News Items

  • news

    Visible to the public "Ukrainian Cops Bust Prolific Phishing Group"

    Ukrainian police have arrested a phishing gang that allegedly tricked tens of thousands of victims into handing over their credit card details on spoofed sites. The five individuals reportedly made over five million hryvnias ($172,600) from their scheme, which involved faking mobile operator websites. The head of the cybergang purportedly designed over 40 phishing pages, mimicking sites where users typically top-up their mobile phone balance. They were able to steal card details to drain the bank accounts of over 70,000 victims. Rather than phishing emails, the group is said to have used paid online marketing and social media advertising to reach their targets. The adversaries hosted the phishing sites on their own infrastructure, managed by one group member. Three others were tasked with fraudulently transferring funds out of the victim's bank accounts, receiving a percentage of the profits in return. Police searched the suspects' homes, seizing computer equipment, mobile phones, flash drives, bank cards, and over two million hryvnias ($69,000) in cash. The adversaries face up to eight years in jail.

    Infosecurity reports: "Ukrainian Cops Bust Prolific Phishing Group"

  • news

    Visible to the public "Hyper-Growth Linked to Higher Hacking Risk"

    Security researchers at Beyond Identity have found that companies with a compound annual growth rate (CAGR) of 40% or higher are more likely than companies growing at a standard rate to have suffered ten or more cybersecurity breaches. The researchers surveyed 1102 employees, ranging from entry-level and mid-level to business leaders, about cybersecurity issues within their organizations. While 62% of hyper-growth company employees claimed that their organization was proactive towards cybersecurity threats, only 61% backed up data, and only 55% encrypted data. Fewer than half (48%) of the employees of standard growth companies said their organization was proactive towards cybersecurity threats. However, 66% said they back up data, and 53% said they encrypted data. The researchers noted that fewer than half (44%) of all the respondents said they used anti-malware and firewall software, with 39% of hyper-growth companies taking these precautions compared with 42% of standard growth companies. Secure hardware was used by 64% of hyper-growth companies but only 57% of standard growth companies. Regarding password security, 72% of hyper-growth company employees said they used a password manager app. However, 62% stored their passwords in a document on their computer, 41% stored them in a note on their phone, and 46% wrote them down on paper. Among standard growth company employees, 54% used a password manager app, 39% stored their passwords on their computer, 27% stored them on their phone, and 34% wrote them down on paper. The researchers also found that nearly two-thirds of companies (62%) had experienced at least one cybersecurity breach. While 6% of standard growth companies had suffered between 6 and ten breaches, and 1% had experienced more than 10 breaches, 15% of hyper-growth companies had been breached five to 10 times, and 5% had been hit on more than ten occasions. The average estimated cost of an attack was $20k-$25k for hyper-growth companies and $34k-$119k for standard growth companies. Following a cyberattack, educating employees on cybersecurity was a measure taken by 70% of hyper-growth companies but just 45% of standard growth companies.

    Infosecurity reports: "Hyper-Growth Linked to Higher Hacking Risk"

  • news

    Visible to the public Spotlight on Lablet Research #27 - Formal Approaches to the Ontology and Epistemology of Resilience

    Spotlight on Lablet Research #27 -

    Formal Approaches to the Ontology and Epistemology of Resilience

  • news

    Visible to the public "Toward a Stronger Defense of Personal Data"

    Researchers at the Massachusetts Institute of Technology (MIT) developed an Application-Specific Integrated Circuit (ASIC) chip to defend Internet of Things (IoT) devices against power-based side-channel attacks. A side-channel attack is a security exploit that seeks to gather information by measuring or exploiting the indirect effects of a system or its hardware rather than directly targeting a program or code. For example, in one type of side-channel attack, a skilled hacker could monitor a device's power consumption fluctuations while a neural network operates to extract protected information that leaks out of the device. Current methods developed to prevent some side-channel attacks are known to be power-intensive, and therefore, are not feasible for IoT devices such as smartwatches, which rely on lower-power computation. To address this issue, the MIT researchers built an integrated circuit chip capable of protecting IoT devices against power-based side-channel attacks while using significantly less energy than typical security techniques. Their chip, which is smaller than a thumbnail, could be implemented into a smartwatch, smartphone, or tablet to perform secure Machine Learning (ML) computations on sensor values. The researchers wanted to build an integrated circuit that performs ML on edge, so that it is low-power but still defensive against these side-channel attacks, and the privacy of these models is still preserved. The chip is based on a special type of computation called threshold computing, which involves splitting data into unique random components rather than having a neural network operate on the actual data. With the chip, the network operates on those different components individually in a random order before collecting the final result. Using this method, the information leakage from the device is random every time, thus preventing any actual side-channel information from being revealed. This article continues to discuss the new lower-energy chip developed by MIT researchers to prevent hackers from extracting hidden information from an IoT device.

    MIT reports "Toward a Stronger Defense of Personal Data"

  • news

    Visible to the public "CISA Launches New Catalog of Free Public and Private Sector Cybersecurity Services"

    The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) published a new catalog of free public and private sector cybersecurity services and tools that organizations of all sizes can use in order to reduce their cybersecurity risk. The list includes services and tools from CISA, the open source community, and private and public sector organizations across the cybersecurity community. It aligns with the CISA's advisory on reducing the likelihood of a damaging cyber incident, detecting malicious activity quickly, responding effectively to confirmed incidents, and maximizing resilience. CISA encourages public and private sector organizations to work together to promote basic cybersecurity practices and help other organizations reduce their vulnerability to cyberattacks. In addition to the list of free services and tools, CISA recommends certain measures that organizations should consider in establishing a foundational cybersecurity program. These measures include fixing known exploited security flaws in software, implementing Multi-Factor Authentication (MFA), prohibiting significantly risky bad practices, reducing Internet attack surfaces, and signing up for CISA's cyber hygiene vulnerability scanning. This article continues to discuss CISA's list of free cybersecurity services and tools to help organizations reduce cybersecurity risk and strengthen resiliency.

    HSToday reports "CISA Launches New Catalog of Free Public and Private Sector Cybersecurity Services"

  • news

    Visible to the public "Global Consensus Emerges to Secure Internet-Connected Home and Wearable Devices"

    The global market size of the consumer Internet of Things (IoT) is expected to grow from $45 billion in 2022 to $154 billion by 2028. In conjunction with the increasing use of connected devices is the growth in cyber threats as new products introduce vulnerabilities that can lead to hacking and the leakage of personal data. The World Economic Forum's Council on the Connected World established a multistakeholder coalition composed of business leaders, government officials, and technology experts to develop a consensus on baseline security protections in order to address this challenge. The stakeholders agreed on five security requirements for consumer-facing IoT devices, which align with the interests of industry, consumers, white hat hackers, and governments. This article continues to discuss the global consensus to improve the security of Internet-connected home and wearable devices.

    World Economic Forum reports "Global Consensus Emerges to Secure Internet-Connected Home and Wearable Devices"

  • news

    Visible to the public "FlexBooker Data Leak Impacts Millions of End Customers"

    An online booking software provider unwittingly leaked the details of millions of customers online after misconfiguring a cloud storage solution, according to researchers at vpnMentor. The researchers found the leak on January 23 and traced it back to US firm FlexBooker, which provides software that enables businesses to accept bookings on their websites. The 172GB trove was left completely unsecured due to a misconfigured Amazon Web Services (AWS) S3 bucket. The researchers stated that the bucket was fixed three days after reaching out to both the vendor and AWS. The researchers said that FlexBooker's misconfigured AWS account contained over 19 million HTML files which exposed what seemed to be automated emails sent via FlexBooker's platform to users. The researchers noted that this means potentially up to 19 million people were exposed, depending on how many people made multiple bookings on a website using FlexBooker. Each email appeared to be a confirmation message for bookings made via the platform and exposed both the FlexBooker account holder and the person(s) who made a booking. Among the data viewed by the team included full names, email addresses, phone numbers, and appointment details. Each exposed email contained a link with a unique code that could be used to create cancellation links, edit links, and view appointment details. Data on some children were also exposed via a FlexBooker client, which was a babysitting service. The researchers stated that if hackers managed to access the leaked information, they could have used it to craft phishing and identity theft attacks by posing as the businesses with which end-customers made bookings. The discovery by the researchers came just days after FlexBooker was forced to admit a December data breach that purportedly compromised nearly four million customer accounts.

    Infosecurity reports: "FlexBooker Data Leak Impacts Millions of End Customers"

  • news

    Visible to the public Pub Crawl #59


    Pub_Crawl_web.jpgPub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers.

  • news

    Visible to the public "Meyer Breach Impacts US Employees' Personal Information"

    Cookware giant Meyer has revealed a data breach that impacted an undisclosed number of employees. Meyer is the largest distributor of cookware in the United States. The attack happened at the end of October 2021, but it wasn't until December 1 that an investigation revealed employee data might have been taken. The company does not conclusively know which employees were affected by the breach. The types of personal information that may have been accessed during this incident will depend on the types of information an employee provided to Meyer and may include: first and last name, address, date of birth, gender, race/ethnicity, Social Security number, health insurance information, medical condition(s) and diagnoses, random drug screening results, COVID vaccination cards and status, driver's license, passport, and government-issued identification number. Meyer stated that they have taken steps to enhance their security controls further and continue investigating and evaluating the breach to prevent a similar occurrence in the future.

    Infosecurity reports: "Meyer Breach Impacts US Employees' Personal Information"

  • news

    Visible to the public "Cisco's Email Security Appliances at Risk of DoS Attacks"

    Cisco Email Security Appliance (ESA) devices are impacted by a vulnerability that could lead to the execution of Denial-of-Service (DoS) attacks. Although Cisco's product security incident response team has not seen the vulnerability being actively exploited, the company and the US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) urge that the patches released to address it be applied immediately. The vulnerability, tracked as CVE-2022-20653, stems from the DNS-based Authentication of Named Entities (DANE) email verification component of Cisco's AsyncOS software used in Cisco ESA. According to Cisco, the vulnerability exists because of insufficient error handling in DNS name resolution. In order to exploit the vulnerability, the attacker needs to send a specially-crafted email to be processed by an impacted device. The attacker can then make the device unreachable from management interfaces and block the processing of additional email messages until the device recovers, thus resulting in a DoS condition. Continued attacks could make the device completely unavailable in a persistent DoS condition. Cisco's advisory says the vulnerability affects all Cisco ESA devices running a vulnerable version of Cisco AsyncOS software with the DANE feature enabled and the downstream mail servers configured to send bounce messages. This article continues to discuss the root, potential exploitation, and impact of CVE-2022-20653, as well as the fixes released for the vulnerability and the importance of patch management.

    BankInfoSecurity reports "Cisco's Email Security Appliances at Risk of DoS Attacks"

  • news

    Visible to the public "Hive Ransomware's Master Key Recovered Using Weakness in Its Encryption Algorithm"

    Researchers at Kookmin University successfully decrypted Hive ransomware-infected data without depending on the private key used to limit access to the data. They recovered the master key for generating the file encryption key without the attacker's private key, using a cryptographic vulnerability identified in their analysis. Hive, which is based on the Ransomware-as-a-Service (RaaS) model, targets company networks, steals information, encrypts data on the networks, and demands a ransom to access decryption software. The gang uses weak Remote Desktop Protocol (RDP) servers, stolen Virtual Private Network (VPN) credentials, and phishing emails containing malicious attachments. This article continues to discuss the tactics, techniques, and procedures of the Hive ransomware gang, and the exploitation of a security flaw in the encryption algorithm used by the Hive ransomware to recover encrypted data.

    CyberIntelMag reports "Hive Ransomware's Master Key Recovered Using Weakness in Its Encryption Algorithm"

  • news

    Visible to the public "VMware NSX Data Center Flaw Can Expose Virtual Systems to Attacks"

    VMware has released a patch for a high-severity vulnerability discovered in NSX Data Center for vSphere. It affects the NSX Edge appliance component, a virtual router placed at the edge of the tenant network that enables communication between virtual data centers and the outside world. The vulnerability, tracked as CVE-2022-22945, has been given a CVSS score of 8.8. Its exploitation could allow an attacker to remotely execute arbitrary operating system commands as root. In addition to gaining unrestricted access to the underlying operating system, exploiting the vulnerability could enable an attacker to install malware on the virtual device and gain network access to virtual servers, including for network traffic capture and man-in-the-middle (MITM) attacks. This article continues to discuss the patching, potential exploitation, and impact of the VMware NSX vulnerability.

    Security Week reports "VMware NSX Data Center Flaw Can Expose Virtual Systems to Attacks"

  • news

    Visible to the public "Fertility Clinic Hit with Ransomware"

    A fertility clinic based in New York City is notifying patients that their personal data may have been compromised and possibly stolen during a recent cyberattack. Extend Fertility, which specializes in IVF and freezing eggs and embryos, was hit with ransomware in December 2021. The clinic hired third-party digital forensic specialists to determine the incident's nature and scope.

  • news

    Visible to the public "Carpet Bombing Attacks on the Rise"

    Security researchers at Neustar Security Services have found that carpet bombing Distributed Denial of Service (DDoS) attacks are on the rise. Carpet bombing, in which a DDoS attack targets multiple IP addresses of an organization within a very short time, accounted for 44% of total attacks last year. The researchers found that in the first two quarters of 2021, carpet bombing represented just over a third (34%) of total attacks mitigated by the SOC. However, this form of DDoS attack became more prevalent in the second half of the year, accounting for 60% of all attacks in Q3 and 56% in Q4. The researchers stated that the most intense carpet bombing attack was clocked at 369 million packets per second (Mpps). The researchers noted that while "the majority of attacks were over in minutes," the longest-running attack dragged on for nine days, 22 hours, and 42 minutes.

    Infosecurity reports: "Carpet Bombing Attacks on the Rise"

  • news

    Visible to the public "New Cybersecurity Advisory: Protecting Cleared Defense Contractor Networks Against Russian Hackers"

    The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), and the National Security Agency (NSA) issued a joint Cybersecurity Advisory titled, "Russian State-Sponsored Cyber Actors Target Cleared Defense Contractor Networks to Obtain Sensitive US Defense Information and Technology." Within the last two years, Cleared Defense Contractors (CDCs) that support the US Army, US Air Force, US Navy, US Space Force, and Intelligence Community programs have been compromised. Both large and small CDCs and subcontractors supporting various defense industries have been targeted in attacks aimed at stealing unclassified proprietary and export-controlled information such as weapons development, communications infrastructure, technological and scientific research, and more. The agencies' advisory highlights the activities and tactics used by the Russian state-sponsored cyber actors, including brute force attacks, spearphishing attacks involving emails with links to malicious domains, and the use of harvested credentials together with known vulnerabilities to escalate privileges. The advisory urges all CDCs to investigate suspicious activity within their enterprise and cloud environments. All CDCs, regardless of whether or not they have evidence of compromise, are encouraged to apply the recommended mitigations to reduce the risk of compromise. These actions include implementing multifactor authentication, enforcing strong password creation, ensuring that all software is updated, enabling M365 Unified Audit Logs, and implementing endpoint detection and response tools. This article continues to discuss the new joint cybersecurity advisory from the FBI, NSA, and CISA on protecting CDCs from Russian hackers.

    Homeland Security News Wire reports "New Cybersecurity Advisory: Protecting Cleared Defense Contractor Networks Against Russian Hackers"

  • news

    Visible to the public "Warning: Popular E-cigarette Store Hacked to Steal Credit Cards"

    According to Bleeping Computer, Element Vape, a major online seller of e-cigarettes and vaping kits, is serving a credit card skimmer on its website, likely after being compromised by hackers. Researchers have observed Element Vape's website loading a malicious JavaScript file from a third-party website. The file appears to contain a credit card stealer. Threat actors known as Magecart have used such credit card stealers on eCommerce stores by injecting scripts. Multiple webpages of the Element Vape online store, including the homepage, were found to have an obscure base64-encoded script. It remains unknown how long the malicious script has been present on the website. When decoded and analyzed, the discovered script was seen collecting customers' payment card and billing information on the checkout page. The script looks for email addresses, payment card numbers, expiration dates, phone numbers, and billing addresses. This information is then exfiltrated to the attacker through an obfuscated hardcoded Telegram address in the script. In addition, the script has anti-reverse-engineering features to deter analysis by detecting when it is being run in a sandbox environment or in other analysis tools. This article continues to discuss the discovery of a malicious JavaScript file being pulled by Element Vape's website to skim credit cards.

    Bleeping Computer reports "Warning: Popular E-cigarette Store Hacked to Steal Credit Cards"

  • news

    Visible to the public "Ransomware's Savage Reign Continues as Attacks Increase 105 Percent"

    SonicWall released a report detailing the significant rise in ransomware, with 623.3 million attacks globally. According to the report, almost all monitored threats, cyberattacks, and malicious digital assaults, including ransomware, encrypted threats, Internet of Things (IoT) malware, and cryptojacking, increased in 2021. Researchers tracked the rise in ransomware, recording 318.6 million more ransomware attacks in 2021 than in 2020, which is a 105 percent increase. Since 2019, ransomware volume has increased by 232 percent. High-profile ransomware attacks have affected businesses, state and federal governments, schools, hospitals, and individuals. In addition, attacks against supply chains have resulted in widespread system downtime, economic loss, and reputational damage. All industries experienced increases in ransomware attacks, including government, healthcare, education, and retail. The frequency and complexity of cyberattacks continue to grow every year, thus increasing costs to organizations worldwide. This article continues to discuss key findings shared in SonicWall's report on the increase in ransomware attacks, the expansion of cyberattack vectors, and other cyber threats.

    Help Net Security reports "Ransomware's Savage Reign Continues as Attacks Increase 105 Percent"

  • news

    Visible to the public "High Severity WordPress Plugin Bug Hits Three Million"

    Security experts at Wordfence are urging users of a popular WordPress plugin to update immediately after a bug was found that could allow attackers to steal sensitive data and potentially even hijack vulnerable sites. UpDraft Plus describes itself as "the world's most trusted WordPress backup." The researchers noted that UpDraft Plus contains valuable data, including configuration files that could be used to access websites' backend databases and their contents. The new vulnerability CVE-2022-0633 could allow any logged-in user, including subscriber-level users, to download backups made with the plugin. The researchers stated that one of the features that the plugin implemented was the ability to send backup download links to an email of the site owner's choice, but unfortunately, this functionality was insecurely implemented, making it possible for low-level authenticated users like subscribers to craft a valid link that would allow them to download backup files. The researchers noted that threat actors would need an active account on a victim's system to exploit the vulnerability, meaning it would be largely confined to highly targeted attacks. However, a CVSS score of 8.5 is rated high severity. The researchers stated that the consequences of a successful targeted attack are likely to be severe, as they could include leaked passwords and PII, and in some cases, site takeover if the attacker is able to obtain database credentials from a configuration file and successfully access the site database. All UpDraft Plus users are urged to upgrade to version 1.22.3 to fix the bug.

    Infosecurity reports: "High Severity WordPress Plugin Bug Hits Three Million"

  • news

    Visible to the public "Trickbot Targets 140,000 Victims in 14 Months"

    Security researchers at Check Point have discovered that the infamous Trickbot Trojan has targeted customers of 60 big-name brands over the past year, including Amazon, PayPal, Microsoft, Bank of America, American Express, and Wells Fargo. The security vendor claimed that the malware had infected at least 140,000 victims since November 2020, with attackers being careful to target high-profile victims. APAC was the most affected region over the 14-month period, with an estimated 3.3% of organizations impacted. Next came Latin America (2.1%), Europe (1.9%), Africa (1.8%), and North America (1.4%). The researchers noted that the attacks typically begin with phishing emails, including malicious macros. Trickbot began its life as a banking Trojan but steadily grew in sophistication over the years and now features 20 modules that can be executed on-demand to steal data and launch additional malware. The researchers noted that the malware has remained stubbornly persistent by using a decentralized architecture, choosing targets selectively, and deploying anti-analysis techniques.

    Infosecurity reports: "Trickbot Targets 140,000 Victims in 14 Months"

  • news

    Visible to the public "How Picking Up Your Smartphone Could Reveal Your Identity"

    How much time an individual spends on different smartphone apps is enough to identify them in a larger group in more than one in three cases, according to researchers warning of the implications for security and privacy. The researchers analyzed smartphone data from 780 people. They loaded 4,680 days of app usage data into statistical models, with each day being paired with one of the 780 users so that the models can learn the individuals' daily app use patterns. Then the researchers tested whether the models could identify an individual when fed only a single day of smartphone activity that was anonymous and not yet paired with a user. The models, which were trained on only six days of app usage data per individual, were able to identify the correct person from a day of anonymous data one-third of the time. The models could also list the most to least likely candidates when predicting who owns the data. The list provided when the models made a prediction showed the top 10 most likely individuals that a specific day of data belonged to, and nearly 75 percent of the time, the correct user would be among that top 10. The researchers warn that software granted access to a smartphone's standard activity logging could generate a reasonable prediction about the identity of the user even if they are logged out of their account. Identification is still possible without the monitoring of conversations or behaviors within apps themselves. This article continues to discuss the study on how app usage data can reveal a person's identity.

    Lancaster University reports "How Picking Up Your Smartphone Could Reveal Your Identity"

  • news

    Visible to the public "Researchers Warn of a New Golang-based Botnet Under Continuous Development"

    Cybersecurity researchers at the threat intelligence firm, ZeroFox, are warning of a new Golang-based botnet called Kraken, which is said to be under active development. According to the researchers, Kraken has a number of backdoor capabilities to steal sensitive information on compromised Windows hosts. A report recently released by ZeroFox reveals that Kraken features the ability to download and execute secondary payloads as well as run shell commands and take screenshots. Early variants of the botnet, discovered in October 2021, were based on source code uploaded to GitHub. However, it remains unclear as to whether the repository in question belongs to the operators of the malware or the code was used as a foundation when they decided to start their development. Current iterations of the botnet come with functions to steal from different cryptocurrency wallets, including Armory, Atomic Wallet, Bytecoin, Electrum, Ethereum, Exodus, Guarda, Jaxx Liberty, and Zcash. This article continues to discuss recent findings surrounding the Kraken botnet's capabilities, variants, and continuous development.

    THN reports "Researchers Warn of a New Golang-based Botnet Under Continuous Development"

  • news

    Visible to the public "FBI Warns of BEC Scams Abusing Virtual Meeting Platforms"

    The Federal Bureau of Investigation (FBI) has issued an alert pertaining to the growing use of virtual meeting platforms to carry out Business Email Compromise (BEC) attacks and Email Account Compromise (EAC) scams. These schemes involve using social engineering tactics to trick employees, who can make or authorize payments, into transferring funds into fraudulent accounts. They are typically performed over business or personal email addresses, but the FBI's Internet Crime Complaint Center (IC3) has observed an increase in complaints about BEC attacks being performed over virtual meeting platforms. This article continues to discuss the FBI's warning of BEC attacks in which virtual meeting platforms are abused and how organizations can stay protected against such scams.

    Security Week reports "FBI Warns of BEC Scams Abusing Virtual Meeting Platforms"

  • news

    Visible to the public "Healthcare Data Breaches Impact 147k Illinoisans"

    The protected health information (PHI) of nearly 150,000 residents of Illinois may have been exposed in data breaches at two separate healthcare organizations. South Shore Hospital (SSH) in Chicago and the Family Christian Health Center (FCHC) in Harvey, Illinois, have begun notifying Illinoisans that the security of their data may have been compromised. SSH became aware of suspicious activity on its network on December 10, 2021. During an investigation, it was determined that an unauthorized third party may have accessed data belonging to some current and former hospital patients and employees. Data that may have been exposed in the attack included names, addresses, birth dates, Social Security numbers, health insurance information, diagnoses, Medicare and Medicaid information, and financial information. The hospital reported the breach as a hacking incident that impacted nearly 116,000 individuals. Data in the care of FCHC was compromised during a ransomware attack that began around November 18, 2021, but wasn't discovered until November 30, 2021. The incident impacted 31,000 patients. Information compromised in the attack included dental patients' names, dates of birth, addresses, insurance cards, and driver's licenses. Exposed data belonging to other patients included names, dates of birth, addresses, insurance identification numbers, and Social Security numbers.

    Infosecurity reports: "Healthcare Data Breaches Impact 147k Illinoisans"

  • news

    Visible to the public "Researchers Block "Largest Ever" Bot Attack"

    Security researchers at Imperva claim to have stopped the largest bot attack they've ever seen, leveraging 400,000 compromised IP addresses to scrape web data. The researchers stated that the large-scale botnet generated 400 million requests from the IP addresses over four days, comprising around 10 requests per IP per hour on average. The researchers spotted the 30-fold surge in traffic volume to the impacted site and mitigated the attack. The victim was a job listings site with a presence in six countries. The attack was designed to harvest job seekers' profiles from the site. The researchers noted that the OWASP Foundation considers web scraping as an automated threat (OAT-011), defined as collecting accessible data and/or processed output from the application. The researchers warned that while web scraping treads a fine line between business intelligence and violating data privacy, it remains one of the most prominent automated attacks affecting organizations today. Scraping can result in lower conversion rates, skewed marketing analytics, a decrease in SEO ranking, website latency, and even downtime (usually caused by aggressive scrapers).

    Infosecurity reports: "Researchers Block "Largest Ever" Bot Attack"

  • news

    Visible to the public "COVID Tests May Leak Personal Data"

    More than 14 million PCR tests were performed in Sweden last year. Researchers at Umea University have discovered the exposure of personal data by a private company that handles test certificates for major cities in Sweden, potentially affecting thousands of people. The private company was found to have a critical security weakness that could allow unauthorized individuals to access personal information such as names, Social Security numbers, test results, and more. The researchers were able to access such information by forcing a server to run in an unexpected state. Following the discovery of the problem, they disclosed it to the company, which then fixed the weakness within 24 hours and ensured that no one else had found and exploited it. According to the company, it was able to verify that no data or personal information had been leaked. Security problems have two main elements, with the first being data leakage and the second being the infiltration into a system and the manipulation of data by an external actor. It is essential to consider security at an early stage in the development of a system and to allow a third party to evaluate the system in order to minimize data leakage and other attacks. The researchers are developing software tools capable of automatically detecting weaknesses to help prevent data leakage and minimize the risks of attacks. One of the goals of the automated tools is to reduce the time and need for computational resources. This article continues to discuss the discovery of a critical weakness in the handling of COVID tests, how the issue was addressed, the vulnerability of health-related data to exposure, the importance of designing systems from a security perspective at an early stage, and the automated tools being developed by researchers at Umea University to help detect security weaknesses in systems.

    Umea University reports "COVID Tests May Leak Personal Data"

  • news

    Visible to the public "Red Cross Attributes Server Breach to Nation-State Actor"

    The International Committee of the Red Cross (ICRC) has concluded that a nation-state hacker was behind a cyberattack on its servers discovered last month. However, The forensic report does not attribute the attack to any specific advanced persistent threat (APT) group, and ICRC declined to speculate on the culprit. During an investigation into the breach, it was found that the attack compromised the personal data of more than half a million individuals helped by ICRC's program, which reunites families separated by conflict, disaster, or migrations. Personal data included names, locations, and contact information of individuals served by the group and login information for staff and volunteers. The breach was discovered on January 18 and occurred on November 9, 2021. The ICRC stated that the hackers were able to get into the system by exploiting an unpatched vulnerability in the password reset management system Zoho ManageEngine ADSelfService Plus, which allowed them to place web shells that provided further access to move within the systems and exfiltrate data. Microsoft warned in November that Chinese-based hackers were using the vulnerability to target victims in the U.S. defense industrial base, higher education, consulting services, and information technology sectors. The ICRC analysis presumes that hackers were able to copy or export data, but none of that information has shown up on the dark web yet. The attack on the human rights organization drew a rebuke from the U.S. State Department, which called on other nations to condemn cyberattacks on humanitarian data.

    CyberScoop reports: "Red Cross Attributes Server Breach to Nation-State Actor"

  • news

    Visible to the public "AWS' AI Code Reviewer Now Spots Log4Shell-Like Bugs in Java and Python Code"

    Amazon Web Services (AWS) has updated its CodeGuru Reviewer tool detectors to find log injection flaws similar to the recently disclosed Log4Shell bug in the popular Java logging library Log4J. AWS' CodeGuru Reviewer is a scanner that applies Machine Learning (ML) to check code during reviews for bugs and to recommend revisions that address security issues. The tool's goal is to improve code reviews in the context of Continuous Integration/Continuous Development (CI/CD) processes. For example, after committing code to GitHub or Bitbucket, the developer can add CodeGuru Reviewer to review the code. The new features for CodeGuru Reviewer include a Detector Library for common security flaws impacting Java and Python web applications, and several security detectors for Log4Shell-like log injection flaws. The Detector Library lists several detectors for flaws common to Java and Python programming, such as unauthenticated LDAP requests in Java code. It also provides details about each security issue, highlighting their severity and impact on an application, and one case of non-compliant and compliant code for the issue. The library currently has 91 Java detectors and 69 Python detectors. AWS noted that CodeGuru uses ML and Automated Reasoning (AR) to identify possible problems, enabling each detector to find a range of defects. This article continues to discuss the new features of AWS' CodeGuru Reviewer aimed at spotting Log4Shell-like bugs in Java and Python code.

    ZDNet reports "AWS' AI Code Reviewer Now Spots Log4Shell-Like Bugs in Java and Python Code"

  • news

    Visible to the public "Internet Society Data Leaked"

    The personal information of tens of thousands of members of the Internet Society (ISOC) has been exposed in a data security breach. International non-profit organization ISOC was founded in 1992 with the mission to ensure open internet development by enhancing and supporting internet use for individuals and organizations worldwide. Researchers at Clario discovered the unsecured data on December 8, 2021, in an open and unprotected Microsoft Azure blob repository containing millions of files. Data exposed in the blob included the full names of ISOC members together with their residential addresses, email addresses, gender, login details, and password hash. The information was stored in json files. The researchers reported the incident to ISOC via email on the day of the leak's discovery. ISOC responded by launching an investigation into the leak and securing the data. During the investigation, ISOC attributed the security breach to a misconfiguration error by their management system provider MemberNova. ISOC noted that its investigation had not revealed "any instances of malicious access to member data as a result of this issue." The society said that individuals who were impacted by the incident were notified of the breach before the holidays.

    Infosecurity reports: "Internet Society Data Leaked"

  • news

    Visible to the public "Attackers Publicly Demanding Ransom From Hacked Instagram Account Owners in a Brazen Phishing Campaign"

    An Instagram phishing campaign has been discovered targeting corporate and influencer accounts with a large following. According to security researchers at the Secureworks Counter Threat Unit (CTU), the hackers perform phishing attacks to gain control of the targeted account and then force the victims to pay a ransom to get the hacked Instagram account back. The attackers accuse the account owner of copyright infringement and threaten to delete the account unless the target completes an appeal form. The victim is provided with a link to a customized phishing landing page that resembles the target's account. The page displays an appeal button that takes the victim to a fake login page where they are asked to enter their Instagram login credentials, which the hackers then use to gain access to the account. Once the hackers gain control over the Instagram account, they modify the username, change the password, and post a message on the victim's bio stating that the hacked account is being held to be sold back to its owner. The threat actors behind the Instagram phishing campaign have been identified as Turkish and Russian citizens, Pharaben and Farway. They describe themselves as advanced experts in social media and hacking. The researchers warn that although the social media hacking incident appears insignificant, the threat actors could gain access to email accounts or other corporate resources through the compromised Instagram accounts. Hacked corporate Instagram accounts could also damage an organization's brand and reputation, further pressuring victims to pay the demanded ransom. This article continues to discuss the phishing campaign that has targeted corporate Instagram accounts and the potential impact of social media hacking.

    CPO Magazine reports "Attackers Publicly Demanding Ransom From Hacked Instagram Account Owners in a Brazen Phishing Campaign"

  • news

    Visible to the public "'Cities: Skylines' Gaming Modder Banned Over Malware"

    Chaos, a popular modder for the Cities: Skylines city-building game, has been banned after reportedly hiding an automatic updater in several of their mods to deliver malware to those who downloaded them. The modder released a redesigned version of a core framework project that most Cities: Skylines mods use to function called Harmony. The author then reworked other popular mods, listing his Harmony redo as a core download, thus requiring players to download it to get the mods to work. However, Chaos' version of Harmony was discovered to contain an updater that enabled the modder to infect the devices of those who downloaded it, with malware. Chaos also planted malware in other mods to bog down gameplay in order to get more players to download additional poisoned mods that he had created as solutions. The modder's accounts have been suspended, and some of his mods have been removed from the Steam Workshop. John Bambenek, the principal threat hunter at digital IT and security operations company Netenrich, pointed out that the distribution of malware via games, game mods, or pirated/cracked games is now a fairly common tactic among malicious American and European actors. This article continues to discuss the banning of a Cities: Skylines modder due to hidden malware.

    Threatpost reports "'Cities: Skylines' Gaming Modder Banned Over Malware"

  • news

    Visible to the public  "Researchers Discover Common Threat Actor TA2541 Behind Aviation and Defense Malware Campaigns"

    Security researchers at Proofpoint discovered a common threat actor behind attacks reported by Microsoft, Cisco Talos, and more. The individual or group, dubbed TA2541, has been attacking targets in the aviation, aerospace, transportation, and defense industries with Remote Access Trojans (RATs) since 2017. Its malware campaigns have impacted organizations globally, with recurring targets being in North America, Europe, and the Middle East. In addition to COVID-19-themed phishing emails, TA2541 has used emails requesting quotes for aeronautical parts, ambulatory flights, and other specific components in the course of targeting organizations. In past campaigns, TA2541 used files containing malicious scripts that download malware, but its more recent campaigns have been using a Google Drive URL that takes the victim to an obfuscated Visual Basic Script (VBS) file. Once the VBS file is executed, PowerShell pulls an executable from a text file hosted on sites such as Pastebin. The executable then uses PowerShell to get into Windows processes, collects information, attempts to disable security software, and then downloads the RAT. TA2541 has also been observed using Discord URLs that link to compressed files, which download either AgentTesla or Imminent Monitor. TA2541's techniques require human error, like other malicious campaigns involving phishing attacks. Therefore, it is essential to train people on how to recognize suspicious emails and messages, as well as to implement proper anti-phishing security tools. This article continues to discuss the tactics, techniques, procedures, and targets of TA2541, and how to avoid falling victim to its campaigns.

    TechRepublic reports "Researchers Discover Common Threat Actor TA2541 Behind Aviation and Defense Malware Campaigns"

  • news

    Visible to the public "Maryland Cyber Nonprofit to Create Centers of Excellence"

    The Cybersecurity Association of Maryland, Inc. (CAMI), a nonprofit organization, has announced plans to expand its membership program and create multiple Centers of Excellence. CAMI's mission is to advance cybersecurity in Maryland through collaboration and advocacy. CAMI will do this by creating opportunities for companies in all industries to come together. In a statement released recently, CAMI stated that it will be expanding its membership qualifications to "companies across all verticals who view cybersecurity as a strategic initiative." In creating three new Centers of Excellence, the association aims to provide a forum through which Marylanders can share best security practices. The first center will be focused on business growth and innovation and will support members with raising capital, scaling operations, marketing, and mentorship. Center number two will be dedicated to working with organizations to close the cybersecurity talent gap. The final center will specialize in cyber resilience, providing knowledge and resources to members, including support with Cybersecurity Maturity Model Certifications (CMMC), securing state, local and educational (SLED) agencies, and offering cyber-hygiene help for small and medium-sized businesses. CAMI was established in 2015 and is Maryland's only organization solely dedicated to the growth of Maryland's cybersecurity industry.

    Infosecurity reports: "Maryland Cyber Nonprofit to Create Centers of Excellence"

  • news

    Visible to the public "Three-Fifths of Cyberattacks in 2021 Were Malware-Free"

    Security researchers at CrowdStrike have found that ransomware-related data leaks surged by 82% year-on-year in 2021, but most cyberattacks involved no malware at all. The researchers found that 62% of attacks were compromised of "non-malware, hands-on-keyboard activity." That means threat actors use legitimate credentials to access networks and then "living off the land" techniques to achieve lateral movement once inside. The researchers stated that such tactics help adversaries bypass detection by legacy tools, but not current network monitoring and other behavior-based security. The researchers noted that these tactics may partly explain the surge in highly targeted ransomware attacks against high-value organizations, known as "big-game hunting." The researchers said the number of such attacks leading to data leaks rose from 1474 in 2020 to 2686 last year. This amounts to over 50 targeted ransomware events per week.

    Infosecurity reports: "Three-Fifths of Cyberattacks in 2021 Were Malware-Free"

  • news

    Visible to the public "Blocking Microgrid Cyberattacks To Keep the Power Flowing"

    The complexity of power grids continues to grow because of the increase in energy demands, environmental regulations, and small-scale renewable energy systems. Establishing small groups of sources and loads called microgrids helps maintain the resiliency of power supplies. Microgrids are capable of operating independently of the main power grid, and therefore, can still support hospitals during a natural disaster. However, as microgrids become increasingly complex, they need sophisticated computer networks for coordinating, controlling, and distributing different power sources, thus making them vulnerable to cyberattacks. To help prepare for these types of events, KAUST researchers have been performing attack simulations to assess the impact of potential attacks as well as develop detection methods and techniques for suppressing malicious behavior. In the study, they took a realistic approach by adopting a model in which the threat actor has limited knowledge but can design attacks using historical measured data on the performance of the grid. The researchers considered three different types of attack, one of which involves the alteration of measurement data used by the microgrid system operator to coordinate the power generation of inverter-based Distributed Generations (DGs). The simulations revealed that such attacks could induce high costs, cause power loss, and damage equipment. In addition to the attack simulations, the researchers identified effective methods to quickly and accurately detect abnormal conditions associated with incoming attacks. This article continues to discuss the KAUST researchers' work on developing methods for protecting microgrids from cyberattacks.

    KAUST Discovery reports "Blocking Microgrid Cyberattacks To Keep the Power Flowing"

  • news

    Visible to the public "A Hacker Group Has Been Framing People for Crimes They Didn't Commit"

    The cybersecurity firm, Sentinel One, recently published a report that details findings surrounding a hacker group dubbed ModifiedElephant, which has been targeting people in India for years. The group's main activity is spying, but it sometimes uses its digital capabilities to frame victims for crimes. According to researchers, ModifiedElephant's objective is long-term surveillance, which sometimes ends with the delivery of files that incriminate targets for specific crimes. One of the most notable ModifiedElephant cases involves Maoist activist, Rona Wilson, and his associates who were accused of plotting to overthrow the government and then arrested by India security services. A word document detailing plans to assassinate the nation's prime minister was discovered on Wilson's laptop, but forensic analysis of the device found that it was a fake document planted using malware. Sentinel researchers say that ModifiedElephant planted the document using common hacking tools and techniques, including tailored phishing emails, Remote Access Tools (RATs), and more. This article continues to discuss findings surrounding the objectives, operations, targets, and notable cases of ModifiedElephant, as well as other similar groups.

    Gizmodo reports "A Hacker Group Has Been Framing People for Crimes They Didn't Commit"

  • news

    Visible to the public "San Francisco 49ers Hit by Ransomware"

    Cybercriminals have attacked the San Francisco 49ers with ransomware. Confirmation of the attack came after the 49ers were listed on a dark web leak site as a victim of ransomware-as-a-service (RaaS), BlackByte. The attack might have been carried out by the ransomware creators or by an affiliate accessing the malware in return for a share of any illegal proceeds gained through its use.

  • news

    Visible to the public "Data Breach at Morley Companies"

    The personal information of 521,000 people may have been exposed in a data breach at a business services company based in Saginaw, Michigan. Last year, Morley Companies was targeted by adversaries in an attack detected on August 1, when data in the company's care suddenly became unavailable. On Friday, Michigan attorney general Dana Nessel confirmed that a data security incident that may have impacted data belonging to current employees, former employees, and various clients had been reported by Morley. Morley stated that the incident may have involved personal identifiable information (PII) and protected health information (PHI). Data that may have been compromised included names, addresses, Social Security numbers, dates of birth, client identification numbers, medical diagnostic and treatment information, and health insurance information. Nessel stated that the impacted individuals should treat any emails, phone calls, and text messages asking for bank information as suspicious.

    Infosecurity reports: "Data Breach at Morley Companies"

  • news

    Visible to the public "Rutgers Researchers Discover Security Vulnerabilities in Virtual Reality Headsets"

    Researchers at Rutgers University-New Brunswick studied how voice command features provided by Virtual Reality (VR) and Augmented Reality (AR) headsets could lead to eavesdropping attacks. Their study found that hackers could steal sensitive information such as credit card data and passwords communicated via the voice command features of popular (AR/VR) headsets with built-in motion sensors to record subtle speech-associated facial dynamics. They developed an eavesdropping attack called Face-Mic to highlight the existence of vulnerabilities in AR/VR headsets. According to the leader of the study, Yingying Chen, Face-Mic is the first work to infer private and sensitive information through the use of facial dynamics associated with live human speech while using face-mounted AR/VR devices. The researchers demonstrated the performance of a Face-Mic attack to derive a headset wearer's sensitive information with Oculus Quest, HTC Vive Pro, and other mainstream AR/VR headsets. They studied three types of vibrations captured by motion sensors on the AR/VR headsets, including speech-associated facial movements, bone-borne vibrations, and airborne vibrations, finding that both cardboard headsets and high-end headsets contain security vulnerabilities that could expose a user's sensitive speech and speaker information without permission. This article continues to discuss the findings from the study on how hackers could use AR/VR headsets to steal sensitive information communicated via voice command features.

    Rutgers News reports "Rutgers Researchers Discover Security Vulnerabilities in Virtual Reality Headsets"

  • news

    Visible to the public ARCH 2021 Best Result Award

    The ARCH 2021 Best Result Award goes to Katherine Cordwell, Aditi Kabra, Jonathan Laurent, Stefan Mitsch, Andre Platzer, William Simmons, Yong Kiam Tan, and Noah Abou El Wafa (in alphabetical order) for their verification tool KeYmaera X. The award comes with a 500 Euro prize. Congratulations!
  • news

    Visible to the public "Apple Patches Actively Exploited WebKit Zero Day"

    A memory issue has been discovered affecting iPhone, iPad, and macOS devices, allowing attackers to execute arbitrary code following the processing of malicious web content. The zero-day vulnerability found in Apple's WebKit browser engine is being actively exploited to compromise devices. The vulnerability, tracked as CVE-2022-22620, is described as a Use-After-Free issue, which involves the incorrect use of dynamic memory during a program operation. In regard to Apple's zero-day vulnerability, attackers can execute arbitrary code on affected devices after processing maliciously crafted web content, potentially leading to unexpected OS crashes. According to the vulnerability's description on the Common Weakness Enumeration website, the easiest way for threat actors to exploit the flaw involves the system's reuse of freed memory. Referencing memory after freeing it can cause a program to crash, use unexpected values or execute code. Exploiting previously freed memory can have various consequences, such as the corruption of valid data, the execution of arbitrary code depending on the instantiation and timing of the flaw, and more. Apple released separate security updates for its products to address the issue, both of which improve how the OSes manage memory. The vulnerability impacts numerous Apple devices, including iPhone 6s and later, all iPad Pro models, iPad Air 2 and later, iPad 5th generation and later, iPad mini 4 and later, and the 7th generation iPod touch. The flaw also affects desktops and notebooks running macOS Monterey. This article continues to discuss the potential exploitation and impact of the zero-day WebKit flaw.

    Threatpost reports "Apple Patches Actively Exploited WebKit Zero Day"

  • news

    Visible to the public "Vulnerabilities Found by Google Researchers in 2021 Got Patched on Average in 52 Days"

    Google Project Zero saw a decrease in the overall time used by vendors to address vulnerabilities reported by the bug hunting team. The team reported 376 vulnerabilities between 2019 and 2021 and saw that most of them (351) were patched. Of the remaining flaws, vendors marked 14 as "WontFix," and 11 of them went unfixed. According to Google Project Zero's policy, vendors have 90 days to address the reported security vulnerabilities. However, they can request a 14-day grace period if a patch will be shipped within that 104-day window. Most of the 376 vulnerabilities were patched within that window, with only 5 percent passing the deadline and grace period. In 2021, vendors needed an average of 52 days to address the reported security flaws, down from 54 days in 2020 and 67 days in 2019. Google Project Zero says the overall time to fix flaws has consistently been decreasing, especially between 2019 and 2020. The team says that only one deadline was exceeded in 2021, a decrease from the 9 deadlines exceeded between 2019 and 2020. The grace period was only used 9 times in 2021. Many of the fixes made during the three-year period came from Apple, Microsoft, Google, Linux, and Adobe. They needed, on average, less than 90 days to address the reported flaws. Google Project Zero reported 76 iOS vulnerabilities and 16 Android bugs between 2019 and 2021. This imbalance stems from how Apple releases security updates. This article continues to discuss findings regarding the patching of vulnerabilities reported by Google researchers.

    Security Week reports "Vulnerabilities Found by Google Researchers in 2021 Got Patched on Average in 52 Days"

  • news

    Visible to the public "Californian College Attacked with Ransomware"

    Data belonging to a California community college has been compromised in a "sophisticated" cyberattack. Adversaries struck the Ohlone Community College District (OCCD) network in Fremont on January 20, 2022, disrupting access to certain files. School officials said the private information of some staff, faculty, and current and former students was compromised. The private information that was potentially compromised during the attack includes Social Security numbers, dates of birth, driver's license numbers, US alien registration numbers, medical information, and bank account details. Other data that may be impacted included health insurance information, student ID number, race/ethnicity, class list, course schedule, disciplinary file, grades, transcripts, and/or IEP/504 plan information. The online student portal was down for 17 days, and Ohlone College's phone and email systems were knocked offline for 10 days. A separate student information system was also impacted. Around 16,000 students attend OCCD per year. In response to this incident, the school changed account passwords and is implementing additional security measures. The college is also reviewing its policies and procedures related to network security.

    Infosecurity reports: "Californian College Attacked with Ransomware"

  • news

    Visible to the public "Half of Global Emails Were Spam in 2021"

    Security researchers at Kaspersky recently published their Spam and Phishing in 2021 report. In 2021 nearly half of emails destined for inboxes were classed as spam, with Russia the biggest culprit. Most of the spam came from machines in Russia (25%), followed by Germany (14%), the US (10%), and China (9%). The vendor said it blocked over 148 million malicious email attachments in 2021, with credential-stealing Trojans from the Agensla family the most common type, accounting for 9% of the total. Kaspersky's anti-phishing technology blocked over 253 million phishing attempts during the year, and the firm claimed that 8% of global users faced at least one such attack. Brazilian (12%), French (12%), and Portuguese (11%) users were the most frequently targeted by attackers. The researchers also found that online stores (18%), internet portals (17%), and payment systems (13%) were the most commonly spoofed in phishing attacks.

    Infosecurity reports: "Half of Global Emails Were Spam in 2021"

  • news

    Visible to the public "Decryption Keys Released for Maze, Sekhmet, and Egregor Ransomware Strains"

    Master decryption keys have been released for the Maze, Sekhmet, and Egregor ransomware strains. The alleged malware developer released the master ransomware keys for these three strains on the Bleeping Computer forums. The security firm, Emsisoft, has verified that the master decryption keys work and released a free decryptor. According to Bleeping Computer, in order to use the decryptor, the victim must have a ransom note for the infection that includes an encrypted decryption key for Emsisoft's tool to decrypt. The master keys were released by someone seemingly tied to the groups, meaning that any organization whose files were locked using any of those strains of crypto-locking malware can now decrypt their files for free. Brett Callow, a threat analyst at Emsisoft, says that companies commonly archive any encrypted data that they could not recover, expecting that a decryptor will eventually become available. If victims still have the original encrypted files on a disk, they can now recover their data. Although this may not make a significant difference regarding business continuity, it could help victims get their critical historical records back for tax purposes, insurance purposes, and more. While the release of master decryption keys for all three strains helps victims recover important data, the keys do not repair the considerable damage and disruption associated with the ransomware strains. The Maze and Egregor ransomware strains were among the most observed ransomware infections with the greatest ransom demands. For example, the threat actors behind Maze ransomware regularly demanded $1 million to $2 million worth in ransoms. In 2020, Maze and Conti were the most commonly seen strains of ransomware used in attacks against healthcare sector organizations. In addition, the actors behind the ransomware strains have introduced innovative new business practices such as the double-extortion tactic in which threats are made to release the data unless a victim paid the demanded ransom. This article continues to discuss the release of decryption keys for Maze, Sekhmet, and Egregor victims, as well as the history, impact, and constant innovation of the three ransomware strains.

    BankInfoSecurity reports "Decryption Keys Released for Maze, Sekhmet, and Egregor Ransomware Strains"

  • news

    Visible to the public "Critical SAP Vulnerabilities Could Lead To Cyberattacks If Not Patched"

    Onapsis Research Labs and the software company, SAP, discovered critical vulnerabilities affecting SAP applications using SAP Internet Communication Manager (ICM). Organizations use SAP applications to manage critical business processes, such as enterprise resource planning, product lifecycle management, customer relationship management, and supply chain management. Businesses impacted by the vulnerabilities, including healthcare organizations and their third-party business associates, could suffer data theft, financial fraud, ransomware attacks, the disruption of mission-critical business processes, and a halt of all operations. JP Perez-Etchegoyen, CTO at Onapsis, pointed out that healthcare organizations handle highly sensitive data, including patient data, employee records, financial data, and more, all of which are often stored in business-critical applications like SAP. Patches have been made available for all three of the critical vulnerabilities, but if organizations do not prioritize certain security notes, cybercriminals could easily arrange cyberattacks. Onapsis noted that the exploitation of these vulnerabilities could be simple for an attacker since it does not require previous authentication and necessary preconditions, and the payload can be sent via HTTP(S). The researchers discovered the vulnerabilities during their investigation of HTTP smuggling over the past year. They found that threat actors could leverage HTTP smuggling techniques with a request indistinguishable from a legitimate request, which makes it difficult to detect. As the vulnerabilities are difficult to detect, easy to exploit, and can result in the complete takeover of a system, they create the potential for large-scale cyberattacks if not immediately patched. This article continues to discuss the discovery, potential exploitation, impact, and mitigation of the critical SAP vulnerabilities.

    HealthITSecurity reports "Critical SAP Vulnerabilities Could Lead To Cyberattacks If Not Patched"

  • news

    Visible to the public "Linux Malware on the Rise"

    Attackers have increasingly targeted Linux environments due to the frequent use of Linux as the basis for cloud services, virtual-machine hosts, and container-based infrastructure. According to VMware's "Exposing Malware in Linux-Based Multi-Cloud Environments" report, there has been an increase in the number of ransomware programs targeting Linux hosts to infect virtual-machine images or containers. The report also revealed a rise in the use of cryptojacking to monetize illicit access as well as over 14,000 instances of the red-team tool Cobalt Strike, 56 percent of which are pirated copies used by criminals or companies that have not purchased licenses. The red-team tool has grown so popular as a way to manage compromised machines that underground developers have created their own protocol-compatible version of the Windows program for Linux. Initial access by attackers on the Linux side is often achieved through credential theft. Giovanni Vigna, senior director of threat intelligence at VMware, pointed out that stolen credentials often give attackers more time to explore a victim's network than remote code execution. Attackers have developed various tools to compromise and monetize compromised Linux systems, including ransomware, crypto-miners, implants from remote access management software, and more. This article continues to discuss key findings surrounding the increased targeting of Linux in multi-cloud infrastructure.

    Dark Reading reports "Linux Malware on the Rise"

  • news

    Visible to the public "Critical Code Execution Flaws Patched in 'PHP Everywhere' WordPress Plugin"

    Security researchers at Defiant, a WordPress security company, discovered that thousands of WordPress websites were impacted by three remote code execution vulnerabilities that were identified in the PHP Everywhere plugin. With more than 30,000 downloads, the PHP Everywhere plugin is an open-source plugin designed to enable PHP code everywhere in the WordPress installation. Last month, the latest PHP Everywhere iteration was released with patches for three critical vulnerabilities (CVSS score of 9.9). The most severe of these issues is CVE-2022-24663, a vulnerability that allows any authenticated user, including subscribers and customers, to "execute shortcodes via the parse-media-shortcode AJAX action. An attacker looking to exploit the bug would need to send a crafted request with a specific shortcode parameter to execute arbitrary PHP code on the site, which would typically lead to complete site takeover. The other two security flaws, which are tracked as CVE-2022-24664 and CVE-2022-24665, require the attacker to have at least contributor-level permissions on the vulnerable site, meaning that the impact is less severe. The researchers stated that CVE-2022-24664 existed because all users with the edit_posts capability, including untrusted contributors, could use the PHP Everywhere metabox. Thus, they could create a post containing PHP code in the PHP Everywhere metabox, and achieve code execution by previewing the post. CVE-2022-24665 existed because, by default, all users with the edit_posts capability could use the PHP Everywhere Gutenberg block (this could be set to admin-only). Thus, contributor-level users could create a post, add the PHP everywhere block with code in it, and preview the post to achieve code execution. The security holes were reported to PHP Everywhere's maintainers on January 4. Version 3.0.0 of the plugin was released on January 10 with patches for all three vulnerabilities.

    SecurityWeek reports: "Critical Code Execution Flaws Patched in 'PHP Everywhere' WordPress Plugin"

  • news

    Visible to the public "New Ransomware Warning for Critical Infrastructure Providers"

    The UK, US, and Australian authorities have issued a new warning for critical infrastructure (CNI) providers after a surge in ransomware attacks over the past year. The joint cybersecurity advisory comes from the UK's National Cyber Security Centre (NCSC), the Australian Cyber Security Centre (ACSC), and the FBI, NSA, and US Cybersecurity and Infrastructure Security Agency (CISA). The agencies reported that 14 out of 16 US CNI sectors were hit by ransomware in 2021, while education was the number one target in the UK. Phishing, stolen or brute-forced remote desktop protocol (RDP) credentials, and vulnerability exploitation remain the top threat vectors, with the agencies warning of growth in ransomware-as-a-service affiliates. The joint cybersecurity advisory also warns that different ransomware groups in Eurasia are sharing information with each other. However, it's not clear in many instances if the groups are distinct or have merely rebranded. The joint cybersecurity advisory also contains an extensive list of industry best practices that could help CNI firms mitigate the risk of ransomware compromise. The agencies stated that ransomware groups have also increased their impact by targeting vulnerabilities in cloud applications, virtual machine software, orchestration software, and cloud accounts and APIs.

    Infosecurity reports: "New Ransomware Warning for Critical Infrastructure Providers"

  • news

    Visible to the public "Will SOTA Updates Help Hackers Steal Your Car?"

    Software-Over-The-Air (SOTA) updates can help hackers steal a car, depending on the vehicle's level of SOTA capability and its level of communication security. A vehicle would directly receive SOTA updates from a cloud-based server. SOTA is an important capability for updating a car's software-controlled functions via a Wi-Fi or mobile network. However, these vehicle software updates must be hacker-proof as it has already been proven that malicious hackers could take over a vehicle. Updates transmitted by SOTA can affect the software controlling the vehicle's physical components, electronic processing systems, infotainment, and critical safety systems. A SOTA system could face attacks, including identity theft and the manipulation or repetition of transmitted messages, which could result in hackers gaining control of the vehicle. Software vulnerabilities pose a significant threat to passenger safety and vehicle performance, and could lead to many recalls. More than 8 million vehicles were recalled in the past few years, and about 4 million of those involved software problems. Symantec released a paper on vehicle security, focusing on the protection of the connected car architecture's various layers, such as the cloud-based layer, radio layer, Single-Board Computer (SBC), Body Control Module (BCM), and more. Symantec's work suggests that it will take many years to secure all components of the connected car, but an essential starting point is securing the head unit in the vehicle and then using it to manage and update the rest of the car. Recommended techniques include white-listing pre-approved code, controlling how that code can behave, running code in sandboxes, and monitoring code and activity across the Controller Area Network (CAN) bus, over the air, and within the modules. Ensuring SOTA security requires the combined responsibility of the vehicle manufacturers and their suppliers. This article continues to discuss the concept of SOTA, the security risks that SOTA may facilitate, and efforts to strengthen vehicle Internet-related security.

    Electropages reports "Will SOTA Updates Help Hackers Steal Your Car?"

  • news

    Visible to the public "Attackers Used Malicious Telegram Installer to Distribute Purple Fox Rootkit"

    In collaboration with MalwareHunterTeam, Minerva Labs analyzed a malicious Telegram installer that threat actors are using to infect victims with the Purple Fox rootkit. The researchers found that the malicious Telegram installer is a compiled AutoIt script called Telegram Desktop.exe, which creates a new folder and drops both a legitimate Telegram installer and a malicious downloader into it. When executed, the malicious downloader contacts a command-and-control (C2) server and downloads two files into a new folder. One of those resources contains another file that reflectively loads a Dynamic Link Library (DLL) file, leading the attack flow to use more files to shut down antivirus processes. From there, the campaign uses its C2 server to gather information such as the hostname, CPU, and more, from the victim. The attack concludes by downloading and running the Purple Fox rootkit. Further analysis showed that the malicious installers were delivering the same rootkit via email, likely from phishing websites. The Purple Fox rootkit also made headlines in September 2019 when researchers discovered the RIG exploit kit spreading a Purple Fox variant by redirecting visitors to a malicious PowerShell command that installs the rootkit. In 2021, researchers at Guardicore Labs found an active malware campaign targeting Windows machines, which differed from previous attack operations involving Purple Fox because it did not use phishing emails or exploit kits. Instead, this operation used an SMS password brute-force attack that allowed the rootkit to propagate as a worm across web-facing Windows machines. This article continues to discuss the use of a malicious Telegram installer to distribute the Purple Fox rootkit, other recent attacks involving Purple Fox, and how organizations can defend against Purple Fox attack attempts.

    Security Intelligence reports "Attackers Used Malicious Telegram Installer to Distribute Purple Fox Rootkit"