News Items

  • news

    Visible to the public "Google Finds Zero-Day Security Flaws in All Your Favorite Browsers"

    Google's Threat Analysis Group (TAG) has shared details about four zero-day security vulnerabilities found in popular web browsers, including Google Chrome, Internet Explorer, and Safari. The zero-day flaws discovered in these web browsers were exploited earlier in 2021 and used as part of three different campaigns. An assessment of the three exploits revealed their development by the same surveillance company that sold these capabilities to two different government-backed actors. In addition to explaining the vulnerabilities, the researchers drew attention to the increase in the number of attacks involving zero-day exploits. According to the researchers, 33 publicly disclosed zero-day exploits had been used in attacks so far this year. In 2020, a total of 22 zero-day exploits were discovered. This article continues to discuss the zero-day security vulnerabilities found in popular web browsers and what the increase in the number of zero-day exploits suggests.

    TechRadar reports "Google Finds Zero-Day Security Flaws in All Your Favorite Browsers"

  • news

    Visible to the public "Researchers Find Big Flaw in a Schneider Electric ICS System Popular in Building Systems, Utilities"

    Researchers at a security firm called Armis discovered a vulnerability in Schneider Electric computer control systems which is popular in heating, air conditioning, and other building systems that could allow hackers to control them. The remote code execution vulnerability puts millions of devices at risk. The affected Modicon programmable logic controllers (PLCs) are also used widely in manufacturing, automation applications, and energy utilities. The researchers stated that the vulnerability could be used to deploy a variety of attacks, from launching ransomware to altering the commands to machinery. The vulnerability could also allow attackers to hijack a command that would leak a password hash from the device's memory. Once they have that, they can authenticate its use and downgrade other security measures, ultimately gaining full control over the PLC. The attack requires network access, making it more challenging but not impossible to deploy in PLCs segmented from other systems, as is often the case in industrial settings. Armis first flagged the vulnerability to Schneider Electric in November. The company is still developing a patch and says it has collaborated with multiple researchers on the vulnerability.

    CyberScoop reports: "Researchers Find Big Flaw in a Schneider Electric ICS System Popular in Building Systems, Utilities"

  • news

    Visible to the public "Updated Joker Malware Floods into Android Apps"

    The Joker premium billing-fraud malware is back on Google Play in a fresh onslaught, with an updated bag of tricks to evade scanners. Joker has been around since 2017, disguising itself within common, legitimate apps like camera apps, games, messengers, photo editors, translators, and wallpapers. Once installed, Joker apps silently simulate clicks and intercept SMS messages to subscribe victims to unwanted, paid premium services controlled by the attackers. This is a type of billing fraud that researchers categorize as "fleeceware." The Joker apps also steal SMS messages, contact lists, and device information. Often, the victim is none the wiser until the mobile bill arrives. Malicious Joker apps are commonly found outside of Google Play and have been able to get past Google Play's protection methods since 2019. Joker apps have been able to get past Google Play's protection methods because the malware's authors keep making minor changes to their attack methodology. As a result, there have been periodic waves of Joker infestations inside the official store, including two massive onslaughts last year. According to researchers at Zimperium, more than 1,800 Android applications infected with Joker have been removed from the Google Play store in the last four years. In the latest wave, at least 1,000 new samples have been detected on Google Play since September.

    Threatpost reports: "Updated Joker Malware Floods into Android Apps"

  • news

    Visible to the public "Ransomware Giant REvil’s Sites Disappear"

    Just days after President Biden demanded that Russian President Putin shut down ransomware groups, the servers of one of the most prominent groups mysteriously went dark. Researchers stated that all of REvil's Dark Web sites slipped offline. It is unclear whether it's due to the ransomware gang getting busted or whether the threat actors did it on purpose. The REvil ransomware operation, also known as Sodinokibi, uses both clear web and Dark Web sites to negotiate ransoms, leak data, support its backend infrastructure, and receive payment from its many victimized organizations. Their victim's list has recently grown with the addition of Kaseya and its many managed service provider (MSP) customers and the global meat supplier JBS Foods. One cybersecurity expert emphasized that REvil's sites being offline doesn't mean that the notorious gang has been shut down.

    Threatpost reports: "Ransomware Giant REvil's Sites Disappear"

  • news

    Visible to the public "Iranian Hacker Group TA453 Caught Phishing University Scholars"

    Proofpoint researchers recently discovered the Iran-linked hacker group TA453 carrying out a credential-stealing phishing operation called Operation SpoofedScholars. The TA453 threat actors masqueraded as British scholars with the University of London's School of Oriental and African Studies (SOAS). They made their conversations with intended victims appear legitimate by hacking a real website run by SOAS, creating personalized credential harvesting pages disguised as registration links, and sending emails to victims inviting them to attend an online conference. According to Proofpoint, TA453 targeted experts in Middle Eastern affairs from think tanks, senior professors from well-known academic institutions, and journalists who specialize in Middle Eastern coverage. One of the emails distributed by the hacker group showed the use of a Gmail account to send personal invitations to experts and scholars. The email asked recipients to participate in a webinar hosted by the SOAS University of London as main speakers. Confirmation of their participation required the recipients to click on a registration link, enter their personal details, and share their bank account information. Proofpoint has said TA453's tactics, techniques, and targeting aligned with Islamic Revolutionary Guard Corps (IRGC) intelligence collection priorities. The firm also pointed out that the targeted victims have information of interest to the Iranian government, such as information about foreign policy, U.S. nuclear negotiations, and more. This article continues to discuss the Iran-linked Advanced Persistent Threat (APT) group's phishing campaign targeting experts and professors.

    TEISS reports "Iranian Hacker Group TA453 Caught Phishing University Scholars"

  • news

    Visible to the public "SolarWinds Patches Zero-Day Exploited in the Wild (CVE-2021-35211)"

    SolarWinds has released an emergency patch for CVE-2021-35211, an RCE vulnerability affecting its Serv-U Managed File Transfer and Serv-U Secure FTP currently being exploited in the wild. Microsoft has provided evidence of limited, targeted customer impact. However, SolarWinds does not currently have an estimate of how many customers may be directly affected by the vulnerability. CVE-2021-35211 was unearthed in the SolarWinds Serv-U product by Microsoft's Threat Intelligence Center (MSTIC) and Microsoft Offensive Security Research teams. SolarWinds stated they will be publishing additional details about the vulnerability once its customers have had enough time to implement the fix. In the meantime, the researchers noted that the vulnerability affects Serv-U 15.2.3 HF1 and all prior Serv-U versions but does not exist if SSH is enabled for a Serv-U installation. The vulnerability allows attackers to perform remote code execution and to install programs. Attackers can also view, change or delete data, or run programs on the affected system. The researchers also stated that this is not related to the SUNBURST supply chain attack

    Help Net Security reports: "SolarWinds Patches Zero-Day Exploited in the Wild (CVE-2021-35211)"

  • news

    Visible to the public "Russia-based APT28 Linked to Mass Brute Force Attacks Against Cloud Networks"

    Many cyber espionage campaigns have been linked to Russian hackers. Federal agencies of the U.S. and the U.K. recently warned about a number of brute force attacks executed by the Russia-based APT28 cybercriminal group. The agencies' joint report revealed that the Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (GTsSS), military unit 26165, used a Kubernetes cluster to carry out a series of brute force attacks against private and public entities globally from mid-2019 to early 2021. APT28 has multiple identities, which include Fancy Bear, Sednit, Tsar Team, and STRONTIUM. The APT28 threat actors launched brute force attacks against organizations that use Microsoft Office 365 cloud services. A brute force attack uses trial-and-error to guess usernames and passwords in order to gain access to a targeted source. Hackers can steal users' private data, such as email account credentials, through this type of attack. The threat actors were discovered to have exploited publicly known vulnerabilities in Microsoft Exchange servers for remote code execution and to gain privileged access to targeted networks. They also used the TOR platform and VPN services, such as IPVanish, CactusVPN, WorldVPN, NordVPN, ProtonVPN, and Surfshark, to hide their activities. Primary targets include government, military services, defense contractors, energy companies, law firms, media firms, and more. This article continues to discuss recent criminal activities performed by APT28 threat actors and how to mitigate brute force attacks.

    CISO MAG reports "Russia-based APT28 Linked to Mass Brute Force Attacks Against Cloud Networks"

  • news

    Visible to the public "New Tool Automatically Finds Buffer Overflow Vulnerabilities"

    A team of researchers at Carnegie Mellon University's CyLab designed a new tool called SyRust to automatically check for memory bugs--the types of bugs that can lead to buffer overflow exploits. Their tool specifically checks for such bugs in Rust libraries. The team's goal is to automatically find memory bugs that can result in security vulnerabilities in Rust libraries, as checking for these bugs manually, is said to be inefficient and time-consuming. Rust is an increasingly popular programming language that has been branded as both safe and efficient. CyLab's Limin Jia, a professor of electrical and computer engineering, pointed out that Rust only works if you write in the language's strict idioms. Rust developers usually require complex data structures for their software, but those structures and their operations are typically written using unsafe Rust that is not checked by the Rust compiler for memory safety bugs. SyRust can help by automatically generating unit tests for library APIs and testing library implementations for memory bugs. The team tried SyRust out on 30 popular libraries and discovered four new memory bugs. Although the tool has not been perfected yet, it is a step in the right direction. The SyRust tool does not generate enough tests to draw out all possible behaviors to ensure that a program contains no bugs. This article continues to discuss buffer overflow attacks, the Rust programming language, and the SyRust tool designed by CyLab researchers to automatically check for memory bugs in Rust libraries.

    CyLab reports "New Tool Automatically Finds Buffer Overflow Vulnerabilities"

  • news

    Visible to the public "The Ransomware Crime Wave Has Made Zero Trust Critical"

    Due to the increase in ransomware attacks that have shaken the U.S. in recent weeks, researchers suggest that now is the time to focus on zero trust. The idea of basing cybersecurity on a zero trust model is not a new concept, but it's an idea whose time has arrived in a big way. The researchers stated that conventional security technologies and techniques such as firewalls and VPNs are based on barrier-centered approaches that allow certain IT environments to be protected with access granted only to trusted users who can enter those environments with secret credentials. Zero trust proceeds from the foundational framework that no individual, no device, no application, nothing can be trusted as secure. As cloud computing continues its rise, the researchers stated that there is growing consensus that zero trust will be the future state for security infrastructure. Zero trust architecture has been defined in the NIST Special Publication 800-207, and the framework has already been widely adopted in the US by the Department of Defense, the banking sector, the healthcare sector, and elsewhere. The researchers believe that it is likely that zero trust will grow to become the standard security model moving forward because it's based on a strategy and not just more technology.

    eWEEK reports: "The Ransomware Crime Wave Has Made Zero Trust Critical"

  • news

    Visible to the public "Sage X3 Vulnerabilities Can Pose Serious Risk to Organizations"

    Researchers at the cybersecurity firm Rapid7 discovered four vulnerabilities in the Sage X3 enterprise resource planning (ERP) product, posing a significant risk to organizations. One of the flaws has been rated critical, while the rest were rated medium in severity. The critical flaw is described as an unauthenticated, remote command execution issue relating to a remote administration service. Its exploitation involves specially crafted requests to execute commands with elevated privileges. Exploiting the critical flaw requires a piece of information, which can be obtained through one of the medium-severity vulnerabilities discovered to be an installation pathname disclosure issue. The combination of this medium-severity flaw with the critical flaw could allow an attacker to learn the affected software's installation path and then use that information to send commands to the host system to be run in the SYSTEM context. An attacker could run arbitrary operating system commands to create Administrator-level users, install malicious software, and more. Sage X3 is used by thousands of medium and large organizations globally. This article continues to discuss the potential exploitation and impact of the security vulnerabilities found in the Sage X3 ERP product.

    Security Week reports "Sage X3 Vulnerabilities Can Pose Serious Risk to Organizations"

  • news

    Visible to the public "Hackers Disrupt Iran's Rail Service with Fake Delay Messages"

    Iran's railroad system recently faced a cyberattack in which hackers posted fake messages about train delays or cancellations on display boards at stations across the country. The hackers posted messages on the display boards such as "long-delayed because of cyberattack" or "canceled." The messages also encouraged passengers to call a phone number belonging to the office of the country's supreme leader, Ayatollah Ali Khamenei, for more information. However, a spokesman of the state railway company said the disruption did not cause any problem for train services. This article continues to discuss the disruption of Iran's rail service with fake messages and other notable cyberattacks that have targeted Iran's critical infrastructure.

    Military.com reports "Hackers Disrupt Iran's Rail Service with Fake Delay Messages"

  • news

    Visible to the public "Yearlong Phishing Campaign Targets Energy Firms"

    Researchers at cybersecurity company Intezer have discovered that a campaign that uses remote access Trojans and malware-as-a-service infrastructure for cyber espionage purposes has targeted large international energy companies for at least a year. The campaign uses spear-phishing emails to steal browser data and private information, including banking details. The campaign also is used for logging keyboard strokes of victims. The campaign uses malicious code such as Formbook and Agent Tesla, along with Loki, Snake Keylogger, and AZORult. The researchers stated that in addition to energy companies, the campaign also attacks the oil and gas, IT, manufacturing, and media sectors. Its targets are primarily based in South Korea but include companies in the U.S., the United Arab Emirates, and Germany as well, Intezer stated. While the researchers did not offer details on the number of companies affected by the attacks, they noted that 68% of the victims are in the oil, gas, and energy sectors, followed by 20% in construction, 8% in IT, and 4% in media.

    DataBreachToday.com reports: "Yearlong Phishing Campaign Targets Energy Firms"

  • news

    Visible to the public Kaseya victim of sophisticated ransomware attack

    Kaseya which provides solutions to managed service providers (MSP) was the victim of a ransomware attack on July 2. There were up to 1500 small to medium-sized companies that may have had their systems compromised through their MSP.Kayseya provides remote-monitoring and management tools for networks and endpoints as well as compliance systems and service desks. Over 40,000 organizations worldwide use at least one Kaseya software solution that makes it central to a wide software supply chain.
  • news

    Visible to the public "NUS Researchers Bring Attack-Proof Quantum Communication Two Steps Forward"

    The secure communication method, Quantum Key Distribution (QKD), uses particles of light known as photons to encode data in quantum bits, which are transmitted to a sender and receiver in the form of an encryption key. Although the security of QKD is said to be unbreakable in principle, attackers could still steal important information if it is not implemented correctly. Malicious actors could perform side-channel attacks in which they exploit vulnerabilities in the setup of the information system to eavesdrop on the exchange of secret keys. Researchers at the National University of Singapore (NUS) have developed a theoretical method and experimental method to protect QKD communications from side-channel attacks. The first method is an ultra-secure cryptography protocol that can be used in any communication network requiring long-term security. According to the researchers, the new protocol is easier to set up and is more tolerant to noise and loss than the original device-independent QKD protocol. The new protocol also provides the highest level of security allowable by quantum communications and empowers users to independently verify their own key generation devices. The team's setup allows all information systems built with device-independent QKD to be guarded against misconfiguration and poor implementation. The other method involves the use of a first-of-its-kind quantum power limiter device that defends QKD systems against bright light pulse attacks. The NUS team says its power limiter is highly cost-effective and can be easily manufactured with off-the-shelf components. Their device also does not need any power. Therefore, this device can be easily added to any quantum cryptography system to bolster the security of its implementation. This article continues to discuss the two methods developed by NUS researchers to protect QKD communications against side-channel attacks and the importance of closing the gap between the theory and practice of quantum secure communications.

    NUS reports "NUS Researchers Bring Attack-Proof Quantum Communication Two Steps Forward"

  • news

    Visible to the public "Fraudulent Content Has a Direct Impact on Consumer Loyalty"

    Researchers conducted a new survey of 1,200 U.S consumers where they examined how weaponized content is moving the fraud economy forward and consumer perception of content fraud . The researchers found that scams accounted for 59% of blocked user-generated malicious content during the first quarter of the year. The other most common blocked content fraud types include irrelevant content (22%, not related to the topic at hand), toxic (18%, includes foul language, harassment, hate speech, or bullying), and commercial (1%, solicitations against terms of service). The researchers also found that approximately 27% of consumers surveyed reported running across fraudulent content on a daily or weekly basis. According to respondents, the most common types of fraudulent content encountered are spam (51%) and scams (50%), with misinformation and 'fake news' rounding out the top three (43%). More than half of consumers surveyed said they would stop shopping at a business if malicious content was discovered on the brand's website. Specifically, 56% said they would stop using the site or service if fake or misleading content were found, while 54% said they would stop use if they were scammed into sharing personal information. The consumers surveyed also identified the places online where they encounter the most content fraud. These include social networking sites (61% ), classifieds (28% ), dating sites (24%), marketplaces (21%), and crowdfunding sites (15%).

    Help Net Security reports: "Fraudulent Content Has a Direct Impact on Consumer Loyalty"

  • news

    Visible to the public "People Don't Realize They're Data Breach Victims"

    Most participants in a recent study conducted by the University of Michigan School of Information did not know that their email addresses and other personal information had been involved in data breaches. Researchers presented facts from up to three breaches to 413 individuals that included their personal information and found that people were unaware of 74 percent of the breaches. This finding raises concern because if people do not know they are data breach victims, they cannot properly protect themselves against the implications of a breach, such as an increased risk of identity theft. The study also found that most data breach victims blamed their personal behaviors for the incidents. These behaviors include reusing the same password for multiple accounts, using the same email for a long time, and signing up for sketchy accounts. Only 14 percent attributed the problem to external factors. However, Adam Aviv, associate professor of computer science at George Washington University, says the fault for breaches almost always lies with the inadequate security practices of affected companies, not by breach victims. This article continues to discuss key findings from the study, what people should do when their data has been stolen, and how future data breaches could be prevented.

    NextGov reports "People Don't Realize They're Data Breach Victims"

  • news

    Visible to the public "DoD Watchdog Says 3D Printers Pose Cybersecurity Risks"

    A report from the Department of Defense (DoD) Office of Inspector General (OIG) found that 3D printers pose cybersecurity risks to the agency. DoD employees were discovered not properly securing the IT systems used for 3D product development. They were found to be unaware that the 3D printers had hackable IT systems. According to the report, DoD employees consider additive manufacturing (AM) systems like 3D printers and computer workstations as tools to generate supply parts, not IT systems. This has led to the failure to implement cybersecurity controls and consistently secure AM systems. Internal or external malicious actors could compromise the AM systems to steal design data and gain access to the DoD Information Network if the DoD does not properly protect the confidentiality and integrity of those systems. The compromise of AM design data could allow adversaries to recreate and use DoD's technology for their own advantage on the battlefield. This article continues to discuss key findings and recommendations from the OIG report on the cybersecurity of DoD AM systems.

    MeriTalk reports "DoD Watchdog Says 3D Printers Pose Cybersecurity Risks"

  • news

    Visible to the public "File Security Violations Within Organizations Have Spiked 134% as The World Reopened For Business"

    Researchers at BetterCloud surveyed more than 500 IT and security professionals and examined internal data from thousands of organizations and users during a new study. The study's goal was to understand organizations' top challenges, priorities, and the magnitude of data loss and sensitive information leaks that are occurring. The researchers found that SaaS file security violations are out of control. This year, as the world reopened for business, file security violations spiked 134%, and the types of violations are rampant throughout organizations. Nearly half of the organizations surveyed stated their top security concern was not knowing where sensitive data lives. The researchers also found that only 35 percent of respondents trust end-users to responsibly share and store company data, and nearly half of respondents stated they have difficulty securing users' activities within SaaS apps. The researchers stated that companies are not investing enough in SaaS file security, thus increasing the risk for potential incidents, whether intentional or unintentional.

    Help Net Security reports: "File Security Violations Within Organizations Have Spiked 134% as The World Reopened For Business"

  • news

    Visible to the public  "Ransomware-as-a-Service: Negotiators Are Now in High Demand"

    Victoria Kivilevich, a threat intelligence analyst at KELA, published findings from a study on Ransomware-as-a-Service (RaaS) trends suggesting that one-person operations are diminishing because of the profitability of the criminal ransomware business. The growth in the number of cybercrime and extortion specialists has come with a rise in the demand for individuals who can act as negotiators in the attack chain. The demand for extraction and monetization specialists in the ransomware supply chain has increased. The emergence of negotiators in the monetization arena is now a trend in the realm of RaaS. According to KELA researchers, there have been more threat actors that manage the negotiation part of ransomware attacks and further pressure victims into paying the demanded ransom through calls, Distributed Denial-of-Service (DDoS) attacks, threats to leak stolen information to the public, and more. KELA suggests that this role has emerged because of the need for ransomware operators to have a decent profit margin and the need for individuals that can manage conversational English to negotiate more effectively. The negotiation part of the ransomware attack also appears to be an outsourced activity, at least for some affiliates or developers. Therefore, the ransomware ecosystem is increasingly resembling a corporation consisting of diversified roles and numerous outsourced activities. This article continues to discuss the increased demand for negotiators in the RaaS ecosystem and other key findings from KELA's study on RaaS trends.

    ZDNet reports "Ransomware-as-a-Service: Negotiators Are Now in High Demand"

  • news

    Visible to the public "Brits Lose Over £1bn in Fraud So Far This Year"

    Researchers have found that Brits have lost over PS1bn to fraud and cybercrime in the first six months of 2021. The study revealed that 81,018 fraud and cybercrime-related police reports were issued in Q2 2021, with UK residents experiencing a total loss of PS382.3m due to these crimes. Interestingly, this represents a significant decrease compared with Q1 2021, when there were 137,695 reports. However, financial losses per average victim were PS176 higher in Q2 compared to Q1, at PS4719. The most common type of fraud and cybercrime in Q2 was related to online shopping and auctions, comprising one in five police reports (14,868). Victims lost a total of PS11.9m to these types of activities. According to the researchers, crimes relating to financial investments, share sales, or boiler room fraud proved to be most costly to victims in Q2. A total of 1309 victims lost PS35.8m to these activities in this period, equating to PS26,585 per person. Dating scam victims also experienced heavy losses, at PS13,558 each on average. Brits aged 30-39 were most commonly hit by fraud and cybercrime, making up 13,172 reports and a total of PS37m lost. Elderly UK residents (aged 70 and above) were more likely to fall victim to computer software and other advance fee frauds than any other age category. This population lost PS34.2m to these crimes in Q2, with an average of PS6,118 lost per case.

    Infosecurity reports: "Brits Lose Over PS1bn in Fraud So Far This Year"

  • news

    Visible to the public "Microsoft Confirms 'PrintNightmare' Vulnerability Affects All Windows Versions"

    The PrintNightmare vulnerability is part of the Windows Print Spooler and allows remote code execution. This enables hackers to gain system privileges on a device to install programs, view, change, and delete data and create accounts with full user rights. Some mediation was provided with Microsoft patches released on June 8--but not everything has been fixed. Watch for future updates.

    PCMag reports "Microsoft Confirms 'PrintNightmare' Vulnerability Affects All Windows Versions"

  • news

    Visible to the public "NIST Maps Out the Migration to Post-quantum Cryptography"

    The National Institute of Standards and Technology's National Cybersecurity Center of Excellence (NCCoE) released a draft document outlining migration challenges and approaches to making the migration from public-key cryptographic algorithms to quantum-resistant algorithms easier. Efforts to evaluate and select post-quantum encryption algorithms have been ongoing since 2016, with the migration process also expected to be a long one. As nothing can protect hardware, software, applications, or data from quantum-enabled adversaries, encryption keys and data will need to be re-encrypted with a quantum-resistant algorithm. In order to replace cryptographic algorithms, all system components, including protocols, schemes, and infrastructures, must be ready to process the new encryption scheme. Therefore, algorithm replacement is expected to be significantly disruptive and lengthy. NIST has described five implementation scenarios with the goal of identifying vulnerable cryptographic code, prioritizing the replacement of that code, and more. Each scenario addresses enterprise data center environments, including on-premises data centers and data hosted in public and hybrid clouds by owners or third-party providers. Organizations working with NIST on this project will install and test discovery tools and quantum-resistant components in an enterprise environment hosted by NCCoE's post-quantum cryptography laboratory. This article continues to discuss NIST's efforts to ease the migration to post-quantum cryptography.

    GCN reports "NIST Maps Out the Migration to Post-quantum Cryptography"

  • news

    Visible to the public "The Kaseya Ransomware Attack Is a Really Big Deal"

    The Kaseya ransomware incident brings further attention to the importance of improving software supply chain security. Kaseya is a managed service provider (MSP), helping its customers manage their IT infrastructure. The company can deploy software to the systems under management in a way that is almost identical to that of a software provider deploying an automatic update to machines. Automatic software deployment in the context of software updates is a good thing in normal situations. However, this feature was abused in the Kaseya incident as the Russian-based criminal group REvil hacked into Kaseya's management system and distributed REvil software to systems under Kaseya's management. The ransomware disabled computers and demanded a payment of nearly $45,000 in cryptocurrency per impacted system. The subversion of software delivery mechanisms to install ransomware is an issue that requires further exploration. One other reason as to why Kaseya-like attacks should be of concern is the indiscrimination of supply chain compromises, with everyone who installs a malicious update getting the malware. Before researchers and policymakers start looking for solutions, they must examine why supply chain compromise is fundamentally different from most other problems in cybersecurity. This article continues to discuss the Kaseya ransomware incident and why the information security community should worry about Kaseya-like attacks.

    Homeland Security News Wire reports "The Kaseya Ransomware Attack Is a Really Big Deal"

  • news

    Visible to the public "Cybercrime Costs Organizations Nearly $1.79 Million Per Minute"

    Researchers at RiskIQs discovered that cybercrime costs organizations an incredible $1.79m every minute. Their study, which analyzed the volume of malicious activity on the internet, laid bare the scale and damage of cyberattacks in the past year, finding that 648 cyberthreats occurred every minute. The researchers calculated that the average cost of a breach is $7.2 per minute, while the overall predicted cybersecurity spend is $280,060 every minute. E-commerce has been heavily hit by online payment fraud in the past year. While the e-commerce industry saw a record $861.1bn in sales, it lost $38,052 to online payment fraud every minute. The researcher also found that the healthcare industry lost $13 per minute on digital security breaches in the past year. The new study also looked at the impact of different forms of cybercrime. It showed that per minute there was $3615 lost to cryptocurrency scams, 525,600 records compromised, and six organizations victimized by ransomware. The researchers stated that the scale of cyberattacks last year was further underlined by the fact that one Magecart host was detected every 31 minutes, one vulnerable Microsoft Exchange server was patched every 1.7 minutes, and one malicious mobile app was blocklisted every five minutes.

    Infosecurity reports: "Cybercrime Costs Organizations Nearly $1.79 Million Per Minute"

  • news

    Visible to the public "Most Insider Data Breaches Aren't Malicious"

    Researchers at Code42 and Aberdeen Research have found that the majority of insider data breaches are non-malicious. In a new report titled "Understanding Your Insider Risk and the Value of Your Intellectual Property," the researchers found that at least one in three (33%) reported data breaches involve someone with authorized access to the impacted data. Another key finding of the report was that 78% of those insider data breaches involved unintentional data exposure or loss rather than any malice. The researchers observed employees repeatedly taking actions that put valuable company data at risk while fulfilling their day-to-day work responsibilities. The daily average of data-exposure events by trusted insiders per user was 13 and included moving corporate files to untrusted locations via email, messaging, cloud, or removable media. While such breaches are unlikely to be caused by malice, they can still have a significant financial impact on a business. The study found that the cost per year of breaches caused by insiders can reach up to 20% of annual revenue. The researchers stated that businesses struggle to maintain data security as most do not have consistent, centralized visibility over their digital environments. Researchers found that 75% of organizations lack the tools necessary to track how much enterprise file movement their organization has and lack the tools to monitor how frequently valuable files are exposed by legitimate users carrying out their daily tasks. Another key finding of the research was that in 2020 a breach was four and a half times more likely to happen on an endpoint than on a server.

    Infosecurity reports: "Most Insider Data Breaches Aren't Malicious"

  • news

    Visible to the public "Critical Infrastructure Cyberattacks Signaling The Importance of Prioritizing Security"

    Researchers at Armis released new data uncovering the lack of knowledge and general awareness of major cyberattacks on critical infrastructure and an understanding of security hygiene. During a new survey of over 2,000 respondents from across the United States, researchers found that end users are not paying attention to the significant attacks plaguing operational technology and critical infrastructure across the country, signaling the importance of businesses prioritizing a focus on security as employees return to the office. In the past year, 65,000 ransomware attacks occurred in the United States. In other words, approximately 7 attacks per hour, which is expected to continue to rise. Over 21% of respondents have not even heard about the cyberattack on the largest U.S. fuel pipeline, and 45% of working Americans did not hear about the attempted tampering of Florida's water supply. The researchers stated that the severity of the cyberattacks on critical infrastructure is not sticking. Despite the complete shutdown of the Colonial Pipeline following the attack and the halting of production at JBS, consumers don't see the lasting effects of these attacks. Almost a quarter (24%) of respondents believe that the Colonial Pipeline attack will not have any long-lasting impact on the U.S. fuel industry. The researchers believe that healthcare could be the next frontier for hackers. More than half (63%) of healthcare delivery organizations have experienced a security incident related to unmanaged IoT devices over the past two years. The data from the survey shows that when it comes to device security, over 60% of healthcare employees believe that their personal devices do not pose any security threat to their organization, and 26% even said that their companies do not have any policies in place to secure both work and personal devices.

    Help Net Security reports: "Critical Infrastructure Cyberattacks Signaling The Importance of Prioritizing Security"

  • news

    Visible to the public "Lookout Discovers Cryptomining Scams Targeting Tens Of Thousands Of Victims Using Hundreds Of Android Apps"

    Researchers at the integrated endpoint-to-cloud security company Lookout identified more than 170 Android apps being used for cryptocurrency mining scams. These apps are categorized into two Android app families, BitScam and CloudScam, and have swindled over 93,000 victims. Only 25 of the apps were available for download on the Google Play store. The BitScam and CloudScam apps were claimed to provide cloud cryptocurrency mining services for a price. The analysis of the apps found that they do not actually perform cloud cryptocurrency mining. The scammers behind the apps took the money spent on them and upgraded without delivering any of the advertised services. According to the researchers, the apps allowed scammers to steal a total of over $350,000 from victims. Ioannis Gasparis, a mobile application security researcher at Lookout, said the apps were able to go undetected because they do not perform malicious activities. The apps were instead used as shells to attract users interested in cryptocurrencies and collect money paid for nonexistent services. Google has now removed the BitScam and CloudScam cryptomining apps from the Google Play store. However, there are more of these apps available for download on third-party stores. This article continues to discuss the discovery of hundreds of Android apps that have been used to target thousands of victims with cryptocurrency mining scams.

    AiThority reports "Lookout Discovers Cryptomining Scams Targeting Tens Of Thousands Of Victims Using Hundreds Of Android Apps"

  • news

    Visible to the public  "The Top 5 Most Dangerous Criminal Organizations Online Right Now"

    Ransomware attacks continue to grow in size, frequency, and ransom demand. It is essential to understand the groups behind these attacks in order to take them down. The top five most dangerous criminal organizations currently online include DarkSide, REvil, Clop, the Syrian Electronic Army, and FIN7. DarkSide was the group behind the ransomware attack against the U.S. Colonial Pipeline's fuel distribution network that led to gas shortages and higher prices. REvil is a Russia-based ransomware-as-a-service group that recently targeted the global meat processing company JBS. The Clop ransomware group has yielded half a billion U.S. dollars through its double-extortion tactic in which threats are made to targeted organizations to pay an extra ransom so that stolen data is not leaked to the public. The Syrian Electronic Army is a hacktivist group as it is known for launching online attacks to promote political propaganda. FIN7 is another Russia-based group that is arguably the most successful online criminal organization of all time, as many of its operations have been undetected for years. This article continues to discuss recent ransomware attacks, the top five most dangerous online criminal organizations, and why it is difficult for law enforcement agencies to take such organizations down.

    The Conversation reports "The Top 5 Most Dangerous Criminal Organizations Online Right Now"

  • news

    Visible to the public "Cybercriminals Are Deploying Legit Security Tools Far More Than Before, Researchers Conclude"

    According to a report released by researchers at Proofpoint, financially motivated cybercriminals are increasingly using legitimate security tools in the performance of their attacks. The report reveals that there has been a significant increase in attacks using Cobalt Strike, which is a legitimate tool used by cybersecurity professionals to test system security. The number of attacks involving Cobalt Strike grew by 161 percent in 2020. Proofpoint researchers have already observed the tool targeting tens of thousands of organizations in 2021. Threat groups have been able to access the tool through the circulation of pirated versions on the dark web. Sherrod DeGrippo, senior director of threat research and detection at Proofpoint, calls on the cybersecurity community to examine how illegitimate use of offensive security tools has increased among Advanced Persistent Threat (APT) actors and cybercriminals alike. Financially motivated threat actors are now armed like groups supported by different governments. This article continues to discuss the increased use of legitimate security testing tools among cybercriminals, the popularity of Cobalt Strike, and the growth in the use of trusted services to distribute malware.

    CyberScoop reports "Cybercriminals Are Deploying Legit Security Tools Far More Than Before, Researchers Conclude"

  • news

    Visible to the public "Lazarus Hackers Target Engineers Using Malware-Laced Job Ads"

    Researchers at AT&T Cybersecurity have discovered a new phishing campaign that is targeting engineering applicants and employees in classified engineering roles across the U.S. and Europe. They revealed that the Lazarus hacking group is behind the new phishing campaign. Between May to June 2021, Twitter users identified several malicious documents attempting to impersonate new defense contractors and engineering companies such as Airbus, General Motors (GM), and Rheinmetall. All of these documents were found to contain macro malware, which has been altered during the course of this campaign from one target to another. The first two documents identified in early May 2021 relate to Rheinmetall, a German Engineering company focused on the automotive and defense industries. A similar document targeting General Motors had minor updates in the Command and Control (C&C) communication process. Another malicious document targeting Airbus had different execution and injection processes. Researchers warn that the new activity is in line with the Lazarus group's campaigns and will not be the last. Lazarus continues to use the same tactics, techniques, and procedures (TTPs), such as using Microsoft Office documents that can download remote templates, leveraging compromised third-party infrastructure to host the payloads, and more. This article continues to discuss the researchers' findings surrounding the Lazarus group's new phishing campaign against engineers.

    ITPro reports "Lazarus Hackers Target Engineers Using Malware-Laced Job Ads"

  • news

    Visible to the public "Official Formula 1 App Hacked"

    Fans of Formula One International auto racing were sent strange messages over the holiday weekend after the sport's official app was hacked. A spokesperson for F1 stated that no customer data is believed to have been compromised during the incident. Two push notifications were sent out, the first of which, delivered at around 8PM CEST on Saturday, only contained the message "foo." The researchers stated that programmers are known to use the metasyntactic variable "foo" as a placeholder for a value that can change, depending on conditions or on information passed to the program. App users were then sent a not so confusing but more worrying message that read, "Hmmmm, I should check my security.. :)". The unsettling incident, which prompted F1 to launch an investigation, appeared to end there. An F1 spokesperson said that a probe into the incident confirms that this targeted attack was limited to the Push Notifications Service. The hack raised some concerns among the app's users. Researchers stated that while this hack may only have resulted in a mischievous message being sent to users, it certainly had the potential to be much worse. The researchers also stated that In-app messages could, for example, be used to create very convincing phishing campaigns.

    Infosecurity reports: "Official Formula 1 App Hacked"

  • news

    Visible to the public "Researchers Find New Ransomware Variant 'Diavol'"

    Researchers at Fortinet have discovered a new ransomware variant called Diavol, which has been observed targeting organizations since June 2021. Although Diavol is a new ransomware threat, it is believed to have a connection with the Russia-based cybercriminal group Wizard Spider. According to the researchers, Diavol leverages Asynchronous Procedure Calls (APCs) with a unique encryption procedure. This ransomware leaves a ransom note in every folder it encrypts. Diavol ransomware does not apply any tactics for evading detections, but the group behind it is using an anti-analysis method to disguise the ransomware code. The researchers found that Diavol ransomware has similarities with Conti and Egregor ransomware. For example, the command lines used by Diavol are similar to those used by Conti ransomware. Conti and Diavol ransomware also operate with synchronous I/O operations in the encryption of files. However, the attackers behind Diavol ransomware may have set up these similarities intentionally to confuse the security experts analyzing it. This article continues to discuss the spread and attack flow of Diavol ransomware, as well as its similarities to Conti and Egregor ransomware.

    CISO MAG reports "Researchers Find New Ransomware Variant 'Diavol'"

  • news

    Visible to the public "INTERPOL Offers National Cybercrime Strategy Guidebook"

    The International Criminal Police Organization's (INTERPOL) National Cybercrime Strategy Guidebook is a part of phase two of the ASEAN Cyber Capacity Development Project (ACCDP II), the purpose of which is to bolster countries' ability to defend against cybercrime and collaborate internationally. The ACCDP addresses the need for criminal justice authorities to improve their cyber skills, knowledge, and regional partnerships via tailored activities and products. This project is a component of INTERPOL's response to global cybercrime and supports the implementation of its global cybercrime strategy. INTERPOL supports national efforts to fight cybercrime, which is considered an international focus area together with terrorism and organized crime. The Guidebook is designed to be used by any country seeking to develop, review, or improve its national cybercrime strategy, as the information provided is not tailored to any specific region. This article continues to discuss the development, goals, and content of INTERPOL's National Cybercrime Strategy Guidebook.

    HSToday reports "INTERPOL Offers National Cybercrime Strategy Guidebook"

  • news

    Visible to the public "Kaseya Says up to 1,500 Victims Affected by Ransomware, as Biden Directs 'Full Resources' to Investigate"

    A massive ransomware attack has compromised up to 1,500 businesses, according to a Tuesday update from a Florida IT company called Kaseya. Kaseya offers its VSA platform to managed service providers (MSPs) to whom other companies outsource IT functions. The company stated that only 50 of its 35,000 customers had been breached, but given the reach of its MSP customers, 50 victims can quickly multiply into many, many more. The self-proclaimed culprit behind the attacks is the Russia-based ransomware gang REvil. REvil claims that this attack has affected more than 1 million victims and is seeking $70 million in cryptocurrency collectively. Researchers at the Dutch Institute for Vulnerability Disclosure stated that the attackers exploited previously unknown zero-day vulnerabilities that Kaseya was in the midst of patching when the outbreak began. The researchers noted that the Kaseya-filtered attack is more globally disbursed than other ransomware attacks and compared this ransomware incident to the 2017 WannaCry cryptoworm that infected hundreds of thousands of computers. The company shut down the software over the holiday weekend and also released detection tools.

    CyberScoop reports: "Kaseya Says up to 1,500 Victims Affected by Ransomware, as Biden Directs 'Full Resources' to Investigate"

  • news

    Visible to the public PrintNightmare impacts all Windows versions

    The PrintNightmare vulnerability is part of the Windows Print Spooler and allows remote code execution. This enables hackers to gain system privileges on a device to install programs, view, change, and delete data and create accounts with full user rights. Some mediation was provided with Microsoft patches released on June 8—but not everything has been fixed. Watch for future updates. https://www.pcmag.com/news/microsoft-confirms-printnightmare-vulnerability-affects-all-windows-versions
  • news

    Visible to the public "Attackers Already Unleashing Malware for Apple macOS M1 Chip"

    The growing popularity of Apple Macs among enterprises is accompanied by the increasing number of malware variants targeting macOS. The arrival of Apple's new ARM64-based M1 processors has come with a new generation of malware specific to macOS. Most macOS-specific malware variants have been found to be repurposed from Windows malware variants. The shift to working from home due to the COVID-19 pandemic has increased the use of Macs for work activities as some employees' home offices include Mac devices, thus making them a more attractive target for attackers seeking to compromise enterprises. Mac security expert Patrick Wardle has already observed an increasing number of malware variants written specifically for the M1 platform. M1 provides faster and more efficient processing, graphics, and longer battery life. It also comes with new security features to protect the machine from remote exploitation and provide physical access protection. Still, Wardle discovered that new macOS malware could circumvent many anti-malware tools. Wardle will share his findings from the reverse engineering and analysis of M1-specific malware samples at Black Hat USA in Las Vegas to help threat hunters and researchers better detect such malware. When he split out the binaries for macOS malware (one built for the Intel-based Mac platform and the other for the M1-based platform), anti-malware systems were found to detect malware targeting the Intel platform more than macOS malware targeting the M1 platform, despite the binaries being logically identical. This finding suggests that existing antivirus signaures tend to be created only for the Intel variant of macOS malware. This article continues to discuss the increased targeting of Apple's new ARM-based M1 processors by malware authors and the research conducted by Patrick Wardle to help spot new macOS malware.

    Dark Reading reports "Attackers Already Unleashing Malware for Apple macOS M1 Chip"

  • news

    Visible to the public "Building a Better 'Canary Trap'"

    A canary trap in espionage is the spread of multiple versions of false documents to hide a secret. The canary trap technique can be used to detect information leaks or create distractions that conceal valuable information. A team of researchers at Dartmouth's Department of Computer Science developed a new data protection system called WE-FORGE that uses Artificial Intelligence (AI) to expand upon the canary trap method. The system protects intellectual property such as drug designs and military technologies by producing false documents. WE-FORGE improves upon the canary technique by using natural language processing to automatically generate multiple fake files that are sufficiently similar to the original ones to be believable but different enough to be incorrect. The system also adds randomness to prevent adversaries from identifying real documents. WE-FORGE can create many fake versions of any technical design document, thus making it significantly difficult for adversaries to determine which document is real once they have successfully hacked a system. The use of this technique causes adversaries to waste their time and resources, as well as have lower confidence. This article continues to discuss the concept of canary traps in espionage and how the WE-FORGE data protection system builds on this technique to better deceive would-be attackers.

    Homeland Security News Wire reports "Building a Better 'Canary Trap'"

  • news

    Visible to the public "CISA Begins Cataloging, Publicizing Bad Cyber Practices"

    The U.S. Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) is cataloging bad cybersecurity practices to help critical infrastructure providers improve the prioritization of their cybersecurity responsibilities. The list will be updated based on cybersecurity professionals' feedback. Recent events have brought further attention to the significant impact that cyberattacks against critical infrastructure can have on essential functions of government and the private sector. Organizations, especially those designated as National Critical Functions (NCF), must implement effective cybersecurity programs to manage cyber risks and defend against cyber threats. According to CISA, bad cyber practices in an organization that supports NCFs are dangerous because any disruption, corruption, or dysfunction to its systems could weaken security, national economic security, national public health, and national public safety. The bad practices catalog currently only includes two practices. These practices involve the use of unsupported software and fixed default passwords and credentials in service of NCFs. This article continues to discuss the purpose and current status of CISA's bad practices catalog.

    MeriTalk reports "CISA Begins Cataloging, Publicizing Bad Cyber Practices"

  • news

    Visible to the public "Smart Home Experiences Over 12,000 Cyber-Attacks in a Week"

    According to a new investigation, smart homes could experience more than 12,000 cyberattacks in a single week. The consumer group Which? partnered with NCC Group and the Global Cyber Alliance (GCA) to conduct an experiment in which a home was filled with numerous IoT devices, including TVs, thermostats, and smart security systems. The researchers then analyzed the number of attempted hacks that took place over several weeks. The researchers revealed a "breathtaking" amount of hacks and unknown scanning attacks targeting these devices, rising to 12,807 unique scans/hacks during a single week in June. In this week, the most common method used was attempting to log in to the devices through weak default usernames and passwords, such as 'admin.' There was a total of 2435 specific attempts to maliciously log into devices in this way, equating to 14 per hour. Encouragingly, most of the devices withstood the attacks, although a wireless camera from Amazon was hacked, which allowed a malicious actor to spy on the home. The device, the ieGeek security camera, has since been removed from sale from Amazon's website following the study. Surprisingly, the researchers stated that an Epson printer was the most frequently targeted device in the house, but attacks failed as it had "reasonably strong default passwords in place." According to the researchers, having unique default passwords also protected a Yale security system and a Samsung smart TV from attacks. The analysis found that the hacking attempts took place from various locations worldwide, with the vast majority originating from the USA, India, China, and the Netherlands.

    Infosecurity reports: "Smart Home Experiences Over 12,000 Cyber-Attacks in a Week"

  • news

    Visible to the public "Hacked Data for 69K LimeVPN Users Up for Sale on Dark Web"

    According to researchers, the VPN provider known as LimeVPN has been hit with a data breach affecting 69,400 user records. Recently a hacker claimed to have stolen the company's entire customer database before knocking its website offline. The stolen records consist of user names, passwords in plain text, IP addresses, and billing information, according to researchers at PrivacySharks. Researchers added that the attack also included public and private keys of LimeVPN users. The hacker stated that they have the private keys of every user, which is a severe security issue as it means they can easily decrypt every LimeVPN user's traffic. Even though LimeVPN is not a large provider like Surfshark or NordVPN, the fact that its entire database was scraped raises the question of security among VPN providers.

    Threatpost reports: "Hacked Data for 69K LimeVPN Users Up for Sale on Dark Web"

  • news

    Visible to the public "Microsoft Reveals Authentication Failures, System Hijack Vulnerabilities in Netgear Routers"

    Microsoft's team of security researchers discovered three vulnerabilities in Netgear DGN-2200v1 series routers, running firmware before v1.0.0.60. The researchers have stressed that these vulnerabilities could allow attackers to roam freely through an entire organization as their exploitation enables data leaks and full system compromise. The series of vulnerabilities were discovered after noticing strange behavior in a Netgear DGN-2200v1 router's management port. Although communication was protected with TLS encryption, it was still flagged as anomalous when Machine Learning (ML) models were employed. Further investigation of the router firmware revealed three HTTPd (Hypertext Transfer Protocol daemon) authentication flaws. The first vulnerability enables access to any page on a device, including those that should require authentication, such as router management pages. The second flaw allows the launch of side-channel attacks. This flaw stems from how the router verifies users via HTTP headers. The exploitation of this vulnerability could allow attackers to extract stored credentials. The third security flaw utilizes the previous authentication bypass bug to extract the router's configuration restore file, which was encrypted using a constant key. Remote attackers could use this vulnerability to decrypt and extract stored secrets. Netgear learned about these security issues through the Microsoft Security Vulnerability Research (MSVR) program and then patched them. The bugs have been issued CVSS severity scores between 7.1 and 9.4. This article continues to discuss the critical security bugs that allow the takeover of Netgear routers and the growing number of firmware attacks and ransomware attacks via VPN devices and other internet-facing systems.

    ZDNet reports "Microsoft Reveals Authentication Failures, System Hijack Vulnerabilities in Netgear Routers"

  • news

    Visible to the public "Malware Actors Have Begun Using AutoHotkey Scripts For Attacks"

    Living-off-the-Land (LotL) attacks involve the use of trusted pre-installed system tools to avoid installing foreign files or tools, thus allowing threat actors to hide their malicious activity. New LotL attacks have been overserved using AutoHotkey, which is a free, open-source scripting language for Microsoft Windows. AutoHotkey allows users to create scripts for various tasks such as auto-clicking, form fillers, and more. A recent attack that occurred in mid-May 2021 was observed misusing AutoHotkey. The Remote Access Trojan (RAT) delivery campaign started with an AutoHotkey-compiled script that loaded an executable, which branched into one of four versions when it ran. These versions involved different VBScripts and malware payloads, including Houdini, VjW0rm, and HCrypt. One of the ways companies can defend themselves against attacks via AutoHotkey scripts is to invest in security awareness training programs that use phishing tests. Such tests will make employees more familiar with email-based attacks. In addition to awareness training, companies are encouraged to carefully review native apps and tools used by employees to perform their normal work activities. This article continues to discuss the concept of LotL attacks, examples of malicious campaigns in which AutoHotkey scripts were used, and how employers can defend themselves against such attacks.

    Security Intelligence reports "Malware Actors Have Begun Using AutoHotkey Scripts For Attacks"

  • news

    Visible to the public "Business Professors Study Ideal Responses to Ransomware Attacks"

    Business professors and a doctoral student at the University of Texas at Arlington (UTA) are looking at how ransomware attacks, in some cases, can set organizations against the law enforcement agencies that are trying to protect them. Their study titled "Coping with Digital Extortion: An Experimental Study on Benefit Appeals and Normative Appeals" explains that companies find it sensible to negotiate with their attackers to decrease the demanded ransom. However, the decision to negotiate with ransomware attackers motivates the malicious actors to continue performing such attacks, thus countering the FBI's suggestion to not give in to paying a ransom. Part of the UTA study looks at how companies can be nudged into adopting strategies that decrease the risk of digital extortion. The researchers used behavioral game theory in the exploration of tactics, such as investing in cybersecurity or refusing to pay ransoms. They conducted experiments involving human subjects to analyze decisions made by interacting players. The study suggests that even if companies pay the ransom, they still have to pay for added security. This article continues to discuss the UTA study that explores responses to ransomware attacks.

    UTA reports "Business Professors Study Ideal Responses to Ransomware Attacks"

  • news

    Visible to the public "Data Breach at Las Vegas Hospital"

    An investigation has been launched into a data breach that occurred in June at a hospital in Las Vegas. The University Medical Center (UMC) is a nonprofit public hospital affiliated with the Kirk Kerkorian School of Medicine at UNLV and operated by the Clark County Commission. The hospital houses the Silver State's only Level 1 trauma center. On Monday, ransomware gang REvil claimed to have hacked into their computer network and exfiltrated data belonging to the hospital. Sensitive information allegedly swiped by the gang includes Nevada driver's licenses, passports, and Social Security numbers. Images of what appear to be stolen data belonging to at least six victims were uploaded to the hacking group's website on the darknet. On Tuesday, UMC acknowledged that its network had been compromised in the middle of June when a server was accessed without authorization. The hospital said that the matter had been reported to law enforcement, who were now investigating it as a cyberattack. The hospital stated that there is no evidence that any clinical systems were accessed during the attack.

    Infosecurity reports: "Data Breach at Las Vegas Hospital"

  • news

    Visible to the public "CISA Releases New Ransomware Self-Assessment Security Audit Tool"

    The US Cybersecurity and Infrastructure Security Agency (CISA) has released the Ransomware Readiness Assessment (RRA), a new module for its Cyber Security Evaluation Tool (CSET). RRA is a security audit self-assessment tool for organizations that want to understand better how well they are equipped to defend against and recover from ransomware attacks targeting their information technology (IT), operational technology (OT), or industrial control system (ICS) assets. CISA stated that RRA is intended to help an organization improve by focusing on the basics first and then progressing by implementing practices through the intermediate and advanced categories.

    Bleeping Computer reported: "CISA Releases New Ransomware Self-Assessment Security Audit Tool"

  • news

    Visible to the public "High-Severity Vulnerabilities Found in Several Phoenix Contact Industrial Products"

    The Germany-based industrial solutions provider Phoenix Contact recently informed customers about ten vulnerabilities that have been identified across many of its products. Advisories published by Phoenix Contact and Germany's CERT VDE say the vulnerabilities were pointed out by various researchers and companies. Firmware updates were released to address many of the flaws. For some of the flaws, only recommendations were provided by the vendor for preventing attacks. Two of the vulnerabilities are described as a high-severity security bypass issue and a medium-severity Denial-of-Service (DoS) flaw. These vulnerabilities impact Phoenix Contact's TC router, FL MGUARD modules, ILC 2050 BI building controllers, and PLCNext products. Another high-severity flaw, which could allow the installation of malicious firmware on a device, affects SMARTRTU AXC remote terminal and automation systems, EEM-SB37x energy meters, CHARX control modular AC charging controllers, and PLCNext products. Three of the vulnerabilities that can be exploited for DoS attacks and Cross-Site Scripting (XSS) attacks, impact FL SWITCH SMCS series switches. The exploitation of the XSS bug can allow an attacker to inject malicious code into a device's web-based management interface. This article continues to discuss the potential exploitation and impact of the security vulnerabilities discovered in different Phoenix Contact industrial products.

    Security Week reports "High-Severity Vulnerabilities Found in Several Phoenix Contact Industrial Products"

  • news

    Visible to the public "IT, Healthcare, and Manufacturing Facing Most Phishing Attacks"

    Researchers at the email and collaboration security firm Avanan analyzed over 905 million emails for the 1H 2021 Global Phish Cyber Attack Report. The company discovered that their customers in the IT, healthcare, and manufacturing industries are most targeted by phishing attacks. The researchers found 9,000 phishing emails targeting the IT industry in a one-month span out of almost 400,000 total emails. Avanan's healthcare industry customers saw over 6,000 phishing emails in one month out of an average of more than 450,000 emails. Their manufacturing customers saw a little less than 6,000 phishing emails out of nearly 330,000 total emails. The Avanan researchers believe these industries are attractive targets for phishing attacks because of the massive amount of data they collect and the continued use of outdated technology that provides points for attack. Most phishing attacks were found to involve either impersonation or credential harvesting. Over 50 percent of all phishing attacks involve credential harvesting, which is almost a 15 percent increase since 2019. Nearly 20 percent of all phishing attacks are associated with Business Email Compromise (BEC). The report revealed that non-executive accounts are targeted 77 percent more than other accounts, with almost 52 percent of all impersonation emails appearing to be from a non-executive account at an enterprise. This article continues to discuss additional findings from Avanan regarding phishing attacks in the first half of 2021.

    ZDNet reports "IT, Healthcare, and Manufacturing Facing Most Phishing Attacks"

  • news

    Visible to the public "End Users in the Dark About Latest Cyberthreats, Attacks"

    A survey was conducted by the IoT security firm Armis to which 2,000 employees across various industries responded. They were surveyed on their knowledge pertaining to current security events and best practices. The results from the survey show that there is a lack of awareness of major cybersecurity incidents in the U.S. Of the professionals surveyed, 21 percent revealed that they had not heard about the Colonial Pipeline ransomware attack. Of those who were aware of the Colonial Pipeline cyberattack, 24 percent did not believe it would have a lasting impact on the U.S. oil industry, despite it causing localized fuel shortages, increasing gas prices, sparking panic buying, and dominating headlines. More than 40 percent said they were not aware of the February attack at a water treatment facility in Oldsmar, Florida, in which an attacker compromised a control system and attempted to taint the municipal water supply. Armis suggests that the lack of awareness surrounding such incidents and the risks they pose means basic security procedures are probably not being followed. For example, 54 percent of the respondents did not believe connecting their personal devices to their company network will present a security risk to their company. Companies are encouraged to improve their network security and keep their users informed of the heightened risk for cyberattacks in the current climate. This article continues to discuss the key findings from the Armis survey on the level of awareness of current security events and best practices, and how a lack of end-user knowledge increases risk for cyberattacks.

    SearchSecurity reports "End Users in the Dark About Latest Cyberthreats, Attacks"

  • news

    Visible to the public "Data for 700M LinkedIn Users Posted for Sale in Cyber-Underground"

    After 500 million LinkedIn enthusiasts were affected in a data-scraping incident in April, it's happened again. Researchers at Privacy Sharks discovered a new posting with 700 million LinkedIn records on a popular hacker forum called RaidForums. The records were posted by a hacker calling himself "GOD User TomLiner." The advertisement, published on June 22nd, claims that 700 million records are included in the cache and included a sample of 1 million records as "proof." The researchers examined the free sample and saw that the records include full names, gender, email addresses, phone numbers, and industry information. The researchers stated that it is unclear what the origin of the data is but that the scraping of public profiles is a likely source. According to LinkedIn, no breach of its networks has occurred.

    Threatpost reports: "Data for 700M LinkedIn Users Posted for Sale in Cyber-Underground"

  • news

    Visible to the public "Major Threats to Cloud Infrastructure Security Include a Lack of Visibility And Inadequate IAM"

    Researchers at Ermetic conducted a new study where they surveyed 200 CISOs and other security decision-makers and found that nearly 60% of the participants consider lack of visibility as well as inadequate identity and access management a significant threat to their cloud infrastructure. The participants also cited access risk and infrastructure security among their top cloud security priorities for the next 18 months. Most (98%) of the companies in the survey experienced a cloud data breach in the past 18 months, compared to 79% last year. More than half of the companies (67%) reported three or more incidents in the past 18 months. Most (83%) of the enterprises stated that at least one of their cloud breaches was related to access. More than half (63%) of respondents said that their organization had sensitive data exposed in the cloud, and this number increased to 85% for companies with annual cloud infrastructure budgets of $50M or more. Many (71%) of the organizations use commercial security tools offered by cloud providers and reported that these tools require a lot of time. Only 20% of organizations said they are very satisfied with their cloud security posture. Most of the companies (92%) stated they tried, are trying, or will try to implement least privilege in the cloud in the next 12 months. Half of large organizations reported they are struggling to implement least privilege.

    Help Net Security reports: "Major Threats to Cloud Infrastructure Security Include a Lack of Visibility And Inadequate IAM"