News Items

  • news

    Visible to the public Cyber Scene #58 - China's Cyber Belt and Road: Strategic Measures and Countermeasures

    Cyber Scene #58 -

    China's Cyber Belt and Road: Strategic Measures and Countermeasures

  • news

    Visible to the public SoS Musings #51 - The Vulnerability of the Maritime Industry to Cyberattacks

    SoS Musings #51 -

    The Vulnerability of the Maritime Industry to Cyberattacks

  • news

    Visible to the public "Florida DEO Suffers Data Breach, Over 57K Accounts Affected"

    Florida's Department of Economic Opportunity (DEO) revealed that it had sustained a data breach that targeted its unemployment benefits system affecting over 57,920 claimant accounts. The security incident involved user accounts in the Reemployment Assistance Claims and Benefits Information System - CONNECT. While the attackers behind the data breach are unknown, the authorities at DEO have notified the affected users via email. The threat actors allegedly accessed sensitive information from the CONNECT public claimant portal between April 27, 2021, and July 16, 2021. The exposed data in the breach include social security numbers, driver's license numbers, bank account numbers, addresses, phone numbers, and birthdates. The attackers may also have obtained the PIN used to access the CONNECT account. As a security precaution, DEO locked the CONNECT accounts and enhanced its authentication procedures and network security systems to defend against future threats.

    CISO MAG reports: "Florida DEO Suffers Data Breach, Over 57K Accounts Affected"

  • news

    Visible to the public "Zimbra Server Bugs Could Lead to Email Plundering"

    According to Zimbra's site, its email and collaboration tools are used by over 200,000 businesses, over a thousand government and financial institutions, and hundreds of millions of users to exchange emails every day. Researchers at SonarSource discovered that the Zimbra webmail server has two flaws that could let an attacker paw through the inbox and outbox of all the employees in all the enterprises that use the immensely popular collaboration tool. The first flaw could be triggered just by opening a malicious email containing a JavaScript payload. If a victim were to open such a rigged email, they would trigger a cross-site scripting (XSS) bug (CVE-2021-35208) in their browser. When executed, that payload would provide an attacker with access to the victim's emails, as well as their webmail session, the researchers stated. The second flaw is a bypass of an allow-list that leads to a powerful server-side request forgery (SSRF) vulnerability (CVE-2021-35209) that can be exploited by an authenticated account belonging to a member of a targeted organization who has any permission role whatsoever. The two bugs, if combined, would give a remote attacker the power to extract precious goodies, including Google Cloud API Tokens or AWS IAM credentials from instances within the cloud infrastructure. The issues were reported to Zimbra on May 20 and 22, and patches were released on June 28 for the 8.8.15 and 9.0 series.

    Threatpost reports: "Zimbra Server Bugs Could Lead to Email Plundering"

  • news

    Visible to the public  "Cybersecurity Technique Protects in-Vehicle Networks"

    Army researchers have developed a new machine learning-based framework to improve the security of vehicles' computer networks without weakening performance. This development supports a larger Army effort to invest in more advanced cybersecurity protection measures for aerial and land platforms. Researchers at the U.S. Army Combat Capabilities Development Command, known as DEVCOM, Army Research Laboratory, in collaboration with a team of experts from Virginia Tech, the University of Queensland, and Gwangju Institute of Science and Technology, came up with a technique called DESOLATOR, which stands for deep reinforcement learning-based resource allocation and moving target defense deployment framework. This method helps optimize a well-known cybersecurity strategy called the moving target defense. The idea behind this strategy is that it is hard for adversaries to hit a moving target. The adversary could get a better look at everything and choose their targets if everything was static. However, if IP addresses were shuffled fast enough, then the information assigned to the IP is quickly lost, thus requiring the adversary to look for it again. DESOLATOR helps computer networks inside vehicles identify the optimal IP shuffling frequency and bandwidth allocation for the delivery of effective and long-term moving target defense. Dr. Frederica Free-Nelson, Army computer scientist and program lead, said DESOLATOR facilitates lightweight protection in which fewer resources are used for maximized protection. DESOLATOR is beneficial as it utilizes fewer resources to safeguard mission systems and connected devices in vehicles while preserving the same service quality. This article continues to discuss how the new machine learning-based framework DESOLATOR bolsters the cybersecurity of in-vehicle networks.

    Homeland Security News Wire reports "Cybersecurity Technique Protects in-Vehicle Networks"

  • news

    Visible to the public "Apple Fixes 'Actively Exploited' Zero-Day Flaw"

    Apple has released iOS 14.7.1, iPad iOS 14.7.1, and macOS Big Sur 11.5.1 to address a zero-day flaw that seems to have been actively exploited. According to Apple, the flaw, tagged as CVE-2021-30807, could allow threat actors to execute arbitrary code with kernel privileges. It was found in the IOMobileFrameBuffer extension. Another security researcher and member of the Microsoft Security Response Center (MSRC) revealed that they had also discovered the bug in iOS four months ago. Following Apple's disclosure of the bug, the researcher published details about the issues they discovered in IOMobileFrameBuffer. This article continues to discuss the iOS and macOS update issued by Apple to fix a zero-day flaw that is believed to have been actively exploited by attackers already.

    ZDNet reports "Apple Fixes 'Actively Exploited' Zero-Day Flaw"

  • news

    Visible to the public Data Leaks - What Are They?

    Data Leaks - What Are They?

  • news

    Visible to the public Cybersecurity Snapshots #20 - Are Smartwatches Secure?

    Cybersecurity Snapshots #20 -

    Are Smartwatches Secure?

  • news

    Visible to the public Spotlight on Lablet Research #20 - Resilient Control of Cyber-Physical Systems with Distributed Learning

    Spotlight on Lablet Research #20 -

    Resilient Control of Cyber-Physical Systems with Distributed Learning

  • news

    Visible to the public "36% of Organizations Suffered a Serious Cloud Security Data Leak or a Breach in The Past Year"

    Researchers at Fugue and Sonatype surveyed 300 cloud pros, including cloud engineers, security engineers, DevOps, and architects. The researchers found that 36% of organizations suffered a serious cloud security data leak or a breach in the past 12 months and that eight out of ten organizations are worried that they're vulnerable to a significant data breach related to cloud misconfiguration. More than half (64%) of respondents stated the problem would worsen or remain unchanged over the next year. The researchers noted that cloud misconfiguration mistakes are a significant insider threat. During the study, the researchers found that the primary causes of cloud misconfiguration are too many APIs and interfaces to govern (32%), a lack of controls and oversight (31%), a lack of policy awareness (27%), and negligence (23%). Almost a quarter of respondents (21%) said they are not checking Infrastructure as Code (IaC) before deployment, and 20% aren't adequately monitoring their cloud environment for misconfiguration. The researchers also found that traditional security challenges play a significant role in cloud security, such as alert fatigue (cited by 21%) and false positives (27%), and human error (38%). The demand for cloud security expertise continues to outpace supply, and 36% of respondents cited challenges in hiring and retaining the cloud security experts, and 35% cited challenges sufficiently training their cloud teams on security.

    Help Net Security reports: "36% of Organizations Suffered a Serious Cloud Security Data Leak or a Breach in The Past Year"

  • news

    Visible to the public "Average Ransomware Payment Declined by 38% in Second Quarter of 2021, New Coveware Report Says"

    The tides may be starting to turn on the ransomware epidemic, new industry findings show. According to researchers at Coveware, the average ransomware payment declined to $136,576 in the second quarter of 2021. The 38% decrease is a dramatic drop from the average demand of $220,298 that Coveware reported in April for the first quarter. That number was a 43% increase from the last quarter of 2020. The decline comes in the shadow of three major ransomware attacks hitting the U.S. supply chain. Since May, U.S. officials have faced three high-profile ransomware attacks against fuel provider Colonial Pipeline, meat supply company JBS, and most recently, Florida IT company Kaseya. The attacks on JBS and Kaseya have been attributed to REvil, a ransomware gang thought to be based in Russia. These latest attacks have resulted in a wake-up call in both the government and private sector that could continue to drive a decrease in ransomware demands, the researchers suggested. During their study, the researchers also found that Sodinokibi, the ransomware created by REvil, held the biggest share of the market at 16.5%, and a version of the Conti ransomware ranked at second place 14.4%.

    CyberScoop reports: "Average Ransomware Payment Declined by 38% in Second Quarter of 2021, New Coveware Report Says"

  • news

    Visible to the public "Data Privacy - Are You Sure You Want a Cookie?"

    New research from Copenhagen Business School finds that the designers of cookie banners can impact users' privacy choices through the manipulation of the choice architecture. Simple changes can increase absolute consent by 17 percent. A website cookie banner is put in place as the consent management tool that gives users the opportunity to consent to the processing of their personal data. With the current legal framework, users need to actively provide consent. Therefore, manipulations of the banner can affect a user's decision about whether to make an active choice and the outcome of this choice (i.e., accept or decline consent). Findings from this study provide empirical evidence showing that people's data privacy decisions can easily be manipulated. The empirical evidence that supports the study's conclusions was gathered by testing a public website's different banner designs. The researchers analyzed how their manipulations affected 1,493 user interactions with the cookie banner and the resulting privacy choice. Although several official guides on banner design have been released since the experiment, the researchers argue that website owners remain privileged. One researcher stresses that nudging users into making a privacy choice could be good, but manipulating them into providing consent should be opposed. This study creates awareness and action by policymakers. It also recognizes that the problems of manipulative choice architecture within the digital space (also called dark patterns), are still essential topics for debate. They introduced a conceptual distinction between choice-making architecture and choice outcome architecture to help have a more structured debate. The researchers concluded that it will be up to the consumer to detect, avoid and resist manipulative choice architecture. Users and consumers are encouraged to learn about the broader issues associated with dark patterns and the tricks used in websites and apps to become less responsive to such manipulations. This article continues to discuss privacy manipulation, protecting user data, and the importance of learning about dark patterns.

    Copenhagen Business School reports "Data Privacy - Are You Sure You Want a Cookie?"

  • news

    Visible to the public "Sophos Warns of Discord-Borne Malware"

    Researchers at the cybersecurity firm Sophos analyzed over 1,800 malicious files on Discord's Content Distribution Network (CDN) that were detected by the company's telemetry. According to Sophos, the number of URLs hosting malware on the collaboration platform's CDN rose by 140 percent year-on-year during the second quarter of 2021. Threats include information-stealing malware, backdoors, spyware, and ransomware. Discord is said to be attractive to malware operators because it provides a persistent, highly available, global distribution network and a messaging system that can be adapted into command-and-control channels for malware. Discord's wide user base also provides an ideal environment for performing social engineering attacks to steal personal information and credentials. One malware distributed via Discord was found to be capable of stealing private images from an infected device's camera. Malware spread through Discord is often masqueraded as gaming-related tools and cheats, as well as cracked versions of Photoshop and other popular commercial software. Organizations that use Discord for work purposes are urged to adopt multi-factor authentication, ensure that all work devices have up-to-date malware protection, and more. This article continues to discuss Sophos researchers' findings surrounding the use of Discord to distribute malware.

    iTWire reports "Sophos Warns of Discord-Borne Malware"

  • news

    Visible to the public "Scammers Are Using Fake Microsoft 11 Installers to Spread Malware"

    Security researchers at Kaspersky have warned that crooks are exploiting people who are overeager to get their hands on the new Microsoft operating system update, due for a fall release, with fake installers. The researchers stated that although Microsoft has made the process of downloading and installing Windows 11 from its official website reasonably straightforward, many still visit other sources to download the software, which often contains unadvertised goodies from cybercriminals and sometimes isn't necessarily Windows 11 at all. Those sarcastic "goodies" range from relatively innocuous adware to password stealers and trojans. It is not unprecedented for cybercriminals to use demand for a product or service to take advantage of victims, be it coronavirus contact tracing apps or the Telegram encrypted messaging app. The fake installers are spreading as Microsoft is tussling with several security threats targeting the company.

    CyberScoop reports: "Scammers Are Using Fake Microsoft 11 Installers to Spread Malware"

  • news

    Visible to the public "CBP Cybersecurity Failures Left Travelers' Personal Info at Risk, IG Says"

    According to a recent DHS Office of Inspector General audit, Customs and Border Protection (CBP) failed to ensure that its Mobile Passport Control (MPC) applications were protected from cybersecurity threats. The internal watchdog report found that the organization charged with border control did not scan its apps for vulnerabilities, detect vulnerabilities identified in scans, complete security and privacy compliance reviews, and properly manage its system configuration. If CBP does not address these cybersecurity vulnerabilities, MPC apps and servers will remain vulnerable to attacks, thus putting travelers' personally identifiable information (PII) at risk of exploitation by malicious actors. The audit revealed that over 10 million travelers used the unsecured MPC apps between July 2017 and December 2019. CBP is encouraged to ensure that all MPC app update versions are scanned prior to release by developers, codify processes surrounding scanning, ensure specialists review all scan results for vulnerabilities, define processes for performing required security and privacy compliance reviews, and more. This article continues to discuss the discovery of CBP's failure to conduct required cybersecurity activities for its MPC apps.

    NextGov reports "CBP Cybersecurity Failures Left Travelers' Personal Info at Risk, IG Says"

  • news

    Visible to the public "Malware Makers Using ‘Exotic’ Programming Languages"

    Researchers from BlackBerry Research and Intelligence Team have found that malware authors are increasingly using rarely spotted programming languages such as Go, Rust, Nim, and DLang to rewrite old tools, create new tools, and to hinder analysis. The team chose those four languages to examine, partly because they fit its detection methodologies and since the languages have strong community backing and could be considered more developed. The researchers stated that using rarely spotted languages and new languages keeps malware author's creations a step or two or three ahead of protection tools.

    Threatpost reports: "Malware Makers Using 'Exotic' Programming Languages"

  • news

    Visible to the public Cyber Security booklet for Middle and High School students

    The National Cryptologic Foundation Cyber Center for Education and Innovation has just released a great booklet, Outsmart Cyberthreats, on cyber security for Middle and High School students. The scenarios show students how to protect themselves and their devices from threats.
  • news

    Visible to the public "How Android Unlocking Patterns Could Be Made More Secure"

    Android device users can unlock the display by entering a pattern, often in the shape of a letter. While this function is convenient, it is less secure than using a PIN. An international research team recommends the implementation of a blocklist on Android devices to prohibit the 100 most popular patterns, which are the easiest to guess. Philipp Markert from the Horst Gortz Institute for IT Security at Ruhr-Universitat Bochum, in collaboration with colleagues from George Washington University and the United States Navy, explored how this method should be implemented. The use of a four-digit PIN allows 10,000 different combinations. Theoretically, there can be 389,112 versions of the Android patterns that are drawn on a three-by-three grid. However, users are not taking advantage of these options. In areas of the world where people read from the top left to the bottom right, patterns in the form of letters are popular. About 49 percent of all patterns start in the top left. A little over 32 percent end in the bottom right, making it easier for attackers to guess a pattern. The research team tested how blocklists of different lengths affect security and usability. More than 1,000 people were asked to select a new unlocking pattern, some of which were able to select from all theoretically conceivable possibilities. Certain patterns were left out for the other five groups in which blocklists of different lengths were used. If a user selected a blocklisted pattern, they were given a warning and had to enter a new pattern. In an earlier study, the researchers identified the most popular Android patterns. The shortest of the five tested blocklists had twelve of the most popular patterns from the previous study, while the longest blocklist contained 581 of the most popular ones. The medium-length list with 100 blocklisted patterns is suggested to be the best compromise between security and usability. The researchers also verified how the blocklists impacted the security of the patterns. They simulated the ease at which an attacker could guess the pattern of a stolen mobile phone. The chance of success was 23.7 percent after 30 attempted guesses, without a blocklist. It was 2.3 percent with the longest blocklist. The recommended list with 100 blocklisted patterns reduced the chances of success to almost 7.5 percent. This article continues to discuss the key findings from the study on how to increase the security of Android unlocking patterns.

    RUB reports "How Android Unlocking Patterns Could Be Made More Secure"

  • news

    Visible to the public "Misconceptions Plague Security and Privacy Tools"

    A study conducted by researchers at Carnegie Mellon University's CyLab found that people have many misconceptions about the available security and privacy tools meant to protect their privacy and online security. The researchers surveyed 500 demographically representative U.S. participants to measure their use and perceptions of five web browsing-related tools, including private browsing, Virtual Private Networks (VPNs), Tor Browser, ad blockers, and antivirus software. They were asked about the effectiveness of each tool in different scenarios, such as blocking hackers from gaining access to their devices or preventing law enforcement from seeing the websites they visit. For all but one scenario, participants answered over half of the assessment questions incorrectly. That one scenario is the prevention of friends or family with physical access to your device from seeing visited websites in their browser history. People were found to know some things about these tools' capabilities, but they tended to incorrectly assume that the tools could do other things too. Those who were more familiar with these tools were more likely to answer a question about them correctly or incorrectly than to recognize that they were not sure. For example, one participant said that private browsing could be effective at preventing their employer from seeing their browsing history on the employer's network, but this is false. The most concerning misconception participants had, was that they often confused tools' privacy protections with security protections as some suggested that private browsing, VPNs, and Tor Browser would protect them from security threats. The researchers have provided some recommendations for designing nudging interventions, which could promote security and privacy tools, as well as help people use them effectively. This article continues to discuss the key findings from the study regarding users' misconceptions about security and privacy tools, along with suggestions for combating these misconceptions.

    CyLab reports "Misconceptions Plague Security and Privacy Tools"

  • news

    Visible to the public "Memory Corruption Issues Lead 2021 CWE Top 25"

    Memory corruption errors are still considered one of the most common and critical vulnerabilities in modern software. The MITRE-operated Homeland Security Systems Engineering and Development Institute places memory corruption errors at the top of the 25 most dangerous software weaknesses list. This placement is based on an analysis of Common Vulnerabilities and Exposures (CVE) data and severity scores given to each CVE. The MITRE Common Weakness Enumeration (CWE) team counted a total of over 3,000 identified security bugs associated with memory corruption issues in the National Vulnerability Database (NVD) within the past two years. The vulnerabilities received an average severity rating of 8.22 on a scale of 10, meaning most were ranged from serious to very critical. These errors can lead to system crashes, code execution, and data corruption. Cross-site scripting errors (Improper Neutralization of Input During Web Page Generation), which topped the list last year, were placed second in MITRE's new 2021 CWE Top 25 Most Dangerous Software Weaknesses list. Attackers could exploit cross-site scripting issues to steal session and cookie information, send malicious requests to a website, exploit browser vulnerabilities, and more. There were more vulnerabilities related to cross-site scripting in the NVD than the top-ranked memory corruption issue. However, these errors ranked lower in the list because they had a much lower average severity score. Other prevalent and severe software vulnerabilities include improper input validation errors and OS command injection. This article continues to discuss the issues included in MITRE's new 2021 CWE Top 25 Most Dangerous Software Weaknesses list.

    Dark Reading reports "Memory Corruption Issues Lead 2021 CWE Top 25"

  • news

    Visible to the public "Netskope Report Finds Cloud-Delivered Malware Increased 68% in Q2"

    Netskope recently released the fifth edition of its Cloud and Threat Report covering the cloud data risks, threats, and trends they see throughout the quarter. The report noted that cloud storage apps account for more than 66% of cloud malware delivery. In Q2 2021, 43% of all malware downloads were malicious Office docs, compared to just 20% at the beginning of 2020. The researchers stated that this increase comes even after the Emotet takedown, indicating that other groups observed the success of the Emotet crew and have adopted similar techniques. The researchers also found that collaboration apps and development tools account for the next largest percentage, as attackers abuse popular chat apps and code repositories to deliver malware. In total, Netskope detected and blocked malware downloads originating from 290 distinct cloud apps in the first half of 2021. The researchers explained that cybercriminals deliver malware through cloud apps to bypass blocklists and take advantage of any app-specific allow lists. Cloud service providers generally remove most malware immediately, but some attackers have found ways to do significant damage in the short time they spend undetected in a system. The researchers also found that about 35% of all workloads are exposed to the public internet within AWS, Azure, and GCP, with public IP addresses that are reachable from anywhere on the internet. The researchers stated that RDP servers have become a popular infiltration vector for attackers and were exposed in 8.3% of workloads. The average company with anywhere between 500 and 2,000 employees now deploys 805 separate apps and cloud services, with 97% of those being unmanaged and often freely adopted by business units and users, the researchers stated. During the report, the researchers pointed out that the rapid adoption of enterprise cloud apps has continued into 2021, with data showing adoption is up 22% for the first half of the year.

    ZDNet reports: "Netskope Report Finds Cloud-Delivered Malware Increased 68% in Q2"

  • news

    Visible to the public "Kaseya Obtains Universal Decryptor for REvil Ransomware"

    Kaseya has obtained a master decryptor key for the REvil ransomware that locked up the systems of at least 60 of its customers in a spate of worldwide cyberattacks on July 2. The attacks, which exploited now-patched zero-days in the Kaseya Virtual System/Server Administrator (VSA) platform, affected Kaseya customers in 22 countries using the on-premises version of the platform, many of which are managed service providers (MSPs) who use VSA to manage the networks of other businesses. In addition to the 60 direct customers, around 1,500 downstream customers of those MSPs were also affected. The VSA software is used by Kaseya customers to monitor and manage software and network infrastructure remotely. Late on Thursday afternoon, the vendor announced via its rolling advisory on the incident that it had obtained the decryptor "through a third party." It is unclear if the ransom of $50 million was paid to receive the decryptor. Kaseya is working with Emsisoft, and Emsisoft has confirmed the key is effective at unlocking victims. Kaseya stated that their representatives will contact customers who the ransomware has impacted. Even though the master decryption key has been acquired, researchers warn that the attack should not be considered over. For one thing, REvil is known for its double-extortion attacks, where company data is stolen in addition to being hit with ransomware. The researcher stated that the group may still have copies of data stolen from victims, and the group could use this data to extort victims or auction off the data, as it has done in the past on its website, Happy Blog.

    Threatpost reports: "Kaseya Obtains Universal Decryptor for REvil Ransomware"

  • news

    Visible to the public "New Cybersecurity Education and Research Institute"

    Washington State University (WSU) was selected to receive a $1.5 million Department of Defense (DOD) grant to set up a new cybersecurity education and research program. The Northwest Virtual Institute for Cybersecurity Education and Research (CySER) program establishes a cyber operations research and teaching center at WSU. This program includes a consortium of Pacific Northwest research partners from Central Washington University (CWU), Montana State University (MSU), Columbia Basin College (CBC), and the University of Idaho (UI). The program will train ROTC and DOD-skilled civilian workers in computer science and other areas regarding cyber basics, operations, or defense. They will be able to earn bachelor's degrees and specialized certificates. In addition, this effort will bring major Northwest institutions, industry, and national labs together for the first time to develop coordinated training with cyber-related courses, summer workshops, internships, research, a seminar series, and field trips to national labs. The delivery of training modules will involve enhanced teaching methods, such as teamwork, technical communication, hands-on problem-solving approaches, and more. Areas of research in CySER include cyber education, network security, information security, cyber-physical systems, quality assurance, software security, Machine Learning (ML), and Artificial Intelligence (AI). This article continues to discuss the structure and goals of the CySER program.

    Homeland Security News Wire reports "New Cybersecurity Education and Research Institute"

  • news

    Visible to the public "Financial Services Accounting For Nearly 40% of All Phishing URLs"

    Researchers at Vade discovered that there had been a significant jump in phishing attacks since the start of the year, with a 281 percent spike in May and another 284 percent increase in June, for a total of 4.2 billion phishing emails detected by Vade in June alone. Researchers identified Credit Agricole as the most impersonated brand during their research, with 17,555 unique phishing URLs, followed by Facebook, with 17,338, and Microsoft, with 12,777. The researchers found that WhatsApp phishing increased 321% over H2 2021 and 36.4% of all unique phishing URLs impersonated financial services brands. The researchers also found that 25% of all unique phishing URLs impersonate social media brands, Netflix phishing declined 51% over H2 2020, and Brazil is the number one phishing country sender.

    Help Net Security reports: "Financial Services Accounting For Nearly 40% of All Phishing URLs"

  • news

    Visible to the public "Cybercriminals may target 2020 Tokyo Olympics, FBI warns"

    The United States Federal Bureau of Investigation (FBI) has issued a warning about threat actors potentially attempting to disrupt the upcoming Tokyo 2020 Summer Olympics. The FBI is warning that cybercriminals could utilize various types of cybercrime such as distributed denial of service (DDoS) attacks, ransomware, and social engineering to derail the Olympic games. As of now, there have been no signs of an attack targeting the popular sporting event. The FBI stated that they encourage any companies partnering with the Olympic games to remain vigilant and maintain best practices in their network and digital environments. The Bureau highlighted that large-scale popular events such as the Olympics attract various cybercriminals since it allows them to pursue different agendas, ranging from making money and boosting their notoriety to sowing confusion. The FBI shared advice on how service providers could mitigate the risks of such attacks. This includes creating and setting business continuity plans to lower the chances of service interruptions in case an attack occurs and regularly monitoring networks and applying best practices since a substantial part of the workforce has transitioned to remote-work environments, and employs the use of Virtual Private Networks.

    WeLiveSecurity reports: "Cybercriminals may target 2020 Tokyo Olympics, FBI warns"

  • news

    Visible to the public  "New Technology Shows Promise In Detecting, Blocking Grid Cyberattacks"

    Researchers from Idaho National Laboratory (INL) and New Mexico-based Visgence Inc. have developed and demonstrated a new cybersecurity technology. The Constrained Cyber Communication Device (C3D) can block cyberattacks on the power grid. The C3D device was tested against a series of remote access attempts that suggest a cyberattack. During the live demonstration at INL's Critical Infrastructure Test Range Complex, the device alerted operators to abnormal commands and automatically blocked them, thus preventing attacks from accessing and damaging critical components of the power grid. Commands sent to protective relay devices are autonomously reviewed and filtered using advanced communication capabilities. Relays are fundamental to the nation's power grid as they are designed to quickly command breakers to turn off electricity flow when a disturbance is detected. They help protect expensive equipment from damage when a power line fails due to a severe storm. However, relays are not designed to hinder a cyberattack's speed and stealthiness. A cyberattack can send wild commands to grid equipment within milliseconds. An intelligent and automatic filtering technology is needed to prevent such attacks. Jake Gentle, INL program manager, says the C3D device is placed deep inside a utility's network to monitor and block cyberattacks before they affect relay operations. The development of the device was funded by the U.S. Department of Energy's (DOE) Office of Electricity under the Protective Relay Permission Communication project. The C3D device and an associated software package will be further tested over the next several months before it is made available for licensing to private industry.

    INL reports "New Technology Shows Promise In Detecting, Blocking Grid Cyberattacks"

  • news

    Visible to the public "NPM Package Steals Chrome Passwords on Windows via Recovery Tool" 

    New NPM malware has been observed stealing Google Chrome credentials through the use of legitimate password recovery tools on Windows systems. NPM, short for Node Package Manager, is a packet manager for the JavaScript programming language. The NPM malware has also been discovered listening for incoming connections from the attacker's command-and-control (C2) server and providing advanced capabilities, including directory listing, file lookup, file upload, shell command execution, and camera access. Researchers at ReversingLabs shared their findings surrounding two malicious NPM packages called "nodejs_net_server" and "temptesttempfile." The researchers' report primarily focuses on nodejs_net_server, which has the core malware functionality. The malware, specifically nodejs_net_server, uses the legitimate ChromePass freeware utility for Windows to carry out credential-stealing activities. This password recovery tool aims at extracting passwords from the user's Chrome web browser. It was found packed inside the NPM package with misleading names. This article continues to discuss findings regarding the two malicious NPM packages that steal passwords from the Chrome web browser via the password recovery tool ChromePass.

    Bleeping Computer reports "NPM Package Steals Chrome Passwords on Windows via Recovery Tool"

  • news

    Visible to the public "HiveNightmare: Windows 10 and Windows 11 Have a Security Vulnerability"

    Both Windows 10 and Windows 11 have been discovered to be impacted by a local privilege escalation vulnerability that can allow attackers to gain access to otherwise inaccessible areas of the registry. The exploitation of this vulnerability could lead to the discovery of passwords, DPAPI decryption keys, and more. The zero-day vulnerability called HiveNightmare allows unauthorized access to the Security Account Manager (SAM), SYSTEM, and SECURITY hive files. A US-CERT advisory warns that the security flaw could enable attackers to extract account password hashes, discover the original Windows installation password, recover DPAPI computer keys, and obtain a computer machine account. Microsoft describes the flaw as an elevation of privilege vulnerability that stems from overly permissive Access Control Lists (ACLs) on multiple system files, including the SAM database. An attacker could run arbitrary code with SYSTEM privileges through the successful exploitation of this vulnerability. They could then perform malicious activities such as viewing, changing, or deleting data, and creating new accounts with full user rights. However, an attacker must know how to execute code on a victim's machine to exploit the vulnerability. Microsoft has provided information about a workaround to help mitigate the vulnerability until a patch is made available. This article continues to discuss the HiveNightmare registry vulnerability that affects Windows 10 and 11, and details about a workaround to help mitigate it.

    BetaNews reports "HiveNightmare: Windows 10 and Windows 11 Have a Security Vulnerability"

  • news

    Visible to the public "Law Firm to the Fortune 500 Breached with Ransomware"

    Campbell Conroy & O'Neil, P.C., a U.S. law firm to many huge companies, put out a press release that an intruder may have accessed their client's data. The law firm was hit with ransomware in February and is now suffering the data-breach fallout. Some of the law firm clients include Apple, Boeing, British Airways, Chrysler, Exxon Mobil, Fisher-Price, Ford, Honda, IBM, Jaguar, Monsanto, Toyota, and US Airways. Campbell did not mention which ransomware gang claimed responsibility. None of the big ransomware groups had claimed the breach as of Tuesday morning. Campbell's ensuing investigation hasn't yet determined if the unauthorized threat actors got at specific information, but the law firm does know that the adversaries could have gained access to a treasure trove of sensitive personally identifiable information (PII) belonging to certain individuals. The information that could have been accessed includes names, dates of birth, driver's license numbers/state identification numbers, financial account information, Social-Security numbers, passport numbers, payment card information, medical information, health insurance information, biometric data, and/or online account credentials.

    Threatpost reports: "Law Firm to the Fortune 500 Breached with Ransomware"

  • news

    Visible to the public "TSA Issues Cybersecurity Requirements for Pipelines"

    The U.S. Transportation Security Administration (TSA) issued a directive Tuesday requiring owners and operators of TSA-designated critical pipelines to implement cybersecurity controls. The latest directive by TSA applies to companies transporting hazardous liquids and natural gas. This security directive requires owners and operators of TSA-designated critical pipelines to implement specific mitigation measures to protect against ransomware attacks and other known threats to information technology and operational technology systems. The owners and operators of TSA-designated critical pipelines must also develop and implement a cybersecurity contingency and recovery plan and conduct a cybersecurity architecture design review. The new TSA requirements build off another DHS directive issued in May following the ransomware attack on Colonial Pipeline Co. The DHS directive required pipelines to report confirmed and potential cybersecurity incidents to CISA, designate a cybersecurity coordinator to be available around the clock, review current practices, and identify gaps and remediation measures to address cyber-related risks.

    Data Breach Today reports: "TSA Issues Cybersecurity Requirements for Pipelines"

  • news

    Visible to the public "This Ancient Printer Security Bug Affects Millions of Devices Worldwide"

    Cybersecurity researchers at SentinelOne have shared details about a high-severity vulnerability in HP printer drivers, which impacts millions of devices. According to the researchers, the vulnerability has existed since 2005 and impacts more than 380 HP and Samsung printer models along with at least a dozen different Xerox products. The exploitation of the security bug could allow attackers to install programs, create new accounts with full user rights, as well as view, change, encrypt, or delete data. The security flaw is described as a buffer overflow vulnerability that could be exploited in a local user privilege escalation attack. This article continues to discuss the potential exploitation and impact of the 16-year-old printer security bug.

    TechRadar reports "This Ancient Printer Security Bug Affects Millions of Devices Worldwide"

  • news

    Visible to the public "50,000 Phone Numbers Worldwide on List Linked to Israeli Spyware"

    The Israeli cyberarms firm NSO Group, accused of providing spyware to governments, has been linked to a list of 50,000 smartphone numbers, which impacts activists, journalists, business executives, and politicians globally. The firm and its malware have been making headlines since at least 2016 when researchers said it was helping spy on a dissident in the United Arab Emirates. Recent findings raise concerns regarding privacy and highlight the extent to which clients might be using the private Israeli company's malware. The Washington Post, the Guardian, Le Monde, and other news outlets who helped investigate the data leak revealed that it was a list of over 50,000 smartphone numbers belonging to those believed to have been identified as people of interest by NSO clients since 2016. Pegasus is said to be a highly invasive tool that can turn on a target's phone camera and microphone. It can access data on the device, thus making a phone a pocket spy. This article continues to discuss the key findings surrounding Pegasus malware and the data leak of 50,000 phone numbers.

    Security Week reports "50,000 Phone Numbers Worldwide on List Linked to Israeli Spyware"

  • news

    Visible to the public "Researchers Create New Approach to Detect Brand Impersonation"

    Security researchers at Microsoft created a new method for detecting brand impersonation attacks. These attacks refer to the crafting of content to mimic a trusted company or known brand to trick unsuspecting victims into responding and disclosing information. Brand impersonation attacks have become increasingly hard to detect due to the continued advancement of technology and techniques. Justin Grana, an applied researcher at Microsoft, says these attacks have increased in accuracy from a visual perspective as brand impersonation can look the same as legitimate content. Today's brand impersonation attacks lack copy-and-paste or jagged logos, making it more difficult for people and technology to pick up on visual cues that previously helped distinguish fake content from true content. To address the challenge of detecting brand impersonation attacks, the team developed and trained a Siamese Neural Network on labeled images. Siamese Neural Networks are designed to make better predictions using a smaller number of samples, unlike standard deep learning, which is trained using many examples. The team's dataset contains over 50,000 screenshots of malicious login pages covering more than 1,000 brand impersonations. Each image is a collection of numbers, which were translated into what is described as a point on an N-dimensional coordinate plane. The team tried to make the numbers meaningful in order to distinguish fake from real brand images. The algorithm used by the team was rewarded for translating content of the same brand to similar numbers and content of different brands to different numbers. Any numbers observed to be close together were likely from the same brand. This article continues to discuss the concept of brand impersonation attacks, the Siamese Neural Network developed to detect these attacks, and lessons learned from the research behind this approach.

    Dark Reading reports "Researchers Create New Approach to Detect Brand Impersonation"

  • news

    Visible to the public "Researchers Flag 7-Years-Old Privilege Escalation Flaw in Linux Kernel (CVE-2021-33909)"

    Security researchers at Qualy have discovered a vulnerability (CVE-2021-33909) in the Linux kernel's filesystem layer that may allow local, unprivileged attackers to gain root privileges on a vulnerable host. The security researchers were able to independently verify the vulnerability, develop an exploit, and obtain full root privileges on default installations of Ubuntu 20.04, Ubuntu 20.10, Ubuntu 21.04, Debian 11, and Fedora 34 Workstation. Other Linux distributions are likely vulnerable and probably exploitable, the researchers stated. The researchers also flagged CVE-2021-33910, a closely related systemd vulnerability that could lead to a denial of service condition. The source of both flaws is the incorrect handling of long path names. The first vulnerability (CVE-2021-33909) is an attack against the Linux kernel. The researchers stated that an unprivileged local attacker can exploit this vulnerability by creating, mounting, and deleting a deep directory structure whose total path length exceeds 1GB. A successful attack results in privilege escalation. The second vulnerability (CVE-2021-33910) is an attack against systemd (the system and service manager) and requires a local attacker with the ability to mount a filesystem with a long path. This attack causes systemd, the services it manages, and the entire system to crash and stop responding.

    Help Net Security reports: "Researchers Flag 7-Years-Old Privilege Escalation Flaw in Linux Kernel (CVE-2021-33909)"

  • news

    Visible to the public "HelloKitty Ransomware Is Targeting Vulnerable SonicWall Devices"

    The U.S. Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) warns of the exploitation of a known vulnerability in SonicWall Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products with end-of-life (EOL) firmware as part of targeted ransomware campaign. CISA urges users and administrators to either upgrade their devices to the latest firmware or disconnect all EOL appliances as soon as possible. The cybersecurity firm CrowdStrike confirmed that HelloKitty is one of the groups behind the ongoing ransomware attacks. HelloKitty is a human-operated ransomware operation that has been active since November 2020. This ransomware group is known for attacking the Polish video game company CD Projekt Red and claiming to have stolen source code for Cyberpunk 2077, Witcher 3, and other games. This article continues to discuss the targeting of a known and previously patched vulnerability contained by EOL SonicWall SMA and SRA products in an ongoing ransomware campaign, the HelloKitty ransomware group said to be among the multiple threat actors behind the campaign, and other threat groups that have targeted vulnerabilities in SonicWall devices to launch ransomware attacks.

    Bleeping Computer reports "HelloKitty Ransomware Is Targeting Vulnerable SonicWall Devices"

  • news

    Visible to the public  "Nasty Linux Systemd Security Bug Revealed"

    Researchers at the cybersecurity firm Qualys found a new Linux systemd security bug. Systemd is a system and services manager for Linux operating systems. It is the default service manager in many Linux distributions. According to Qualys, the exploitation of the new systemd vulnerability could allow unprivileged users to cause a denial of service via kernel panic. The security hole is said to have arrived in the systemd code in April 2015. It enables attackers to misuse the alloca() function in a way that causes memory corruption, which then allows them to crash systemd and, therefore, the entire operating system. There's no way to solve this problem. Although it is not present in all current Linux distributions, it can be found in most distributions such as the Debian 10 (Buster) and its relatives like Ubuntu and Mint. This article continues to discuss the new Linux systemd security bug that can enable any unprivileged user to crash a Linux system.

    ZDNet reports "Nasty Linux Systemd Security Bug Revealed"

  • news

    Visible to the public "MosaicLoader Malware Delivers Facebook Stealers, RATs"

    Researchers at Bitdefender have discovered a never-before-documented Windows malware strain dubbed MosaicLoader. MosaicLoader is spreading indiscriminately worldwide through paid ads in search results, targeting people looking for pirated software and games. It masquerades as a cracked software installer, but in reality, it's a downloader that can deliver any payload to an infected system. Researchers at Bitdefender stated that the adversaries behind MosaicLoader created a piece of malware that can deliver any payload on the system, making it potentially profitable as a delivery service. The researchers also stated that MosaicLoader downloads a malware sprayer that obtains a list of URLs from the command-and-control (C2) server and downloads the payloads from the received links. The researchers observed the malware sprayer delivering Facebook cookie stealers, which exfiltrate login data. This allows cyberattackers to take over accounts, create posts that spread malware, or cause reputational damage. The researchers also stated that MosaicLoader is also spreading the Glupteba backdoor and a variety of RATs for espionage purposes, which can log keystrokes, record audio from the microphone and images from the webcam, capture screenshots, and so on. Other observed threats so far include cryptocurrency miners.

    Threatpost reports: "MosaicLoader Malware Delivers Facebook Stealers, RATs"

  • news

    Visible to the public "Facebook Suspends Accounts Used by Iranian Hackers to Target US Military Personnel"

    Facebooks takes down over 200 Iranian Hacker Accounts used to target US Military Personnel This week Facebook disabled a sophisticated online cyber espionage campaign by Iranian threat actor AKA Tortoiseshell which was targeting about 200 military personnel and companies in the defense and aerospace using fake online personas. The hackers used fictitious personas to contact its targets, building trust over months, posing as recruiters and employees of defense related companies. They used Facebook to redirect the victims to rogue domains via malicious link and get the victims to download malicious software. By blocking this redirecting capability, Facebook was able to disable their attacks.

    The Hacker News reports "Facebook Suspends Accounts Used by Iranian Hackers to Target US Military Personnel"

  • news

    Visible to the public "Ruthless Attackers Target Florida Condo Collapse Victims"

    It has recently been discovered that adversaries are stealing the identities of those lost in the condo-collapse tragedy. Families mourning the loss of loved ones to the partial collapse of the Champlain Towers South condo building in Surfside, Florida, are now being urged to check their deceased relative's credit thanks to a group of hackers targeting victims in a new identity-theft scheme. Cybercriminals are watching the news and stealing the identities of victims read during the broadcast. Surfside Mayor Charles Burkett told local Florida news station 10 News that law enforcement is working to track down the cybercriminals. Officials aren't releasing details about how many of the victims have already been targeted. The death toll from the tragic condo collapse is currently hovering around 100. Law enforcement is urging family members of victims to check recent credit history and contact the Social Security office.

    Threatpost reports: "Ruthless Attackers Target Florida Condo Collapse Victims"

  • news

    Visible to the public "Cybersecurity Training Program Teaches How to Fend Off Attacks"

    IT Governance USA calls on organizations to implement cybersecurity training in the onboarding process for all new employees. This training should include examples of security incidents and the details of those who should be contacted in the event that an employee thinks they have fallen victim to a cyberattack. Security experts also encourage organizations to regularly perform simulated phishing attacks to increase awareness among employees about how to avoid and respond to such attacks. IEEE Educational Activities has partnered with the Information Systems Audit and Control Association (ISACA), an international professional association focused on IT governance, to offer the ISACA Cybersecurity Nexus (CSX) training platform to organizations. The CSX platform complements IEEE's research, standards, and education programs. It was developed to provide real-world cybersecurity training to help professionals in the identification and mitigation of potential cyberattacks. The training courses are hands-on, performance-based, and conducted in a live network environment. The CSX platform includes instructional courses and labs in a sandbox environment that safely replicates the world in which practitioners work. The courses allow technical teams to build, practice, and demonstrate their skills in a live environment. The technical skill-set training ranges from beginner to advanced. A dashboard for reviewing team performance with real-time progress tracking is also included by the CSX platform. This article continues to discuss the increased risk of cyberattacks due to the COVID-19 pandemic, the importance of raising cybersecurity awareness among employees, and the CSX platform created to provide real-world cybersecurity training to help professionals better identify and mitigate potential cyberattacks.

    IEEE Spectrum reports "Cybersecurity Training Program Teaches How to Fend Off Attacks"

  • news

    Visible to the public "Hackers Got Past Windows Hello by Tricking a Webcam"

    Researchers from the security firm CyberArk have discovered a potential vulnerability in Microsoft's facial recognition technology. They demonstrated a new method for deceiving Microsoft's Windows Hello facial recognition system. Windows Hello facial recognition only works with webcams containing an infrared sensor and the regular RGB sensor. However, the system does not look at RGB data, meaning that with one straight-on infrared image of a target's face and one black frame, the researchers were able to unlock the victim's Windows Hello-protected device. The researchers successfully tricked Windows Hello into thinking that the device owner's face was present, and unlocking by manipulating a USB webcam into delivering an attacker-chosen image. The researchers created a complete map of the Windows Hello facial recognition and found that it would be more convenient for an attacker to pretend to be the camera since the entire system relies on that input. Microsoft considers the researchers' finding a Windows Hello security feature bypass vulnerability. The company recently released patches to address the vulnerability and suggested that users enable Windows Hello enhanced sign-in security, which applies virtualization-based security to encrypt Windows Hello face data as well as process it in a protected memory area where attackers cannot tamper with it. The CyberArk research falls into the category of hacks known as downgrade attacks in which a device is tricked into relying on a less secure mode (e.g., a malicious cell phone tower that forces a phone to use 3G mobile data, with its weaker defenses, instead of 4G). This article continues to discuss the use of infrared photos and third-party hardware to fool Microsoft's facial recognition technology.

    Wired reports "Hackers Got Past Windows Hello by Tricking a Webcam"

  • news

    Visible to the public "CISA Issues Mitigation Tips for Common Attack Tactics"

    The U.S. Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) has made high-level recommendations for mitigating six stages of a sample attack pathway. The six stages identified by CISA include initial access, command and control, lateral movement, privilege escalation, collection, and exfiltration. The agency showed how successful an adversary could be at each of the stages through the performance of scenario-based network penetration testing, social engineering testing, web application testing, wireless testing, configuration reviews of servers and databases, as well as detection and response capability evaluations. CISA's assessment team discovered that more than 68 percent of their successful exfiltration attempts used adversary-established command and control centers as opposed to automatic exfiltration or archived data collection. According to CISA, this allowed the downloading of information without having to establish additional pathways and potentially alerting network defenders. CISA emphasized that the theft of information could result in the recreation of blueprinted technologies, targeting of supply chain components, and more. CISA's analysis also delved into the ways in which adversaries set up command and control mechanisms and how to foil them. This article continues to discuss findings from CISA's analysis and mitigation measures for avoiding adversarial system takeovers recommended by the agency.

    NextGov reports "CISA Issues Mitigation Tips for Common Attack Tactics"

  • news

    Visible to the public "US Blames China For Microsoft Hacking, Ransomware Attacks as Part of Global Condemnation"

    On Monday, the United States and their allies blamed China for exploiting flaws in the Microsoft Exchange Server that enabled worldwide ransomware attacks on tens of thousands of victims. It was part of a multi-front response Monday from the European Union, NATO U.S. intelligence partners that included the announcement of charges against four Chinese hackers that the Justice Department said worked on behalf of Beijing to breach U.S. companies and institutions over seven years. For the first time, the U.S. government also accused the Chinese government of employing criminal hackers who have conducted criminal attacks. The United States government agencies also released a technical report Monday that warned of China's ongoing appetite for targeting the defense, medical, semiconductor, and other industries to steal intellectual property. A senior administration official stated that "no one action can change China's behavior in cyberspace, and neither can just one country acting on its own." He also said that "our cooperation with the EU, NATO, and the Five Eyes countries in this effort will allow us to enhance and increase information sharing, including cyber threat intel and network defense information with public and private stakeholders, and expand diplomatic engagement to strengthen our collective cyber resilience and security cooperation." Microsoft itself attributed the Exchange Server attack to Chinese government hackers in March. The administration official said the delay in the U.S. government action came because the administration wanted to be sure about its attribution and combine it with the technical report release and present an allied front. China has denied responsibility for the Microsoft breach.

    CyberScoop reports: "US Blames China For Microsoft Hacking, Ransomware Attacks as Part of Global Condemnation"

  • news

    Visible to the public Facebooks takes down over 200 Iranian Hacker Accounts used to target US Military Personnel

    Facebooks takes down over 200 Iranian Hacker Accounts used to target US Military Personnel This week Facebook disabled a sophisticated online cyber espionage campaign by Iranian threat actor AKA Tortoiseshell which was targeting about 200 military personnel and companies in the defense and aerospace using fake online personas. The hackers used fictitious personas to contact its targets, building trust over months, posing as recruiters and employees of defense related companies.
  • news

    Visible to the public "U.S. Government Sets up Ransomware Task Force, Offers $10 Million Reward for Info"

    The U.S. Department of Justice said in the announcement that ransomware is a long-standing problem and a growing national security threat. Tackling this challenge requires collaboration across every level of government, the private sector, and our communities. Roughly $350 million in ransom was paid to malicious cyber actors in 2020, a more than 300% increase from the previous year. Further, there have already been multiple notable ransomware attacks in 2021. Despite making up roughly 75% of all ransomware cases, attacks on small businesses often go unnoticed. The U.S. Government has set up a cross-agency ransomware task force, a hub for ransomware resources, and is offering $10 million for information on state-sponsored cyber attackers. StopRansomware.gov integrates ransomware resources from all U.S. federal government agencies into a single platform that includes guidance on how to report attacks and the latest ransomware-related alerts and threats from the DHS's Cybersecurity and Infrastructure Security Agency (CISA) and the U.S. Secret Service, the DOJ's FBI, the Department of Commerce's National Institute of Standards and Technology (NIST), and the Departments of the Treasury and Health and Human Services.

    Help Net Security reports: "U.S. Government Sets up Ransomware Task Force, Offers $10 Million Reward for Info"

  • news

    Visible to the public "Encrypting Photos on the Cloud to Keep Them Private"

    Online photo collections must be secured as they can provide a gold mine of personal data to attackers. A new study by computer scientists at Columbia Engineering has revealed what could potentially be the first way to encrypt personal images on widely used cloud photo services provided by Google, Apple, Flickr, and more, without making changes to those services. Traditional security measures such as passwords and two-factor authentication are not enough to protect photos on the cloud anymore. There have been many cases in which employees at online services abused their insider access to user data, for instance, Snapchat employees viewed users' private photos. There have also been bugs that expose random users' data to others. For example, a bug was found in Google Photos that revealed users' private videos to other users. Columbia Engineering researchers have created a system for mobile users to enjoy cloud photo services while protecting their photos from attackers. They developed a system called Easy Secure Photos (ESP), which encrypts photos uploaded to cloud services so that attackers or the cloud services themselves cannot decipher them. With this system, users can still visually browse and display images as if they were not encrypted. Therefore, if a user's account is hacked, attackers cannot access their photos because they are encrypted. ESP uses an image encryption algorithm whose resulting files can be compressed but still be recognizable as images. ESP also works for both lossy and lossless image formats like JPEG and PNG, and is efficient enough to be used on mobile devices. In addition, this system creates and uploads encrypted thumbnail images to cloud services. This article continues to discuss the weaknesses associated with cloud photo services and the new system developed by Columbia Engineering researchers to encrypt photos uploaded to those services.

    Homeland Security News Wire reports "Encrypting Photos on the Cloud to Keep Them Private"

  • news

    Visible to the public "New Research Shows Cryptographic Vulnerabilities on Popular Messaging Platform, Telegram"

    Researchers from Royal Holloway, University of London (RHUL), are part of a team, which conducted a security analysis of the encryption protocol used by the popular Telegram messaging platform that is used by more than half a billion active users monthly. They discovered several cryptographic vulnerabilities in the protocol, ranging from technically minor and easy to exploit to more advanced. Results from the analysis showed that the immediate risk is low for most users, but the weaknesses emphasize that Telegram failed to meet the cryptographic guarantees made by other deployed cryptographic protocols such as Transport Layer Security (TLS). Telegram's 'MTProto' protocol, used to secure communication between the platform's users and servers, replaces the industry-standard TLS protocol. By default, Telegram provides a basic level of protection through the encryption of traffic between clients and servers. End-to-end encryption, which would also protect communication from Telegram employees or anyone who infiltrates Telegram's servers, is only optional and unavailable for group chats. The adoption and proper implementation of changes suggested by the research team can allow Telegram's MTProto to provide security comparable to TLS. According to the Telegram developers, these recommended changes have now been adopted. This article continues to discuss findings and suggestions from the security analysis of Telegram's encryption protocol.

    RHUL reports "New Research Shows Cryptographic Vulnerabilities on Popular Messaging Platform, Telegram"

  • news

    Visible to the public "Iranian Spies Tried Hacking US Military Personnel by Posing as Job Recruiters on Facebook"

    Facebook discovered on Thursday that Iranian government-backed hackers were targeting U.S. military personnel and companies in the defense and aerospace industries, primarily in the US and to a lesser extent in the UK and Europe, on their platform. Facebook linked the campaign to a group known alternately as Tortoiseshell or Imperial Kitten, which primarily had focused on Middle East targets before. This time, they were mainly preoccupied with the United States. As part of a social engineering effort, the hackers posed via fake online personas as defense and aerospace industry recruiters or claimed to work in hospitality, journalism, medicine, or non-governmental organizations. The social media giant stated that they removed the offending accounts, blocked the sharing of malicious domains, notified potential victims, and shared threat information with others in its industry. Those blocked domains included fake recruiting websites, a spoofed U.S. Department of Labor job site, and several that used the Trump family name.

    CyberScoop reports: "Iranian Spies Tried Hacking US Military Personnel by Posing as Job Recruiters on Facebook"

  • news

    Visible to the public "A New Feature Selection Technique For Intrusion Detection Systems"

    Network-based technologies continue to grow in use among individuals, professionals, and businesses worldwide. However, most network-based systems have been discovered to be significantly vulnerable to attacks. A malicious attack on network-based systems can have severe and devastating consequences. For example, an attack on a power utility network could result in the loss of electricity for millions of individuals and offices. Computer scientists have been trying to develop advanced Intrusion Detection Systems (IDSs) capable of identifying and counteracting malicious attacks in order to strengthen network security. Machine Learning (ML) algorithms have been proven to be promising in the automatic detection of attacks and intrusions on a network. The practice of selecting data features that a model can use when making predictions is important in developing and training ML-based IDSs. Researchers from Canadian University Dubai in the UAE created a new feature selection method that could help allow the development of more effective ML-based IDSs. Their feature selection method, MICorr, addresses some of the limitations of existing feature selection techniques. The researchers tested their method on the CSE-CIC-IDS2018 dataset, which contains 10,000 benign and malicious network intrusion instances. The new feature method is said to address the challenge of considering continuous input features and discrete target values. They showed that their proposed method performs well against the benchmark selection methods. This article continues to discuss the vulnerability of network-based systems to attacks, ML-based IDSs, and the new feature selection technique developed for IDSs.

    NewsUpdate UK reports "A New Feature Selection Technique For Intrusion Detection Systems"

  • news

    Visible to the public "Phishing Continues to Be One of the Easiest Paths for Ransomware"

    According to a new survey conducted by the enterprise data storage company Cloudian, phishing remains one of the main ways to attack organizations. The survey includes insights from 200 IT decision-makers whose organizations were hit with a ransomware attack over the past two years. More than half of them provided anti-phishing training to employees. Almost 50 percent had perimeter defenses implemented when they experienced a ransomware attack. Nearly 25 percent of all respondents said their ransomware attacks were initiated through phishing, with 65 percent of victims having conducted anti-phishing training sessions. Slightly over 40 percent of enterprises with less than 500 employees said their attacks began with phishing. About one-third of all victims revealed that their public cloud was used by ransomware groups as an entry point for attack. Phishing schemes continue to grow in sophistication, with attackers now mimicking emails from high-level executives and other trusted associates. Results from the survey also highlighted the speed of ransomware groups, revealing that 56 percent of victims said ransomware actors took over their data and sent a ransomware demand in under 12 hours. This article continues to discuss key findings from Cloudian's survey regarding the performance, speed, and costs of ransomware attacks.

    ZDNet reports "Phishing Continues to Be One of the Easiest Paths for Ransomware"