device. It employs an end-to-end Quantum-as-a-Service (QSaaS) security architecture that addresses the most vulnerable aspects of the digital ecosystem, combining zero-trust, next-generation post-quantum cryptography, quantum-strength keys, high availability, ease of deployment, and active defense into a comprehensive and interoperable cybersecurity suite. The end-to-end strategy considers the whole data lifecycle, including data storage, communication, and consumption. This article continues to discuss QuSecure's new QuProtect solution aimed at addressing quantum security threats.

    BetaNews reports "New Solution Aims to Address Quantum Security Threats"

  • news

    Visible to the public "Info-Stealing 'Cryware' Targeting Cryptocurrency Wallets"

    The Microsoft 365 Defender Research Team observed a new type of malware that collects and exfiltrates data directly from cryptocurrency wallets. The researchers dubbed the information-stealing malware "cryware." According to the researchers, cryptocurrency wallets, also known as "hot wallets," are stored locally on a device and enable easier access to cryptographic keys needed to execute transactions. Rather than relying on ransomware victims to manually transfer cryptocurrency as ransom payment or using cryptojackers to mine cryptocurrency, the attackers can use cryware to target hot wallet data and immediately move cryptocurrencies to their own wallets. This article continues to discuss Microsoft's observations surrounding the emergence of information-stealing cryware that is being used by malicious actors to target cryptocurrency wallets.

    SC Media reports "Info-Stealing 'Cryware' Targeting Cryptocurrency Wallets"

  • news

    Visible to the public "Bad Bots Swarm the Internet in Record Numbers in 2021"

    According to researchers at Imperva, malicious bots accounted for almost 28% of global web traffic in 2021, a record high that exceeded the previous year's figure of 26%. The researchers stated that bots are software apps that run automated tasks. However, while most of them perform legitimate work such as crawling and indexing the internet for search engines, an increasing number are being used for malign purposes. The researchers claimed that the most common of these last year were account takeover (ATO), content or price scraping, and scalping to obtain limited-availability items. The researchers found that two-thirds of this traffic could be traced to "evasive bad bots," software that uses the latest evasion techniques to circumvent security tools. These include cycling through random IPs, entering sites and apps through anonymous proxies, changing identities, and mimicking human behavior to evade detection. The researchers noted that some 36% of bad bots hid as mobile web browsers in 2021, with Safari the most popular choice due to its enhanced privacy settings. The researchers stated that due to the increase in malicious bot traffic, ATO attacks soared by 148% from 2020 to 2021, allowing scammers to access sensitive account information and potentially carry out fraudulent transactions. Financial services was the most targeted industry (35%) in ATO attacks, followed by travel (23%), with the US the leading origin country of ATO attacks (54%) in 2021. Overall, travel (34%), retail (34%), and financial services (9%) were the sectors most targeted by bad bots in 2021, which stands to reason given the large amounts of sensitive data stored in customer accounts and the potential for monetization.

    Infosecurity reports: "Bad Bots Swarm the Internet in Record Numbers in 2021"

  • news

    Visible to the public "Ransom Demands Surge 45% in 2021"

    According to new research conducted by Group-IB, the average ransom demand in 2021 was $247,000, 45% more than the previous year, with most threat actors trying to force payment via double extortion tactics. During the study, the Group-IB compiled its conclusions from an analysis of over 700 investigations undertaken by its incident response team. The researchers stated that the continued rise of ransomware is down to the proliferation of initial access brokers and ransomware-as-a-service offerings on the dark web. The researchers argued that more sophisticated threats made it harder for victims to recover. The average downtime from an attack rose from 18 to 22 days year-on-year. However, on the plus side, the researchers noted that attacker dwell time fell from 13 days to nine over the same period. That limits the time in which threat actors have to move laterally within networks, steal data, and deploy their ransomware payload. The researchers stated that data theft and threatened leakage were used in 63% of attacks last year as a method of forcing payment. Lockbit, Conti, and Pysa were the most aggressive in posting data to leak sites. However, it was two newcomers, Hive and Grief, that caught the eye of the researchers, making it on the top 10 list of ransomware gangs by number of victims posted to leak sites. The researchers noted that remote desktop protocol (RDP) remains the top vector for attacks (47%), followed by phishing (26%). More attacks were facilitated by exploits of public-facing applications last year (21%) than in 2020 (17%).

    Infosecurity reports: "Ransom Demands Surge 45% in 2021"

  • news

    Visible to the public "Microsoft Has Issued Warning About Brute-Force Attacks on MSSQL Servers"

    Microsoft has issued a warning about brute-force attacks on Internet-exposed and inadequately protected Microsoft SQL Server (MSSQL) database servers using weak passwords. Although this is not the first time MSSQL servers have been attacked, Redmond claims that the threat actors are using the genuine sqlps.exe program as a LOLBin (living-off-the-land binary). The Microsoft Security Intelligence team said that the attackers achieve fileless persistence by spawning the sqlps.exe utility, which is a PowerShell wrapper for running SQL-built cmdlets, to run recon commands and alter the start mode of the SQL service to LocalSystem. The attackers also use sqlps.exe to create a new account that they add to the sysadmin role, giving them complete control of the SQL server. Then they gain the ability to perform other actions like deploying payloads such as coin miners. The sqlps utility, included with Microsoft SQL Server, enables loading SQL Server cmdlets as a LOLBin. Using sqlps, attackers can run PowerShell commands without worrying about defenders noticing their actions. Since sqlps is an effective way to avoid Script Block Logging, a PowerShell feature that would otherwise report cmdlet activities to the Windows event log, it also ensures that the threat actors leave no traces for the investigation of their attacks. This article continues to discuss Microsoft's warning pertaining to brute-force attacks on MSSQL servers.

    CyberIntelMag reports "Microsoft Has Issued Warning About Brute-Force Attacks on MSSQL Servers"

  • news

    Visible to the public "April VMware Bugs Abused to Deliver Mirai Malware, Exploit Log4Shell"

    According to researchers, a GitHub proof-of-concept exploit of recently disclosed VMware bugs is being used by hackers in the wild. Hackers are exploiting the reported VMware bugs in order to deliver Mirai Denial-of-Service (DoS) malware and exploit the Log4Shell vulnerability. Barracuda security researchers discovered attempts to exploit the recently reported vulnerabilities CVE-2022-22954 and CVE-2022-22960. They analyzed the attacks and payloads detected by Barracuda systems between April and May and discovered a steady stream of attempts to exploit the two VMware vulnerabilities. On April 6, 2022, VMware issued an advisory outlining a number of security flaws. The most serious of these is CVE-2022-22954, which has a CVSS score of 9.8 and allows an attacker with network access to perform Remote Code Execution (RCE) on VMware Workspace ONE Access and Identity Manager Solutions via server-side template injection. CVE-2022-22960 is a local privilege escalation vulnerability in VMware Workspace ONE Access, Identity Manager, and vRealize Automation. According to VMware's advisory, the bug is caused by improper permission in support scripts, which allows an attacker with local access to gain root privileges. This article continues to discuss the recently announced VMware bugs and the GitHub proof-of-concept exploit being used by hackers to abuse the flaws.

    Threatpost reports "April VMware Bugs Abused to Deliver Mirai Malware, Exploit Log4Shell"

  • news

    Visible to the public "NIST Leaning on Strong Feedback for Cyber Framework Update"

    The National Institute of Standards and Technology (NIST) is working on updating its influential Cybersecurity Framework, which was first published in 2014 and updated in 2018. A NIST official stated on May 17 that the agency is relying on industry feedback for the new update. According to Kevin Stine, chief of NIST's Applied Cybersecurity Division, NIST issued a request for information (RFI) in February to gather input on three categories: the Cybersecurity Framework, cybersecurity resources, and supply chain cybersecurity. The RFI was closed at the end of April, and Stine stated that most of the 130-135 comment submissions NIST received focused on the Cybersecurity Framework. NIST was thrilled with the volume of feedback it received, as well as with submissions from various organizations, including associations representing thousands of companies across the sector and around the world. This article continues to discuss NIST's efforts to update its Cybersecurity Framework.

    MeriTalk reports "NIST Leaning on Strong Feedback for Cyber Framework Update"

  • news

    Visible to the public "Ransomware Groups Continue to Leverage Old Vulnerabilities"

    A new report from Cyber Security Works (CSW) says researchers observed ransomware groups exploiting vulnerabilities that were several years old. The discovery highlights a continuing trend in which threat actors target known vulnerabilities and trusted attack methods rather than using and developing new ones. The report is based on ransomware and vulnerability data from multiple threat intelligence feeds and risk analyses. According to the report, there has been a 7.6 percent increase in vulnerabilities related to ransomware since January 2022. The researchers found that 11 of the 22 newly added ransomware-associated vulnerabilities were initially disclosed in 2019, thus showing that ransomware groups are on the lookout for vulnerabilities with pre-existing mechanisms of exploitation. The findings of the Health Sector Cybersecurity Coordination Center's (HC3) Q1 2022 report are consistent with that of the CSW researchers. HC3 also observed threat actors using legitimate tools and existing weaknesses to exploit victims instead of developing custom malware. Threat actors have been seen favoring file transfer, remote access, and encryption tools in the infiltration of target organizations. This article continues to discuss ransomware groups increasingly going after old vulnerabilities and using tried-and-true attack techniques to exploit victims and the importance of healthcare providers being extremely vigilant in their cybersecurity posture.

    HealthITSecurity reports "Ransomware Groups Continue to Leverage Old Vulnerabilities"

  • news

    Visible to the public "Zero-Trust Architecture May Hold the Answer to Cybersecurity Insider Threats"

    An MIT Lincoln Laboratory study explored the implementation of zero-trust security, a cybersecurity approach that requires users to prove their authenticity every time they access data or a network application. The goals of the study were to review the implementation of zero-trust architectures in government and industry, identify technical gaps and opportunities, and develop recommendations for the Unites States' approach to a zero-trust system. The first step in the study was to define zero-trust and understand the field's misconceptions about it. For example, some of these misperceptions claim that a zero-trust architecture requires purchasing entirely new equipment or that it renders systems unusable. Jeffrey Gottschalk, the study's co-lead, says that part of the reason there is so much confusion about zero-trust is that it takes what the cybersecurity world has known for many years and applies it in a new way. He emphasizes that it represents a paradigm shift in how we think about security, but it takes many things we already know how to do, such as Multi-Factor Authentication (MFA), encryption, and software-defined networking, and combines them in different ways. The research team examined recent significant cybersecurity incidents to determine which security principles were most responsible for the attack's scope and impact. While several of these attacks used previously unknown implementation vulnerabilities, also known as zero-days, most were caused by the exploitation of operational security principles. The malicious actor had become an insider. By treating every component, service, and user of a system as constantly exposed to and potentially compromised by a malicious actor, zero-trust security principles could protect against this type of insider threat. Each time a user requests access to a new resource, their identity is verified, and every access is mediated, logged, and analyzed. This article continues to discuss key takeaways from the study on zero-trust architectures and how zero-trust security principles could protect against insider threats.

    MIT News reports "Zero-Trust Architecture May Hold the Answer to Cybersecurity Insider Threats"

  • news

    Visible to the public "Cryptography Security Enhanced Through Zero-Knowledge Schemes"

    Dr. Yupeng Zhang, assistant professor in the Department of Computer Science and Engineering at Texas A&M University, has received the National Science Foundation's (NSF) Faculty Early Career Development (CAREER) Award for his research project focused on developing efficient and scalable zero-knowledge proof schemes. These zero-knowledge proofs are an important cryptographic primitive (well-established, low-level cryptographic algorithms used to build cryptographic protocols) for ensuring data privacy and computation integrity at the same time. A zero-knowledge proof is a method by which one party (the prover) can prove to another party (the verifier) that a given statement is true while not conveying any additional information other than the fact that the statement is true. The essence of zero-knowledge proof is that it is trivial to prove that one knows certain information by simply revealing it. The challenge is to prove such possession of knowledge without revealing the information itself or any additional information. Zhang's research aims to enhance the security, privacy, and integrity of data and computations in the digital world through the use of schemes in the cryptography realm. He explains that zero-knowledge proof is a powerful tool for establishing trust between people who do not know each other ahead of time. It enables one to persuade others that their secret data has certain properties without disclosing the secret data itself. Zero-knowledge proofs have been applied in cutting-edge technologies to provide privacy, scalability, and integrity due to their powerful functionality. Zhang's research focuses on three areas of zero-knowledge proof schemes: theory, application, and systems. This article continues to discuss Zhang's project on developing efficient and scalable zero-knowledge proof schemes.

    Texas A&M University reports "Cryptography Security Enhanced Through Zero-Knowledge Schemes"

  • news

    Visible to the public "Personal Information of Nearly Two Million Texans Exposed"

    The personal information of nearly two million Texans was exposed for almost three years due to a programming issue at the Texas Department of Insurance (TDI). The department revealed that details of 1.8 million workers who have filed compensation claims were publicly available online from March 2019 to January 2022. The information publicly available included Social Security numbers, addresses, dates of birth, phone numbers, and information about workers' injuries. In a public notice on March 24, TDI said it first became aware of a security issue with a TDI web application that manages workers' compensation information on January 4, 2022. This issue enabled members of the public to access a protected part of the online application. In an updated press release published on Tuesday, May 17, TDI said the investigation did not find any evidence workers' personal information had been misused. Neil Jones, director of cybersecurity evangelism at Egnyte, stated that although there's no current evidence that the breached information has been used maliciously, it is not uncommon for attackers to wait for just the right time to post their breached data to the Dark Web.

    Infosecurity reports: "Personal Information of Nearly Two Million Texans Exposed"