News Items

  • news

    Visible to the public "FBI: Ransomware Gang Breached 52 US Critical Infrastructure Orgs"

    According to the US Federal Bureau of Investigation (FBI), the RagnarLocker ransomware group has compromised the networks of at least 52 organizations across ten critical infrastructure sectors. The federal law enforcement agency revealed that it had identified the 52 affected entities in the critical manufacturing, energy, financial services, government, and information technology sectors. RagnarLocker ransomware actors have been observed frequently changing obfuscation techniques in order to evade detection and prevention. The flash alert, released in coordination with the Cybersecurity and Infrastructure Security Agency (CISA), includes indicators of compromise (IOCs) that organizations can use to detect and block RagnarLocker ransomware attacks. These IOCs include information on the RagnarLocker ransomware gang's attack infrastructure, email addresses, and Bitcoin addresses used to collect ransom demands. This article continues to discuss the FBI's warning of RagnarLocker ransomware attacks on critical infrastructure.

    Bleeping Computer reports "FBI: Ransomware Gang Breached 52 US Critical Infrastructure Orgs"

  • news

    Visible to the public "Medical, IoT Devices From Many Manufacturers Affected by 'Access:7' Vulnerabilities"

    Research conducted by employees at CyberMDX, a medical device cybersecurity company recently acquired by Forescout, found that many Internet of Things (IoT) and medical devices are impacted by vulnerabilities in PTC's Axeda agent. The Axeda agent is a solution used for remote access and management of over 150 connected device models from more than 100 manufacturers. CyberMDX conducted its investigation after detecting potential security issues associated with the Axeda agent component on customer systems. The analysis resulted in the discovery of a set of seven supply chain vulnerabilities called Access:7. Threat actors could exploit these vulnerabilities for remote code execution, Denial-of-Service (DoS) attacks, and obtaining information. Most of the vendors impacted by Access:7 vulnerabilities are in the healthcare sector. Other affected vendors are in IoT, financial services, and manufacturing. The vulnerabilities could allow a malicious actor to gain initial access to a network, steal potentially sensitive data, or disrupt affected devices. Although the Axeda platform has reached End of Life (EOL), the vendor has released patches for manufacturers to provide to their customers. This article continues to discuss the discovery, potential exploitaiton, and impact of the Access:7 vulnerabilities.

    Security Week reports "Medical, IoT Devices From Many Manufacturers Affected by 'Access:7' Vulnerabilities"

  • news

    Visible to the public "Oklahoma Hospital Data Breach Impacts 92,000 People"

    A security incident at a nonprofit community hospital in Oklahoma may have exposed the personal data of more than 92,000 individuals.
    Duncan Regional Hospital (DRH) discovered that access to some of its systems were mysteriously blocked on January 20, 2022. The hospital disconnected all its systems from external access and notified law enforcement. DRH triggered its cybersecurity incident response plan and hired an independent forensics firm to determine what had happened, how it had occurred, and whether any sensitive information may have been impacted. DRH was able to bring all systems back to normal operations within 24 hours. The investigating firm found that patient information and employee information may have been exposed during the incident. The impacted data might include patients' name, date of birth, Social Security number, limited treatment information, and medical appointment information such as date of service and name of providers. For employees, the data impacted includes personal information associated with W-2s, such as name, date of birth, address, and Social Security number.

    Infosecurity reports: "Oklahoma Hospital Data Breach Impacts 92,000 People"

  • news

    Visible to the public "Samsung Source Codes Stolen"

    Cybercriminals have broken into the network of South Korean tech giant Samsung Electronics and stole various source codes. The source codes involved in the incident are related to the operation of the company's Galaxy devices. While the company is yet to determine the full scope of the breach, Samsung said that no evidence had been found to suggest that any personal information belonging to its customers or employees had been compromised in the incident. Samsung noted that the cyberattack and data theft was unlikely to disrupt its business or directly impact its customers. Confirmation of the breach comes after hacking and data extortion group Lapsus$ claimed to have penetrated Samsung's network earlier this month. On Friday, the cybercriminal group published 190GB of confidential data it claimed had been exfiltrated from the tech company. The published data reportedly contained source codes and biometric unlocking algorithms linked to Samsung and source code belonging to American multinational technology corporation Qualcomm.

    Infosecurity reports: "Samsung Source Codes Stolen"

  • news

    Visible to the public "Days-long DDoS Attack with Embedded Ransom Note Mitigated"

    An undisclosed website has faced a days-long Distributed Denial-of-Service (DDoS) attack, which measured up to 2.5 million requests per second. According to researchers at Imperva, instead of the attackers contacting the victim separately, the attack itself included a ransom note, perhaps to remind the target to send their bitcoin payment. The ransomware note suggests that the attack was carried out by the Ransomware-as-a-Service (RaaS) operator REvil. As part of the latest attack, the threat actor claimed to have been behind a different attack against the service provider Bandwidth, but the researchers have not determined whether the attackers were, in fact, part of the original REvil group. They did find that the Meris botnet played a key role in the attack. Researchers at Qrator Labs and Cloudflare first observed the botnet activity in huge waves of DDoS attacks. These firms observed the DDoS attack signatures reach nearly 17.2 million to 21.8 million requests per second. In the recent DDoS attack, multiple sites belonging to the targeted company were attacked, with one of the sites being hit for about 10 minutes. The attackers used sophisticated tactics to prevent mitigation as they constantly changed ransom messages and attack vectors. The attacks lasted for several days, sometimes lasting up to several hours. In 20 percent of cases, the attack reached between 90,000 and 750,000 requests per second. The researchers were able to mitigate over 12 million embedded requests targeting random URLs on the same site. On the second day of the attack, the researchers mitigated more than 15 million requests, with the URL containing a different ransom message, but using the same tactics. This article continues to discuss key findings and observations surrounding the days-long DDoS attack on an undisclosed website.

    GovInfoSecurity reports "Days-long DDoS Attack with Embedded Ransom Note Mitigated"

  • news

    Visible to the public "Bad Actors Are Becoming More Successful at Evading AI/ML Technologies"

    The Threat Research team at Deep Instinct monitored the different volumes and types of cyberattacks and analyzed their findings to help predict the future of cybersecurity, determine attackers' motivations, and highlight the steps that organizations should take to protect themselves. One of the key findings from this research is that malicious actors are becoming increasingly successful at evading Artificial Intelligence (AI) and Machine Learning (ML) technologies, which calls on organizations to increase their efforts towards developing and implementing more innovative solutions. Other key findings include a 170 percent increase in the use of Office droppers with a 125 increase in all types of threats combined. Findings suggest that the volume of all malware types is significantly higher versus pre-pandemic. In addition, threat actors have made a noticeable shift away from older programming languages, such as C and C++, towards Go and other newer languages. Attackers are suspected to be making this shift because newer languages are easier to learn and to program than their predecessors, and are less likely to be detected by cybersecurity tools or analyzed by security researchers since they are still less commonly used. As defense evasion and privilege escalation become more prevalent, the team expects to see continued efforts by bad actors to evade Endpoint Protection Platforms (EPP) and Endpoint Detection and Response (EDR) in 2022. Threat actors appear to be investing more in anti-AI and adversarial attack techniques, and applying these methods in their larger evasion strategy. This article continues to discuss key findings from Deep Instinct's research on 2021 threat trends.

    Help Net Security reports "Bad Actors Are Becoming More Successful at Evading AI/ML Technologies"

  • news

    Visible to the public "Low-Power Encrypted Computing Solutions"

    The smart devices we use in our daily lives, such as smartphones, smartwatches, and smart health devices, generate large amounts of data. As the number of data sources such as these low-resource client devices continues to grow, the demand for sophisticated computing to extract value from the data using Machine Learning (ML) increases. Low-resource devices have limited computing capabilities due to their simple computing hardware and the energy limitation of their small batteries. These devices could use computational offloading in which sensor data is sent to a nearby edge device or the cloud for processing in order to get around these shortcomings. Offloading makes even very sophisticated data processing feasible, but only with the adjustment that the server performing the processing has unencrypted access to the data. Homomorphically encrypted computing is a new computing method aimed at mitigating these privacy concerns. It involves the client encrypting its data and sending the encrypted data for offloading. The offloaded processing occurs without decrypting the data. Although encrypted computing has a significantly high computational cost, advances in computer architecture and algorithms have made it possible to offload encrypted computation at a reasonable cost, thus making the technique feasible. However, these advances do not consider the costs posed to the low-resource client by encrypted computing, which make encrypted offload computing infeasible for low-resource devices. Therefore, researchers at Carnegie Mellon University (CMU) developed new algorithms and hardware designs to address these costs to client devices in order to make encrypted offloading possible for low-resource clients. This article continues to discuss the concept of homomorphically encrypted computing and the algorithms and hardware designs developed by the researchers to make encrypted offloading feasible for low-resource clients.

    CMU reports "Low-Power Encrypted Computing Solutions"

  • news

    Visible to the public "Senate Passes Strengthening American Cybersecurity Act"

    The United States Senate has passed the Strengthening American Cybersecurity Act, requiring critical infrastructure operators and federal agencies to report cyberattacks within 72 hours and ransomware payments within 24 hours. The Act combines language from three bills, including the cyber-incident reporting bill, introduced to the Senate in September 2001. The legislation would impact companies across 16 federally designated critical infrastructure sectors, including energy and financial services. Under the new legislation, current federal cybersecurity laws would be updated to enhance coordination between federal agencies. In addition, all federal civilian agencies would be required to report any significant cyberattacks to the Cybersecurity and Infrastructure Security Agency (CISA). The Act would also give the Federal Risk and Authorization Management Program (FedRAMP) five-year authorization to ensure federal agencies are able to adopt cloud-based technologies.

    Infosecurity reports: "Senate Passes Strengthening American Cybersecurity Act"

  • news

    Visible to the public "Vulnerabilities in Over 100k Medical Infusion Pumps"

    Security researchers at Palo Alto Network's Unit 42 have discovered that most smart medical infusion pumps have known security gaps that make them vulnerable to hackers. Smart infusion pumps are network-connected medication delivery devices that use a combination of computer technology and drug libraries to administer medications and fluids to patients while limiting the potential for dosing errors. The researchers reviewed crowdsourced data from scans of more than 200,000 infusion pumps on the networks of hospitals and other healthcare organizations. Security gaps were detected in 75% of the scanned medical devices. The security researchers noted that the most striking finding was that 52% of all infusion pumps scanned were susceptible to two known vulnerabilities that were disclosed in 2019, one with a "critical" severity score and the other with a "high" severity score. The researchers stated that regulation needs to step in to make vendors and providers ensure that the connected devices used for delivering care meet a minimum standard for security. The researchers noted that devices that can't be updated need to be replaced.

    Infosecurity reports: "Vulnerabilities in Over 100k Medical Infusion Pumps"

  • news

    Visible to the public "Taking a Systems Approach to Cybersecurity"

    A new study conducted by researchers at the International Institute for Applied Systems Analysis (IIASA) proposes a framework that takes a more holistic approach to cybersecurity. They also proposed a model that explicitly represents multiple dimensions of the potential effects of successful cyberattacks. Critical infrastructure such as electric power grids are growing in sophistication, meaning they are also becoming increasingly more reliant on digital networks and smart sensors to operate. This reliance has made such critical infrastructure more vulnerable to cyberattacks that can disable systems, disrupt operations, or enable attackers to remotely control affected systems. The impacts of successful attacks on critical cyber-physical systems are also multidimensional, so they can incur losses for operators of the compromised system, result in economic losses for other parties relying on their services, present environmental hazards, and more. According to the new study, the multidimensional impacts of cyberattacks call for a tool capable of distinguishing between the different dimensions of cyber risks. The tool should also enable the design of security measures that can most efficiently use limited resources. The researchers wanted to determine whether it is possible to find vulnerabilities that could open ways for several attack scenarios to proceed if exploited. They also wanted to find out if it is possible to use this knowledge to simultaneously deploy countermeasures to protect a system from several threats. One common way in which cyber threats are managed involves conducting an analysis of individual attack scenarios through risk matrices, prioritizing the scenarios based on their perceived urgency, and addressing them in order until all the available cybersecurity resources are spent. However, the team pointed out that this approach could lead to suboptimal resource allocations since the potential synergies between different attack scenarios and among available security measures are not considered. Existing assessment frameworks and cybersecurity models assume the perspective of the system's operator and support their cost-benefit analysis, but this approach is inadequate in the context of security of critical infrastructure, where the potential impacts of cyberattacks are multidimensional and may affect multiple stakeholders. Therefore, the researchers propose a quantitative framework that features a more holistic picture of the cybersecurity landscape, encompassing multiple attack scenarios. To do this, they developed a Bayesian network model that represents the cybersecurity landscape of a system. This article continues to discuss the framework and model proposed by the researchers to support a holistic approach to cybersecurity.

    IIASA reports "Taking a Systems Approach to Cybersecurity"

  • news

    Visible to the public "Researchers Show They Can Steal Data During Homomorphic Encryption"

    Researchers at NC State University have demonstrated that it is possible to steal data during homomorphic encryption. Homomorphic encryption has been highlighted as a next-generation data security technology, but the team discovered a vulnerability that allowed them to steal data while it was being encrypted. They were not able to crack homomorphic encryption using mathematical tools. Instead, they performed side-channel attacks in which they monitored a device's power consumption as it encoded data for homomorphic encryption in order to read the data while it was being encrypted. This research suggests that even the next generation of encryption technologies must be protected against side-channel attacks. Homomorphic encryption is a method for encrypting data in a way that prevents third parties from reading it, but this type of encryption still allows third parties and third-party technologies to conduct operations using the data. For example, a user could apply homomorphic encryption to upload sensitive data to a cloud computing system to analyze the data. Programs in the cloud could perform the analysis and then send the results back to the user, but those programs would never be able to read the sensitive data. This method preserves data privacy while allowing users to carry out operations using the data. Although it has been theoretically possible, homomorphic encryption is significantly computing power-intensive. Therefore, researchers are still in the early stages of developing hardware and software to make homomorphic encryption practical. Microsoft is a leader in homomorphic encryption, with its creation of the SEAL Homomorphic Encryption Library to help the broader research community study and develop homomorphic encryption. The team found a way to crack homomorphic encryption using the SEAL Homomorphic Encryption Library via a side-channel attack. They verified the vulnerability contained by the library up through at least version 3.6. As homomorphic encryption research continues, tools and techniques must be developed to protect against side-channel attacks. This article continues to discuss the demonstrated possibility of stealing data during homomorphic encryption through side-channel attacks.

    NC State University reports "Researchers Show They Can Steal Data During Homomorphic Encryption"

  • news

    Visible to the public "Phishing Campaign Targeted Those Aiding Ukraine Refugees"

    According to a new report from researchers at Proofpoint, cyberattackers are using a compromised Ukrainian military email address to deliver malicious macros to EU government employees who have been helping manage the logistics of refugees fleeing Ukraine. The attackers are leveraging breaking news about the Russian invasion of Ukraine to trick targets into opening emails with Microsoft Excel files containing malware. The phishing attempt has been attributed to TA445, also known as UNC1151 or Ghostwriter, which has previously been linked to the Belarus government. The researchers were able to trace the compromised Ukrainian military email address to a publicly available procurement document for a Stihl-brand lawnmower purchased in 2016. They found that the order was made by a military unit in Chernihiv, Ukraine. How the attackers gained access to a military email address remains unclear. This article continues to discuss the phishing campaign targeting EU government employees, the suspected attackers behind the campaign, and Ukraine-oriented cyberattacks that have occurred in recent weeks.

    Threatpost reports "Phishing Campaign Targeted Those Aiding Ukraine Refugees"

  • news

    Visible to the public "HSB Survey Finds EV Security Fears"

    According to new research, small business owners in America are expanding their service fleets with electric vehicles (EVs) despite having fears about the machines' cybersecurity. An online survey for the Hartford Steam Boiler Inspection and Insurance Company (HSB) found that 15% of small and medium-sized businesses had leased or purchased EVs for commercial use. However, just over three-quarters (76%) of those business owners and managers were concerned that the EVs could fall prey to hackers, ransomware, and other cyberattacks when connected to EV charging stations. The survey revealed that nearly half of small business owners were "somewhat or very concerned" about the cybersecurity and safety of internet-connected and automated vehicles. The president for HSB, Timothy Zeilman, stated that the technology is advancing swiftly, and there is a growing need to focus on the cybersecurity of electric vehicles. He continued by noting that with the rush to make the switch to electric cars and trucks, owners and the EV industry should step up their efforts to protect vehicles and charging infrastructure from cyberattacks. When asked to describe their own security experience regarding their commercial vehicles, 13% of business owners and managers said that their fleet had been impacted by a computer virus, hacking incident, or other cyberattack at some point. Nearly half of the 504 individuals surveyed (44%) said that they were worried about their vehicles' data, software, or operating systems being damaged or destroyed by malware or another form of cyberattack. More than half (56%) of respondents described themselves as somewhat or very concerned that a cyberattack could immobilize their vehicles or render them inoperable. Roughly the same proportion of respondents (54%) said they were worried that a cyberattack could compromise their safety on their EV. The possibility of a hacker breaking into their EV and communicating with them over the vehicle's audio system was a concern for 43% of respondents.

    Infosecurity reports: "HSB Survey Finds EV Security Fears"

  • news

    Visible to the public "Most Disclosed ICS Vulnerabilities are Low Complexity"

    Securing researchers at Claroty during new research have found that industrial control system (ICS) vulnerability disclosures have surged, and most vulnerabilities reported are low complexity. The researchers found that the volume of disclosures has increased by 110% over the last four years. In the second half of 2021, 797 vulnerabilities were published, representing a 25% increase from the 637 reported over the first six months of 2021. The researchers noted that 87% of vulnerabilities are low complexity, meaning they don't require special conditions, and an attacker can expect repeatable success every time. ICS vulnerabilities are not limited to operational technology (OT), as just over a third (34%) of disclosures affected IoT, IoMT, and IT assets. The researchers stated that nearly two-thirds (64%) of vulnerabilities reported require no user interaction, and 70% don't require special privileges before successfully exploiting a vulnerability. Just under two-thirds of the vulnerabilities (63%) disclosed may be exploited remotely through a network attack vector. The researchers found that the leading potential impact of the vulnerabilities disclosed is remote code execution (prevalent in 53% of vulnerabilities), followed by denial-of-service conditions (42%), bypassing protection mechanisms (37%), and allowing the adversary to read application data (33%).

    Infosecurity reports: "Most Disclosed ICS Vulnerabilities are Low Complexity"

  • news

    Visible to the public "Conti Ransomware Source Code Leaked"

    A hacker claiming to be Ukrainian has leaked Conti ransomware source code after the cybercrime gang behind the ransomware showed support for Russia. The Conti ransomware group released a statement saying it would target the critical infrastructure of Russia's enemies in retaliation for attacks on Russia. They later claimed that they condemned the war and are not allies of any government, but said they are prepared to respond to "American cyber aggression." Someone then created a Twitter account called "conti leaks," where they started leaking files associated with the Conti ransomware operation. Some say the individual behind the leaks is a Ukrainian security researcher, while others say they are a Ukrainian member of the Conti group. The first set of files contained tens of thousands of messages exchanged by Conti members since January 2021. The information included Bitcoin addresses, conversations with victims, IP addresses, and more. The Twitter account has continued releasing Conti chat logs, credentials, email addresses, screenshots, command-and-control (C2) server details, and other files. This article continues to discuss the leak of files associated with the Coni ransomware operation.

    Security Week reports "Conti Ransomware Source Code Leaked"

  • news

    Visible to the public "The Biggest Threat to ICS/OT Is a Lack of Prioritization"

    Findings from a survey conducted by the SANS Institute suggest that cyberattackers have a robust understanding of Operational Technology (OT) and Industrial Control System (ICS) engineering, as they have executed attacks that can gain access and impact operations. Of the survey participants, 61 percent revealed that there is a gap in the perception of cybersecurity risks faced by their ICS facilities between OT/ICS cybersecurity front-line teams and other members of the organization. When asked about the most concerning threat categories, 50 percent of the respondents cited ransomware as the biggest threat. Adversaries are targeting ICS operations with ransomware because such operations could lead to higher and faster payouts. Facilities are urged to ensure that OT/ICS defenders are knowledgeable about their control systems and the ever-changing threat landscape. Defenders must also increase efforts to improve ICS network visibility and monitor abnormalities in the control system traffic. This article continues to discuss key findings from the survey regarding the gap in perception around ICS risks, ransowmare as the biggest threat to OT, challenges associated with ICS security resources, and the importance of improving ICS system and network visibility.

    Help Net Security reports "The Biggest Threat to ICS/OT Is a Lack of Prioritization"

  • news

    Visible to the public "Personal Data From T-Mobile Breach Still Spreading on Dark Web, State Governments Warn"

    The top law enforcement officials from multiple states are alerting people affected by an August 2021 breach at T-Mobile that their personal data might be circulating in cybercrime forums online. New York Attorney General Letitia James stated that information stolen in a massive data breach has fallen into the wrong hands and is circulating on the dark web. Officials from California, Florida, and several other states issued similar warnings. The T-Mobile breach involved the data of tens of millions of current, former or prospective customers of the wireless company. The stolen data is attractive for identity theft and other financial crimes. Law enforcement agencies from multiple states are investigating the breach. In some cases, the hacker accessed people's names, dates of birth, Social Security numbers, and driver's license or ID numbers. The company also said technical data, including international mobile equipment identities (IMEIs) and international mobile subscriber identities, were also compromised. IMEIs, which are often used for advertising purposes, are a unique fingerprint for a device that cannot be reset. States are advising people to take the usual steps if they fear their personal or financial information has been misused: check credit reports and consider contacting the Equifax, Experian, and TransUnion credit bureaus to place freezes on personal credit reports. Individuals can also ask credit reporting services to provide fraud alerts. The August incident was the fifth the company has suffered since 2018.

    CyberScoop reports: "Personal Data From T-Mobile Breach Still Spreading on Dark Web, State Governments Warn"

  • news

    Visible to the public "NATO Completes Quantum-Safe Comms Test"

    NATO has successfully completed a trial of new "quantum-safe" technology designed to mitigate the future risks posed by quantum computers cracking asymmetric cryptography. A company called Post Quantum revealed that the NATO Cyber Security Centre (NCSC) tested "secure communication flows" using one of its specialized virtual private networks (VPNs). Many security researchers have warned that communications based on current public-key encryption standards like RSA are at risk once quantum technology becomes mature enough. Post Quantum described its technology as a "Hybrid Post-Quantum VPN," which blends traditional encryption algorithms with those deemed "quantum-safe." The company has submitted the solution to the Internet Engineering Task Force (IETF) for open standardization. An NCSC principal scientist stated that securing NATO's communications for the quantum era is paramount to its ability to operate effectively without fear of interception.

    Infosecurity reports: "NATO Completes Quantum-Safe Comms Test"

  • news

    Visible to the public "Cyberattacks in Ukraine: New Worm-Spreading Data-Wiper With Ransomware Smokescreen"

    Researchers at the anti-malware company ESET found signs of new malware with worm-spreading capabilities being distributed in cyberattacks in Ukraine. According to the researchers, the cyberattacks began hours before Russia invaded Ukraine, with Distributed Denial-of-Service (DDoS) attacks targeting Ukrainian government websites. The cyberattacks then turned into wiper attacks, destroying data on computer networks. The initial attacks were found leveraging HermeticWiper, HermeticWizard, and HermeticRansom. HermeticWiper corrupts a system's data to make it inoperable, while HermeticWizard spreads the data wiper like a worm across a local network through Windows Management Instrumentation (WMI) and the Server Message Block protocol (SMB). HermeticRansom adds a data-extortion ransomware component written in the Go programming language. A day later, ESET's technology thwarted another new wiper in a Ukrainian governmental network. The wiper dubbed IsaacWiper is being assessed to determine whether it is linked to HermeticWiper. Although the company has not found any tangible connection with a known threat actor, the wiper and worm-spreading components were found to be signed with a code-signing certificate assigned to Hermetic Digital. The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) has released indicators of compromise (IOCs) to help threat hunters look for signs of the data-wiping threats in computer networks. This article continues to discuss findings surrounding the destructive data-wiping malware attacks in Ukraine.

    Security Week reports "Cyberattacks in Ukraine: New Worm-Spreading Data-Wiper With Ransomware Smokescreen"

  • news

    Visible to the public "Log4Shell Exploits Now Used Mostly for DDoS Botnets, Cryptominers"

    Threat actors are still exploiting the Log4Shell vulnerabilities contained by the widely used Log4j software to add devices to Distributed Denial-of-Service (DDoS) botnets and plant cryptomining malware. According to a report from Barracuda, the volume of attempts to exploit Log4Shell vulnerabilities has remained relatively constant. The analysis of attacks involving the exploitation of these vulnerabilities showed that most exploitation attempts were made by malicious actors in the US, Japan, central Europe, and Russia. The operators of the Mirai botnet have exploited Log4Shell vulnerabilities. The Mirai malware targets publicly exposed network cameras, routers, and other devices and then recruits them into a botnet composed of remotely controlled bots. The threat actor controls the botnet to execute DDoS attacks against targets, draining their resources and disrupting their online services. Barracuda's report explains that Mirai is distributed in different forms from various sources, meaning the operators are trying to build a large botnet that attacks victims of all sizes. The threat actors behind these operations are said to be renting their botnet firepower to others or performing DDoS attacks themselves to extort target companies. Other payloads dropped through the exploitation of Log4Shell vulnerabilities include BillGates malware, Kinsing, XMRig, and Muhstik. This article continues to discuss the continued exploitation of Log4Shell vulnerabilities to build DDoS botnets and deliver cryptomining malware.

    Bleeping Computer reports "Log4Shell Exploits Now Used Mostly for DDoS Botnets, Cryptominers"

  • news

    Visible to the public  "DDoS Attackers Have Found This New Trick to Knock Over Websites"

    Distributed Denial-of-Service (DDoS) attackers have been observed using a new technique to knock websites offline, which involves targeting middleboxes such as firewalls to amplify junk traffic attacks. Amplification attacks have helped malicious actors knock over servers with short traffic bursts. According to the content distribution network firm, Akamai, there has recently been a surge of attacks using Transmission Control Protocol (TCP) Middlebox Reflection. Akamai revealed that the attacks reached 11 Gbps at 1.5 million packets per second (Mpps). Researchers at the University of Maryland and the University of Colorado Boulder released a paper last August, revealing that attackers could use middleboxes through TCP to amplify DDoS attacks. Most DDoS attacks use the User Datagram Protocol (UDP) to amplify packet delivery by sending packets to a server that replies with a larger packet size, which are then forwarded to the attacker's target. The TCP attack leverages network middleboxes that do not follow the TCP standard. The researchers discovered hundreds of thousands of IP addresses that could amplify attacks by more than 100 times through the use of firewalls and content filtering devices. This article continues to discuss the new technique being used by DDoS attackers to amplify attacks.

    ZDNet reports "DDoS Attackers Have Found This New Trick to Knock Over Websites"

  • news

    Visible to the public "Rural Idaho Receives Cybersecurity Boost"

    Boise State University (BSU) has partnered with Stellar Cyber to launch a new program to improve cybersecurity in Idaho's rural and remote communities. BSU said its Institute for Pervasive Cybersecurity is adopting Stellar Cyber's Open XDR platform. The platform will be a teaching tool and play a central role in the university's new Cyberdome skill development program. Stellar Cyber stated that the new partnership allows Boise to launch a first-of-its-kind, free Security-as-a-Service program for Idaho's rural and remote communities, including state-funded agencies and school districts. Boise State stated that they will use the Open XDR platform to provide free Security-as-a-Service (SaaS) services to Idaho's more than 750 state-funded agencies and teach and train Cyberdome students about cybersecurity through real-world operational experience. The platform features a suite of built-in tools, which includes network detection and response (NDR), security information event management (SIEM), and threat intelligence platform (TIP). It was designed to integrate with third-party security tools like endpoint detection and response (EDR), which students have already been trained to use.

    Infosecurity reports: "Rural Idaho Receives Cybersecurity Boost"

  • news

    Visible to the public "Ghostwriter Group Targets NATO Refugee Effort"

    Security researchers at Proofpoint have detected a new phishing campaign linked to a notorious disinformation threat group, targeting European governments as they try to manage an influx of Ukrainian refugees. The new phishing campaign was first spotted on February 24, and the original phishing email was sent using a compromised account belonging to a member of the Ukrainian military. The email itself piggybacked on news of a recent UN Security Council meeting and contained a malicious XLS macro later determined to deliver the SunSeed malware. The file itself was spoofed to appear as if it contained a recently discovered 'kill list' of Ukrainian figures drawn up by Moscow. The timing of the phishing campaign also appeared to coincide with Ukrainian CERT warnings of widespread phishing campaigns targeting military personnel and relatives launched by Belarusian group Ghostwriter (UNC1151/TA445). The email messages that the researchers observed were limited to European governmental entities. The targeted individuals possessed a range of expertise and professional responsibilities. However, there was a clear preference for targeting individuals with responsibilities related to transportation, financial and budget allocation, administration, and population movement within Europe. The researchers stated that this campaign might represent an attempt to gain intelligence regarding the logistics surrounding the movement of funds, supplies, and people within NATO member countries. Although the researchers said they didn't have definitive technical evidence linking the campaign to Ghostwriter, they had spotted "several temporal and anecdotal indicators." The researchers noted that the group could be trying to gather evidence to help craft more narratives about migrants and refugees intended to sow discord across Europe, a tactic it has used before. TA445 has a history of engaging in a significant volume of disinformation operations designed to manipulate European sentiment around the movement of refugees within NATO countries. The researchers noted that these controlled narratives might intend to marshal anti-refugee sentiment within European countries and exacerbate tensions between NATO members, decreasing Western support for the Ukrainian entities involved in armed conflict.

    Infosecurity reports: "Ghostwriter Group Targets NATO Refugee Effort"

  • news

    Visible to the public "Chinese Cyberspies Use Their ‘Most Advanced’ Backdoor to Attack Governments"

    Daxin is a stealthy backdoor linked to China that was built to be deployed in fortified corporate networks with high-level threat detection capabilities. Findings from an analysis of the backdoor conducted by Symantec's Threat Hunter team reveal that Daxin is one of the most sophisticated backdoors ever used by Chinese hackers. Daxin comes in the form of a Windows kernel driver, a relatively rare format in the malware world. Daxin's communication capabilities combine data sharing with conventional Internet traffic, making it stealthy. Backdoors allow threat actors to gain remote access to a hacked computer system in order to steal data, run commands, download other malware, and more. Such tools require data transfer encryption or obfuscation to avoid detection by network traffic monitoring tools since they are often used to steal information from secured networks or cause further damage to a device. Daxin does this by looking for specific patterns in a device's network data. Following the discovery of particular patterns, Daxin will then take over a genuine TCP connection and abuse it to interact with the command-and-control (C2) server. The Daxin malware may hide its communication in what appears to be ordinary traffic and, therefore, go unnoticed by hijacking TCP conversations. Symantec pointed out that the use of hijacked TCP connections gives Daxin's communications a high degree of stealth, helps set up connectivity on networks containing strict firewall rules, and lowers the risk of discovery by Security Operations Center (SOC) analysts. This article continues to discuss recent findings surrounding the China-linked Daxin malware.

    CyberIntelMag reports "Chinese Cyberspies Use Their 'Most Advanced' Backdoor to Attack Governments"

  • news

    Visible to the public "Revamped Anchor Malware Targets Windows Systems"

    Researchers with IBM Security X-Force are warning of a revamped version of the Anchor malware called AnchorMail, which has been targeting Windows systems. Anchor is a backdoor that has been deployed by the group behind the Trickbot malware. It was previously used to communicate with the command-and-control (C2) server, with the end goal being to launch Conti ransomware. According to the researchers, the malware's installation framework has been used by some of the most notorious threat actors in attacks against organizations in the healthcare, finance, telecoms, education, and critical infrastructure sectors. Anchor used the Domain Network System (DNS) protocol to communicate with the C2. The newly discovered variant now uses an email-based C2 server and communicates via the Simple Mail Transfer Protocol (SMTP) and Internet Message Access Protocol (IMAP) protocols over Transport Layer Security (TLS), helping attackers avoid detection. AnchorMail is difficult to detect as it encrypts the data over SMTPS/IMAPS protocols, and leverages properly crafted email messages to set up the C2 channel. Charlotte Hammond, a malware reverse engineer with IBM Security X-Force, said that AnchorMail is written in C++ and has only focused on targeted Windows systems thus far, but a Linux-variant of AnchorMail could emerge too since Anchor has been ported to Linux. This article continues to discuss the history of Anchor malware and the Trickbot gang, as well as findings regarding AnchorMail.

    Decipher reports "Revamped Anchor Malware Targets Windows Systems"

  • news

    Visible to the public "Organizations Vulnerable to Emerging Threats As They Struggle With Malware Analysis"

    According to a new report from the infrastructure protection company OPSWAT, nearly all organizations are struggling in regard to malware analysis. Findings shared in the report reveal that 94 percent of organizations find it difficult to recruit, traine, and retain malware analysis staff. In addition, 93 percent of organizations are challenged by malware analysis tools' lack of automation, integration, and accuracy. This article continues to discuss the malware analysis challenges faced by organizations and why such analysis is a critical capability.

    BetaNews reports "Organizations Vulnerable to Emerging Threats As They Struggle With Malware Analysis"

  • news

    Visible to the public "Nvidia Confirms It Is Investigating a Cybersecurity Incident"

    Nvidia investigating a probable cyberattack Nvidia experienced an incident this week that compromised their internal systems including email and development tools for two days. Their commercial activities were not impacted. The hacker has not yet been identified and the company is evaluating if any Nvidia or customer data was affected. U.S. companies are on high alert with possible cyber attacks coming from Russian sources in retaliation for recent U. S. sanctions for their invasion of Ukraine.

    TechCrunch reports "Nvidia Confirms It Is Investigating a Cybersecurity Incident"

  • news

    Visible to the public "US, Britain Accuse Russia of Cyberattacks Targeting Ukraine"

    Russia likely responsible for recent cyber attacks against Ukraine Anne Neuberger, the White House chief cyber official, said that the US has linked Russia to recent denial of service attacks on Ukraine's major banks and defense ministry. Ukraine was able to get their networks back online, but this may be the opening show of more attacks to follow. While the attacks disrupted some government communications and online banking services, the Ukrainian government was able to mitigate the damage and restore service. Government and business are on alert for more cyber attacks as tensions rise in the conflict.

    Security Week reports "US, Britain Accuse Russia of Cyberattacks Targeting Ukraine"

  • news

    Visible to the public "State Bar of California Investigates Data Breach"

    The State Bar of California has launched an investigation to discover how hundreds of thousands of confidential attorney disciple records were exposed online. The records were found on February 24 on a public website that aggregates nationwide court case records. Data compromised in the incident included case numbers, file dates, case types, case statuses, and respondent and complaining witness names. Alongside the discovered 260,000 confidential attorney discipline records were approximately 60,000 public State Bar Court case records. The State Bar stated that it was taking "urgent action" to address the breach and had notified law enforcement of the incident. The State Bar said that the site "also appears to display confidential court records from other jurisdictions" but did not specify which ones. During the investigation into the incident, the State Bar discovered that a previously unknown security vulnerability in the Tyler Technologies Odyssey case management portal allowed the nonpublic records to be unintentionally swept up by Judyrecords when they attempted to access the public records using a unique access method. The State Bar is working with Tyler Technologies, the maker of the Odyssey system, to remediate the security vulnerability, which they believe may not be unique to the State Bar's implementation and could impact other users of Odyssey systems. The State Bar said that as of late Saturday, February 26, all State Bar records, confidential and public, had been removed from the website.

    Infosecurity reports: "State Bar of California Investigates Data Breach"

  • news

    Visible to the public "Toyota Halts Production Across Japan After Ransomware Attack"

    After a ransomware attack on a key supplier, the world's largest carmaker has been forced to halt production at all of its plants in Japan. Toyota claimed it would suspend 28 production lines at 14 factories on Tuesday, with a planned resumption due for Wednesday but might be postponed. A cyberattack hit plastic parts supplier Kojima Industries and threatened to spill over into Toyota's IT systems via its "Kanban" just-in-time production control system. Toyota cyber-experts are said to be on-site at Kojima to determine the impact and source of the attack. Also affected are Toyota subsidiaries Hino Motors and Daihatsu Motor. The Japanese carmaker sold 10.5 million vehicles in 2021, making it the world's biggest producer for the second year running. Andy Kays, CEO of Socura, claimed factory IT and OT systems are so exposed by default that it's "astounding" more compromises don't occur. Modern manufacturing companies such as Kojima Industries have hundreds, if not thousands, of connected devices on site. Each one is a potential point of attack and a point of failure. Combined with a factory's sizeable workforce, its attack surface is enormous. According to a recent report from IBM, the manufacturing sector was hit by more ransomware attacks than any other last year.

    Infosecurity reports: "Toyota Halts Production Across Japan After Ransomware Attack"

  • news

    Visible to the public "Trickbot Comes Up With a New Set of Tricks"

    The group behind the Trickbot malware appears to be shifting away from the cybercriminal platform to the use of more modern attack tools. According to researchers at the threat intelligence firm Intel 471, the group behind the malware stopped spreading Trickbot and instead started distributing copies of Emotet and Qbot to infected systems late last year. The shift suggests that Trickbot's operators are changing strategies and working more closely with Emotet botnet operators. According to Greg Otto, a researcher at Intel 471, Trickbot employs nearly 400 people, making the group likely to continue operations, refine its malware, and resurface under a different name. Researchers at Check Point Software Technologies had also observed over 140,000 Trickbot-infected machines spreading Emotet malware to other systems in November 2021, which caused a surge in Emotet infections after a multinational takedown by law enforcement agencies in January 2021. The Trickbot operators likely have phased Trickbot malware out of their operations in favor of other platforms, such as Emotet, since Trickbot itself is relatively old malware that has not been significantly updated. Although Trickbot has apparently stopped its campaign to infect new systems, currently compromised computers are still communicating with each other and uploading code that can be injected into websites and other malware programs, such as Emotet and Qbot. The campaigns themselves have been quiet, but the command-and-control (C2) infrastructure tied to Trickbot remains operational, serving more plugins and web injects as well as additional configurations to bots in the botnet. The operators also used the Bazar backdoor malware to gain stealthy access to high-value targets. This article continues to discuss changes made by the group behind Trickbot.

    Dark Reading reports "Trickbot Comes Up With a New Set of Tricks"

  • news

    Visible to the public "Samsung Shattered Encryption on 100M Phones"

    Security researchers at Tel Aviv University have stated that Samsung shipped an estimated 100 million smartphones with botched encryption, including models ranging from the 2017 Galaxy S8 on up to last year's Galaxy S21. The researchers found what they called "severe" cryptographic design flaws that could have let attackers siphon the devices' hardware-based cryptographic keys, which are keys that unlock the treasure trove of security-critical data that is found in smartphones. The researchers stated that the design flaws primarily affect devices that use ARM's TrustZone technology. ARM's TrustZone technology is the hardware support provided by ARM-based Android smartphones (which are the majority) for a Trusted Execution Environment (TEE) to implement security-sensitive functions. The researchers noted that adversaries could exploit Samsung's cryptographic missteps to downgrade a device's security protocols. Doing this would set up a phone to be vulnerable to future attacks, a practice known as IV (initialization vector) reuse attacks. IV reuse attacks mess with the encryption randomization that ensures that even if multiple messages with identical plaintext are encrypted, the generated corresponding ciphertexts will each be distinct. The researchers published a paper regarding this research entitled "Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design." The authors will give a detailed presentation of the vulnerabilities at the upcoming USENIX Security, 2022 symposium in August.

    Threatpost reports: "Samsung Shattered Encryption on 100M Phones"

  • news

    Visible to the public "r2c: An Open Source Tool for Software Security"

    MIT alumni founded a startup named r2c with the purpose of simplifying the process of securing code by offering a database of software checks. It is easier to attack a system than it is to protect it in the software security industry as hackers only need to find one vulnerability to successfully execute an attack, while software developers must protect their code from all possible attacks. Therefore, when an individual programmer makes a popular app, it quickly becomes a target for various security threats. Although larger companies have software security teams, they are known to slow down deployments as they review lines of code to safeguard against attacks. The startup r2c is now looking to make the process of securing software more seamless through an open source code-proofreading tool. The tool called Semgrep parses lines of code to detect potential bugs and vulnerabilities similar to how Grammarly finds grammatical errors or possible improvements in online writing. Semgrep includes a database of over 1,500 prewritten rules that security professionals can use in their code scans. If a security professional does not see the rule they want, they can use r2c's interface to write their own rules and then add it to the database for others to use. Besides simplifying the process of implementing code standards, r2c has also fostered a community in which security professionals share ideas and brainstorm solutions to threats. This article continues to discuss r2c's open source Semgrep tool and other services offered by the startup to help improve software security.

    SciTechDaily reports "r2c: An Open Source Tool for Software Security"

  • news

    Visible to the public "CISA and FBI Publish Advisory to Protect Organizations from Destructive Malware Used in Ukraine"

    The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) issued a joint Cybersecurity Advisory pertaining to the WhisperGate and HermeticWiper malware being used against organizations in Ukraine and what organizations can do to protect their networks from the destructive malware. The advisory emphasized that the malware can disrupt an organization's daily operations, potentially making critical assets and data unavailable. Although there is currently no specific credible threat to the US, all organizations are encouraged to assess and strengthen their cybersecurity. All organizations are urged to enable Multi-Factor Authentication (MFA), set antimalware to perform regular scans, enable spam filters to prevent phishing emails from reaching end users, update software, filter network traffic, and more. This article continues to discuss the joint Cybersecurity Advisory released by CISA and the FBI on the destructive malware targeting organizations in Ukraine.

    HSToday reports "CISA and FBI Publish Advisory to Protect Organizations from Destructive Malware Used in Ukraine"

  • news

    Visible to the public "Microsoft Exchange Bugs Exploited by ‘Cuba’ Ransomware Gang"

    According to researchers at Mandiant, the ransomware gang known as Cuba is increasingly shifting to exploiting Microsoft Exchange vulnerabilities, including ProxyShell and ProxyLogon. The group has been likely using these vulnerabilities as early as last August. Mandiant, which tracks the threat actor as UNC2596, noted that the group deploys the COLDDRAW ransomware. The researchers stated that Cuba might be the only group that uses COLDDRAW because it's the only threat actor using it among those tracked by Mandiant. In a December flash alert, the FBI attributed a spate of attacks on at least 49 U.S. entities in the financial, government, healthcare, manufacturing, and information technology sectors to the group. In order to identify active network hosts to potentially encrypt and files to exfiltrate, Cuba has used WEDGECUT, a reconnaissance tool, which sends PING requests to a list of hosts generated by a PowerShell script that enumerates the Active Directory. Then, the adversaries peek around to see what files might be of interest. The researchers noted that Cuba also routinely uses a script to map all drives to network shares, "which may assist in user file discovery." The researchers stated that Cuba threat actors have used several methods for lateral movement, including RDP, SMB, and PsExec, frequently using BEACON to facilitate this movement. The adversaries then deploy various backdoors, including NetSupport, as well as BEACON and BUGHATCH, which are often deployed using the TERMITE in-memory dropper. To finish their extortion work, the gang tries to steal files and encrypt machines, threatening to publish exfiltrated data belonging to organizations that fail to pay the ransom.

    Threatpost reports: "Microsoft Exchange Bugs Exploited by 'Cuba' Ransomware Gang"

  • news

    Visible to the public "Cryptocurrency Wallets Targeted by Alien Malware Variant"

    Xenomorph is a new banking Trojan that has targeted 56 European banks. It is connected to the Alien Trojan family and has been discovered being distributed via the Google Play Store. There were over 50,000 installations of the malicious app. According to researchers, Xenomorph is significantly different from its predecessor, but is suspected of having been developed by the same actor or another person who is familiar with the coding. Although Xenomorph remains active in targeting banks, it now has the capability to target cryptocurrency wallets. Like many other Android banking Trojans, Xenomorph's primary attack vector is an overlay attack mechanism in which the attacker places a window over a running app to trick its victims into revealing Personal Identifiable Information (PII). The developers of Xenomorph combined this feature with the ability to use SMS and call interception, thus enabling them to log and use two-factor authentication tokens. The researchers say the app will constantly request Accessibility Services privileges until the user grants those privileges. The Accessibility engine that powers this malware in conjunction with the infrastructure and C2 protocol have been found to be designed as scalable and updatable. The researchers found out that the Fast Cleaner application, presented as a speed-boosting app for clearing storage space, belonged to the GymDrop family, which was previously seen deploying an Alien A payload. The threat actor can spy on a user and collect additional data using keystroke logging capabilities. ThreatFabric said the alleged designer took credit for the Alien variant in a darknet forum. Alien, which is a popular choice among threat actors looking for access to tools to deploy Malware-as-a-Service (MaaS) campaigns, seems to be a spin-off of the now inactive Cerberus malware. Alien malware has many capabilities similar to those of Xenomorph, such as keystroke logging, push notifications, the ability to hide what the app is doing, and more. This article continues to discuss findings surrounding Xenomorph, the Alien Android family, and the circumvention of authentic app stores to launch attacks.

    BankInfoSecurity reports "Cryptocurrency Wallets Targeted by Alien Malware Variant"

  • news

    Visible to the public "New Security Tech Monitors Power Use for Warning Signs of Cyberattacks"

    Researchers at the University of Waterloo have developed new technology aimed at protecting governments, businesses, and other organizations from cyberattacks by monitoring power consumption for warning signs of such attacks. The technology involves a small piece of hardware that uses Artificial Intelligence (AI) software to determine if a system's power usage is inconsistent with known predictable patterns. If the power consumption is unusual, the AI software will alert security staff within the organization, stating that its infrastructure could be under attack by hackers seeking to steal or lock critical information. For example, if several machines are suddenly exhibiting a similar pattern of high-power usage in specific patterns, the technology would raise an alert that crypto-ransomware might be spreading throughout the network. The technology has a wide variety of potential applications as it could be used to protect network equipment, computers, water supply, 5G infrastructure, trains, airplanes, and anything else that consumes power. This article continues to discuss the new security technology developed by researchers at the University of Waterloo to monitor power consumption for warning signs of cyberattacks and protect organizations from such attacks.

    The University of Waterloo reports "New Security Tech Monitors Power Use for Warning Signs of Cyberattacks"

  • news

    Visible to the public "How AI Is Shaping the Cybersecurity Arms Race"

    Cybersecurity staff are often overwhelmed by the amount of data they must sort through to manage their cyber defenses. Using Artificial Intelligence (AI) could help cybersecurity professionals find patterns in huge pools of data. Sagar Samtani, an Assistant Professor in the Department of Operations and Decision Technologies at Indiana University, who studies AI and cybersecurity, has shared his thoughts on why AI is a necessary tool in cybersecurity operations. Samtani pointed out two main ways in which AI is strengthening cybersecurity, with the first being that it helps automate many tasks that a human analyst would typically handle manually. These tasks include looking for unknown workstations, servers, code repositories, and other hardware and software on a network. The second way AI is bolstering cybersecurity is by helping to detect patterns in large quantities of data that a human analyst cannot see. For example, human analysts can use AI to pick up on linguistic patterns of hackers posting emerging threats on platforms in the dark web, and then have the AI alert them about the detected patterns. Analytics enabled by AI can help identify the special language or code words used by hackers to refer to their tools, techniques, and procedures. This article continues to discuss the benefits of using AI in cybersecurity operations as well as common questions and concerns surrounding the role of AI.

    The Conversation reports "How AI Is Shaping the Cybersecurity Arms Race"

  • news

    Visible to the public "New York to Get Statewide Cybersecurity Center"

    New York State is creating a Joint Security Operations Center (JSOC) to centralize and enhance its cyberdefenses. State governor Kathy Hochul stated that New York was forming a statewide team to "thwart" potential cyberattacks. She added that the state would be hiring 70 "highly trained individuals to work in a facility with 117 desktop computers." The governor said that the center would improve New York's ability to prevent cyberattacks and respond to attacks that could not be blocked. She noted that this center would help shore up New York's defenses, identify weaknesses, and protect from vulnerabilities. The governor also announced that she is proposing that New York invest $61.9m to improve its cyberdefenses. Should her proposal be approved, it will represent a doubling of the state's previous funding allocations for making cybersecurity improvements. Cybersecurity and Infrastructure Security Agency director Jen Easterly praised New York's actions on social media.

    Infosecurity reports: "New York to Get Statewide Cybersecurity Center"

  • news

    Visible to the public "Anonymous Hacking Group Declares “Cyber War” Against Russia"

    Hacktivist group Anonymous has declared "cyber war" against Vladimir Putin's government following the Russian invasion of Ukraine.
    The well-known international hacking collective announced on its Twitter account on Thursday, shortly after the Kremlin commenced military action. Shortly after declaring cyber war, the group claimed responsibility for taking down Russian government websites, including the Kremlin and State Duma. The group later tweeted that it had taken down the website of the Russian propaganda station RT news. Anonymous has signaled that it intends to ramp up cyberattacks on the Russian state. The hacktivist group is renowned for targeting governments and other organizations for actions and policies they disagree with, such as cracking down on protesters. Past targets have included government agencies of the US, Israel, Spain, and Uganda, as well as groups like the Klu Klux Klan and Islamic State. Cyber has already played a significant role in the Russia-Ukrainian dispute over recent weeks, which has now spilled into armed conflict.

    Infosecurity reports: "Anonymous Hacking Group Declares "Cyber War" Against Russia"

  • news

    Visible to the public "Microsoft App Store Sizzling with New ‘Electron Bot’ Malware"

    A backdoor malware, dubbed Electron Bot, is actively taking over social media accounts, including those on Facebook, Google, and Soundcloud, and has cloned popular games such as Temple Run or Subway Surfer to infiltrate Microsoft's official store. The backdoor allows attackers to take full control over compromised machines. It can remotely enable operators to register new accounts, log in, comment, and like social media posts in real-time. According to a report recently released by Check Point Research (CPR), over 5,000 people in Bermuda, Bulgaria, Russia, Spain, Sweden, and more, have fallen victim to the malware. Its main path of distribution is through the Microsoft store platform, as it hides in dozens of infected apps, most of which are games that the threat actors are constantly uploading. CPR researchers describe the Electron Bot backdoor as a modular Search Engine Optimization (SEO) poisoning malware used for social media promotion and click fraud. SEO poisoning is a technique in which threat actors create malicious websites and use SEO strategies to make them appear above legitimate sites in search results. Electron Bot is also said to be an ad clicker, which constantly clicks on remote websites to generate clicks on ads generating Pay-Per-Click (PPC) ad revenue. The attackers have also been using Electron Bot to promote social media accounts to direct traffic to specific content, thus increasing views and ad-clicking for PPC revenue. CPR explains that the Electron framework allows the bot to imitate human browsing behavior and circumvent protections implemented for websites. This article continues to discuss the discovery, capabilities, and infection routine of the new Electron Bot malware, as well as other malware found in official app stores.

    Threatpost reports "Microsoft App Store Sizzling with New 'Electron Bot' Malware"

  • news

    Visible to the public "Ransomware Trained on Manufacturing Firms Led Cyberattacks in Industrial Sector"

    Most industrial network operators and their security teams have seen a surge in ransomware attacks over the past year. Real-world incident response investigations conducted by teams at Dragos and IBM X-Force in 2021 revealed that the manufacturing sector is the most attractive Operations Technology (OT) target, and ransomware is the main weapon of choice against organizations within this sector. The two ransomware groups, Conti and LockBit 2.0, launched over 50 percent of all ransomware attacks on the industrial sector, 70 percent of which were against manufacturing firms, thus making manufacturing the main OT industry target of ransomware attacks last year. Although the ransomware attacks against Colonial Pipeline and JBS were the most high-profile in the manufacturing sector, there were a significant number of cases that did not go public, according to Rob Lee, founder and CEO of Dragos. Dragos responded to more than 200 ransomware attack incidents experienced by manufacturing firms last year. Incident-response (IR) cases investigated by IBM X-Force showed that over 60 percent of the incidents faced by OT firms last year were against manufacturers. In addition, manufacturing surpassed financial services as the most-attacked vertical investigated by X-Force's incident response team last year, with ransomware accounting for 23 percent of those attacks. Dragos also discovered three new threat groups it had not previously encountered in OT, dubbed Kostovite, Petrovite, and Erythrite, in 2021. Kostovite compromised a major operations and maintenance company's OT infrastructure by exploiting a zero-day vulnerability contained by the Ivanti Pulse Connect Secure VPN. The Petrovite threat group gathers intelligence on ICS and OT systems in mining and energy operations in Kazakhstan and Central Asia, while Erythrite targets Fortune 500 food and beverage, electric, oil and gas, and IT service providers supporting the industrial sector. A common issue among industrial organizations is a lack of network visibility as well as potentially open and vulnerable ports of entry. This article continues to discuss key findings surrounding attacks against industrial organizations.

    Dark Reading reports "Ransomware Trained on Manufacturing Firms Led Cyberattacks in Industrial Sector"

  • news

    Visible to the public "Oklahoma Cops Say Rape Victims' Data May Have Been Leaked"

    The Oklahoma City Police Department (OKCPD) has announced that personal data belonging to victims of sexual assault may have been exposed during a security incident at a DNA analysis laboratory. The OKCPD said that a company the department previously used to perform forensic testing had been hacked. DNA Solutions is a private DNA analysis laboratory whose testing facility is located at the University Research Park Campus in Oklahoma City. The laboratory provides paternity and forensic testing in humans and sire confirmation, genotype registries, DNA banking, and animal forensic identification. Master Sgt. Gary Knight stated that the OKCPD had contracted the company for two years to perform "Y-screening" (Y-chromosomal testing) to detect male DNA foreign to the victim of sexual assault. DNA Solutions Inc. determined that an unauthorized third party accessed their network and may have compromised certain sensitive personal and health-related information from sexual assault kits sent to them for forensic testing. DNA Solutions said it discovered the hack on November 18, 2021, and immediately blocked the hacker's access to its network. An investigation was launched to determine which files had been accessed by the attacker. The company said that while some sensitive personal and health information was compromised, the attacker did not access any personally identifiable information or financial information. The company stated that the data accessed by the adversaries did not include social security numbers, driver's license information, or financial information.

    Infosecurity reports: "Oklahoma Cops Say Rape Victims' Data May Have Been Leaked"

  • news

    Visible to the public "Computer Security Researchers Aim To Prevent Tech Abuse"

    Computer security researchers at Cornell Tech have developed a new method for helping domestic abuse survivors stop assailants from hacking into their devices and social media to cause further harm to them. Their model is based on continuity of care in which clients are provided with a seamless relationship with one volunteer tech consultant similar to what occurs in the health care setting. The model matches survivors with trustworthy consultants who understand their needs, offers multiple ways to safely communicate with consultants, and securely stores their tech abuse history and concerns. Emily Tseng, a doctoral student and lead author on a paper about the model, emphasized that managing personal data in tech abuse is complex and cannot always be solved in a single visit. She also pointed out that existing tech support approaches are limited by a one-size-fits-all protocol similar to that of an emergency room. The researchers' paper, "Care Infrastructure for Digital Security in Intimate Partner Violence," details a new approach, which was developed in partnership with New York City's Mayor's Office to End Domestic and Gender-Based Violence. The research behind their approach involved eight months of data, interviews with volunteer technology consultants, and experts on Intimate Partner Violence (IPV). This work explores the benefits and burdens of running a volunteer technology consultant service for IPV survivors, as well as the challenges that emerge when trying to safely provide computer security advice. Cornell Tech's program helps survivors experiencing technology abuse and increases understanding of how people could misuse technology to further harm others. For example, assailants can abuse their victims through spyware, the inappropriate use of different devices' location-tracking features, and more. This article continues to discuss the new approach created by Cornell Tech researchers to help domestic abuse survivors stop assailants from hacking their devices and social media.

    Cornell Chronicle reports "Computer Security Researchers Aim To Prevent Tech Abuse"

  • news

    Visible to the public "Vishing Makes Phishing Campaigns Three-Times More Successful"

    IBM's security researchers have found that phishing emerged as the number one threat vector in 2021. The researchers revealed that phishing overtook vulnerability exploitation as the top pathway for compromise globally last year, accounting for 41% of initial access attempts, up from 33% in 2020. Interestingly, the researchers stated that click rates for the average targeted phishing campaign increased almost three-fold, from 18% to 53% when phone phishing (vishing) was also used by threat actors. In the UK, an estimated 80% of consumers received a scam call or text over the summer of 2021. The researchers at IBM highlighted business email compromise (BEC) and ransomware actors as particularly prolific users of phishing during 2021. The researchers noted that despite dropping into second place, vulnerability exploitation remains a significant threat to organizations. The number of incidents using this as an infection vector surged by 33% year-on-year in 2021.

    Infosecurity reports: "Vishing Makes Phishing Campaigns Three-Times More Successful"

  • news

    Visible to the public SoS Musings #58 - Bolstering Open Source Software Security

    SoS Musings #58 -

    Bolstering Open Source Software Security

  • news

    Visible to the public "A Security Technique to Fool Would-Be Cyber Attackers"

    Researchers at the Massachusetts Institute of Technology (MIT) have demonstrated a new technique that protects a computer program's secret information from attackers while enabling faster computation. Multiple programs running on the same computer may not be capable of directly accessing each other's hidden information. However, as they share the same memory hardware, their secrets could be stolen by a malicious program through the performance of a memory timing side-channel attack. The malicious program detects delays when it attempts to access a computer's memory because the hardware is shared by all the programs using the machine. It can then gather another program's secrets, such as a password or cryptographic key, by interpreting those delays. One method to prevent these attacks is to enable only one program at a time to use the memory controller, but this significantly slows down the computation. Therefore, the MIT researchers devised a new approach that allows memory-sharing to continue while providing robust defense against this type of side-channel attack. Their method can speed up programs by 12 percent compared to state-of-the-art security schemes. According to the researchers, their technique could be applied to various types of side-channel attacks that target shared computing resources. The scheme developed by the team shapes a program's memory requests into a predefined pattern that is independent of when the program needs to use the memory controller. Before a program accesses the memory controller and interferes with another program's memory request, it must go through a request shaper that uses a graph structure. This structure processes requests and sends them to the memory controller on a fixed schedule. The graph is called a Directed Acyclic Graph (DAG), so the team's security scheme is dubbed DAGguise. The researchers tested DAGguise by simulating its performance in a real implementation. They continuosly sent signals to the memory controller, simulating how an attacker would try to determine another program's memory access patterns. They verified that no private data were leaked with any attempt. Then they used a simulated computer to determine how their system could improve performance compared to other security approaches. This article continues to discuss the MIT team's demonstration of their method aimed at safeguarding a computer program's secret information while enabling faster computation.

    MIT News Office reports "A Security Technique to Fool Would-Be Cyber Attackers"

  • news

    Visible to the public "Log4j Vulnerabilities Put Strain on Overburdened Cybersecurity Workforce"

    Since the discovery of Apache Log4j vulnerabilities in 2021, the cybersecurity workforce has been trying to patch systems, reduce the intensity of network intrusions, and manage other critical activities at the same time. The significance of these vulnerabilities and the remediation process have taken a toll on the cybersecurity workforce, which already suffers a shortage of professionals. Apache Log4j is a widely used Java framework that enables application logging features. The widespread use of Log4j makes the vulnerabilities threatening as they could have catastrophic security consequences for healthcare and other sectors if not patched immediately. The Health Sector Cybersecurity Coordination Center (HC3) warned the healthcare sector of the severity of the Log4j vulnerabilities, stating that Log4j is a common application used by many enterprises and cloud applications, including several large and well-known vendors. Therefore, the health sector is likely impacted by the vulnerabilities to a large-scale extent. HC3 observed the China-based threat actor HAFNIUM exploiting the vulnerabilities, together with Conti and PHOSPHOROUS. According to HC3, US entities made up 43 percent of all exploitation attempts in late January 2022. Microsoft also saw high rates of Log4j exploitation attempts involving establishing remote shells, red-team activity, coin mining, and mass-scanning. Patching legacy devices is difficult, thus putting a strain on the cybersecurity workforce. (ISC)2 surveyed 269 cybersecurity professionals working closely with Log4j vulnerabilities and remediation efforts. Over half of the respondents revealed that their team spent weeks or months remediating Log4j vulnerabilities, and almost half of the respondents said they sacrificed weekends and holidays to work on remediation. One respondent predicted that Log4j vulnerabilities would never be eradicated as the actual impact of the vulnerabilities has not yet been realized. A previous study from (ISC)2 found that the current cybersecurity workforce must grow by 65 percent to adequately protect critical assets, but these results were collected before the discovery of the Log4j vulnerabilities. These vulnerabilities will likely continue to put additional stress on cybersecurity professionals across all industries. This article continues to discuss the Log4j vulnerabilities and their long-term effects on the cybersecurity workforce.

    HealthITSecurity reports "Log4j Vulnerabilities Put Strain on Overburdened Cybersecurity Workforce"

  • news

    Visible to the public Cybersecurity Snapshots #27 - Organizations Are Urged to Be On the Lookout for Potential Russian Cyberattacks

    Cybersecurity Snapshots #27 -

    Organizations Are Urged to Be On the Lookout for Potential Russian Cyberattacks

  • news

    Visible to the public Cyber Scene #65 - Cyber Front Strategic Update: Not Quiet on Western, or Any Fronts

    Cyber Scene #65 -

    Cyber Front Strategic Update: Not Quiet on Western, or Any Fronts