News Items

  • news

    Visible to the public "This Seemingly Normal Lightning Cable Will Leak Everything You Type"

    The modified Apple Lightning cable, called the OMG Cable, that hackers could use to hijack a computer now has a new version. The OMG Cable functions the same as a regular cable, except it was modified to allow hackers to remotely take over a victim's computer, run malicious payloads, and more. The OMG Cables work by creating a Wi-Fi hotspot to which a hacker can connect, from their own device. From there, an interface is provided in an ordinary web browser that the hacker can use to start recording keystrokes. According to the security researcher known as MG, who made the OMG Cables, the latest version comes with new physical variations, including Lighting to USB-C. The new cables also have geofencing features, allowing users to trigger or block the device's payloads based on where the cable is physically located. The Type C cables enable the same type of attacks to be executed against smartphones and tablets. Other improvements include being able to change keyboard mappings and forge the identity of specific USB devices. This article continues to discuss the capabilities of the new version of OMG Cables.

    Motherboard reports "This Seemingly Normal Lightning Cable Will Leak Everything You Type"

  • news

    Visible to the public "Malicious Office Documents Make Up 43 Percent of Malware Downloads"

    A new study conducted by AtlasVPN found that 43 percent of all malware downloads in the second quarter of 2021 were malicious Microsoft Office documents, which is an increase from the same time in 2020 when only 14 percent of malware were distributed through Office files. In the third quarter of 2020, the volume increased to 38 percent before decreasing to 34 percent in 2020's fourth quarter and 2021's first quarter. Earlier this year, global law enforcement agencies had to stop the spread of Emotet malware via Word documents. Emotet's capability to open doors for malware installations such as information stealers, Trojans, and ransomware made it significantly dangerous. The success of Emotet has motivated other cybercriminals to attempt similar infection techniques. This article continues to discuss the increased weaponization of Microsoft Office documents to spread malware.

    BetaNews reports "Malicious Office Documents Make Up 43 Percent of Malware Downloads"

  • news

    Visible to the public Crack Codes & Learn About NSA's Student Opportunities

    September 09, 2021 4:00pm - 6:00pm (GMT-05:00) Eastern Time (US & Canada)

    Please join us for an engaging NSALive Adobe Webinar on Sept 9th 2021 from 4-6pm EST to learn about the National Security Agency and Student Program opportunities, as well as a deep dive into the 2021 Codebreaker Challenge! Codebreaker Challenge is our annual cybersecurity & cryptanalysis challenge with a realistic, NSA mission-centric scenario open to U.S based academic institutions. The 2021 challenge is open from August 2nd – December 31st 2021

  • news

    Visible to the public Online scam targets gift cards and loyalty cards

    Online scam targets gift cards and loyalty cards Over 100,000 inboxes are the target of an under the radar approach to extracting small amounts of funds from giftcards, credits, and other valuables that show up in people’s inboxes. This cybercrime group could be seeking 5 to 10 million authentications attempts using IMAP to net 50K to 100K of working inbox credentials.
  • news

    Visible to the public "Conti Ransomware Gang's Playbook Gets Translated Into English, Gives Insight Into Attacks"

    Researchers from Cisco Talos were able to translate the Conti ransomware gang's leaked internal materials, thus revealing details about the group's attack methods. The materials suggest that their attack methods were designed to allow low-skilled actors to successfully launch attacks against targets considered valuable. The ransomware gang's attack playbook was leaked by an unhappy Conti member. Following the leak, the researchers analyzed them and released an English translation, clarifying the steps and tools involved in a Conti attack. The documents revealed detailed information on attack scenarios that amateur hackers could perform. Though these attacks could be performed by low-skilled hackers, they have the potential to cause significant destruction. The instructions teach Conti's affiliates how to gain administrator access to a targeted network after using provided commands and tools to list users, specifically those that have Active Directory access. They also detail the performance of simple reconnaissance such as checking LinkedIn and other social media platforms to identify employees who could have privileged network access. The Cobalt Strike red-teaming framework and its cracked version 4.3 was the most popular tool in the instructions. There were also instructions on how to exploit the ZeroLogon vulnerability, PrintNightmare, and other critical bugs. Some of the tools described by the group are not what researchers usually see during incident response. These tools include SharpView, a .NET port of the PowerView tool from the PowerShell-based PowerSploit offensive toolkit, Armitage, a Java-based GUI front-end for the Metasploit penetration testing platform, and SharpChrome, a tool for decrypting logins and cookies in Chrome. Common-line utilities mentioned in the leaked documents included ADFind, SMBAutoBrute, and AnyDesk. The leak also contained video tutorials on how to use PowerShell to carry out different tasks such as penetration testing and attacking the Active Directory. Defenders could use the leak to implement better strategies and controls for detecting such attacks. This article continues to discuss the translation of the Conti ransomware gang's playbook, the information contained by the leaked instructions, and how defenders could take advantage of this information.

    CyberIntelMag reports "Conti Ransomware Gang's Playbook Gets Translated Into English, Gives Insight Into Attacks"

  • news

    Visible to the public "Accellion Breach Impacts Beaumont Health"

    Another Accellion breach victim has been named nine months after threat actors exploited zero-day vulnerabilities in the company's File Transfer Application. Beaumont Health has notified approximately 1500 patients that their personal data may have been compromised in the December attack on Accellion software. The potentially impacted information included a listing of roughly 1500 patients who had one of two procedures performed at a Beaumont Hospital. The list included the patient name, procedure name, physician name, the internal medical record number and the date of service. Beaumont Health stated that this incident is limited to these patients and does not affect all patients of Beaumont. The healthcare provider added that no financial information had been impacted by the incident and that neither Beaumont nor Goodwin had found any evidence of the compromised data being misused. News of the data breach comes a year after a phishing attack on Beaumont Health may have exposed the data of 6000 patients.

    Infosecurity reports: "Accellion Breach Impacts Beaumont Health"

  • news

    Visible to the public "LockFile Ransomware Attacks Exploit ProxyShell Vulnerabilities on Unpatched Microsoft Exchange Servers"

    The U.S. Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency alert pertaining to the active exploitation of Microsoft Exchange ProxyShell vulnerabilities by threat actors in the wild. ProxyShell is a set of vulnerabilities discovered by DevCore security researcher Orange Tsai and demonstrated at the August Black Hat security conference. The cybersecurity firm Huntress also found more than 140 webshells executed against 1,900 unpatched Exchange servers. According to a security researcher at Huntress, organizations that have been impacted include manufacturing, seafood processors, auto repair shops, industrial machinery, a small residential airport, and more. Several other researchers also detected malicious activity involving the exploitation of ProxyShell vulnerabilities for the potential launch of LockFile ransomware attacks. Threat actors have dropped webshells using ProxyShell vulnerabilities to gain persistent access on affected Microsoft Exchange servers. The webshells were used to install backdoors for LockFile ransomware attacks as well as launch Petitpotam attacks to hijack servers. This article continues to discuss the weaponization of ProxyShell vulnerabilities for potential LockFile ransomware attack execution.

    CPO Magazine reports "LockFile Ransomware Attacks Exploit ProxyShell Vulnerabilities on Unpatched Microsoft Exchange Servers"

  • news

    Visible to the public "Misinformation on Facebook Got Six Times More Clicks Than Factual News During The 2020 Election, Study Says"

    Researchers at New York University and Universite Grenoble Alpes in France conducted a new study of user behavior on Facebook around the 2020 election. The forthcoming peer-reviewed study reports that from August 2020 to January 2021, news publishers known for putting out misinformation got six times the amount of likes, shares, and interactions on the platform, as did trustworthy news sources. The researchers also found that the statistically significant misinformation boost is politically neutral and that misinformation-trafficking pages on both the far left and the far right generated much more engagement from Facebook users than factual pages of any political slant. The study also found that publishers on the right have a much higher propensity to share misleading information than publishers in other political categories. The NYU study is one of the few comprehensive attempts to measure and isolate the misinformation effect across a broad group of publishers on Facebook, experts said, and its conclusions support the criticism that Facebook's platform rewards publishers that put out misleading accounts. In response, Facebook said that the report measured the number of people who engage with content, but that is not a measure of the number of people that actually view it (Facebook does not make the latter number, called impressions, publicly available to researchers).

    The Washington Post reports: "Misinformation on Facebook Got Six Times More Clicks Than Factual News During The 2020 Election, Study Says"

  • news

    Visible to the public "Comcast Flaw Could Have Turned Remotes into Listening Devices"

    The cloud and data center security company Guardicore discovered a new attack vector on Comcast's XR11 voice remote that would allow attackers to turn it into a listening device, posing a significant threat to a user's privacy. The attack dubbed WarezTheRemote, which Comcast has now remediated, was a major security threat as over 18 million units of the XR11 were deployed across homes in the U.S., making it one of the most widespread remote controls. The Guardicore researchers were able to break into RF communication between the remote and set-top box and then eavesdrop on conversations using a basic RF transceiver. WarezTheRemote applies a man-in-the-middle (MITM) attack to exploit the remote's RF communication with the set-top box and over-the-air firmware upgrades by pushing a malicious firmware image back to the remote, allowing attackers to record audio, without user interaction, continuously. The attack does not require the malicious actor to have physical contact with the targeted remote. It also does not require any interaction from the victim. Bud Broomhead, CEO at Viakoo, a provider of automated Internet of Things (IoT) cyber hygiene, highlighted this as another example of the potential exploitation of IoT device vulnerabilities by cyber attackers that could lead to ransomware, stolen data, or a system takeover. Remediation of IoT device vulnerabilities includes upgrading firmware, credentialing with password enforcement, and more. John Bambenek, Threat Intelligence Advisor at Netenrich, a digital IT and security operations company, adds that WarezTheRemote emphasizes the need for IoT device makers to think about security to prevent such basic attacks, but it is more important not to overlook the more severe risks. Organizations must think about the amount of data these IoT devices are allowing them to gather and whether cybercriminals can take and abuse that data. This article continues to discuss the WarezTheRemote attack that could have allowed Comcast's XR11 voice remote to be turned into a listening device and the remediation of IoT device vulnerabilities.

    Security Magazine reports "Comcast Flaw Could Have Turned Remotes into Listening Devices"

  • news

    Visible to the public "UK Researchers Invent Device to Thwart USB Malware"

    A team of researchers at Liverpool Hope University have designed a new device, which they claim will mitigate the risk of malicious USB drives. The researchers stated that the device has been engineered to overcome a significant issue with operating systems. If not configured correctly, operating systems will trust all USBs regardless of what might be installed on them. The new device sits between the PC or laptop and USB stick, scanning the removable media for malware while disguising information about the computer so that it's "nearly impossible" for any malicious code to infect the machine. The invented device also scans the USB and decides the visibility and accessibility of the files present in USB devices at the host computer, giving either full access, partial access, or a full block. The researchers stated that the new scanning device effectively aims to "keep the malicious code busy" with a disguised OS while scanning and categorizing the thumb drive.

    Infosecurity reports: "UK Researchers Invent Device to Thwart USB Malware"

  • news

    Visible to the public "Cybersecurity Education Helps Communities Become More Cyber Secure"

    As part of the National Security Agency (NSA), the National Centers of Academic Excellence in Cybersecurity awarded a two-year $1.67 million grant to the Center for Infrastructure Assurance and Security (CIAS) at the University of Texas at San Antonio to help communities become more cyber secure. During the two-year grant, the CIAS will work with multiple communities to help develop a community-wide K-12 cybersecurity program, support local industry and government in becoming more cyber resilient, and help local academic institutions develop cybersecurity programs for students. Dr. Greg White, director of the CIAS, emphasized that the increased targeting of communities nationwide by both domestic and foreign cyber threats calls for a whole-community approach to be taken to protect citizens, organizations, and infrastructures from cyberattacks. The NSA grant will enable the CIAS to work with Angelo State University in implementing a cybersecurity program that starts with K-12 education and continues into local businesses, government, and the general public. The two-year pilot program will establish a K-12 cybersecurity initiative for elementary, middle, and high schools in which cybersecurity lesson plans, tools, and resources are provided to students, teachers, and counselors during the school year. The program will also expand upon cybersecurity summer camps and promote the establishment of CyberPatriot teams as well as Cyber Threat Defender tournaments. This grant will help establish a Culture of Cybersecurity program geared towards K-5 students. It will also help develop certification training, assist 2- and 4-year institutions meet the requirements for an NSA/DHS Center of Academic of Excellence designation, and more. This article continues to discuss the NSA grant aimed at helping communities become more cyber secure.

    Homeland Security News Wire reports "Cybersecurity Education Help Communities Become More Cyber Secure"

  • news

    Visible to the public "A Popular Smart Home Security System Can Be Remotely Disarmed, Researchers Say"

    Researchers at the cybersecurity company Rapid7 discovered two vulnerabilities in Fortress S03, a popular smart home security system. The exploitation of these vulnerabilities could lead to the system being disarmed by malicious actors. Fortress S03 relies on Wi-Fi to connect cameras, motion sensors, and sirens to the Internet, thus allowing owners to monitor their home from anywhere using a mobile app. The system also uses a radio-controlled key fob that allows owners to arm or disarm their home from outside. The vulnerabilities found to be contained by the security system include an unauthenticated Application Programming Interface (API) and an unencrypted radio signal that can be easily intercepted by attackers. According to the Rapid7 researchers, the system's unauthenticated API can be remotely queried over the Internet without the request being checked by the server as to whether it is legitimate. In addition, by knowing the homeowner's email address, the server would return the device's unique IMEI, which could then be used to disarm the system remotely. The other vulnerability involves unencrypted radio signals sent between the security system and the homeowner's key fob. The researchers were able to capture and replay the signals for arming and disarming the system since the radio waves were not adequately scrambled. This article continues to discuss the discovery, potential impact, and disclosure of the vulnerabilities discovered in the Fortress S03, and Fortress' response to the researchers' findings.

    TechCrunch reports "A Popular Smart Home Security System Can Be Remotely Disarmed, Researchers Say"

  • news

    Visible to the public "Bad Bots Focus Attacks on E-Commerce Targets"

    Researchers from Barracuda Networks conducted a new study and published their work in a report called Bot attacks: Top Threats and Trends. During their research, the researchers found that nearly two-fifths (39%) of all internet traffic is comprised of "bad bot" activity, with e-commerce assets most at risk of attack. The researchers also found that automated traffic accounts for the vast majority (64%) of all internet traffic today, including search engine crawlers and social media bots. The researchers stated that only a quarter (25%) of internet traffic can be labeled "good bot" activity. Most of the traffic analyzed in the report came from AWS and Azure public clouds. North America accounted for 67% of bad bot traffic, followed by Europe and Asia. However, in Europe, malicious bots are more likely to come from hosting services or residential IPs, the report said. The researchers warned that e-commerce apps and login portals are the most common target of advanced persistent bots, which are harder to detect as they closely imitate human behavior.

    Infosecurity reports: "Bad Bots Focus Attacks on E-Commerce Targets"

  • news

    Visible to the public "Bluetooth Devices Proven to Be Vulnerable to Unfixable Security Problems"

    Researchers at the Singapore University of Technology and Design (SUTD) have detailed a set of 16 new security vulnerabilities dubbed "BrakTooth." These vulnerabilities impact a wide range of Bluetooth Classic (Basic Rate/Enhanced Data Rate) implementations. The report titled "BrakTooth: Causing Havoc on Bluetooth Link Manager" was developed in collaboration with the Institute for Infocomm Research (I2R) and the Agency for Science, Technology and Research (A*STAR), and was led by Assistant Professor Sudipta Chattopadhyay from SUTD's ASSET (Automated Systems Security) Research Group. According to the white paper, the vulnerabilities impact Bluetooth chipset vendors, including Intel, Texas Instruments, Silicon Labs, and Infineon (Cypress). These vulnerabilities are likely to primarily affect mainstream electronic device users because of their heavy daily usage of laptops and smartphones. Microsoft, Asus, HP, and other major laptop vendors are using the affected Intel chipset (Intel AX200). Major smartphone and tablet vendors such as Samsung, Sony, and Xiaomi are using the affected Qualcomm chipsets (WCN3990/8). The reported vulnerabilities could allow an attacker to shut down a Bluetooth-enabled device remotely. For instance, an attacker could shut down a headset or speaker by exploiting some of the vulnerabilities. The attacks can be executed continuously to disrupt the user's listening experience. The most serious vulnerability allows arbitrary code execution in an embedded controller. This vulnerability lets an attacker remotely execute chosen code in the target device, thus potentially leading to the deletion of data. Besides major laptops, smartphones, and tablets, the vulnerabilities also affect industrial automation, automotive infotainment systems, and aircraft entertainment systems. The researchers followed a responsible disclosure process when reporting the vulnerabilities to vendors. They gave all Bluetooth system-on-chip (SoC) and module vendors at least 90 days until the public disclosure to address the vulnerabilities in their chipsets. For now, the patches for these vulnerabilities are only partially available. For example, patches for Intel and Qualcomm will only be available around October 2021, meaning many major laptops and smartphones will be unpatched until those fixes are made available. Several of the vulnerabilities have also been said to be impossible to fix due to the unavailability of space in the impacted chipsets. This article continues to discuss the scope, impact, and disclosure of the BrakTooth vulnerabilities.

    SUTD reports "Bluetooth Devices Proven to Be Vulnerable to Unfixable Security Problems"

  • news

    Visible to the public "Feds Warn of Ransomware Attacks Ahead of Labor Day"

    The FBI and CISA put out a joint cybersecurity advisory (PDF) Tuesday, noting that ransomware actors often ambush organizations on holidays and weekends when offices are typically closed, making the upcoming three-day weekend a prime opportunity for threat actors. The agencies stated that they haven't discovered "any specific threat reporting indicating a cyberattack will occur over the upcoming Labor Day holiday," they are instead working on the idea that it is better to be safe than sorry given that some significant cyberattacks have occurred over holidays and weekends during the past few months. Researchers at Cerberus Sentinel stated that attackers usually go after organizations when there are three-day weekends, mainly because the absence of crucial personnel makes it less likely that targeted organizations can quickly detect and contain attacks once launched. The additional time gives attackers the ability to exfiltrate more sensitive data or lock up more computers with ransomware than they otherwise might have been able to. The now-infamous Colonial Pipeline attack by now-defunct ransomware group DarkSide that crippled the oil pipeline on the East Coast for some weeks after occurred in the lead-up to Mother's Day weekend, agencies observed. Then later in May, over the Memorial Day weekend, the REvil ransomware group targeted the world's largest meat distributor JBS Foods, forcing the shutdown of some operations in both the United States and Australia and causing disruption in the global food supply chain. Like DarkSide, REvil also has since closed up shop. Another major ransomware attack by REvil occurred over the Fourth of July holiday weekend, this time exploiting zero-day vulnerabilities in the Kaseya Virtual System/Server Administrator (VSA) platform. Though the two ransomware players who launched these previous attacks are now gone, there are still plenty who are active, federal agencies warned. The FBI's Internet Crime Complaint Center (IC3), which logs cyber incident complaints about various types of Internet crime, said attacks from the following ransomware variants have been the most frequently reported to the FBI over the last month: Conti, PYSA, LockBit, RansomEXX/Defray777, Zeppelin, and Crysis/Dharma/Phobos.

    Threatpost reports: "Feds Warn of Ransomware Attacks Ahead of Labor Day"

  • news

    Visible to the public "Cybercriminal Sells Tool to Hide Malware in AMD, NVIDIA GPUs"

    Cybercriminals are continuing to make progress with attacks involving malware that can execute code from a compromised system's graphics processing unit (GPU). This method is not new as demo code has been published previously. However, projects on this method have been academic or incomplete and unrefined. Earlier in August, a proof-of-concept (PoC) was found being sold on a hacker forum, thus suggesting that cybercriminals might be transitioning to a new level of sophistication for their attacks. The PoC is for a method said to protect malicious code from security solutions scanning the system RAM. The overview provided by the seller says that the method uses the GPU memory buffer to store and execute malicious code. According to the seller, the technique only works on Windows systems supporting versions 2.0 and above of the OpenCL framework for executing code on different processors, including GPUs. They claimed to have tested the code on graphics cards from Intel (UHD 620/630), Radeon (RX 5700), and more. Another member of the hacker forum pointed out that the GPU-based malware has been done before, citing JellyFish, which is a six-year PoC for a Linux-based GPU rootkit. The seller rejected this connection with the JellyFish malware, claiming that their method is different and does not depend on code mapping back to userspace. Two weeks after the announcement about this PoC on the hacker forum, the seller said they had sold the PoC, but they did not disclose the terms of the deal. This article continues to discuss the hacker forum advertisement of a PoC technique for both storing and executing malware on a graphics card, as well as the academic research that has been done on GPU-based malware.

    Bleeping Computer reports "Cybercriminal Sells Tool to Hide Malware in AMD, NVIDIA GPUs"

  • news

    Visible to the public Check into Careers with the Intelligence Community (IC)!

    A career with the Intelligence Community (IC) can be enormously rewarding. It also demands the very best of the workforce. To meet the requirements, you must be highly competent in your field. You must also be highly reliable and trusted to safeguard some of the nation’s most sensitive information.

  • news

    Visible to the public "Baby Monitor Vulnerable to Attack via Newly Found Bugs"

    Researchers at Bitdefender have discovered security holes in the Victure IPC360 Camera use in a popular baby monitor model. The exploitation of these vulnerabilities could allow outside attackers to access the camera feed or disable the encryption of streams stored in the cloud. In addition, an attacker sharing a network with the camera could enable the ONVIF (Open Network Video Interface Forum) protocol and the Real-Time Streaming Protocol (RTSP) or exploit a stack-based buffer overflow to take complete control over a device. According to the researchers, the vulnerabilities discovered in the model include an AWS bucket missing access control, camera information disclosure, remote control of cameras, local stack-based buffer overflow leading to remote code execution, and hardcoded RTSP credentials. These vulnerabilities are estimated to be affecting more than 4 million devices worldwide. This article continues to discuss the vulnerabilities found in the Victure IPC360 Camera and Victure's response to the discovery made by Bitdefender.

    Dark Reading reports "Baby Monitor Vulnerable to Attack via Newly Found Bugs"

  • news

    Visible to the public "Ransomware Attacks Soar 288% in First Half of 2021"

    Researchers from the NCC Group have found that the number of ransomware attacks surged by 288% between the first and second quarters of 2021 as double extortion attempts grew. The researchers claimed that nearly a quarter (22%) of data leaks came from the Conti group in the second quarter. Conti typically gains initial network access to victim organizations via phishing emails, the researchers stated. Next came Avaddon, which accounted for 17% of incidents, although this variant is now thought to be inactive. Unsurprisingly, nearly half (49%) of victims with known locations in Q2 were based in the US, followed by 7% in France and 4% in Germany. Christo Butcher, global lead for threat intelligence at NCC Group, argued that no organization in any sector is safe from ransomware today. Christo Butcher also stated that it is crucial for organizations to be proactive about their resilience and should include proactive remediation of security issues and operating a least-privilege model.

    Infosecurity reports: "Ransomware Attacks Soar 288% in First Half of 2021"

  • news

    Visible to the public "Can a Piece of Sticky Tape Stop Computer Hackers in Their Tracks?"

    Researchers at the University of Technology Sydney (UTS) and the Australian Research Council Centre of Excellence for Transformative Meta-Optical Systems (TMOS) have joined the fight against online hackers with a new technology that leaps toward affordable, accessible quantum communications. This new technology would prevent social media messaging, banking, and other online activity from being decrypted. Quantum communication remains in early development, only being feasible in very limited fields because of the high costs associated with manufacturing the required devices. The new technology developed by the team integrates quantum sources and waveguides on a chip in an affordable and scalable way, bringing everyday use closer. The lack of reliable quantum light sources that can encode and transmit information has impeded the development of fully functional quantum communication technologies. A paper recently published in ACS Photonics describes the new platform developed by the team that generates quantum emitters based on hexagonal boron nitrate, also known as white graphene. Unlike current quantum emitters, which are created using complex methods in expensive rooms, the new quantum emitters can be made using $20 worth of white graphene pressed onto a piece of adhesive tape. The TMOS Chief Investigator Igor Aharonovich emphasizes that 2D materials, such as hexagonal boron nitride, are emerging materials for integrated quantum photonics that will impact how future optical components are designed and engineered for secured communication. This article continues to discuss the new technology that brings us closer to affordable, accessible quantum communications and the significantly enhanced security of online activity.

    Science Daily reports "Can a Piece of Sticky Tape Stop Computer Hackers in Their Tracks?"

  • news

    Visible to the public "Illinois Physicians Notify 600K Patients of Data Breach"

    The largest independent group of physicians in Illinois is notifying 600,000 patients that their personal information may have been exposed. DuPage Medical Group (DMG) said that patient data could have been compromised when its computer network was hacked last month. Patient information that the hackers may have accessed includes names, addresses, dates of birth, diagnosis codes, information on medical procedures, and treatment dates. For some patients, there is a chance that their Social Security number may also have been compromised. DMG experienced a network outage on July 13. Third-party cyber-forensic specialists were hired to investigate the security incident. They were able to find that unauthorized actors had gained access to the DMG network between July 12, 2021, and July 13, 2021, and that it was the adversaries who had caused the outage.

    Infosecurity reports: "Illinois Physicians Notify 600K Patients of Data Breach"

  • news

    Visible to the public "Ransomware May Have Cost US Schools Over $6bn in 2020"

    Scores of ransomware attacks on US schools and colleges last year may have cost them over $6bn, according to a new report published by researchers at Comparitech. The researchers analyzed the 77 attacks reported by educational institutions nationwide in 2020 and calculated the cost to these victims from estimated downtime and recovery time. The researchers found that the average downtime was seven days, and the average recovery time was 55.4 days. Comparitech claimed that 2020 saw 1,740 schools and colleges and potentially 1.4m students affected by ransomware, an increase of 39% and 67% respectively on 2019 figures. This is despite the actual number of attacks in 2020 coming in 20% lower than the figure for the previous year. The researchers stated that this suggests that adversaries targeted larger school districts with bigger annual budgets, hoping to cause more significant disruption and increase their ransom payment demands. Ransom demands in 2020 varied dramatically from just $10,000 to over $1m, although the researchers were only able to find mention of these for nine out of the 77 attacks it analyzed. From January 2018 to June 2021, Comparitech logged 222 separate ransomware attacks on US schools and colleges, impacting 3,880 schools and nearly three million students. Downtime alone is estimated to have cost these victim organizations over $17.3bn, with recovery costs adding millions, if not billions, to the total, the researchers stated.

    Infosecurity reports: "Ransomware May Have Cost US Schools Over $6bn in 2020"

  • news

    Visible to the public "Bangkok Airways Apologizes for Passport Info Breach as LockBit Ransomware Group Threatens Data Leak"

    Bangkok Airways issued a statement to its customers apologizing for a data breach involving their passport information and other personal data. According to the company, the cybersecurity incident occurred because of unauthorized and unlawful access to its information system on August 23. Bangkok Airways has not yet revealed how many customers were impacted by the breach or the timeframe from which the data came. However, an investigation of the incident did reveal that names, nationalities, genders, phone numbers, emails, addresses, contact information, historical travel information, partial credit card information, and more had been accessed in the cyberattack. According to the statement, the attackers were not able to impact Bangkok Airways' operational or aeronautical security systems. Passengers are urged to contact their bank or credit card providers for further advice and change compromised passwords immediately. Bangkok Airways' announcement coincided with a notice from the LockBit ransomware group claiming that it was planning to leak 103 GB of compressed files stolen from the company. Members of the LockBit group are actively exploiting vulnerabilities contained by Fortinet FortiOS and FortiProxy products to gain initial access to specific victim networks. The group largely targets commercial and professional services, as well as the transportation sector. This article continues to discuss the data breach faced by Bangkok Airways and key findings surrounding the LockBit ransomware group.

    ZDNet reports "Bangkok Airways Apologizes for Passport Info Breach as LockBit Ransomware Group Threatens Data Leak"

  • news

    Visible to the public "Tech Companies Pledge Billions for Critical Infrastructure Security Upgrades, Training"

    President Joe Biden recently met with leaders of larger technology companies and platform providers to discuss options for addressing security threats and technical debt facing the U.S. The meeting resulted in Google, Microsoft, IBM, and other companies committing to investing in tens of billions of dollars in technology, cybersecurity training, and other initiatives. Google will spend $10 billion on several programs, including the expansion of its zero-trust initiative, software supply chain security effort, and training for nearly 100,000 people through its Google Career Certificates program. Microsoft plans on spending $20 billion to enhance its own product design and security processes. The company will also spend $150 million to help federal, state, and local government agencies upgrade their security. IBM committed to providing training for 150,000 people in cybersecurity and helping diversify the security workforce. These commitments are a part of the Biden administration's efforts to improve the country's critical infrastructure security and making investments to address the cyber skills shortage. This article continues to discuss the commitments made by large technology companies in an effort to improve the security of the nation's critical infrastructure significantly.

    Decipher reports "Tech Companies Pledge Billions for Critical Infrastructure Security Upgrades, Training"

  • news

    Visible to the public Pub Crawl #53


    Pub_Crawl_web.jpgPub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers.

  • news

    Visible to the public "Researchers Develop Hardware-Cybersecurity Education Program With $400,000 NSF Grant"

    Many commonly reported cyberattacks, such as distributed denial-of-service (DDoS) attacks, focus on software vulnerabilities. With the growing risks of corporate or state espionage via hardware, such as the hiding of malicious Trojan circuits on a motherboard by a third-party vendor, it is important to increase efforts in strengthening computer hardware security. A new initiative at the University of Kansas School of Engineering will design course modules to train students to build and maintain more secure computer hardware. This work is supported by a $400,000 grant from the National Science Foundation's (NSF) Secure and Trustworthy Cyberspace (SaTC) program. Tamzidul Hoque, the principal investigator of the new grant, pointed out that hardware is often overlooked when thinking about cybersecurity, but it has become an essential component, considering the globalization of the electronic device supply chain. The design and manufacturing of hardware by several different vendors globally calls for improved hardware security. However, the focus areas in college and university courses for electrical and computer engineering, and computer science include software security rather than hardware security. Hoque and his colleagues plan to develop course modules on hardware security that can be integrated into existing courses seamlessly. They plan to offer them to colleges and universities across the U.S. for free. The modules will cover six critical hardware topics, including reverse engineering, IP protection through obfuscation, hardware Trojan attacks, physical unclonable functions (PUFs), bus snooping, and side-channel attacks. This article continues to discuss the need for more attention on computer hardware security and the new effort aimed at improving hardware cybersecurity education.

    The University of Kansas reports "Researchers Develop Hardware-Cybersecurity Education Program With $400,000 NSF Grant"

  • news

    Visible to the public "What Universities Need To Know About Cyber Risk"

    Higher education providers have become an increasingly attractive target for state-sponsored actors in cyberattacks. The number of publicly acknowledged cybersecurity incidents impacting Australian universities have risen this year. Earlier this year, the Australian Security Intelligence Organization (ASIO) confirmed that Australian universities and researchers were under threat from foreign states. There are several reasons why universities' systems may be vulnerable to cyberattacks. Universities are designed to be open and collaborative, and they typically use many public-facing systems, some of which may be outdated. Many universities are spread across many campuses and research locations. They have many different users accessing systems and services, including students, academics, researchers, and staff members. These various touch points provide a broader attack surface to hackers that is difficult to combat. The fact that universities store a significant amount of intellectual property assets and personal information stemming from research activities and users, also makes them more vulnerable to cyberattacks. In response to the rising threat of cyberattacks against universities, the Australian government introduced legislative reforms requiring improvements to existing university compliance frameworks. There are several steps that universities can take now to strengthen existing controls and mitigate the risk of a cyberattack, such as leveraging sector-specific networks to collaborate on security-related initiatives, performing effective staff training on cybersecurity, assessing cybersecurity maturity and compliance against the National Institute of Standards and Technology (NIST) cybersecurity framework, and more. This article continues to discuss the increased targeting of universities in cyberattacks, government efforts to tackle the rising threat of such attacks against universities, and how universities could mitigate cyber risk now.

    Lexology reports "What Universities Need To Know About Cyber Risk"

  • news

    Visible to the public "Cyber-thieves Scam New Hampshire Town Out of $2.3m"

    A New Hampshire town is reeling from the "very shocking" cybercrime that claimed more than 14% of its annual budget. Peterborough is a town of 7000 people, with a budget for the fiscal year of just over $15.8m. Adversaries conned the town out of $2.3m through two business email compromise (BEC) scams. First, the criminals used forged documents and compromised email accounts to pose as staff at the local school district. This enabled the adversaries to divert a million-dollar transfer made to the district by the town into a bank account under their control. The theft came to light on July 26 when the ConVal School District notified the town that it had missed a $1.2m monthly payment. On August 18, it emerged that the adversaries had stolen more money by posing as general contractor Beck and Bellucci, hired by the town to repair Main Street Bridge. An investigation into the thefts has been launched by the United States Secret Service. During the investigation, researchers discovered that the forged email exchanges used in the attack originated overseas. The town is reviewing its procedures regarding electronic financial transfers and has canceled all automated clearing house transfers.

    Infosecurity reports: "Cyber-thieves Scam New Hampshire Town Out of $2.3m"

  • news

    Visible to the public "5 Items to Monitor to Detect DDoS Attacks"

    There were 24 percent more distributed denial-of-service (DDoS) attacks in 2020 than in 2019. DDoS attacks increased by 55 percent between January 2020 and March 2021. According to both F5 Networks and IBM X-Force, government agencies were the sixth most targeted vertical in 2020. As these attacks involve the hijacking or abuse of network protocols, one approach to detecting attacks that the government could take is monitoring certain types of network traffic. There are five network packet types and protocols commonly abused in DDoS attacks, which include Transmission Control Protocol Synchronize (TCP-SYN), the Domain Name System (DNS), Application Flooding, the User Datagram Protocol, and the Internet Control Message Protocol (ICMP). Although monitoring these systems and protocols is an important step, network visibility in government agencies is different compared to the private sector. For many government agencies, packet data is required to be stored for certain intervals (i.e., 10 days, 30 days, etc.). In addition, the chosen monitoring solution and packet capture (PCAP) storage have to scale accordingly. Having the appropriate network visibility, security delivery, and packet capture storage capability is important to maintaining performance and security, as well as to providing PCAP forensics. Agencies should have the right tools and look at the right protocols to stay ahead of the latest threats. This article continues to discuss the increase in DDoS attacks, the network packet types and protocols commonly abused in these attacks, and how to monitor them.

    NextGov reports "5 Items to Monitor to Detect DDoS Attacks"

  • news

    Visible to the public "Critical IoT Camera Flaw Allows for Device Hijacking"

    Security researchers at Nazomi Networks have discovered another critical bug in IoT security camera systems that could allow attackers to hijack devices. The researchers found a remote code execution vulnerability CVE-2021-32941 in the web service of the Annke N48PBB network video recorder (NVR), which consumers and businesses use. The researchers stated that NVRs are an essential part of any connected security camera system in that they are designed to capture, store and manage incoming video feeds from IP cameras. According to an advisory from the Cybersecurity and Infrastructure Security Agency (CISA), if this flaw is exploited, it could cause a stack-based buffer overflow, allowing an unauthenticated, remote attacker to access sensitive information and execute code. The security researchers at Nozomi Networks said that adversaries could snoop on or delete footage, change the configuration of motion detector alarms, or halt recording altogether. The researchers also stated that a cyberattack exploiting CVE-2021-32941 could be used to support physical robberies of premises protected by Annke devices. The security researchers notified Annke about the vulnerability, and fortunately, Annke acted quickly to fix the issue, releasing new firmware to patch the problem just 11 days after Nozomi's responsible disclosure.

    Infosecurity reports: "Critical IoT Camera Flaw Allows for Device Hijacking"

  • news

    Visible to the public Major companies meet with President Biden and promise billions in spending on cybersecurity

    At a productive White House meeting on August 25th, Microsoft, Google, Amazon, Apple, IBM and others committed to significant efforts in the cybersecurity area. Google plans to invest more than 10 billion to strengthen cybersecurity and train 100,000 Americans in technical security fields. Apple is making security improvements through their supply chain. Microsoft committed $20 billion dedicated to more advanced security tools and $150 billion assisting government agencies to upgrade their systems.
  • news

    Visible to the public "Microsoft Warns Thousands of Cloud Customers of Exposed Databases"

    Microsoft is warning thousands of its cloud computing customers that intruders could be able to read, change, or delete their main databases. A research team at the security company Wiz discovered the vulnerability in Microsoft Azure's flagship Cosmos DB database. The team was able to access keys that control access to databases belonging to thousands of companies. Since Microsoft cannot change these keys by itself, the company emailed customers urging them to create new ones. Microsoft agreed to pay Wiz $40,000 for reporting the flaw. According to Microsoft's email to customers, there is no evidence that the flaw had been exploited by external entities other than the Wiz researchers. The flaw was found in Jupyter Notebook, a visualization tool that has been available for years but was enabled by default in Cosmos in February 2021. Wiz Chief Technology Officer Ami Luttwak says those customers who have not been notified by Microsoft could have had their keys accessed by attackers. Only customers whose keys were visible this month were notified by Microsoft. This article continues to discuss the Microsoft Azure cloud vulnerability exposing thousands of cloud databases.

    Reuters reports "Microsoft Warns Thousands of Cloud Customers of Exposed Databases"

  • news

    Visible to the public "Engineering Workstations Are a Concerning Initial Access Vector in OT Attacks"

    The SANS 2021 OT/ICS Cybersecurity Report shares findings from a survey of 480 individuals from a wide range of industries. The survey showed that almost 70 percent of respondents believe their Operational Technology (OT) environments face high or severe risk, which is an increase from the 51 percent in 2019 when SANS did a similar survey. Although many organizations have expressed concern about cyber threats to their OT environments, 48 percent of respondents revealed that they do not know whether they experienced a security breach on OT or control systems in the past year, thus emphasizing the need for organizations to improve their detection and response capabilities. Only 12 percent of respondents were confident that their systems had not been compromised, and 15 percent admitted to detecting security incidents, many of which resulted in the disruption of operations. Most of the respondents blamed hackers for incidents, followed by organized crime, service providers, employees, activists, and state-sponsored threat actors. External remote services were cited as the top initial attack vector involved in incidents, followed by the exploitation of public-facing applications, Internet-accessible devices, spear-phishing, removable media, and compromised engineering workstations. This article continues to discuss key findings shared in the SANS 2021 OT/ICS Cybersecurity Report.

    Security Week reports "Engineering Workstations Are a Concerning Initial Access Vector in OT Attacks"

  • news

    Visible to the public "Ragnarok Ransomware Gang Bites the Dust, Releases Decryptor"

    The Ragnarok gang, also known as Asnarok, closed up shop this week, publishing the news to their public website. The cybercriminal group has been active since late 2019. As a parting "gift," the group released their decryptor, hardcoded with a master decryption key, for free as well on the portal. Previously, the site was primarily where Ragnarok would publish data from victims who refused to pay a ransom. Ragnarok now becomes the third ransomware group that has shut down and has released a way for victims to recover files for free this summer, after the likes of Avaddon in June and SynAck earlier this month. Several security researchers have confirmed that the Ragnarok decryptor works. The decryptor key is currently being analyzed, and researchers will eventually release a clean version that is safe to use on Europol's NoMoreRansom portal.

    Threatpost reports: "Ragnarok Ransomware Gang Bites the Dust, Releases Decryptor"

  • news

    Visible to the public "FBI Warns Businesses of New Hive Ransomware"

    The FBI has issued a warning to firms about an increasingly prolific new ransomware variant known as Hive. The FBI noted that the affiliate-based ransomware uses multiple mechanisms to compromise corporate networks, making it harder for defenders to mitigate. The multiple mechanisms used to compromise corporate networks include phishing emails with malicious attachments to gain initial access and the hijacking of Remote Desktop Protocol (RDP) to move laterally. The malware itself looks for and terminates processes linked to backups, anti-virus, and file copying to boost its chances of success. Encrypted files end with a .hive suffix. The FBI stated that the Hive ransomware then drops a hive.bat script into the directory, which enforces an execution timeout delay of one second in order to perform clean-up after the encryption is finished by deleting the Hive executable and the hive.bat script. A second file, shadow.bat, is dropped into the directory to delete shadow copies, including disc backup copies or snapshots, without notifying the victim and then deletes the shadow.bat file. The ransom note, dropped into every impacted directory, warns that if encrypted files are modified, renamed, or deleted, they can't be recovered. Some victims told the FBI they had received follow-up phone calls from their attackers urging payment. A second tactic is to exfiltrate and publish stolen files on a public leak site. The FBI believes that the group, or affiliates associated with Hive, were responsible for the attack on Memorial Health System earlier this month, which disrupted IT systems at nearly all of its 64 clinics and three hospitals. According to researchers at Palo Alto Networks, Hive had breached 28 organizations listed on its leak site as of this week, including a European airline company.

    Infosecurity reports: "FBI Warns Businesses of New Hive Ransomware"

  • news

    Visible to the public "Researchers Demonstrate AI Can Be Fooled"

    Researchers at Purdue University have released a new study, which draws further attention to the possibility of tricking Artificial Intelligence (AI) systems used by image recognition tools, such as those implemented in connected cars to identify street signs. The researchers found that a low-cost, effective camera, a projector, and a PC could be used in an attack to trick such AI systems into making incorrect identifications. Their research paper describes the Optical Adversarial Attack (OPAD), which involves the projection of calculated patterns that alter how 3D objects appear to AI-based image recognition systems. In their experiment, they projected a pattern onto a stop sign, thus causing the image recognition to perceive the sign as a speed limit sign instead. This attack method could also work with image recognition tools used in various applications, from military drones to facial recognition systems. OPAD could be used to trick the image recognition systems in military Unmanned Aerial Vehicles (UAVs), weapons systems, and more. If nation-states were to launch such an attack on a large scale, the lives of millions of citizens could be put in danger. The researchers say OPAD shows that an optical system can be used to alter the appearance of faces or for long-range surveillance tasks. They added that OPAD demonstrates that it is feasible to attack real 3D objects without touching them (i.e., changing their appearance to cause AI systems to misidentify them). However, the feasibility of OPAD is limited by the 3D object's surface material and color saturation. The research and demonstration of OPAD could help inform the development of methods to defend against optical attacks. This article continues to discuss the techniques, potential impact, limitations, and mitigation of OPAD.

    Device Security reports "Researchers Demonstrate AI Can Be Fooled"

  • news

    Visible to the public "FIN8 Using an Updated Backdoor"

    The security firm Bitdefender conducted a forensic analysis of a new backdoor used by the financially motivated threat group FIN8 in recent attacks. FIN8 used the backdoor called Sardonic in attacks against two unidentified financial organizations. According to researchers, Sardonic is an updated version of the threat group's previous backdoor called Badhatch. The gang typically attacks point-of-sale (PoS) systems to steal payment card data. Bitdefender emphasizes that Sardonic differs from Badhatch in that it is significantly potent and has various capabilities, allowing the threat actors to use new malware without having to update components. Sardonic can be automatically enhanced with new functionality without having to re-deploy malware. This suggests that FIN8 is adopting a more agile approach to cyberattacks. FIN8 seems to have spent several months building and testing the new backdoor before employing it for its attacks. Sardonic is more flexible than Badhatch because it can deploy other payloads to the computer, which is already compromised, saving the group extra effort and time in re-infecting existing victims if it chooses to take a different approach. The Sardonic backdoor is also believed to be under development. Future versions are expected to give the group new capabilities. The actual way in which FIN8 gains initial access to its victims' networks remains undetermined, but some evidence has shown that the group may have used social engineering and spear-phishing attacks. In previously studied FIN8 attacks that occurred before the release of Sardonic, researchers saw compromised user accounts, with evidence of the compromise first appearing on one of the database servers. When the malware was on the network, the attackers performed network reconnaissance and used their access to recover a list of trusted domains and a list of domain controllers. Next, the attackers moved laterally by targeting domain controllers. The malware used the built-in Windows Management Interface Command utility for remote code execution. This article continues to discuss the reemergence of FIN8 with a dangerous new backdoor.

    BankInfoSecurity reports "FIN8 Using an Updated Backdoor"

  • news

    Visible to the public "Phishing Alert! XSS Vulnerability in UPS.com Distributes Malicious Invoice"

    Phishing remains one of the most common ways for cybercriminals to spread malware and steal personal information. A Cross-Site Scripting (XSS) vulnerability in UPS.com is being used by fraudsters to distribute fake United Parcel Service (UPS) Invoice Microsoft Word documents. The fake malicious UPS Invoice appears legitimate as it contains elements and links that are close to an actual invoice. However, the document itself does not perform any malicious action. The tracking number links to the UPS website containing the JavaScript XSS exploit. XSS attacks involve injecting client-side scripts into web pages viewed by other users. The exploitation of an XSS vulnerability could allow attackers to bypass access controls, such as the same-origin policy. This article continues to discuss the abuse of an XSS vulnerability in UPS.com to distribute a malicious invoice-like document.

    CISO MAG reports "Phishing Alert! XSS Vulnerability in UPS.com Distributes Malicious Invoice"

  • news

    Visible to the public "Hackers Exploit WhatsApp Modification Tool to Snoop on Texts, Force Paid Subscriptions"

    According to researchers at Kaspersky, hackers have inserted the Triada trojan into a modified version of FMWhatsapp, a WhatsApp mod. Such mods have a following among users who want to customize WhatsApp, such as being able to send larger files or apply custom animated themes. The Triada trojan can launch advertisements, issue paid subscriptions, and intercept text messages. FMWhatsapp isn't available on the Google Play store and is only available via third-party websites, which means users who desire the extra features the mod offers don't get the security protections inherent in more officially-vetted apps. Kaspersky first spotted Triada in 2016, when the company deemed the hacking tool "one of the most advanced mobile Trojans our malware analysts have ever encountered." The researchers stated that the users grant FMWhatsapp permission to read SMS messages, simultaneously granting the trojan access to text messages. The researchers noted that with this app, it is hard for users to recognize the potential threat because the mod application actually does what is proposed, it adds additional features. However, the researchers have observed how cybercriminals have started to spread malicious files through the ad blocks in such apps. The researchers stated that the case of FMWhatsapp and Triada is a lesson about how, in a drive to give users "improved" versions of a software, modders can introduce security holes. Foud Apps, the reported developer of FMWhatsapp, didn't respond to a message seeking comment about Kaspersky's research. Nor did Facebook, owner of WhatsApp. Among the malware that FMWhatsapp downloads is XHelper, a sticky kind of Android malware that's difficult to remove.

    CyberScoop reports: "Hackers Exploit WhatsApp Modification Tool to Snoop on Texts, Force Paid Subscriptions"

  • news

    Visible to the public "Revere Health Data Breach Impacts Cardiology Patients"

    The Personal Identifiable Information (PII) of approximately 12,000 cardiology patients has been exposed in a cyberattack on a healthcare provider based in Utah. Researchers found that patient data in the care of Revere Health was compromised when the organization fell victim to a phishing attack on June 21, 2021. An adversary impersonating the US Agency for International Development (USAID) sent an email to a Revere Health employee that contained a malicious link. When the employee clicked the link, they inadvertently gave the threat actor access to their login credentials. The adversary used the stolen credentials to log in to an employee email account that contained information belonging to patients of Revere Health's Heart of Dixie Cardiology Department in St. George, Utah. No credit card or payment information was among the data accessed by the adversary. Revere Health said that the compromised data was limited to patient names, dates of birth, medical record numbers, provider names, procedures, and information about appointments in a patient notification statement. Revere Health said that active monitoring by its IT security team detected the unauthorized activity quickly. Within 45 minutes of the attack's commencing, the team was able to sever unauthorized access to the compromised email account. An investigation into the incident led Revere Health to conclude that stealing patient data was not the assailant's primary intention. The security logs suggest that the attacker had three objectives: to spread phishing emails, gather active usernames and passwords, and attempt financial fraud against Revere Health.

    Infosecurity reports: "Revere Health Data Breach Impacts Cardiology Patients"

  • news

    Visible to the public Alexandre Bayen is a driving force behind mixed-autonomy traffic

    Coordinated automation could improve traffic flow, boost efficiency, and slash emissions. A combination of machine learning, big data, and Amazon Web Services is making this future possible.

    By Sean O'Neill | August 23, 2021

  • news

    Visible to the public Cybersecurity as a National Imperative

    RSA Conference Keynote, Anne Neuberger (Deputy National Security Advisor for Cyber and Emerging Technology), frames the Biden Administration’s approach to safeguarding U.S. cybersecurity and modernizing cybersecurity defenses to enable the United States to confront threats from sophisticated and persistent nation state threat actors and criminals.

  • news

    Visible to the public "HYCU Initiative Offers Free Evaluation for Ransomware Recovery Prospects"

    The data backup and recovery provider HYCU has announced a new free cloud application that can help organizations identify and measure their ability to recover if they are hit with a ransomware attack. The company's R-Score (ransomware score) evaluation service has been made available via GetRScore.org. R-Score comes from work by HYCU data protection and cybersecurity experts, as well as company partners. For an organization to get a preliminary R-Score and assess its data recovery readiness in the event of a ransomware attack, questions must be answered. The R-Score provided is generated within a range of 0 to 1,000. In addition to a score, the service recommends steps that a company can take to improve its score. According to HYCU founder and CEO Simon Taylor, user data or information used in generating the initial R-Score is not stored or captured in any form where a user can be identified. A free consultation is offered to users to get a better understanding of what they should do to improve their organization's overall R-Score. An organization's preparedness to repel and recover from a ransomware attack is assessed based on its backup process, backup infrastructure, security and networking, disaster recovery, and restore processes. This article continues to discuss the growing threat of ransomware and the new evaluation service aimed at helping organizations improve their ability to recover from ransomware attacks.

    ZDNet reports "HYCU Initiative Offers Free Evaluation for Ransomware Recovery Prospects"

  • news

    Visible to the public SoS Musings #52 - Passwords Are Still Here and in Need of Improvement

    SoS Musings #52 -

    Passwords Are Still Here and in Need of Improvement

  • news

    Visible to the public Cyber Scene #59 - Cyber Around the World

    Cyber Scene #59 -

    Cyber Around the World

  • news

    Visible to the public Cybersecurity Snapshots #21 - Do You Know Where Your QR Code Is Taking You?

    Cybersecurity Snapshots #21 -

    Do You Know Where Your QR Code Is Taking You?

  • news

    Visible to the public Spotlight on Lablet Research #21 - Principles of Secure BootStrapping for IoT

    Spotlight on Lablet Research #21 -

    Principles of Secure BootStrapping for IoT

  • news

    Visible to the public "Researchers Show How Censorship Systems Can Be Abused for DDoS Amplification"

    Researchers have identified a new Distributed Denial-of-Service (DDoS) attack vector over TCP that allows for reflected amplification at significantly high levels, previously unseen. Misconfigured network middleboxes and censorship systems, including devices that enable infinite amplification, are used in the HTTP-based reflected amplification attack. Researchers from the University of Maryland and the University of Colorado Boulder say these attacks can result in more amplification than existing UDP-based attacks. Their results have shown that censorship infrastructure poses a more significant threat to the broader Internet than previously understood. The technique identified by the researchers also allows firewalls and intrusion prevention systems that have been deployed within non-censoring nation-states to be weaponized. This new technique uses TCP despite the three-way handshake that protects TCP applications from being used as amplifiers. According to the researchers, TCP is used in the technique because there are network middleboxes that do not conform to the TCP standard, presenting an opportunity for abuse. They found many censorship middleboxes that would respond to censored requests with large block pages even though there is no valid TCP connection or handshake. Therefore, these devices can be weaponized and abused for DDoS amplification. The team discovered normal TCP reflection, middlebox reflection, combined destination and middlebox reflection, victim-sustained reflection, and other types of attacks. They also found that routing loops and victim-sustained reflection caused infinite amplification. This article continues to discuss the potential abuse of censorship systems for DDoS amplification.

    Security Week reports "Researchers Show How Censorship Systems Can Be Abused for DDoS Amplification"

  • news

    Visible to the public "Data Leak Exposes Tens of Millions of Private Records From Corporations And Government Agencies"

    According to researchers at UpGuard, dozens of major companies, state and federal agencies, and other organizations that misconfigured a setting in their Microsoft software inadvertently exposed millions of people's personal information to the public internet for months. The data leak, which affected American Airlines, Maryland's health department, and New York's Metropolitan Transportation Authority, among others, led to the exposure of at least 38 million records, including employee information as well as data related to Covid-19 vaccinations, contact tracing, and testing appointments. After UpGuard privately notified Microsoft and the affected organizations, the leaks were plugged, and the ability to access the information was removed. While the information was unsecured, names, Social Security numbers, phone numbers, dates of birth, demographic information, addresses, and even dates of employer drug tests and union membership data were available to anyone with the know-how and inclination to look, stated the researchers. In the case of Ford Motor Co., UpGuard said, lists of loaner vehicles distributed to dealerships had also been exposed.

    CNN reports: "Data Leak Exposes Tens of Millions of Private Records From Corporations And Government Agencies"

  • news

    Visible to the public "Cybercrime Losses Triple to £1.3bn in 1H 2021"

    Researchers at Outpost24 analyzed data that comes from the National Fraud Intelligence Bureau (NFIB). The NFIB collects cybercrime and fraud reports from Action Fraud, the UK's national reporting center for such crimes. The researchers found that individuals and organizations lost three times more money to cybercrime and fraud in the first half of the year compared to the same period in 2020. The researchers revealed that between January 1 and July 31 2020, victims lost PS414.7m to cybercrime and fraud. However, the figure surged to PS1.3bn for the same period in 2021. In the first half of 2020, there were just 39,160 reported to Action Fraud, versus 289,437 in the first six months of 2021. In both periods, individuals comprised the vast majority of cases and the majority of losses. However, organizations lost 6.6 times more money in the first half of 2021 compared to 1H 2020, while individual victims lost 2.6 times more during the period. Experts are urging that the government should do more to educate individuals about the dangers of phishing and the importance of cybersecurity best practices and argued that organizations should be more proactive in mitigating home working risks.

    Infosecurity reports: "Cybercrime Losses Triple to PS1.3bn in 1H 2021"