News Items

  • news

    Visible to the public "Cyber and Physical Security Should Collaborate: What Does It Take to Achieve This"

    Organizations have become increasingly dependent on Internet-based technologies for building management systems, Internet of Things (IoT) devices, operational technology, and other physical assets. These technologies introduce new security vulnerabilities that can be exploited by malicious actors to launch cyberattacks. According to Symantec, the number of cyberattacks involving a vulnerability to target physical systems or vice versa has, in fact, increased. In order to understand and mitigate threats that cross the boundary between what is cyber and what is physical, some organizations have decided to integrate their security resources to make them work more closely together. Although it makes sense to merge security functions, there is still little evidence to support this. A lack of guidance on how to effectively implement converged security remains. Organizations wanting to adopt convergence could be implementing new structures and processes that invite new vulnerabilities as there is no evidence and guidance. Research is required to develop an evidence base that can help organizations better decide how to implement convergence. Research conducted by Emma Boakes, a final year Ph.D. student at the University of Portsmouth, aims to provide such an evidence base. Through the performance of three qualitative studies with security staff from various organizations and industries operating converged security, Boakes established that organizations adopt convergence to manage risk in the changing threat environment, reduce complexity across the security function, improve efficiency, and make cost savings. Insights from security personnel often prompt convergence, but other organizations, government, and industry associations influence it. The choice to implement convergence is only one element of the decision-making process. Boakes' findings also showed that organizations implement convergence in different ways depending on organizational context. According to Boakes, organizations must pull insights from their security functions and consult with staff to take advantage of their first-hand experience of security in context to achieve an appropriate and effective implementation of convergence. This article continues to discuss the study on security convergence and the goal to create a roadmap that can help organizations make better decisions regarding implementing convergence.

    Homeland Security News Wire reports "Cyber and Physical Security Should Collaborate: What Does It Take to Achieve This"

  • news

    Visible to the public "Pitt Electrical and Computer Engineers Uncover Hardware Security Vulnerability on Android Phones"

    A study conducted by a team of researchers at the University of Pittsburgh Swanson School of Engineering found that the Graphics Processing Unit (GPU) in some Android smartphones could be used to eavesdrop on a user's credentials when they type them using the device's on-screen keyboard, thus making it an attractive target for hackers. The hardware security vulnerability poses a more significant threat to users' personal data than previous attacks capable of inferring a user's coarse-grained activities, such as the website being visited. The team's attack can correctly infer a user's username and password without the need for any system privileges. In addition, their attack does not cause any noticeable change in the smartphone's operations or performance, so the user would not be able to tell when it is occurring. A phone's GPU processes images that appear on the screen, including the pop-up animations when a letter on the on-screen keyboard is pressed. The researchers correctly inferred which letters or numbers were pressed by a user over 80 percent of the time, based on how the GPU produces the displayed keyboard animations. This study focused on the Qualcomm Adreno GPU. However, the team's demonstrated attack could also be used against other GPUs. The team disclosed their findings to Google and Qualcomm, and then Google confirmed that an Android security update will be released to address the vulnerability later this year. This article continues to discuss the hardware security vulnerability discovered on Android phones.

    The University of Pittsburgh reports "Pitt Electrical and Computer Engineers Uncover Hardware Security Vulnerability on Android Phones"

  • news

    Visible to the public "Researchers Used a Decommissioned Satellite to Broadcast Hacker TV"

    Security researcher Karl Koscher and his colleagues explored what happens when an old satellite has been decommissioned and transitioned into a graveyard orbit. They were given permission to access and broadcast from a Canadian satellite called Anik F1R, which was set up to support Canadian broadcasters in 2005 and was designed to be used for about 15 years. As the satellite will soon move to its graveyard orbit, nearly all services that use it have already moved to a new satellite. However, the researchers were still able to communicate with the satellite using special access to an uplink license and transponder slot lease. Koscher took over the satellite and broadcasted to the northern hemisphere. He and his colleagues from the Shadytel telecommunications and embedded device hacking group broadcasted a livestream from another security conference. They turned an unidentified commercial uplink facility, which is a station consisting of a special powered dish to communicate with satellites, into a command center in order to broadcast from the satellite. Although the researchers were permitted to access both the uplink facility and the satellite, the experiment highlighted the gray area in which a defunct satellite is no longer being used but has not yet moved to its final resting orbit. Besides independent hacking, the researchers pointed out that the lack of authentication and controls on satellites could allow countries to take over each others' equipment. For example, a state could broadcast propaganda without launching their own satellite as they could hijack another state's satellite if they have the ground equipment. This article continues to discuss the potential use of decommissioned satellites by hackers for their own malicious purposes.

    Wired reports "Researchers Used a Decommissioned Satellite to Broadcast Hacker TV"

  • news

    Visible to the public "House Passes Better Cybercrime Metrics Act"

    The United States House of Representatives has passed a bill that would change how cybercrime is tracked, measured, and reported by the federal government. The Better Cybercrime Metrics Act was approved by the House in a bipartisan 377-48 vote. Once signed into law, the bill will encourage local and federal law enforcement agencies to report cybercrime in their jurisdictions to the Federal Bureau of Investigation (FBI). The law will require that the Bureau report cybercrime metrics and cyber enabled crime categories, as it already does for other types of property crimes. The new legislation supports the creation of a classification system that can be used to categorize various cybercrimes. The new legislation authorizes a study at the National Academies of Science "to establish a taxonomy for cybercrime incidents in consultation with federal, state, local, and tribal stakeholders, criminologists, and business leaders that would inform the FBI's reporting of cybercrime and cyber-enabled crime." The new bill will also require the Bureau of Justice Statistics at the Department of Justice and the Census Bureau to include questions related to cybercrime and cyber enabled crime as part of its annual National Crime Victimization Survey.

    Infosecurity reports: "House Passes Better Cybercrime Metrics Act"

  • news

    Visible to the public "Trezor Customers Phished After MailChimp Compromise"

    Customers of a popular cryptocurrency hardware provider have been urged not to reply to any official-looking emails after a convincing phishing campaign was uncovered. Trezor makes hardware devices that customers can use to store their digital currency, which is a more secure alternative to the online equivalent. Over the weekend, several customers complained to the firm's Twitter account after being sent a scam email claiming that a data breach had hit over 100,000 customers. The email went on to say that a "malicious actor" managed to compromise Trezor Suite servers and therefore access their wallets. The customers were then urged to download the latest version of the application to 'protect' their crypto assets. In reality, doing so would enable the threat actors to steal the user's recovery code used to recover wallets in the event a device is lost or stolen. The email is sent from a convincing "trezor.us" domain, although the official one used by the Prague-headquartered company is "trezor.io." Trezor subsequently confirmed yesterday that the scammers had targeted one of its newsletters hosted on popular provider MailChimp to get the details of Trezor customers. Trezor stated that they managed to take the phishing domain offline and are trying to determine how many email addresses have been affected. MailChimp has also confirmed that their service has been compromised by an insider targeting crypto companies. Trezor stated that they would not be communicating by newsletter until the situation was resolved. They are urging customers not to open any emails appearing to come from Trezor until further notice.

    Infosecurity reports: "Trezor Customers Phished After MailChimp Compromise"

  • news

    Visible to the public "Hackers Target Russian Federal Air Transport Agency"

    Hackers have breached infrastructure belonging to Russia's Federal Air Transport Agency, wiping its entire database and files containing 65TB of data. This data includes documents, files, aircraft registration data, and emails from the servers. According to the specialist publication The Aviation Herald, the agency's official website remains offline, and it did not share an update. However, the agency has allegedly switched to using paper because of the lack of access to the Internet and the disruption to the electronic document flow system. There are also reports claiming that the mass loss of data caused by hackers may not be retrievable. This article continues to discuss the data breach faced by Russia's Federal Air Transport Agency.

    BankInfoSecurity reports "Hackers Target Russian Federal Air Transport Agency"

  • news

    Visible to the public "Cybercriminals Fighting Over Cloud Workloads for Cryptomining"

    Threat actors are infiltrating cloud accounts to create distributed workloads for cryptomining. According to researchers, the threat actors are hacking misconfigured and vulnerable cloud instances to carry out Distributed Denial-of-Service (DDoS) attacks and abuse trial accounts from DevOps service providers. Outlaw is the name of a Romanian group that seeks to compromise Internet of Things (IoT) devices, Linux servers, and containers through the exploitation of known vulnerabilities and use of stolen or default credentials to mine the Monero digital currency or launch DDoS attacks. TeamTNT is a highly sophisticated group that targets vulnerable software services. The Kinsing group is known to have a considerable number of cloud exploits. The attacks executed by these groups call on companies to increase efforts towards strengthening their security controls in the cloud. Stephen Hilt, a senior threat researcher with Trend Micro, says these malicious groups are taking advantage of the large amount of poorly configured cloud instances. Other attack groups have discovered ways to exploit the free tier of Continuous Integration and Continuous Deployment (CI/CD) pipeline services, such as Azure DevOps, BitBucket, CircleCI, GitHub, GitLab, and TravisCI. They have also found ways to combine the transient workloads into a cryptomining cloud service. For example, an attacker used multiple six-hour build steps to add processor cycles to a pooled mining service. Different cybercriminal groups have also been competing for cloud services. For instance, TeamTNT has targeted systems compromised by Kinsing, a rival cryptocurrency mining group. This article continues to discuss recent findings regarding cybercriminal groups' use of cloud resources for cryptomining.

    Dark Reading reports "Cybercriminals Fighting Over Cloud Workloads for Cryptomining"

  • news

    Visible to the public "Cyberattack on California Healthcare Organization"

    A non-profit community-based healthcare organization in Northern California is investigating a cyberattack that has disrupted its computer systems. Partnership HealthPlan of California, which serves more than 618,000 Medi-Cal members in 14 Northern California counties from Fairfield, notified a local community health center on March 21 that its computer systems were down. The investigation has not yet determined whether any personal data belonging to patients or staff was compromised in the attack. In a dark web post that has since been deleted, a ransomware group claimed to have accessed Partnership HealthPlan's system and stolen 400GB files from the organization's server. The ransomware group claims the files house hundreds of thousands of medical records containing patients' names, Social Security Numbers, dates of birth, addresses, and contact details. A security researcher at Compaitech stated that the Hive ransomware group posted on its darkweb site that it had stolen 850,000 personally identifiable information (PII) records from the Partnership HealthPlan of California.

    Infosecurity reports: "Cyberattack on California Healthcare Organization"

  • news

    Visible to the public "Over Half of Data Security Incidents Caused by Insiders"

    According to new research at Imperva, a shocking 70% of EMEA organizations have no insider risk strategy despite employees directly or indirectly causing most data security incidents over the past year. The researchers, during a survey, found that insider threats caused 59% of incidents impacting sensitive data in the past 12 months. Imperva defines an insider threat as originating from "inappropriate use of legitimate authorized user accounts" by either their rightful owner or a threat actor who has managed to compromise them. The largest number of respondents to the survey cited a lack of budget (39%) and internal expertise (38%) as their reason for not prioritizing insider risk. However, nearly a third (29%) claimed they don't see employees as a significant threat, and a similar number (33%) cited internal roadblocks such as a lack of executive sponsorship. The most common tactics to protect against insider threats in EMEA included staff training (65%), manual monitoring of employee activity (50%), and encryption (47%). However, the researchers noted that they appear to be having a limited impact, and (56%) of respondents claimed their end-users found ways to circumvent data protection policies. The security researchers stated that an effective insider threat detection system needs to be diverse, combining several tools to not only monitor insider behavior but also filter through the large number of alerts and eliminate false positives. Imperva recommended that organizations put together a dedicated function to handle insider risk and follow zero trust principles as they build out their programs.

    Infosecurity reports: "Over Half of Data Security Incidents Caused by Insiders"

  • news

    Visible to the public Pub Crawl #60


    Pub_Crawl_web.jpgPub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers.

  • news

    Visible to the public "Tiny, Cheap Solution for Quantum-Secure Encryption"

    Researchers at the Washington University in St. Louis (WUSTL) propose an inexpensive, more convenient, and scalable security system that is resistant to quantum attacks. Other potential solutions for securing data against quantum attacks have been found to be significantly computationally expensive or require dedicated optical fibers or satellite links through lasers. The new protocol for Symmetric Key Distribution, which the team refers to as SPoTKD, does not need lasers, satellites, or miles of new cable as it only relies on tiny microchips embedded with tiny clocks that function without batteries. According to the researchers, the clocks are electrons that transport themselves between two locations on the chip through the use of quantum tunneling. The time refers to the electrons' motions. When a chip is created, its initial state is recorded on a computer server. When someone creates a secure channel, they make a note of the time on a subset of the clocks and send that information to the server, which can then use its knowledge about the initial state to determine what time the clocks read at the time they were sent. The server alerts the person of what the times were and, if they are correct, a secure channel of communication has been opened. The quantum nature of the electron transportation provides additional layers of security. The clock collapses when they are measured, and neither a spy nor the recipient can access the information. This article continues to discuss the new quantum attack-resistant security system proposed by researchers at WUSTL.

    WUSTL reports "Tiny, Cheap Solution for Quantum-Secure Encryption"

  • news

    Visible to the public "New AcidRain Data Wiper Malware Targets Modems and Routers"

    AcidRain is a newly discovered data wiper malware that has been wiping routers and modems. According to researchers at SentinelOne, the malware is loosely linked to a cyberattack that targeted the KA-SAT satellite broadband service on February 24, which impacted thousands in Ukraine and tens of thousands across Europe. AcidRain is designed to brute-force device file names and wipe every discoverable file, thus making it easy to deploy again in future attacks. It was first detected on March 15 after it was uploaded to the VirusTotal malware analysis platform by an IP address in Italy as a 32-bit MIPS ELF binary with the "ukrop" filename. When it is deployed, it passes through the entire filesystem of the compromised router or modem, wiping flash memory, SD/MMC cards, virtual block devices, and more, using all possible device identifiers. The wiper uses MEMGETINFO, MEMUNLOCK, MEMERASE, and MEMWRITEOOB input/output control (IOCTL) system calls or overwrites file contents with up to 0x40000 bytes of data in order to destroy data. When AcidRain is finished wiping data, the malware reboots the compromised devices, leaving them unusable. This article continues to discuss the AcidRain data-wiping malware, its possible link to the KA-SAT cyberattack, and other data wipers that have been deployed against Ukraine this year.

    Bleeping Computer reports "New AcidRain Data Wiper Malware Targets Modems and Routers"

  • news

    Visible to the public "Pro-Russia Hackers Targeted More than 400 US Hospitals in 2020"

    Plans of Russian-affiliated hackers to disable and hold over 400 US hospitals hostage were discussed in 2020 in an online chatroom. However, these plans were successfully disrupted by the Department of Homeland Security and the US Cyber Command. A Ukrainian researcher revealed that the Russian cybercriminal gang known as Trickbot was behind the ransomware plot to force 428 US hospitals to quickly pay ransomware as they dealt with surging COVID-19 cases. The group's documents date from the summer and fall of 2020, and US authorities disrupted the gang's attack infrastructure. Since then, Trickbot's operations and malware have been enhanced. US federal authorities have been warning healthcare organizations of the growing threat of ransomware. In fall 2020, the US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), and the Department of Health and Human Services (DHHS) issued alerts pertaining to the targeting of the healthcare sector with Trickbot malware to launch ransomware attacks, steal data, and disrupt critical healthcare services. US hospitals that experienced ransomware attacks include Sonoma Valley Hospital, the Champaign-Urbana Public Health District, Enloe Medical Center, all 250 Universal Health Services facilities, and many others. Trickbot is also suspected of having been behind 16 attacks against US emergency responders in 2021. This article continues to discuss the Russian-affiliated Trickbot cybercriminal gang's plans to attack over 400 US hospitals in 2020, the disruption of the group's infrastructure by US authorities, and the overall growth in ransomware attacks on healthcare facilities.

    Campus Safety reports "Pro-Russia Hackers Targeted More than 400 US Hospitals in 2020"

  • news

    Visible to the public "New Research Claims Biden's Disclosure Deadlines Are Unrealistic"

    According to new research by cyber-risk rating firm BitSight, organizations in the United States are ill-prepared to meet the strict new cyber incident disclosure requirements imposed by the Biden administration. Earlier this month, President Biden signed legislation requiring critical infrastructure organizations to disclose "substantial" cyber incidents to the Federal government within 72 hours. However, an analysis of more than 12,000 publicly disclosed cyber incidents from 2019-2022 published by BitSight researchers revealed that incidents are typically discovered and disclosed after weeks and months rather than hours and days. The researchers stated that, on average, it takes the average organization 105 days to discover and disclose an incident from the date the incident occurred. During that time, organizations don't discover an incident until 46 days after it has happened, and they don't disclose an incident until 59 days after discovery. The researchers found that larger organizations are faster at discovering and disclosing incidents than smaller organizations. Yet, while organizations with more than 10,000 employees were 30% quicker at discovering and disclosing incidents than smaller organizations, it still took them, on average, 39 days to discover an incident and 41 days to disclose it. The researchers noted that disclosing higher severity incidents was a more ponderous process than reporting incidents of a more minor nature. The findings suggest that organizations would struggle to comply with new regulations that would require disclosure of "material" cyber incidents within 96 hours.

    Infosecurity reports: "New Research Claims Biden's Disclosure Deadlines Are Unrealistic"

  • news

    Visible to the public "Personal Data of 820,000 NYC Students Exposed"

    A widely used online grading and attendance system has been hacked, causing what could be the largest ever exposure of students' personal data in American history. Adversaries broke into the IT systems of Illuminate Education in January, gaining access to a database containing the personal data of around 820,000 current and former New York City public school students. Illuminate Education is a taxpayer-funded software company based in California. Illuminate Education created the popular IO Classroom, Skedula, and PupilPath platforms used by New York City's Department of Education to track grades and attendance. Data compromised in the incident included students' names, birthdates, ethnicities, home languages, and student ID numbers. The Department said that the attackers had exfiltrated class and teacher schedules and data regarding which students received free lunches or special education services.

    Infosecurity reports: "Personal Data of 820,000 NYC Students Exposed"

  • news

    Visible to the public "Security Tool Guarantees Privacy in Surveillance Footage"

    Researchers from the Massachusetts Institute of Technology's (MIT) Computer Science and Artificial Intelligence Laboratory (CSAIL), in collaboration with other institutions, developed a system called Privid to better guarantee the privacy of video footage from surveillance cameras. Privid is a privacy-preserving video analytics system aimed at supporting aggregation queries that process large amounts of video data. The system allows analysts to submit video data queries, and adds noise (extra data) to the result to ensure that an individual cannot be identified. The team's system builds upon the formal definition of privacy, known as differential privacy, which enables access to aggregate statistics pertaining to private data without exposing Personally Identifiable Information (PII). Analysts would typically have to access the entire video to do what they need to do with it, but the Privid system ensures the video is not a free-for-all. Analysts who are honest can access the information they need, but with the Privid system, that access is restricted to the point that malicious analysts cannot do too much with it. In order to enable this, Privid breaks the video into small pieces and runs processing code over each chunk instead of running the code over the whole video in one shot. Rather than getting the results back from each piece, the segments are aggregated, and additional noise is added. For example, the code could output the number of people observed in each video chunk, and the aggregation might be the sum. Privid allows analysts to use their own deep neural networks, which are common for modern video analytics, thus giving analysts the flexibility to ask questions that Privid designers did not expect. Across various videos and queries, Privid was accurate within 79 to 99 percent of a non-private system. Officials could use Privid to collect secure public health data or allow transportation departments to monitor the density or flow of pedestrians without revealing personal information about people. This article continues to discuss the development, capabilities, and uses cases of the Privid privacy-preserving video analytics system.

    MIT reports "Security Tool Guarantees Privacy in Surveillance Footage"

  • news

    Visible to the public "Researchers Protecting Solar Technologies From Cyberattack"

    A new study conducted by researchers at the University of Georgia (UGA) proposes the use of a novel approach to protecting the nation's solar farms from cyberattacks. A team at UGA's College of Engineering developed a sensor system capable of monitoring an essential electrical component of solar farms for signs of cyber intrusion in real-time. WenZhan Song, the study's lead investigator, emphasized that hackers' exploitation of the converters that connect solar farms with the power grid is a growing concern. In today's grid-connected solar farms, it is possible to remotely control power electronics, but this Internet connection has increased the likelihood of cyberattacks. In order to safeguard solar farms against cyber threats, the UGA researchers developed a system that can detect anomalies in the operations of power electronic converters in real-time through the use of a single voltage sensor and a current sensor. The system also applies deep learning methods to distinguish between normal conditions, open-circuit faults, short-circuit faults, and cyber intrusions. A small passive sensor device is connected to the power converter to collect data on electrical waveforms and feed the information to a computer monitor. Even if an attack evades the firewall or security software, the sensors will still detect unusual activity in the power electronics device's electrical current. According to the researchers, their system can also run diagnostic tests to determine what type of problem occurred. Compared to other existing detection methods, which only detect abnormal waveforms, the UGA researchers say their system has been proven to be more accurate in identifying cyberattacks in testing using a solar farm model. They also say their system can identify new types of cyberattacks that have not been programmed into deep learning algorithms. This article continues to discuss the UGA research team's sensor system designed to protect solar farms from hackers.

    UGA Today reports "Researchers Protecting Solar Technologies From Cyberattack"

  • news

    Visible to the public SoS Musings #59 - Cyber Threats Facing the Video Game Industry

    SoS Musings #59 -

    Cyber Threats Facing the Video Game Industry

  • news

    Visible to the public Spotlight on Lablet Research #28 - Designing for Privacy

    Spotlight on Lablet Research #28 -

    Designing for Privacy

  • news

    Visible to the public Cyber Scene #66 - The Beat(ing) Goes On

    Cyber Scene #66 -

    The Beat(ing) Goes On

  • news

    Visible to the public Cybersecurity Snapshots #28 - Implementing Zero Trust Models is Easier Said Than Done

    Cybersecurity Snapshots #28 -

    Implementing Zero Trust Models is Easier Said Than Done

  • news

    Visible to the public "CISA Warns of Attacks Against Internet-Connected UPS Devices"

    According to a new advisory from the U.S. Cybersecurity and Infrastructure Security Agency (CISA), hackers have begun to attack internet-connected universal power supply devices, targeting their control interfaces via multiple remote code execution vulnerabilities and, in some cases, unchanged default usernames and passwords. According to CISA, UPS devices have received IoT upgrades that allow users to control them remotely via the internet in recent years. However, like many other IoT devices, some UPSs have severe flaws in their security and authentication systems, which attackers have exploited to gain illicit access to them. CISA's primary guidance in the advisory is to immediately take inventory of all UPS devices in use at a given organization and disconnect them from the internet completely, if at all possible. If they must remain connected to the internet, the agency urged several steps to mitigate possible compromises, including placing the vulnerable devices behind a VPN, enforcing multifactor authentication, and auditing usernames and passwords to ensure that they're not still factory-default or otherwise easily guessed or cracked.

    CSO Online reports: "CISA Warns of Attacks Against Internet-Connected UPS Devices"

  • news

    Visible to the public "Attackers Steal $618m From Crypto Firm"

    A cryptocurrency firm used by gamers to transfer virtual coins has found that hackers stole hundreds of millions of dollars worth of currency from it. Vietnamese blockchain game developer Sky Mavis created the Ronin Network to function as an Ethereum sidechain for its Axie Infinity game. In practice, it allows users to transfer cryptocurrency in and out of the game. Ronin Network discovered the cyber-heist after a user complained that they could not withdraw funds from the bridge. The company found that an adversary compromised Sky Mavis's Ronin validator nodes and Axie DAO validator nodes and used hijacked private keys to forge fake withdrawals. This resulted in the theft of 173,600 Ethereum ($592m) and $25.5m from the Ronin bridge in two transactions. The company noted that Sky Mavis's Ronin chain currently consists of nine validator nodes. In order to recognize a deposit event or a withdrawal event, five out of the nine validator signatures are needed. The attacker managed to get control over Sky Mavis's four Ronin validators and a third-party validator run by Axie DAO. Ronin Network said it had paused its bridge functionality to ensure no further attack vectors are open, and it has increased the validator threshold from five to eight. The company is currently working with analytics firm Chainalysis to monitor where the stolen funds go. The company claimed, "most" of the funds are still in the attacker's wallet. According to Comparitech, the incident makes it the most significant cryptocurrency theft ever recorded, topping the raid on Poly Network, which netted $610m in August last year.

    Infosecurity reports: "Attackers Steal $618m From Crypto Firm"

  • news

    Visible to the public "RED-LILI Continues to Launch NPM attacks on Azure Developers"

    Researchers at Checkmarx have reported the launch of hundreds of malicious packages by the threat actor RED-LILI as part of Node Package Manager (NPM) attacks against Azure and other developers. According to the researchers, attackers have typically leveraged an anonymous disposable NPM account to launch their attacks. However, in this case, the attacker has fully automated the process of creating NPM accounts and opened a dedicated account per package, thus making the new batch of malicious packages more difficult to spot. RED-LILI remains active as the threat actor continues to publish malicious packages. Three weeks ago, Checkmarx released a report on an attacker that has been experimenting with several methods while attempting to perform dependency confusion attacks. Additionally, research teams at JFrog and Sonatype recently published blogs warning the security community of hundreds of malicious packages. All three reports from the research groups are related to the RED-LILI threat actor. Their findings further emphasize that malicious actors are continuing to improve their techniques and build automated systems as they launch waves of supply chain attacks at scale. These advancements are allowing attackers to stay undetected for longer periods of time. Companies are struggling to keep up with new attack entry points such as NPM. When vulnerable NPM packages are pulled into a Continuous Integration (CI) and Continuous Delivery (CD) pipeline, anything from ransomware to the theft of Personally Identifiable Information (PII) can be easily bundled into the software of an unsuspecting organization. This article continues to discuss findings surrounding RED-LILI's NPM supply chain attacks.

    SC Media reports "RED-LILI Continues to Launch NPM attacks on Azure Developers"

  • news

    Visible to the public "Hackers Are Getting Faster at Exploiting Zero Day Flaws. That's Going to Be a Problem for Everyone"

    Rapid7's new 2021 Vulnerability Intelligence Report reveals a 71 percent decrease in 'time to known exploitation' (TTKE) due to the surge in widespread zero-day attacks, most of which were launched by ransomware gangs. Hackers were found to be faster in the exploitation of software bugs in 2021, with the average time to exploitation decreasing from 42 days in 2020 to just 12 days. Google's Threat Analysis Group (TAG) and Project Zero researchers also observed a surge in zero-day attacks in which the threat actors exploit a flaw before a vendor has released a patch for it. This article continues to discuss key findings from Rapid7's report on vulnerability and attack trends in 2021.

    ZDNet reports "Hackers Are Getting Faster at Exploiting Zero Day Flaws. That's Going to Be a Problem for Everyone"

  • news

    Visible to the public "Visitors to Compromised WordPress Sites Are Forced to DDoS Ukrainian Targets"

    WordPress websites are being infected with malicious scripts to use visitors' browsers to execute Distributed Denial-of-Service (DDoS) attacks against Ukrainian websites. Security researchers with MalwareHunterTeam have identified a compromised WordPress website that is being used to launch DDoS attacks against ten different websites belonging to Ukrainian government institutions, think tanks, banks, and more. The compromised website loads a script that forces the visitor's browser to make HTTP GET requests to each target website, with no more than 1,000 simultaneous connections. The DDoS attacks happen in the background, with a slowdown on the user's browser, thus allowing the scripts to launch DDoS assaults while the visitor is unaware that their browser has been hijacked. Each request to a targeted site will contain a random query string to ensure the request is not cached by a caching provider such as Cloudflare or Akamai, and is delivered directly to the server under attack. According to the developer Andrii Savchenko, hundreds of WordPress websites have been hijacked through the exploitation of existing vulnerabilities to carry out these DDoS attacks. This article continues to discuss the hacking of WordPress websites to use visitors' browsers to launch DDoS attacks against Ukrainian websites.

    CyberIntelMag reports "Visitors to Compromised WordPress Sites Are Forced to DDoS Ukrainian Targets"

  • news

    Visible to the public "82% of Public Sector Applications Contain Security Flaws"

    Security researchers at Veracode have discovered that more than four-fifths (82%) of public sector applications have security flaws, the highest proportion of any industry. The researchers also found that the public sector takes around twice as long to fix flaws once detected compared to other industries. In addition, 60% of flaws in third-party libraries in the public sector remain unfixed after two years. This is double the time frame of other industries and 15 months behind the cross-industry average. The researchers analyzed data collected from 20 million scans across half a million applications in the public sector, manufacturing, financial services, retail & hospitality, healthcare, and technology. The public sector also had the joint lowest vulnerability fix rate of all industries, at 22%. The researchers stated that the findings suggest that public sector entities are particularly vulnerable to software supply chain attacks like SolarWinds and Kaseya, which could lead to disruptions and critical data being compromised. The researchers noted that they found that public sector organizations have made significant improvements in tackling high severity flaws, which is encouraging. According to the analysis, high-level flaws only appear in 16% of public sector applications, and the total number has decreased by 30% in the past year.

    Infosecurity reports: "82% of Public Sector Applications Contain Security Flaws"

  • news

    Visible to the public "US Proposes Healthcare Cybersecurity Act"

    Lawmakers in the United States have proposed a new bill that aims to enhance the cybersecurity of America's healthcare and public health (HPH) sector. The new bill is called the Healthcare Cybersecurity Act. A primary goal of the act is to improve collaboration between the US Department of Health and Human Services (HHS) and the US Cybersecurity and Infrastructure Security Agency (CISA). The proposed legislation requires CISA to complete a detailed study on cybersecurity risks facing the HPH sector and work with the HHS on a range of cybersecurity measures to boost the sector's virtual defenses. CISA's study would include "an analysis of how cybersecurity risks specifically impact health care assets, an evaluation of the challenges health care assets face in securing updated information systems, and an assessment of relevant cybersecurity workforce shortages." If the new bill is approved, cybersecurity training for HPH sector operators will be provided in order to raise awareness of cybersecurity risks. The training will also teach HPH sector operators how to mitigate the most common cyberattacks.

    Infosecurity reports: "US Proposes Healthcare Cybersecurity Act"

  • news

    Visible to the public "Hackers Hijack Email Reply Chains on Unpatched Exchange Servers to Spread Malware"

    A new email phishing campaign has been discovered hijacking conversations to deliver IcedID information-stealing malware. The campaign exploits unpatched and publicly-exposed Microsoft Exchange servers. The phishing emails apply the social engineering tactic of conversation hijacking, also known as thread hijacking. It involves the use of a forged reply to a previous stolen email to trick the recipient into opening an attachment. This method has been shown to increase the credibility of the phishing email and cause a high infection rate. The latest wave of attacks targeted organizations within the energy, healthcare, law, and pharmaceutical sectors. IcedID is a banking trojan that has become an entry point for more sophisticated threats, including human-operated ransomware and the Cobalt Strike adversary simulation tool. It can connect to a remote server and download next-stage implants and tools for attackers to perform follow-on activities and move laterally across impacted networks to deliver additional malware. This article continues to discuss findings surrounding the new email phishing campaign aimed at delivering IcedID information-stealing malware by taking over email reply chains on unpatched Microsoft Exchange servers.

    THN reports "Hackers Hijack Email Reply Chains on Unpatched Exchange Servers to Spread Malware"

  • news

    Visible to the public "Researchers Hack Remote Keyless System of Honda Vehicles"

    A researcher at the University of Massachusetts Dartmouth has published Proof-of-Concept (PoC) videos demonstrating how an attacker can remotely unlock a Honda vehicle's doors or start its engine. The attack is made possible by a vulnerability contained by the car manufacturer's remote keyless system. The vulnerability appears to impact all Honda Civic (LX, EX, EX-L, Touring, Si, and Type R) models between 2016 and 2020. It stems from the use of the same unencrypted radio frequency (RF) signal for commands that remotely unlock/lock doors, open the boot, or start the engine remotely. Therefore, an attacker in a man-in-the-middle (MITM) position could listen in on the request and then use it to perform a replay attack. An attacker can record the remote signal sent by the car owner to wirelessly open and start the vehicle, and then perform the same action by themselves later. This article continues to discuss the demonstrated attack against a Honda vehicle to unlock its doors and start its engine.

    Security Week reports "Researchers Hack Remote Keyless System of Honda Vehicles"

  • news

    Visible to the public  "Browser-in-the Browser (BITB) – A New Born Phishing Methodology"

    Browser-in-the-Browser (BITB) is a novel phishing method in which third-party Single Sign-On (SSO) options are abused. These SSO options are embedded on websites and issue pop-up windows for authentication via Google, Facebook, Apple, or Microsoft. The BITB attack involves simulating a pop-up window in order to spoof a legitimate domain. This approach of spoofing a pop-up login window is dangerous as it undermines the standard practice of checking the URL of sites. According to the researcher who demonstrated the technique, this type of attack is difficult to detect because the fake window looks identical to the real window. The fake one only has a few minor differences, making it difficult to notice. This article continues to discuss the BITB phishing method and how it differs from traditional phishing techniques.

    Security Boulevard reports "Browser-in-the Browser (BITB) - A New Born Phishing Methodology"

  • news

    Visible to the public "Washington Health District Suffers Another Data Breach"

    A Health District in the State of Washington has made its second data breach announcement of 2022. Both data breaches at the Spokane Regional Health District (SRHD) occurred when employees fell victim to phishing attacks. The district confirmed that on January 24, personal data might have been compromised when an unauthorized individual compromised an employee's email account on December 21, 2021. An internal investigation concluded that while no documents appeared to have been opened, accessed, or downloaded, the attacker may have 'previewed' clients' protected health information (PHI). The potential disclosure may have affected 1,058 individuals and involved data including names, dates of birth, case numbers, counselor's names, test results and dates of urinalysis, medication received and date of last dose. After the incident, SRHD's deputy administrative officer stated that the district had secured the email account and reinforced cybersecurity training with staff that contains the use of multi-factor authentication and performing additional testing on the system. Despite these efforts, SRHD recently reported a second data breach caused by the opening of a phishing email by a district employee on February 24. This latest breach may have exposed the information of 1,260 individuals from two unidentified departments in the district. The information which may have been involved in the second breach includes names, dates of birth, phone numbers, medications, medical conditions, and test results.

    Infosecurity reports: "Washington Health District Suffers Another Data Breach"

  • news

    Visible to the public "Utah Becomes Latest US State to Pass a Data Privacy Law"

    Utah has passed a new privacy law called the Utah Consumer Privacy Act (UCPA). UCPA will take effect in under two years, on December 31, 2023. The provisions will apply to organizations with annual revenue of $25m or more that conduct business in Utah or produce products or services targeted at Utah residents and process large volumes of personal data. Utah is the fourth US state to enact a consumer privacy law in recent years, following in the footsteps of California, Virginia, and Colorado. The UCPA will provide Utah consumers with a range of new rights regarding the collection and use of their personal information. These include the right to access, delete and obtain a copy of their personal data in a portable manner. In addition, Utah consumers can choose to opt-out of the sale of their personal data and targeted advertising. However, unlike California, Virginia, and Colorado laws, the UCPA does not give consumers the ability to correct inaccuracies in their personal data. UCPA will also require controllers to implement reasonable and appropriate data security measures, provide certain content in their privacy notices, and include specific language in contracts with processors. Unlike the other US state privacy laws, controllers will not be required to conduct data protection assessments before engaging in data processing activities that present a heightened risk of harm to consumers or to conduct cybersecurity audits or risk assessments.

    Infosecurity reports: "Utah Becomes Latest US State to Pass a Data Privacy Law"

  • news

    Visible to the public "Microsoft Help Files Disguise Vidar Malware"

    Trustwave SpiderLabs released a report detailing a new phishing campaign that plants the Vidar information-stealing malware on target machines. This malicious campaign hides its complex malware behind a Microsoft Compiled HTML Help (.CHM) file, which is Microsoft's proprietary file format for help documentation saved in HTML. The attackers do not expect users to ever look at this type of file. Vidar is described as a jack-of-all-trades information-stealing malware deriving from the Arkei malware family. The Vidar malware has been discovered to steal documents, cookies, browser histories, currency from cryptocurrency wallets, data from two-factor authentication software, text messages, and more. According to researchers, the package also provides malware operators Telegram notifications for logs. The threat actors can customize the stealer through profiles, thus allowing them to specify the type of data they are seeking. This article continues to discuss the capabilities, distribution, and obfuscation of Vidar malware through Microsoft help files.

    Threatpost reports "Microsoft Help Files Disguise Vidar Malware"

  • news

    Visible to the public "An Algorithm Makes It Possible to Identify People by Their Heartbeat"

    Biometrics help identify and authenticate a person by analyzing and measuring physical characteristics such as the face, voice, fingerprint, retina, and more. Biometric-based tools are increasingly supplementing or replacing password systems in the realm of security. A team of researchers from Universidad Carlos III de Madrid (UC3M) and the Shahid Rajaee Teacher Training University (SRTTU) proposes an innovative identification method that is based on the exclusive characteristics of the heartbeat. Their technique involves using electrocardiograms (ECG) and analyzing five musical qualities, including dynamics, rhythm, timbre, pitch, and tonality, which are commonly used to characterize audio files. These qualities are applied to the sound of heartbeats, which are then used to obtain a combination of parameters unique for each person. According to the team, their approach has an accuracy rate of 96.6 percent. Although biometric identification based on cardiac recordings has already been proven effective through years of studies, this new work is different as the researchers look at the ECG recording as if it were a sound wave. They also analyze this sound wave using qualities commonly explored to characterize music. The universality of this method's identification is its main advantage since some people still cannot be recognized by certain types of biometrics due to injury, amputation, or disabling physical characteristics. The heartbeat is a bio-signal present in all humans, without exception. This article continues to discuss the proposal and continued development of the researchers' method for using the heartbeat as a biometric tool.

    UC3M reports "An Algorithm Makes It Possible to Identify People by Their Heartbeat"

  • news

    Visible to the public "Protecting Picture Passwords"

    Researchers from the University of Tsukuba, Japan, propose the use of an alternative approach to text passwords, which involves using an enhanced graphical authentication method. They developed the "Estimating Your Encodable Distorted images" (EYEDi) system for online graphical authentication using key images with levels of distortion that can be adjusted to prevent over-the-shoulder and screen-capture snooping, thus improving the security of websites. Randomly distorting key images differently each time makes the system more secure against password crackers, even if they can see the user's screen. Text-based passwords are still the most common way to authenticate a user on the Internet, but they pose a major vulnerability as people often choose to create simple easily crackable passwords. The researchers' proposed solution instead uses a set of pictures called key images. In order for a user to log in, they must chose their secret key images from a lineup of pictures. Although this method is easy to remember and is relatively secure, it is still susceptible to over-the-shoulder attacks in which someone else watches the screen. Therefore, a new system is needed to help make this graphical authentication more resistant to these vulnerabilities. The EYEDi system generates distorted versions of key images during each log-in by applying several image processing filters. Even if a hacker installs a screen-capture program on a user's computer, they would still be unable to discern the original key images. The team noted that previously proposed image distortion methods were incapable of preventing camera recording or screen-capture attacks because the key images are the same each time. This article continues to discuss the EYEDi system developed by researchers at the University of Tsukuba to protect picture passwords and improve Internet security.

    University of Tsukuba reports "Protecting Picture Passwords"

  • news

    Visible to the public "Dual North Korean Hacking Efforts Found Attacking Google Chrome Vulnerability"

    Google's Threat Analysis Group discovered that two distinct sets of North Korean hackers were exploiting the same remote code execution vulnerability in the Chrome web browser. One set of North Korean hackers targeted news media and IT companies, and the other aimed at cryptocurrency and fintech organizations. The vulnerability that was being targeted was patched on February 14th. If the vulnerability was exploited, it would have allowed the hackers to deliver malware packages in hidden iframes, both on websites they owned and websites they had compromised. The researchers stated that the two groups had different aims and used different techniques, but they used the same exploit kit, meaning they likely worked for the same entity with a shared supply chain.

    CyberScoop reports: "Dual North Korean Hacking Efforts Found Attacking Google Chrome Vulnerability"

  • news

    Visible to the public "4.1 Million Websites Infected With Malware Worldwide"

    Security researchers at Sectigo have found that 4.1 million websites globally are currently infected with malware. According to the study, bot traffic accounted for 5.5 times more than human traffic in 2021, compared to 2020, with 2,306 weekly average bot visits per site being made. The researchers also found that the volume of human traffic decreased, indicating that malicious actors are increasingly using bots to scale their attacks and target unaware owners of small and medium-sized business (SMB) website owners. The researchers also found that nearly half (48%) of SMB website owners believe they are too small to target, even though half of them have been breached. The security researchers also found that WordPress sites are 39 times more vulnerable than non-Content Management System (CMS) sites, with plugins proving a significant factor. For every five plugins on a website, the risk of an attack is nearly double, according to Sectigo's research.

    Information Age reports: "4.1 Million Websites Infected With Malware Worldwide"

  • news

    Visible to the public "New Cyberespionage Campaign Targeting ISPs, Research Entities"

    ESET researchers have spotted a cyberespionage campaign involving a previously undocumented Korplug variant by the Mustang Panda Advanced Persistent Threat (APT) group. The campaign takes advantage of the war in Ukraine and other European news topics. Targets include research entities, Internet service providers (ISPs), and European diplomatic missions in East and Southeast Asia. The new Korplug variant has been dubbed Hodur because it resembles the THOR variant documented in 2020. Those who have fallen victim to the new campaign were likely lured with phishing documents that exploit Russia's invasion of Ukraine and other latest events in Europe. For example, one of the filenames related to this campaign is "Situation at the EU borders with Ukraine.exe." Other phishing lures used in this campaign mention COVID-19 travel restriction updates, an approved regional aid map for Greece, and a Regulation of the European Parliament and of the Council. These lures show that the APT group behind the campaign is closely following current affairs to quickly react to them. According to ESET researchers, code similarities and the commonalities in Tactics, Techniques, and Procedures (TTPs) suggest Mustang Panda, also known as TA416, RedDelta, or PKPLUG is behind the campaign. This cyberespionage group is known to mainly target governmental entities and Non-Governmental Organizations (NGOs). This article continues to discuss the latest findings regarding the new cyberespionage campaign abusing the latest events.

    Help Net Security reports "New Cyberespionage Campaign Targeting ISPs, Research Entities"

  • news

    Visible to the public "Serious Vulnerability Exploited at Hacking Contest Impacts Over 200 HP Printers"

    HP has announced that over 200 of its printer models are impacted by a critical Remote Code Execution (RCE) vulnerability disclosed by researchers at the Pwn2Own hacking contest in 2021. The security vulnerability, tracked as CVE-2022-3942, is described as a buffer overflow that can be exploited to remotely execute arbitrary code. The flaw stems from the use of Link-Local Multicast Name Resolution (LLMNR) and exists in the improper validation of the length of user-supplied data before it is copied to a fixed-length stack-based buffer. An attacker can exploit this vulnerability to execute code in the context of root. Impacted HP printer models include Enterprise (LaserJet, Color LaserJet, Digital Sender Flow, OfficeJet, PageWide, and ScanJet), LaserJet Pro, PageWide Pro, DeskJet, and more. Although firmware updates were released for most of the affected devices, tens of pinter models are still vulnerable. Therefore, the company suggests disabling LLMNR in network settings in order to mitigate the flaw. This article continues to discuss the security hole leaving hundreds of HP printers vulnerable to RCE and other security defects discovered in HP printers by researchers at Pwn2Own.

    Security Week reports "Serious Vulnerability Exploited at Hacking Contest Impacts Over 200 HP Printers"

  • news

    Visible to the public "Bigger Demands, Bigger Payouts Are the Trend in Ransomware, Report Says"

    Palo Alto Networks' Unit 42 conducted an analysis of ransomware attacks launched in 2021, finding that large and highly organized cybercrime groups such as Conti are contributing to the increase in the overall cost of ransomware attacks. Cases handled by Unit 42 incident responders show that the average ransom demand rose 144 percent in 2021 to $2.2 million, while the average payment increased 78 percent to $541,010. Ransomware attackers were also more likely than ever to leak data from breaches on the dark web as a way to further pressure victims into paying demanded ransoms. The number of victims whose data was made publicly available by ransomware attackers rose 85 percent in 2021 to 2,566 organizations. Almost 1 in 5 ransomware cases handled by Unit 42 involved Conti. This Eastern European gang has made international headlines in recent weeks after thousands of its own documents leaked. Unit 42 also discovered 35 new ransomware gangs in 2021, further indicating that ransomware is continuously growing.

    CyberScoop reports "Bigger Demands, Bigger Payouts Are the Trend in Ransomware, Report Says"

  • news

    Visible to the public "Security Teams are Responsible for Over 165k Asset"

    Security researchers at JupiterOne have discovered that stretched IT security teams threaten to become overwhelmed by the number of assets they must defend, especially those in the cloud. The security researchers analyzed 370 million assets at nearly 1,300 organizations to compile their 2022 State of Cyber Assets Report. These cyber assets could include cloud workloads, devices, network assets, applications, data assets, and users. The researchers found that the average security team is responsible for managing over 165,000 cyber assets. That amounts to 500 cyber assets for every human employee, making automation a must for effective security. The researchers noted that much of the challenge centers around the cloud, which accounted for 90% of device assets and 97% of security findings. Although cloud network assets outnumber physical networks by nearly 60:1, analysis of 10 million security policies found that less than 30% were cloud specific. Devices including hosts and agents outnumbered human staff by a ratio of 110:1, with the average sized team responsible for managing 32,190 devices. The researchers stated that dynamic network architectures also represent an increasing challenge to security teams. The researchers claimed that static IP addresses now comprise less than 1% of network assets, with dynamic network interfaces accounting for 56%.

    Infosecurity reports: "Security Teams are Responsible for Over 165k Asset"

  • news

    Visible to the public "US and Canada Collaborate to Tackle Cybercrime"

    The United States and Canada held talks on Tuesday to explore how the countries could collaborate better to counter cross-border illegal activity, including cybercrime. During the meeting, the countries have agreed to work together to improve coordination around reporting of ransomware attacks that can affect cross-border critical infrastructure. They also plan to identify and implement options to strengthen "sectors of their economies that are increasingly targeted by criminals and implement effective responses." Another target agreed by the United States and Canada was to promote the adoption of best practices on cyber hygiene and provide stakeholders with the tools they need to quickly and effectively report cyber incidents. The United States and Canada welcomed negotiations for a potential bilateral agreement relating to the US Clarifying Lawful Overseas Use of Data Act (CLOUD Act). If finalized and approved, the agreement would make it easier for Canadian and United States investigative authorities to access communications and associated data in the other country for the purposes of prevention, detection, investigation, and prosecution of serious crime, such as terrorism, child sexual exploitation and abuse, and cybercrime.

    Infosecurity reports: "US and Canada Collaborate to Tackle Cybercrime"

  • news

    Visible to the public "Is a Security Feature on the Way That Makes Computing Faster?"

    The multiple programs running simultaneously on a device depend on data stored in the device's memory hardware. However, sensitive information may not be shared among all the programs, thus leaving the device exposed to a memory timing side-channel attack. When attempts are made to access memory hardware, response delays are noted and exploited to recover passwords, cryptographic keys, or other sensitive data. The current solution in which memory hardware is restricted to one program has been found to slow down computation. Therefore, US National Science Foundation (NSF) grantee researchers at the Massachusetts Institute of Technology (MIT) have developed a method that allows memory hardware to be shared without sacrificing security against memory timing side-channel attacks. Their approach increases computation speed by 12 percent compared to state-of-the-art solutions. The researchers focused on developing a solution to thwart contention attacks in which a malicious program tries to access memory hardware at the same time as another program. They developed a security scheme named DAGguise that uses a graph structure, known as a Directed Acyclic Graph (DAG), to process requests and submit the requests to the memory controller on a fixed schedule. Memory hardware can be shared among programs securely using the DAGguise structure. This article continues to discuss the DAGguise security scheme developed by MIT researchers to protect against memory timing side-channel attacks while allowing for dynamic traffic contention to achieve good performance.

    NSF reports "Is a Security Feature on the Way That Makes Computing Faster?"

  • news

    Visible to the public "CISA, FBI Warn Critical Infrastructure of SATCOM Cyber Threats"

    The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) released a joint advisory warning critical infrastructure organizations about cyber risks associated with satellite communication (SATCOM) networks. SATCOM networks are used across all sectors for voice and data communication. Therefore, CISA and the FBI are urging SATCOM network providers and customers to stay vigilant against cyberattacks on SATCOM networks, which could lead to the disruption of network environments. For example, hackers targeted the SATCOM provider Viasat in February, disrupting network access in Ukraine. Viasat is also a defense contractor for the US, and so it is used across US critical infrastructure. CISA and the FBI call on SATCOM providers and customers to enable Multifactor Authentication (MFA), enforce the principle of least privilege, and inspect trust relationships with IT service providers. The agencies pointed out that threat actors often abuse the trusted relationships between providers and their customers in order to access data. Organizations are also encouraged to monitor network logs, implement robust patching practices, maintain a cyber incident response plan, and more. This article continues to discuss the joint advisory released by CISA and the FBI warning critical infrastructure organizations of SATCOM cyber risks.

    HealthITSecurity reports "CISA, FBI Warn Critical Infrastructure of SATCOM Cyber Threats"

  • news

    Visible to the public  "Pen Testing Tools Increasingly Used by Threat Actors"

    A recent report from the Managed Detection and Response (MDR) firm Red Canary brings further attention to the use of legitimate penetration testing tools such as Cobalt Strike, Impacket, and RMM by threat actors. Malicious actors have found it to be more efficient to use existing penetration testing tools that have already been proven effective than to create new tools. According to the report, Cobalt Strike has grown in popularity, impacting 8 percent of its customers in 2021. In addition, as-a-service models, including Phishing-as-a-Service (PhaaS), Access-as-a-Service, and Crypters-as-a-Service, have become increasingly available to threat actors. This article continues to discuss key findings from Red Canary's latest Threat Detection Report regarding threat actors' penetration testing tools, the increased availability of as-a-service models to launch attacks, and other growing cyber threats.

    BetaNews reports "Pen Testing Tools Increasingly Used by Threat Actors"

  • news

    Visible to the public "FBI: Cybercrime Reports Saw 'Unprecedented' Rise Last Year, Costing Nearly $7B"

    The FBI's Internet Crime Complaint Center (IC3) collects cybercrime complaints and received 847,376 of them last year, with estimated potential losses totaling $6.9 billion, a 64% increase from 2020. The total number of crime reports tallied by the IC3 only rose 7%, which highlights the increased costliness of the attacks. Paul Abbate, deputy director of the FBI, stated that in 2021, America experienced an unprecedented increase in cyberattacks and malicious cyber activity. The IC3 found that business email compromise led the pack again as the costliest crime, tallying $2.4 billion in adjusted losses in 2021. Investment schemes ($1.5 billion), romance scams ($956 million), personal data breaches ($517 million), and real estate scams ($350 million) rounded out the top five most expensive reported crimes. The IC3 also found that cryptocurrency played a more significant role in estimated 2021 cybercrime losses, totaling $1.6 billion compared to $246 million in 2020.

    CyberScoop reports: "FBI: Cybercrime Reports Saw 'Unprecedented' Rise Last Year, Costing Nearly $7B"

  • news

    Visible to the public "Fastest Ransomware Encrypts 100k Files in Four Minutes"

    A new study by researchers at Splunk has found that network defenders have just 43 minutes to mitigate ransomware attacks once encryption has begun. The security monitoring and data analytics vendor evaluated the speed at which 10 ransomware variants encrypt data. The researchers executed 10 samples of each of the 10 variants on four hosts, two running Windows 10 and the other two running Windows Server 2019. The researchers then measured the speed at which the ransomware encrypted nearly 100,000 files, totaling almost 53GB.

  • news

    Visible to the public "100,000 Google Play Users Infected With Android Password-Stealing Malware"

    A malicious Android app has been downloaded more than 100,000 times from the Google Play Store. The Android password-stealing malware called FaceStealer is disguised as a cartoonifier app, Craftsart Cartoon Photo Tools. According to security experts and the mobile security firm Pradeo, FaceStealer displays a Facebook login page and demands the user to register before accessing the program. When users submit their credentials, the app sends them to a command-and-control (C2) server, where the attackers then gather the information. The malicious Android application will also connect to a website that has previously been used for advertising other malicious FaceStealer Android apps. The creator and distributor of these apps appear to have automated the repackaging process and injected malicious code inside an otherwise legal application, thus allowing the apps to pass the Play Store screening process without being flagged. The user does not see any functionality when they open the app unless they sign in to their Facebook account. Pradeo has contacted Google about the Craftsart Cartoon Photo Tools app so that it could be removed. Those who have downloaded the app on their devices should uninstall it as soon as possible, reset their Facebook account password, and enable two-factor authentication for an extra layer of security. This article continues to discuss the infection of over 100,000 Google Play users with the FaceStealer Android password-stealing malware.

    CyberIntelMag reports "100,000 Google Play Users Infected With Android Password-Stealer"

  • news

    Visible to the public "Vulnerabilities Found in Popular Open-Source Projects on GitHub Could Impact Millions"

    Cycode researchers discovered critical vulnerabilities in several popular open-source projects that could lead to a supply chain attack through the Continuous Integration (CI) process. According to the researchers, the vulnerabilities exist in misconfigured GitHub Actions workflows, which can affect millions of potential victims. The workflows were found to lack proper input sanitizing, thus allowing threat actors to inject code into builds through issues and comments, and to access privileged tokens. The most popular repositories found to be vulnerable include Liquibase, Dynamo BIM, FaunaDB, Wire, Astro, Kogito, and Ombi. While Log4j was making headlines over the past several months, over 4,000 high-severity vulnerabilities were announced, according to Ratan Tipirneni, the president and CEO at Tigera. Tipirneni highlighted that Cycode's recent discovery of critical vulnerabilities in popular open-source projects further indicates there will be an increase in vulnerabilities and threats as the pace of innovation in conjunction with the use of open-source libraries grows. This finding also presents an alarming sign for the highly constrained security and DevOps teams. Tipirneni pointed out that it is almost impossible for DevOps or security teams to keep up with the changing tactics of attackers. In order to address this security gap, businesses are urged to adopt a defense-in-depth approach. This article continues to discuss the Cycode researchers' discovery of critical vulnerabilities in open-source projects on GitHub and what businesses should do to actively mitigate security risks.

    SC Media reports "Vulnerabilities Found in Popular Open-Source Projects on GitHub Could Impact Millions"