News Items

  • news

    Visible to the public "Fundamental Flaw in RNGs Affects Many IoT Devices"

    According to researchers Allan Cecil and Dan Petro from Bishop Fox, most modern Internet of Things (IoT) devices have flawed hardware-based Random Number Generators (RNGs). These RNGs have a fundamental flaw that weakens the security of the encryption keys that they generate for communications. The RNGs do not truly produce random numbers. This is a serious problem, given that the whole purpose of the RNG is to generate random numbers, which are then used as seeds for encryption keys. The vulnerability is not limited to a group of vendors or specific IoT operating systems. The researchers stress that it is a widespread problem, and there is currently no simple way to address it. The problem stems from the fact that the hardware RNGs in IoT devices give errors relatively often, and the software normally does not check those error codes. A contributing factor to this problem is that, by design, IoT devices are generally fairly bare-bones regarding software. Therefore, they do not have the safety net of an Operating System (OS) to help deal with serious errors. One of the researchers pointed out that we are just running C or C++ on bare metal, and the return error codes on the RNG are not checked. The researchers call on designers of IoT operating systems to implement a cryptographically secure RNG (CSPRNG) in their OS, which is said to be the most straightforward and effective way to address the weakness in the RNGs on IoT devices. Unlike RNGs, CSPRNGs are not hardware-based and are designed to be attack-resistant. CSPRNGs also do not have the failure states that RNGs do. The CSPRNG subsystem can immediately generate an endless sequence of strong random numbers, which addresses the problem of HAL functions that either block program execution or fail. Cecil and Petro say the problem is not the result of errors made by various developers who write software for IoT devices, as it is a systemic issue with the way in which RNGs function. This article continues to discuss the critical RNG flaw affecting billions of IoT devices and the most effective way suggested by Bishop Fox researchers to address the weakness.

    Decipher reports "Fundamental Flaw in RNGs Affects Many IoT Devices"

  • news

    Visible to the public "New 'Glowworm Attack' Recovers Audio From Devices' Power LEDs"

    Researchers at the Ben-Gurion University of the Negev have demonstrated a method for spying on electronic conversations. They released a new paper outlining a novel passive form of the TEMPEST attack called Glowworm. The Glowworm attack transforms minute fluctuations in the intensity of power LEDs on speakers and USB hubs back into the audio signals that created those fluctuations. The Cyber@BGU team analyzed various widely used consumer devices, including smart speakers, PC speakers, and USB hubs. They found that the devices' power indicator LEDs were commonly influenced perceptibly by audio signals fed via the attached speakers. The fluctuations in LED signal strength generally are not perceptible to the naked eye, but they are strong enough to be read with a photodiode coupled to an optical telescope. The power LED output's slight flickering, stemming from changes in voltage as the speakers consume electrical current, are transformed into an electrical signal by the photodiode. The electrical signal can then be passed through a simple Analog/Digital Converter (ADC) and played back directly. The idea is that a device's solidly lit LEDs will leak information regarding what it is doing. Novelty and passivity are the Glowworm attack's strongest features. As the method does not require active signaling, it would be immune to any electronic countermeasure sweep. This attack also does not require unexpected signal leakage or intrusion even while it is in active use. However, Glowworm does not interact with actual audio, only with a side effect of electronic devices that generate audio. A Glowworm attack, used to spy on a conference call, would not capture the audio of those present in the room. It would only capture the audio of remote participants whose voices are played via the conference room audio system. This article continues to discuss the new Glowworm attack that converts LED output into intelligible audio.

    Ars Technica reports "New 'Glowworm Attack' Recovers Audio From Devices' Power LEDs"

  • news

    Visible to the public "1M Stolen Credit Cards Hit Dark Web for Free"

    Researchers have discovered that threat actors have leaked 1 million stolen credit cards for free online as a way to promote a relatively new and increasingly popular cybercriminal site dedicated to selling payment card credentials. The cards were published on an underground card selling market called AllWorld.Cards and were stolen between 2018 and 2019, according to info posted on the forum. The leaked credit cards include the following fields: credit card number, expiration date, CVV, name, country, state, city, address, ZIP code, email, and phone number, according to threat actors. The researchers stated that AllWorld.Cards appears to be a relatively new player to the market for selling stolen credit card data on the Dark Web. The researcher's analysis suggests that this market has been around since May 2021. The curators of AllWorld.Cards began flogging their cybercriminal services on carding sites in early June to drum up new business. There is some uncertainty about how many of the cards are actually still active and available for cybercriminals to use. Cyble researchers noted that threat actors claimed that 27 percent, according to a random sampling of 98 cards, are still active and can be used for illegal purchasing. However, according to the researcher's own analysis, which involved sending the credit card numbers to client banks "to carry out the appropriate mitigation actions," the researchers found that closer to 50 percent of the cards are "still operational, not yet identified as compromised." Of the banks, 72,937 of the cards were associated with the State Bank of India, 38,010 with Banco Santander (Brazil), 30480 with a U.S. bank based in Ohio called Sutton Bank, 27,441 with JP Morgan Chase Bank, and 24,307 with BBVA Bancomer S.A. a bank based in Mexico. In the last six months of 2020 alone, threat actors offered more than 45 million compromised cards for sale in underground credit card markets monitored by security firm Cybersixgill.

    Threatpost reports: "1M Stolen Credit Cards Hit Dark Web for Free"

  • news

    Visible to the public "Engineer at Sandia Labs Turns Error Detection into 'Secret Language' for Data Security"

    Celestino Corral, an electrical engineer at Sandia National Laboratories (SNL), developed a method that uses error-checking computer code to improve the security of digital content, such as email and social media messaging. Corral started working on error detection in digital code in 2018. Error detection is applied in every electronic message sent between people, embedded in the code for that transmission. He says that even the most robust form of error checking has limitations. If someone is listening in on data, different error-detection methods can be used for each piece of content. The listener will have to take more time to figure out each way in which the error detection is used. Intentional or artificial errors can also be introduced into the message that results in the same code. Eavesdroppers will not know about them and will be unable to read the message without fixing those errors. According to Corral, the manipulation of error detection is a known practice, but it has not been applied in this way to enhance obfuscation and prevent others from reading and using data. Corral emphasizes that the method is not encryption, but it can be used to prevent unauthorized persons from learning anything valuable from online data. This article continues to discuss the method invented to use error detection for data security.

    SNL reports "Engineer at Sandia Labs Turns Error Detection into 'Secret Language' for Data Security"

  • news

    Visible to the public "Salesforce Communities Could Expose Business-Sensitive Information"

    Researchers at Varonis have found that numerous publicly accessible Salesforce communities are misconfigured and could expose sensitive information. A Salesforce Community site lets customers and partners interface with a Salesforce instance from outside an organization. According to the researchers, anonymous users can "query objects that contain sensitive information such as customer lists, support cases, and employee email addresses." The researchers stated that malicious actors could exploit this misconfiguration to perform recon for a spear-phishing campaign. Some adversaries could also use the misconfigurations to steal sensitive information about the business, its operations, clients, and partners. The researchers stated that in some cases, a sophisticated attacker might be able to move laterally and retrieve information from other services that are integrated with the Salesforce account. The researchers stated that Salesforce admins can take the following steps to protect themselves from attackers: ensure guest profile permissions don't expose things that shouldn't be exposed, disable API access for guest profiles, set the default owner for records created by guest users, and enable secure guest user access.

    Infosecurity reports: "Salesforce Communities Could Expose Business-Sensitive Information"

  • news

    Visible to the public "Do You Hear What I Hear? A Cyberattack."

    Cybersecurity analysts work with a significantly large amount of data, especially in the performance of activities such as monitoring network traffic. Yang Cai, a senior systems scientist at CyLab, stresses that important patterns often get buried by a lot of trivial or normal patterns. For years, Cai has been working to develop ways to make it easier to spot abnormalities in network traffic. A few years ago, Cai and his research group developed a data visualization tool that can allow network traffic patterns to be seen. Now, he has developed a way to hear network traffic patterns. Cai and two co-authors demonstrated how cybersecurity data can be heard in the form of music in a new study recently presented at the Conference on Applied Human Factors and Ergonomics. They showed a change in music when there is a change in the network traffic. Cai said they wanted to articulate normal and abnormal patterns through music. Although the process of sonification in which audio is used to perceptualize data is not a new concept, sonification to make data more appealing to the human ear is new. The researchers experimented with various sound mapping algorithms to transform numeral datasets into music with different melodies, harmonies, time signatures, and tempos. They made music using network traffic data from a real malware distribution network and presented it to non-musicians. The non-musicians were found to be able to accurately recognize changes in pitch when played on different instruments. An individual is not required to be a trained musician to hear changes in the music. In the future, Cai's vision is that an analyst will be able to explore cybersecurity data using virtual reality goggles presenting the visualization of the network space. As the analyst moves closer to a data point or cluster of data, music representing that data would become more audible. This article continues to discuss the new study on the transformation of cybersecurity data into music to make abnormalities easier to detect.

    CyLab reports "Do You Hear What I Hear? A Cyberattack."

  • news

    Visible to the public "Hackers Build a Better Timing Attack to Crack Encryption Keys"

    Mathy Vanhoef, a postdoctoral researcher at New York University Abu Dhabi, along with Tom Van Goethem of KU Leuven's imec-DistriNet research group, have developed a new type of timing attack that can crack encryption more efficiently. Timing attacks are a form of encryption cracking that is based on how CPUs process encoded data. An adversary could decode a victim's private encryption key by measuring the time it takes for a CPU to complete specific tasks. Timing attacks have been proven effective in theory, but they have been found to be difficult to perform in practice beyond local ethernet connections. The further away an attacker is from the victim, the harder it is for them to properly analyze timing due to latency and network traffic jitter. In order to overcome these limitations, Vanhoef and Van Goethem discarded the practice of timing CPU processing and instead analyzed the speed of packet arrival. Since modern servers and networks use concurrency, which is the processing of multiple packets simultaneously, the arrival of packets can replace the timing of processing tasks. Instead of trying to measure CPU timing, they decided to send the target a pair of packets. The packets were processed concurrently and returned to the source, and the timing of their return was then measured. This allowed the researchers to measure timing without worrying about distortion from network jitter, because they were both constrained to the same conditions. The timing was then measured and analyzed over multiple attempts to work out secret encryption keys. This article continues to discuss the demonstration and efficiency of the new technique for cracking encryption keys that can overcome the limitations of popular timing attacks.

    SearchSecurity reports "Hackers Build a Better Timing Attack to Crack Encryption Keys"

  • news

    Visible to the public "CISA Releases New Training Guide for Government Cyber Workforce"

    The U.S. Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) has released a new training guide, titled the Cybersecurity Workforce Training Guide. This guide is intended to help IT professionals within the Federal and state, local, tribal, and territorial cybersecurity communities advance their careers. Eric Goldstein, executive assistant director for cybersecurity at CISA, emphasizes that the cybersecurity workforce is on the front lines of our nation's security, thus making it important to provide tools to those in this workforce to help them find available training that can help them be more prepared and skilled at defending against cyberattacks. The comprehensive guide, which includes more than 200 pages, will help cybersecurity professionals understand work roles and tasks, as well as the skills, knowledge, and abilities that are essential to having a successful career. The guide includes information on training and professional development opportunities that will help build skills. It also gives a walkthrough of the National Institute of Standards and Technology's National Initiative for Cybersecurity Education Workforce Framework for Cybersecurity (NICE Framework) and provides a potential career path. This article continues to discuss the goals and content of CISA's newly released Cybersecurity Workforce Training Guide.

    MeriTalk reports "CISA Releases New Training Guide for Government Cyber Workforce"

  • news

    Visible to the public "May 2021 Saw a 440% Increase in Phishing, The Single Largest Phishing Spike on Record"

    Researchers at Webroot Brightcloud published some of their findings in their mid-year threat report recently. The researchers found that around half of businesses (45.49%) and consumers (52.35%), on average, saw at least one sustained additional infection in May 2021. In May 2021, there was a 440% increase in phishing, holding the record for the single largest phishing spike in a single month. Big brands continued to suffer from cyber extortion and ransomware in the 1st half of 2021. PayPal accounted for 1% of the top 200 phished brands but saw a 1,834% spike in May. The researchers also found that phishing attacks are increasingly targeting crypto exchanges and wallets. Observations by Webroot found that there was a 75% increase in Coinbase phishing pages using HTTPS immediately after Coinbase's IPO. Researchers also found that technology supply chains were under attack in the 1st half of 2021. The management of companies and the enterprise industry showed a significant increase in malware infections, 57%, versus the global average.

    Infosecurity reports: "May 2021 Saw a 440% Increase in Phishing, The Single Largest Phishing Spike on Record"

  • news

    Visible to the public "Average Ransomware Demands Surge by 518% in 2021"

    The Unit 42 security consulting group released new results found during their research that show that the average ransomware demands surged by 518% in the first half of 2021 compared to 2020, while payments climbed by 82% in the same period. The researchers revealed that the average demand from ransomware gangs in H1 2021 was $50m, representing a massive increase from $847,000 in 2020. They noted that the highest demand made of a single victim so far in 2021 was $50m, compared to $30m last year. In addition, the average ransomware payment this year was a record $570,000, which compares to $312,000 last year. The researchers also found that the average payment in 2020 was 171% higher than in 2019, further highlighting how lucrative the use of ransomware has become during the past 18 months. According to the researchers, the main factor in these increases was the use of new extortion approaches. This included the rise of "quadruple extortion," in which four extortion methods are used against a single victim: encryption, data theft, denial of service (DoS), and harassment. The Unit 42 team also stated that they expect the ransomware crisis to worsen over the coming months and have observed threat actors "develop new approaches for making attacks more disruptive." This includes encrypting hypervisors, which can corrupt multiple virtual instances running on a single server. The researchers also predict that managed service providers will be increasingly targeted in the wake of the recent high-profile Kaseya attack.

    Infosecurity reports: "Average Ransomware Demands Surge by 518% in 2021"

  • news

    Visible to the public Three random words beat out jumble of letters and numbers for secure passwords

    The UK National Security Centre recommends using three random words as passwords because they are easy to remember and are often stronger that the combinations of letters and numbers that people are led to create. Their research found that hacking software targeted predictable strategies meant to make passwords more complex. Example of substituting the letter O with a zero or the number one with an exclamation mark. For best results, use three random words—not related or predictable words.
  • news

    Visible to the public "Post-Quantum Chip Has Built-in Hardware Trojan"

    A team of researchers working with Georg Sigl, Professor of Security in Information Technology at the Technical University of Munich (TUM), has designed and commissioned the production of a computer chip that efficiently implements post-quantum cryptography. This type of chip is expected to protect against future hacker attacks in which quantum computers are used. The team also included hardware trojans in the chip to explore methods for detecting such malware from the chip factory. Professor Sigl and his team took a hardware/software co-design approach where specialized components and the control software complement one another. According to Professor Sigl, their chip is the first to be based entirely on the hardware/software co-design approach for post-quantum cryptography. The chip is said to be ten times as fast when encrypting with Kyber (one of the most promising candidates for post-quantum cryptography) compared to chips based only on software solutions. It also uses significantly less energy and is flexible. Hardware trojans pose another potential threat as the successful planting of trojan circuitry in the design of a chip before or during the manufacturing stage could have destructive consequences. Such trojans can lead to the shutdown of entire factories or the theft of production secrets. Trojans built into the hardware can also circumvent post-quantum cryptography. To further explore hardware trojans and develop protective measures against them, the team developed and installed four different hardware trojans in their post-quantum chip. In the coming months, Professor Sigl and his team will test the chip's cryptography capabilities and functionality, as well as the detectability of the hardware trojans. This article continues to discuss the development, capabilities, and testing of the post-quantum chip and the detection of hardware trojans.

    eeNews Europe reports "Post-Quantum Chip Has Built-in Hardware Trojan"

  • news

    Visible to the public "Analysis of ICS Exploits Can Help Defenders Prioritize Vulnerability Remediation"

    The Industrial cybersecurity firm Dragos released results from its analysis of exploits targeting vulnerabilities contained by industrial control systems (ICS) and operational technology (OT) systems. Dragos has tracked over 3,000 ICS and OT vulnerabilities over the past decade. According to Dragos, the number of vulnerabilities disclosed in 2020 was less than the number disclosed in the two previous years. In addition to tracking the disclosure of the vulnerabilities, the company looked at the public availability of associated exploits that make it easier for less-skilled threat actors to abuse security holes. Dragos found that only 8 percent of the vulnerabilities disclosed in 2020 have public exploits, possibly because Trend Micro's Zero Day Initiative (ZDI) acquired many ICS vulnerabilities, and ZDI can prevent researchers from making their proof-of-concept (PoC) exploits public. Almost 600 public ICS exploits are known to target the products of more than 110 vendors. Seven major vendors account for about 40 percent of all published exploits, including Advantech, Moxa, Microsoft, Siemens, Rockwell Automation and its Allen-Bradley brand, and Schneider Electric. Many of the public ICS exploits target devices at the site operations level, which could provide an initial access point into the industrial network. There are hundreds of publicly available exploits that a malicious actor can use when they reach the industrial network, which consists of field, control, and supervisory devices. Remote code execution is the most likely impact for most levels of access. However, denial-of-service (DoS) takes the lead in cases where there are exploits targeting control devices. This article continues to discuss the key findings from Dragos' analysis of ICS exploits and recommendations for defenders looking to prioritize ICS vulnerability remediation.

    Security Week reports "Analysis of ICS Exploits Can Help Defenders Prioritize Vulnerability Remediation"

  • news

    Visible to the public "Amazon Kindle Security Flaws Could Have Let Hackers Hijack Your Device"

    Security researchers at Check Point Research (CPR) found security flaws in Amazon Kindle, which were patched by the e-commerce giant in a recent Kindle firmware update. The exploitation of the security flaws could have allowed an attacker to obtain information stored on a user's Kindle device. According to the researchers, an attacker would need to send a malicious e-book to a victim in order to exploit the flaws in the e-reader. When the malicious e-book is delivered to the user's device, and the victim opens it, the exploit chain begins. No other interaction from the user is required. The researchers demonstrated the use of an e-book as malware on an Amazon Kindle that could allow an attacker to delete a user's e-book library or turn their device into a malicious bot. By converting the device into a malicious bot, attackers could target other devices on a user's local network. An attacker could also steal a Kindle's Amazon device token or other sensitive information on a user's e-reader through the exploitation of the security flaws. This article continues to discuss the potential exploitation and impact of security vulnerabilities found in Amazon Kindle.

    TechRadar reports "Amazon Kindle Security Flaws Could Have Let Hackers Hijack Your Device"

  • news

    Visible to the public "Apple to Scan iPhones For Child Sex Abuse Images"

    In new versions of iOS and iPadOS coming this year, before an image is stored onto iCloud Photos, the technology will search for matches of already known Child Sexual Abuse Material (CSAM). Apple stated that if a match is found, a human reviewer will then assess and report the user to law enforcement. The system works by comparing pictures to a database of known child sexual abuse images compiled by the US National Center for Missing and Exploited Children (NCMEC) and other child safety organizations. Those images are translated into "hashes", numerical codes that can be "matched" to an image on an Apple device. Apple stated the technology will also catch edited but similar versions of original images. The company claimed the system had an extremely high level of accuracy and ensures less than a one in one trillion chance per year of incorrectly flagging a given account. The company says that the new technology offers "significant" privacy benefits over existing techniques, as Apple only learns about users' photos if they have a collection of known CSAM in their iCloud Photos account. However, some privacy experts have voiced concerns that the technology could be expanded to scan phones for prohibited content or even political speech. Experts also worry that authoritarian governments could use the technology to spy on their citizens.

    BBC reports: "Apple to Scan iPhones For Child Sex Abuse Images"

  • news

    Visible to the public "Data Breach at University of Kentucky"

    During an annual cybersecurity inspection, researchers have discovered that a data breach has occurred at the University of Kentucky that has exposed the personal information of hundreds of thousands of students and staff. More than 355,000 email addresses were exposed in the security incident, with victims located across the world. The University of Kentucky stated that the database is part of a free resource program known as the Digital Driver's License for training and test-taking used by K-12 schools and colleges in Kentucky and other states. The academic institution noted that the names and email addresses included in the database were not limited to students and teachers based in Kentucky. The university revealed that the database also included personal information belonging to students and teachers in all 50 states and 22 foreign countries. The university stated that the database did not contain financial, health, or Social Security information, limiting the potential of identity theft of any kind. University officials have notified the school districts impacted by the data breach and informed the appropriate legal and regulatory authorities.

    Infosecurity reports: "Data Breach at University of Kentucky"

  • news

    Visible to the public "Telegram for Mac Bug Lets You Save Self-Destructing Messages Forever"

    Reegun Richard Jayapaul, Trustwave SpiderLabs' Lead Threat Architect, discovered new vulnerabilities that could allow users on Telegram for Mac to save specific self-destructing messages and attachments forever or view them without the sender knowing. When media files, other than attachments, are sent in a message, they are saved to a cache folder. Telegram will not download documents such as text, Doc, or PDF files, and audio and video until a recipient tries to open them, probably because of the larger size of attachments. When a recipient views the content, the self-destruct timer will begin, then when it is finished, the content will be deleted automatically. However, Reegun found that the self-destructing media was not deleted from the cache folder, thus allowing a user to save it to another location on their hard drive. Telegram fixed this bug for macOS in version 7.7 (215786) or later, but an additional bug has been discovered that allows self-destructible media to be saved. As voice recordings, video messages, images, and more are automatically downloaded to the cache, Reegun found that a user could copy the media from the cache folder before viewing it in the program. This article continues to discuss the Telegram for Mac flaw that allows self-destructing messages to be saved forever, Telegram's response to this new discovery, and a similar vulnerability found earlier this year.

    Bleeping Computer reports "Telegram for Mac Bug Lets You Save Self-Destructing Messages Forever"

  • news

    Visible to the public "Water Utilities Ill-Prepared to Deal with Cyber Threats"

    The cyberattack on a water treatment facility in Oldsmar, Florida, in which a malicious actor compromised a control system and attempted to taint the municipal water supply, drew further attention to the importance of improving cybersecurity for water utilities. The cybersecurity firm ThreatLocker recently released a report on the unique challenges faced by water companies in trying to strengthen their cybersecurity posture. One of the biggest issues faced by water utilities is the way in which they are structured and funded. Cybersecurity budgets for water utilities have been found to be significantly low. Regarding IT and OT cybersecurity budget allocation, 38 percent of systems allocate less than 1 percent of the budget to IT cybersecurity, and 44.8 percent of systems allocate less than 1 percent of the budget to OT cybersecurity. ThreatLocker CEO Danny Jenkins points out that the lack of investment in cybersecurity at the municipal level raises concern, given the criticality of water resources. In addition to securing IT assets, water utilities must think about the physical systems that are responsible for cleaning and delivering drinking water. Jenkins encourages water companies to implement controls wherever possible to strengthen their cyber defenses in the short term. It is recommended that water companies implement controls to block untrusted software and ensure local administrators enforce restrictions around users. This article continues to discuss the details from ThreatLocker's report on the challenges that water companies face in trying to improve their cybersecurity posture, as well as how these companies can bolster their cyber defenses.

    SIW reports "Water Utilities Ill-Prepared to Deal with Cyber Threats"

  • news

    Visible to the public "Over 60 Million Americans Exposed Through Misconfigured Database"

    Security researchers at vpnMentor have discovered an online Elasticsearch database completely unsecured and exposed to the public internet, containing the personal details of at least 63 million Americans. The researchers were able to trace the trove back to OneMoreLead, a B2B sales and marketing company that claims on its unfinished website to have a database of "40+ million 100% verified B2B prospects to search from." The database itself contained around 126 million records. The researchers stated that depending on the number of duplicates in there, the number of affected individuals could be anywhere between 63 million and 126 million. Personally identifiable information (PII) featured in the database included full names, job titles, personal email and home addresses, work email and office addresses, personal and work phone numbers, home IP addresses, and employer names. The researchers also found that many of the emails had .gov suffixes, or indicated the individual as working for the New York Police Department. The researchers stated that private data from members of the government and police are a goldmine for criminal hackers. There are also question marks over where the information came from. The researchers stated that the company is new, with no known clients and an unfinished website, which makes it unlikely they collected data from 126 million people since opening in 2020 unless the people behind OneMoreLead were working on a similar business previously. The researchers also stated that the exposed data bears an uncanny resemblance to a leak originally connected to German B2B marketing company Leadhunter in 2020. Leadhunter denied responsibility for the leak at the time, and researchers couldn't confirm a link. The researchers informed OneMoreLead, and apparently, they secured the database the day after they were informed.

    Infosecurity reports: "Over 60 Million Americans Exposed Through Misconfigured Database"

  • news

    Visible to the public "Attackers Get Cannier; Found Targeting Non-C-Suite Employees via Spear Phishing"

    The cloud-enabled security solutions provider, Barracuda, released a new report on spear-phishing attacks. According to the report, an average organization faces more than 700 social engineering attacks each year, with 1 in 10 of these attacks being a Business Email Compromise (BEC) attack. Over 70 percent of BEC attacks target employees outside of financial and executive roles. A CEO will attract an average of 57 targeted phishing attackers per year. Cybercriminals are increasingly targeting employees outside of the C-Suite to get in the door and work their way up to higher-value targets, thus making it essential to provide protection and training for employees at all levels. Best practices for protecting against spear-phishing attacks include deploying account-takeover protection, maximizing data-loss prevention, implementing Domain-based Message Authentication, Reporting, and Conformance (DMARC), training employees to recognize attacks, and more. This article continues to discuss key findings from Barracuda's "Spear Phishing: Top Threats and Trends Vol.6" report.

    CISO MAG reports "Attackers Get Cannier; Found Targeting Non-C-Suite Employees via Spear Phishing"

  • news

    Visible to the public "Decade-Old Router Bug Could Affect Millions of Devices"

    Security researchers have discovered a 12-year-old router vulnerability that they have warned may affect millions of devices globally. Evan Grant, a researcher at Tenable, initially found the authentication bypass vulnerability in devices from manufacturer Buffalo. However, during the disclosure process, he discovered that the bug actually existed in the underlying firmware from Taiwanese firm Arcadyan. All of the tested devices shared at least one vulnerability: the path traversal, which allows an attacker to bypass authentication, now assigned as CVE-2021-20090. The researchers stated that this flaw appears to be shared by almost every Arcadyan-manufactured router/modem, including devices that were originally sold as far back as 2008. The issue may affect millions of devices manufactured by 17 different vendors, used in at least 11 countries, including Australia, Germany, Japan, Mexico, New Zealand, and the US. The vulnerability in question has a CVSS score of 8.1, making it high severity. If exploited, it could allow an unauthenticated, remote attacker to bypass authentication. Grant also found two other bugs in Buffalo routers an improper access control flaw CVE-2021-20092 and a configuration file injection vulnerability CVE-2001-20091.

    Infosecurity reports: "Decade-Old Router Bug Could Affect Millions of Devices"

  • news

    Visible to the public "Security Researchers Warn of TCP/IP Stack Flaws in Operational Technology Devices"

    Cybersecurity researchers at Forescout Research Labs and JFrog Security Research have disclosed a set of 14 security vulnerabilities dubbed INFRA:HALT. These vulnerabilities were discovered in TCP/IP stacks commonly used in industrial infrastructure. The researchers warn that the flaws could enable remote code execution as well as lead to denial-of-service attacks and information leaks. The vulnerabilities impact the NicheStack TCP/IP stack found in operational technology (OT) systems used in critical infrastructure. Some of the vulnerabilities are over 20 years old. According to Forescout, the vulnerabilities are related to malformed packet processes, which can allow attackers to send instructions to read or write on parts of the memory. This could lead to a device crash, network disruption, and device takeover. The TCP/IP stack flaws impact all versions of NicheStack before version 4.3, including NicheLite. The full extent of vulnerable OT devices is unknown. However, the researchers were able to identify more than 6,400 vulnerable devices by using the Internet of Things search engine Shodan. The vulnerabilities have been disclosed to HCC Embedded, which acquired NicheStack in 2016. Forescout and JFrog Security Research also contacted Coordination agencies, including the CERT Coordination Center, BSI (the German Federal Cyber Security Authority), and the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), about the vulnerabilities. Forescout released an open-source script to detect devices running NicheStack and to help protect them. This article continues to discuss the discovery, disclosure, source, potential exploitation, and impact of the INFRA:HALT security vulnerabilities, along with recommendations for protecting OT from cyberattacks.

    ZDNet reports "Security Researchers Warn of TCP/IP Stack Flaws in Operational Technology Devices"

  • news

    Visible to the public "REvil Most Popular Ransomware Variant in 2021 (So Far)"

    According to a midyear update from the Accenture Cyber Investigations, Forensics, and Response (CFIR) team, the volume of global cyberattack activity increased by 125 percent in the first half of 2021 compared to the same time frame in 2020. The team's data comes from aiding clients in cyberattack recovery and response. The increase in global cyberattack activity stems primarily from Web shell activity, targeted ransomware operations, and supply chain attacks. Ransomware accounted for the most attacks, followed by backdoors, credential stealers, and droppers and launchers. REvil/Sodinokibi was found to be the most common ransomware variant, taking up 25 percent of attacks, followed by Hades, DoppelPaymer, Ryuk, and Egregor. This article continues to discuss key findings shared by the Accenture CFIR team's midyear update regarding the most prevalent types of malware, the most common ransomware variants, the top five most targeted industries, and the countries most targeted in cyberattacks.

    Dark Reading reports "REvil Most Popular Ransomware Variant in 2021 (So Far)"

  • news

    Visible to the public "Chipotle Emails Serve Up Phishing Lures"

    Researchers at Inky have found that a breach of Chipotle's email marketing service last month lead to customers being served phishing lures and malicious links that redirected to credential harvesting sites. Chipotle's email vendor Mailgun was breached, allowing threat actors to commandeer the company's email marketing efforts. The researchers found that 121 phishing emails were sent from the compromised Chipotle Mailgun account between July 13th and July 16th. Those attacks included two vishing attacks (using malicious voicemail message attachments), 14 impersonated USAA bank to harvest financial data, and the remaining 105 emails attempted to redirect users to a spoofed Microsoft site that attempted to steal credentials. The researchers stated that the attacks leveraging Chipotle's breached Mailgun account are similar to Nobelium's attack on an email marketing service in May 2021. The researchers noted that they have no evidence to suggest the same actors are involved in these attacks and that it appears the adversaries are just copying the successful attack vector used by Nobelium. Inky is still investigating the attacks.

    Threatpost reports: "Chipotle Emails Serve Up Phishing Lures"

  • news

    Visible to the public "DHS Partners with Girl Scouts of the USA to Launch the 2021 Girl Scout Cyber Awareness Challenge"

    The U.S. Department of Homeland Security and Girl Scouts of the USA (GSUSA) has launched the 2021 Girl Scout Cyber Awareness Challenge. This new initiative will encourage girls across the U.S. to learn about cybersecurity and raise awareness within their communities, especially surrounding ransomware. The goal of the 2021 Girl Scout Cyber Awareness Challenge is to help diversify and increase the number of skilled cyber professionals in the cybersecurity workforce in order to strengthen our Nation's cybersecurity resilience. The Challenge will provide opportunities to girls in grades 6-12 to learn more about the cybersecurity field, practice key concepts, and demonstrate the skills they learn during the program. Participants will be encouraged to publish an article about ransomware at the end of the Challenge to increase cybersecurity awareness in their communities. Those who complete the Challenge will receive a certificate of achievement as well as an invitation to attend a capstone virtual event hosted by DHS during Cybersecurity Awareness Month in October. This article continues to discuss the development, goals, and structure of the 2021 Girl Scout Cyber Awareness Challenge.

    HSToday reports "DHS Partners with Girl Scouts of the USA to Launch the 2021 Girl Scout Cyber Awareness Challenge"

  • news

    Visible to the public "Ransomware Volumes Hit Record Highs as 2021 Wears On"

    Researchers at SonicWall found that the second quarter of this year saw the highest volumes of ransomware attacks ever. Ransomware has seen a significant uptick so far in 2021. The FBI has warned that there are now 100 different ransomware strains circulating around the world. The researchers stated that the ransomware scourge hit a staggering 304.7 million attempted attacks within SonicWall Capture Labs' telemetry. To put that in perspective, the firm logged 304.6 million ransomware attempts for the entirety of 2020. The top three ransomware strains seen in the wild by the firm are Ryuk, Cerber, and SamSam. The researchers recorded 93.9 million instances of Ryuk in the first half of 2021, a number that is triple the number of Ryuk attempts seen in the first six months of 2020. Researchers also saw Cerber used in 52.5 million recorded hits in the first half of 2021. Researchers said that Cerber is definitely on the rise and found that the number of attacks nearly quadrupled in April, and by May, it had risen to nearly five times the levels seen in January. There were also 49.7 million recorded instances of SamSam in SonicWall's numbers for the first half of 2021, which is more than double the volume seen during the entire year of 2020. The researchers stated that June alone saw 15.7 million hits, which is more than two-thirds of the 23.5 million SamSam hits seen for all of last year.

    Threatpost reports: "Ransomware Volumes Hit Record Highs as 2021 Wears On"

  • news

    Visible to the public "Phishing Campaign Uses Live Chat, Leverages PayPal Brand"

    The PayPal brand is being leveraged in a new phishing scam. The attackers behind the scam are compromising devices and bypassing secure email gateways by using automated scripts and live chat. These unusual techniques emphasize the need for organizations to strengthen defenses against these types of attacks. Researchers at the Cofense Phishing Defense Center found that the campaign creates spoofed logins and uses a carefully crafted email that seems legitimate until the recipient looks at the headers and links. The subject line indicates that the malicious email is attempting to start a live chat to discuss a service notice related to the target's PayPal account. The email contains a "Help & Contact" link and a "Learn to Identify Phishing" link, both of which lead to authentic PayPal links. However, hovering over the "Confirm Your Account" button reveals that it does not lead to a PayPal URL. It instead leads to a fraudulent live chat where the threat actor then uses automated scripts to initiate communication. The attacker attempts to get the victim's email address and phone number through this communication. According to the Cofense report, the attacker may be trying to gather this information to appear legitimate or collect enough information for authentication. When the threat actor obtains the phone number and the email address, the attacker will then try to get the target's credit card information. In order to directly interact with the victim, the attacker will step in where the script fails. This article continues to discuss findings surrounding the new phishing campaign that leverages the PayPal brand.

    BankInfoSecurity reports "Phishing Campaign Uses Live Chat, Leverages PayPal Brand"

  • news

    Visible to the public "Deploying Cloud Security Tools a Top Priority for 60% Of Study Respondents"

    Sixty percent of respondents in a new study by VMware said that the implementation of cloud security tools is their top priority. The study was a part of a larger study developed for the first day of Black Hat in Las Vegas, which found that attackers are performing more targeted and destructive attacks over 50 percent of the time. In regard to the cloud, 43 percent of respondents said over one-third of attacks targeted cloud workloads, with 22 percent having said that more than half were focused on cloud workloads. The study also revealed that malicious actors are using the cloud to island-hop along supply chains. Island hopping refers to the infiltration of large company networks by targeting third parties with lower levels of security. Tom Kellermann, VMware's head of cybersecurity strategy, expects cloud-jacking via public clouds to go mainstream this year, especially with the mass migrations to public clouds supporting distributed workforces. Vishal Jain, co-founder and CTO at Valtix, emphasized that enterprises are still trying to grasp the shared security model in the cloud and have underinvested in cloud-first security. This has resulted in a significant portion of attacks being aimed at cloud infrastructure and workloads. Companies need easily deployable and adaptable cloud-native security models. This article continues to discuss the key findings from VMware's new research regarding the deployment of cloud security tools and the importance of securing cloud environments.

    SC Media reports "Deploying Cloud Security Tools a Top Priority for 60% Of Study Respondents"

  • news

    Visible to the public "92% of Pharmaceutical Companies Have at Least One Exposed Database"

    Researchers from Reposify analyzed eighteen leading pharmaceutical companies and their nine hundred plus subsidiaries worldwide to assess the prevalence of exposures of services, sensitive platforms, unpatched CVEs, and other security issues. Their results were published in a report called "Pharmaceutical Industry Attack Surface Exposures Report." The researchers found that 92% of pharmaceutical companies had at least one exposed database with potential data leakage. The researchers also found that 46% of pharmaceutical companies had an exposed SMB service. SMB exposures were previously exploited in other infamous attacks, like WannaCry, NotPetya and Nachi and Blaster worms. In 70% of pharmaceutical M&A deals in 2020 that were analyzed, the newly acquired subsidiary had a negative impact on the parent company's security posture, usually adding tens, in some cases, hundreds of sensitive exposed and unpatched services.

    Help Net Security reports: "92% of Pharmaceutical Companies Have at Least One Exposed Database"

  • news

    Visible to the public "FBI, CISA Reveal Most Exploited Vulnerabilities"

    The FBI and the US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA), together with the Australian Cyber Security Center (ACSC) and the UK's National Cyber Security Center (NCSC), recently announced the top 30 vulnerabilities that have been exploited since the beginning of the COVID-19 pandemic. The list includes vulnerabilities, primarily Common Vulnerabilities and Exposures (CVEs), that were routinely exploited by malicious cyber actors in 2020 and those that have been exploited so far in 2021. There are patches for many of the vulnerabilities, so they can easily be fixed. The agencies recommend the implementation of a patch management system to prevent oversights. According to CISA, the rapid shift and increased use of remote work options, such as Virtual Private Networks (VPNs) and cloud-based environments, during the pandemic likely placed more burden on cyber defenders trying to maintain and keep up with routine software patching. The most exploited types of vulnerabilities include arbitrary code execution, arbitrary file reading, path traversal, remote code execution, and elevation of privilege. This article continues to discuss the joint effort that revealed the most exploited vulnerabilities, the struggle faced by cyber defenders to maintain routine software patching during the pandemic, efforts to protect critical infrastructure from cyberattacks, and the possibility of cyber incidents leading to war.

    eSecurity Planet reports "FBI, CISA Reveal Most Exploited Vulnerabilities"

  • news

    Visible to the public "Raccoon Stealer-As-A-Service Will Now Try To Grab Your Cryptocurrency"

    Raccoon Stealer has been upgraded by its developer to steal cryptocurrency alongside financial information. Sophos obtained samples revealing that the stealer is being bundled with malware, including malicious browser extensions, cryptocurrency miners, the Djvu/Stop consumer ransomware strain, and click-fraud bots targeting YouTube sessions. Sophos researchers found that the malware was not spread through spam emails in the new campaign, which was the usual initial attack vector linked to Raccoon Stealer but was instead spread through droppers disguised as installers for cracked and pirated software. The researchers stated that the Raccoon Stealer is able to monitor for and collect account credentials, cookies, website "autofill" text, and financial information that may be stored on an infected machine. The upgraded stealer also now has a "clipper" for cryptocurrency-based theft. Wallets, and their credentials, in particular, are targeted by the QuilClipper tool, as well as Steam-based transaction data.

    ZDNet reports: "Raccoon Stealer-As-A-Service Will Now Try To Grab Your Cryptocurrency"

  • news

    Visible to the public Defeating malicious cyber actors requires partnerships

    ANNAPOLIS, Md.  –  Participating on a panel alongside other high-level officials from the federal, state and private sector, National Security Agency Deputy Director George Barnes discussed NSA’s role within the nation’s shared response to future malicious cyber activities during Thursday’s Annapolis Cybersecurity Summit.

  • news

    Visible to the public  "New Project Uses Empathy to Teach Students about Cybersecurity and AI Ethics"

    Empathy is essential in almost every aspect of daily life, but it is often overlooked in the development of technology, especially technology in which Artificial Intelligence (AI) is used. Researchers at the School of Information Sciences at the University of Illinois Urbana-Champaign are working to fill this gap by using empathy to teach high school students about cybersecurity and AI ethics issues. The project titled "Teaching High School Students about Cybersecurity and Artificial Intelligence Ethics via Empathy-Driven Hands-On Projects" received a two-year, $297,575 National Science Foundation (NSF) Early-Concept Grant for Exploratory Research (EAGER). Associate Professor and project leader Yang Wang has said that many AI technologies have been observed laden with ethical issues, such as having implicit biases toward certain populations or giving them unfair treatment. It is important to plant the seed today and educate future AI designers so tomorrow's AI technologies can be ethical. According to Wang, developers face a lot of pressure to get products out fast, which results in ethics and empathy being sidelined or ignored. For the project, researchers will develop hands-on labs that delve into various scenarios, such as social media, mobile apps, smart toys, and online gaming. The labs will be publicly available for schools to use. They will include real-life examples of young children interacting with unethical AI or being exposed to cybersecurity risks. The researchers will evaluate the impact of these labs on the activation of brain regions associated with empathy in high school students by using a cutting-edge and non-invasive neuro-imaging technique. This article continues to discuss the goals, components, and expectations of the new project that teaches students about cybersecurity and AI ethics using empathy.

    iSchool reports "New Project Uses Empathy to Teach Students about Cybersecurity and AI Ethics"

  • news

    Visible to the public "IoT: Security Researchers Warn of Vulnerabilities in Hospital Pneumatic Tube Systems"

    Cybersecurity researchers at Armis have detailed a set of nine security vulnerabilities, dubbed PwnedPiper, that were discovered in the system controlling the pneumatic tube networks used in thousands of hospitals worldwide. The exploitation of these vulnerabilities could lead to the disruption of services and the potential launch of ransomware attacks. The vulnerabilities were found in the Swisslog Healthcare Nexus Control Panel software, which powers the company's TransLogic pneumatic tube system (PTS) stations. The tubes are used by staff to send patient test samples and medication throughout the hospital, making them an essential part of providing care to patients. PwnedPiper includes hard-coded passwords, a privilege escalation vulnerability, and memory corruption bugs that can lead to remote code execution (RCE) and denial-of-service (DoS) attacks. The set of vulnerabilities also includes a design flaw in which firmware upgrades on the Nexus Control panel are unencrypted and do not require any cryptographic signature. The abuse of this design flaw could allow attackers to gain unauthenticated remote code execution privileges through the initiation of a firmware update procedure. According to Armis, an attacker would need access to the network via a phishing attack or breached remote desktop credentials to get to a Nexus Control Panel. Attackers could gain control over the tube network by exploiting the vulnerabilities in these systems. Following the disclosure of the vulnerabilities, Swisslog Healthcare made security updates available to address them and protect networks. Healthcare organizations that use Translogic's PTS are urged to apply the security updates and implement access controls, such as multi-factor authentication, across their networks. This article continues to discuss the potential exploitation and impact of the PwnedPiper vulnerabilities, as well as Swisslog Healthcare's response to this discovery.

    ZDNet reports "IoT: Security Researchers Warn of Vulnerabilities in Hospital Pneumatic Tube Systems"

  • news

    Visible to the public "CISA Launches US Federal Vulnerability Disclosure Platform"

    Bug hunters who want to help the US federal government secure their online assets can now source all the relevant information from a vulnerability disclosure policy (VDP) platform offered by the Cybersecurity and Infrastructure Security Agency (CISA). In September 2020, the Binding Operational Directive 20-01 was released, which mandates that all FCEB agencies develop and publish a vulnerability disclosure policy. At the moment, this newly established VDP platform collects eleven vulnerability disclosure programs, published by the: Federal Communications Commission (FCC), Department of Homeland Security (DHS), National Labor Relations Board (NLRB), Federal Retirement Thrift Investment Board (FRTIB), Millennium Challenge Corporation (MCC), Department of Agriculture (USDA), Department of Labor (DOL), Privacy and Civil Liberties Oversight Board (PCLOB), Equal Employment Opportunity Commission (EEOC), Occupational Safety and Health Review Commission (OSHRC), and Court Services and Offender Supervision Agency (CSOSA). This newly established VDP platform is run by BugCrowd, a bug bounty and vulnerability disclosure company, and EnDyna, a government contractor that provides science and technology-based solutions to several US federal agencies. Eric Goldstein, Executive Assistant Director for Cybersecurity, CISA, explained that this new platform allows agencies to gain more significant insights into potential vulnerabilities, thereby improving their cybersecurity posture. Goldstein also stated that this approach also enables significant government-wide cost savings, as agencies no longer need to develop their own separate systems to enable reporting and triage of identified vulnerabilities.

    Help Net Security reports: "CISA Launches US Federal Vulnerability Disclosure Platform"

  • news

    Visible to the public "Russians Tied To The SolarWinds Cyberattack Hacked Federal Prosecutors, DOJ Says"

    The Justice Department recently discovered that the Russian hackers behind the massive SolarWinds cyberespionage campaign broke into the email accounts of some of the most prominent federal prosecutors' offices around the country last year. The department stated that 80% of Microsoft email accounts used by employees in the four U.S. attorney offices in New York were breached. In all, 27 U.S. Attorney offices had at least one employee's email account compromised during the hacking campaign. In a statement Friday, the Justice Department said that it believes the accounts were compromised from May 7 to Dec. 27, 2020. Such a timeframe is notable because the SolarWinds campaign, which infiltrated dozens of private-sector companies and think tanks as well as at least nine U.S. government agencies, was first discovered and publicized in mid-December. The list of affected offices includes several large and high-profile ones like those in Los Angeles, Miami, Washington, and the Eastern District of Virginia. The Southern and Eastern Districts of New York, where large numbers of staff were hit, handle some of the most prominent prosecutors in the country. The Justice Department said all victims had been notified, and it is working to mitigate "operational, security and privacy risks" caused by the hack. The Justice Department did not provide additional detail about what kind of information was taken and what impact such a hack may have on ongoing cases.

    NPR reports: "Russians Tied To The SolarWinds Cyberattack Hacked Federal Prosecutors, DOJ Says"

  • news

    Visible to the public "Android Banking Trojan 'Vultur' Abusing Accessibility Services"

    An Android banking Trojan dubbed Vultur, first identified in March 2021, relies on screen recording and keylogging instead of HTML overlays to capture login credentials. According to security researchers at ThreatFabric, Vultur uses the Virtual Network Computing (VNC) implementation from AlphaVNC to gain complete visibility into a victim's device. In order to provide remote access to the VNC server on the device, the malware uses ngrok, an app that leverages encrypted tunnels to expose local systems hidden behind NATs and firewalls to the public Internet. The researchers said the mobile malware takes advantage of the Accessibility Services to identify the app running in the foreground. If the app is on the target list, the malware will then start screen recording. The malware also abuses the Accessibility Services to log all of the keys pressed by the user on the screen, and to prevent the victim from deleting it through manual uninstallation. Vultur has been observed targeting various banking applications, with users in Australia, Italy, and Spain being the main victims. This article continues to discuss the capabilities and targets of the Vultur Android banking Trojan.

    Security Week reports "Android Banking Trojan 'Vultur' Abusing Accessibility Services"

  • news

    Visible to the public Fraudulent phone call centers trick users into downloading ransomware

    Microsoft alerts that the BazaCall attack starts with malicious emails that tricks the users into calling the fake call center. Claiming that a demo service is ending and the user will be charged for a premium service.
  • news

    Visible to the public "FAU Invention for Privacy of Sharing Files Online Gets U.S. Patent"

    Advancement has been made in secure online file-sharing by a scientist from Florida Atlantic University's (FAU) College of Engineering and Computer Science. Hari Kalva, Ph.D., inventor, associate chair, and professor in the Department of Electrical Engineering and Computer Science, received a patent from the U.S. Patent and Trademark Office for a new invention that can help users control how and when shared documents are displayed. Those who share documents online have little control over who views the information being sent and where it is being viewed, which presents a problem for sharing pictures online and when organizations share confidential documents with employees and other parties. Kalva's technology offers new control mechanisms for limiting the capture of information displayed on screens using an external device such as a camera. The system can restrict an individual from viewing documents based on their individual identity, their social network, and where and when the document is being viewed. Messages are encrypted with viewing restrictions with this new technology. The technology links social media accounts to the software to identify who should be given access. Senders can decide how many people can view the message by using the receiver's camera. If the correct amount of people are present, automatic access is granted. If more people are present, those individuals must ask the sender for permission to be granted access. The application software can use biometrics, such as fingerprints, to determine who is attempting to view the message. It also uses GPS, IP address, or cell tower location to identify the receiver's current location. The message can only be shown when the receiver's location matches the location specified in the sender's restrictions. This novel technology will empower users to protect sensitive information sent online and ensure that only the intended audience can view the information sent. This article continues to discuss the capabilities of the new invention that improves the privacy and security of online file-sharing.

    FAU reports "FAU Invention for Privacy of Sharing Files Online Gets U.S. Patent"

  • news

    Visible to the public "Dozens of Active Cozy Bear C2 Servers for Data-Stealing Malware Identified"

    Researchers from RiskIQ's Team Atlas reported having identified more than 30 active command-and-control (C2) servers being used by APT29, a Russia-backed advanced persistent group, in a campaign to deliver WellMess and WellMail malware. These malware strains were previously identified in espionage campaigns targeting COVID-19 vaccine development efforts in the UK, Canada, and the U.S. APT29, also known as Cozy Bear, has primarily targeted diplomatic, governmental, energy, and healthcare organizations. This threat group is associated with Russia's foreign intelligence service. The researchers say APT29's use of WellMess malware is highly targeted. They have also said that it is relatively rare to find signs of the malware and its C2 servers. This article continues to discuss the identification of active Cozy Bear C2 servers being used to deliver WellMess and WellMail malware.

    Computing reports "Dozens of Active Cozy Bear C2 Servers for Data-Stealing Malware Identified"

  • news

    Visible to the public "Curious to See How Healthcare Cybersecurity Fared This Year?"

    In a new report, CynergisTek reviewed just under 100 assessments of healthcare providers across hospitals, physician practices, Accountable Care Organizations (ACOs), and Business Associates. These assessments measure organizations' security posture against the National Institute of Standards and Technology's Cybersecurity Framework (NIST CSF), a standardized framework first published in 2014 intended to help protect American critical infrastructure. Assessments were categorized into two cohorts: high performers with NIST conformance scores over 80% and low performers with conformance scores under 80%. The researchers focused on the industry's overall status in cybersecurity preparedness and found that 64% of organizations obtained below 80% conformance. The researchers identified several areas for continued improvement in planning and preparedness, especially seeing only 75% improved during the coronavirus pandemic and only slightly. The researchers stated that while that is progress, it isn't the progress the industry needs to shore up defenses. The researchers also noted that investing in security is often more cost-effective than paying the recent exorbitant ransoms in the long run. The researchers found that overall, supply chain management was the second lowest-scoring and least mature category assessed. Even among high-performing organizations that have significantly improved over the past four years, scores averaged 2.7 out of 5, reflecting a universal challenge that companies face in identifying and addressing risks across their supply chains. With an acceptable score above a 3, only 23% of organizations barely passed on supply chain security. In particular, researchers found that organizations struggle to validate whether third-party partners are meeting contractual security obligations.

    Help Net Security reports: "Curious to See How Healthcare Cybersecurity Fared This Year?"

  • news

    Visible to the public "Researchers Publish Details on Recent Critical Hyper-V Vulnerability"

    Security researchers at Guardicore Labs have shared details of a critical vulnerability in Hyper-V, tracked as CVE-2021-28476, with a CVSS score of 9.9. The vulnerability impacts Hyper-V's virtual network switch driver (vmswitch.sys). If exploited by malicious threat actors, it can lead to a denial-of-service (DoS) condition and remote code execution. Hyper-V provides virtualization capabilities for both desktop and cloud systems. Microsoft uses Hyper-V as the underlying virtualization technology for Azure. According to the researchers, the vulnerability affects Windows 7, 8.1, and 10, as well as Windows Server 2008, 2012, 2016, and 2019. This article continues to discuss the potential exploitation and impact of the critical vulnerability found in Hyper-V.

    Security Week reports "Researchers Publish Details on Recent Critical Hyper-V Vulnerability"

  • news

    Visible to the public "Criminals Are Using Call Centers to Spread Ransomware in a Crafty Scheme"

    Palo Alto Networks originally discovered the ransomware campaign "BazaCall" in February. Adversaries lure in targets with an email during the campaign, suggesting that a subscription for a service, such as a gym membership, is expiring. Recent campaigns have posed as confirmation receipts for software licenses. Each email contains a unique ID number and instructs the user to call a number that will connect them with an actual human. The call agent advises the user to visit a legitimate-looking website and tells them to download a file from their account page to cancel their subscription. Once the user enables macros on the downloaded document, the malware is delivered from a Cobalt Strike beacon. While such a campaign requires a little more social-engineering know-how on the part of hackers, the delivery method makes it more difficult for spam and phishing email detection software to intervene, researchers at Microsft stated. Researchers say the ongoing ransomware campaign may be more dangerous than previously thought in new findings by Microsoft. Researchers now say that the malware not only allows hackers a one-time backdoor into the device, as previously thought but can also allow adversaries to remotely control the affected system. That means it's even easier for adversaries to sweep for files and find high-end user credentials that could be used to drop ransomware such as Ryuk or Conti within the first 48 hours of infiltration.

    CyberScoop reports: "Criminals Are Using Call Centers to Spread Ransomware in a Crafty Scheme"

  • news

    Visible to the public "Honeypot Security Technique Can Also Stop Attacks in Natural Language Processing"

    The growing sophistication of online fake news detectors and spam filters is accompanied by the increasing advancement of attacker's methods for tricking them. These methods include attacks through the "universal trigger." This learning-based method involves using a phrase or set of words to fool an indefinite number of inputs. A successful universal trigger-based attack could result in the distribution of more fake news on social media feeds and more spam in email inboxes. Researchers at the Penn State College of Information Sciences and Technology have developed a Machine Learning (ML) framework capable of defending against these types of attacks in natural language processing applications 99 percent of the time. The researchers borrowed a technique commonly used in cybersecurity to defend against universal trigger-based attacks in the development of the ML framework. The model, called DARCY, uses a honeypot to bait and detect potential attacks on natural language processing languages, such as fake news detectors and spam filters. The honeypot lures attackers using the words and phrases they are targeting in their attempted hack. DARCY searches and injects multiple trapdoors into the technology that handles natural language processing applications, known as a textual neural network, in order to catch and filter out malicious content created by universal trigger-based attacks. DARCY is believed to be the first work that employs the honeypot concept from the realm of cybersecurity to defend textual neural network models against adversarial attacks. The researchers tested DARCY on four different text classification datasets. They used the framework to defend against six different potential attack scenarios, and it outperformed five existing adversarial detection algorithms that served as defensive baselines. This article continues to discuss the concept, testing, and effectiveness of DARCY.

    The Pennsylvania State University reports "Honeypot Security Technique Can Also Stop Attacks in Natural Language Processing"

  • news

    Visible to the public "CISA, NIST to Develop Cybersecurity Goals for Critical Infrastructure Control Systems"

    The Biden administration has released a national security memorandum to develop cybersecurity standards for critical infrastructure. The "Improving Cybersecurity for Critical Infrastructure Control Systems" memorandum brings the U.S. Department of Homeland Security's (DHS) Cybersecurity and Infrastructure Security Agency (CISA) together with the National Institute of Standards and Technology (NIST) at the Commerce Department to establish cybersecurity performance goals aimed at setting a security baseline that is clear and easy-to-understand. In addition, President Biden formally established the Industrial Control System Cybersecurity Initiative to promote the development and deployment of technology to improve threat detection. The program began with a pilot in the electricity sector and is now being moved to natural gas pipelines. There are plans to move the program to chemical, water, and wastewater sectors this year. According to a senior administration official, the ICS initiative technologies, which are now used by over 150 utilities, would have prevented the ransomware attack on Colonial Pipeline. The ICS initiative has gathered CEOs of utilities and pipelines to inform them about threats to stress the urgency of addressing the cybersecurity threat. The memorandum emphasizes that the cyber threats facing critical infrastructure are among the most significant, and they are growing issues that could significantly harm the U.S. economy and national security. This article continues to discuss the national security memorandum on Improving Cybersecurity for Critical Infrastructure Control Systems and the Industrial Control System Cybersecurity Initiative.

    HSToday reports "CISA, NIST to Develop Cybersecurity Goals for Critical Infrastructure Control Systems"

  • news

    Visible to the public "DDoS attacks in Q2 2021"

    In a new study, researchers at Kaspersky analyzed DDoS Intelligence statistics they collected on botnets in Q2 of 2021. The researchers stated that the countries that suffered the most DDoS attacks in Q2 were the US (36%), China (10.28%), and Poland (6.34%). The country with the most botnet C&C servers was the US (47.95%), while the bulk of bots attacking IoT devices in order to assimilate them were located in China. The most DDoS-active day in the quarter was June 2, when the researchers registered 1,164 attacks. On the quietest day, they observed only 60 DDoS attacks. The researchers also found that most DDoS attacks occurred on Tuesdays (15.31%), while the calmest day of the week was Sunday (13.26%). The longest DDoS attack observed by the researchers in Q2 lasted 776 hours (more than 32 days). The researchers also found that UDP flooding was used in 60% of DDoS attacks.

    Securelist reports: "DDoS attacks in Q2 2021"

  • news

    Visible to the public "BlackMatter & Haron: Evil Ransomware Newborns or Rebirths"

    DarkSide and REvil ransomware gangs have recently gone dark, but researchers at Ars Technica may have just discovered the rebranded version of the two ransomware groups or two completely new ransomware gangs. Both of the newly discovered ransomware gangs were found in July. The first new group to appear this month was Haron, and the second is named BlackMatter. Both ransomware groups are claiming to be focused on targets with deep pockets that can pay ransoms in the millions of dollars. They're also virtue-signaling and talk about sparing hospitals, critical infrastructure, and nonprofits, much like the ransomware gang DarkSide did in the past.

    Threatpost reports: "BlackMatter & Haron: Evil Ransomware Newborns or Rebirths"

  • news

    Visible to the public "Praying Mantis Threat Group Targeting U.S. Firms in Sophisticated Attacks"

    High-profile public and private entities in the U.S. are being targeted in a malicious campaign similar to the one that focused on attacking Australian companies and government entities last year. Researchers at the cyber technology and services company Sygnia, say the threat actor behind the campaign has been launching attacks on Windows Internet Information Services (IIS) environments and Web applications to gain a foothold in a targeted network. The attacks executed by the sophisticated threat actor, tracked as Praying Mantis or TG2021, have been going on since June, and they seem to be part of a cyber-espionage operation for a state-backed entity. According to Sygnia, the full scope of activity remains unknown, but the threat actor's sophistication and highly persistent nature indicate a large operation. Researchers found that the threat actor's main tactic for gaining initial access to target networks is using different deserialization exploits against IIS and Web application vulnerabilities. A deserialization exploit leverages how an application initializes objects that have been serialized. The program can be exploited to execute malicious code on the target if the deserialization process is not secure. For example, the attackers have used a zero-day vulnerability in the Checkbox Survey Web application to exploit IIS servers. This vulnerability stems from an insecure deserialization mechanism in the application and enables remote code execution on the target server. The attackers also exploited two vulnerabilities in a set of user-interface components for Web applications from Telerik. The initial access gained from these exploits has been used to execute a memory-resident malware serving as a backdoor on Internet-facing IIS servers. The malware is designed for IIS servers, only operates in memory, and is difficult to trace on infected systems. This article continues to discuss Praying Mantis' tactics, techniques, and procedures.

    Dark Reading reports "Praying Mantis Threat Group Targeting U.S. Firms in Sophisticated Attacks"

  • news

    Visible to the public "Researchers Demonstrate That Malware Can Be Concealed inside AI Models"

    Researchers Zhi Wang, Chaoge Liu, and Xiang Cui recently released a paper showing the possibility of hiding malware inside of Artificial Intelligence (AI) neural networks to slip it past automated detection tools. The three researchers embedded malware into the neural network behind an AI system called AlexNet, taking up 36.9 (MiB) mebibytes of memory space on the hardware running the AI system. The malware-embedded model was observed classifying images with near-identical accuracy within 1 percent of the malware-free model. They found that hiding the malware in the AI model broke it up in ways that prevented standard antivirus engines from detecting it. VirusTotal, a service that examines items with more than 70 antivirus scanners and URL/domain blocklisting services, along with a multitude of tools for extracting signals from the studied content, failed to raise any suspicions about the malware-embedded model. The researchers' method involves choosing the best layer to work with in a model that has already been training and then embedding the malware into that layer. If the accuracy of a malware-embedded model is inadequate, the attacker could choose to start with an untrained model, add extra neurons and then train the model on the same data set used to train the original model. This approach would lead to the production of a larger model with equivalent accuracy and provide more room to hide malicious stuff inside. This article continues to discuss the researchers' demonstrated use of an AI neural network to hide malware.

    Ars Technica reports "Researchers Demonstrate That Malware Can Be Concealed inside AI Models"

  • news

    Visible to the public Pub Crawl #52


    Pub_Crawl_web.jpgPub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers.