News Items

  • news

    Visible to the public "New Two-Step Algorithm Could Prove 'a Paradigm Shift' in Cloud Data Confidentiality"

    Although cloud computing provides fast, easy-to-use computing and inexpensive data storage services, the cloud environment does come with data confidentiality risks. Cryptography is a mathematical technique that strengthens cloud computing security by encrypting stored or transmitted data. There is a variety of encryption techniques to apply, but none are 100 percent secure. A team of researchers from Yemen and India described a novel, two-step cryptography technique in a recent study shared in KeAi's International Journal of Intelligent Networks. This technique is said to be the first to combine genetic technology with mathematical techniques. According to the researchers, their proposed algorithm creates a complex cryptographic environment with a high level of security and flexibility, which could lead to a paradigm shift in data confidentiality. The researchers evaluated their algorithm's robustness by measuring encryption time, decryption time, throughput, and cipher-text length. In comparison with other genetic encryption techniques and existing symmetric key encryption techniques, the new proposed algorithm has high security strength and better flexibility. Their algorithm requires relatively less time than other techniques. The algorithm's clear structure, which includes two layers of encryption containing only four coding rounds, also reduces computational and processing strength complexity. This article continues to discuss the proposed two-step cryptography method that combines genetic technology with mathematical techniques.

    KeAi reports "New Two-Step Algorithm Could Prove 'a Paradigm Shift' in Cloud Data Confidentiality"

  • news

    Visible to the public "Nobelium Attackers Compromised Microsoft Customer Support Agent"

    The attackers behind the SolarWinds hack carried out another malicious campaign against government agencies and IT companies. They compromised a machine belonging to a Microsoft customer support agent who had access to customer data. The attack campaign targeted companies in 36 countries, with nearly half of the impacted companies being in the U.S. Customers whose accounts were affected by the compromise of the agent's machine have received a warning from Microsoft. According to Microsoft, the campaign was a phishing attack that performed password spraying to access accounts. Microsoft's Threat Intelligence Center said that most of the targets were not successfully compromised. Microsoft discovered the compromise of its customer service agent during the investigation of activity by the threat group Nobelium. This group has been found to be affiliated with the Russian SVR and is also referred to as APT29. The U.S. government has attributed the compromise of SolarWinds and many of its customers to Nobelium. Microsoft has not specified where the compromised customer service agent was located or whether the agent is a company employee or a contractor. The investigation also led to the detection of information-stealing malware on a customer support agent's machine that has access to account information for some of Microsoft's customers. In some cases, the threat actor used this information to launch highly targeted attacks as part of the broader campaign. This article continues to discuss the tactics used by Nobelium attackers in a recent campaign against government agencies and IT companies.

    Decipher reports "Nobelium Attackers Compromised Microsoft Customer Support Agent"

  • news

    Visible to the public "Cobalt Strike Usage Explodes Among Cybercrooks"

    Researchers from Proofpoint have found that the use of Cobalt Strike by cybercriminals is increasing. The researchers stated that the tool has now "gone fully mainstream in the crimeware world." The researchers have tracked a year-over-year increase of 161 percent in the number of real-world attacks where Cobalt Strike has shown up. That 161 percent increase happened between 2019 and 2020, but cybercriminals have not lost their taste for Cobalt Strike in 2021, and the researchers stated that it is still a high-volume threat. Cobalt Strike sends out beacons to detect network vulnerabilities. When used as intended, it simulates an attack. However, threat actors have figured out how to turn it against networks to exfiltrate data, deliver malware and create fake command-and-control (C2) profiles that look legit and slip past detection.

    Threatpost reports: "Cobalt Strike Usage Explodes Among Cybercrooks"

  • news

    Visible to the public "Danger Caused by Subdomains"

    A team of researchers from the Security & Privacy Research Unit at TU Wien and Ca' Foscari University discovered a new security vulnerability associated with subdomains. Large websites often consist of several subdomains (e.g., "sub.example.com" could be a subdomain of the website "example.com"). There are certain tricks that hackers could use to take control over such subdomains. The team analyzed the vulnerability and the scope of the problem. They studied 50,000 of the world's most popular websites and discovered 1,520 vulnerable subdomains. One might think that access to a subdomain is possible only if the administrator of the website explicitly allows it, but this is a misconception. A subdomain often points to another website physically stored on completely different servers. The owner of the website "example.com" may use an existing blogging service to add a blog to the website instead of building it from scratch. Therefore, the subdomain "blog.example.com" is connected to another site. The address bar would show the correct subdomain "blog.example.com," but the data will come from a different server. When this link is no longer valid, it will point to an external page that is not there. This presents the problem of dangling records, which are loose ends within the network of a website that provide ideal attack points. If these dangling records are not removed, attackers can use them to set up their own malicious page that appears as a legitimate subdomain. This article continues to discuss the researchers' findings surrounding the security vulnerability associated with subdomains.

    TU Wien reports "Danger Caused by Subdomains"

  • news

    Visible to the public "Mercedes Benz Data Leak Includes Card and Social Security Details"

    Mercedes Benz has released details of a data breach affecting customers and prospective buyers in the US. The luxury carmaker stated that a vendor had informed them on June 11th that information belonging to customers was inadvertently made accessible on a cloud storage platform. It appears that a third-party security researcher first raised the alarm to the vendor. Although the initial investigation was set to discover whether 1.6 million unique records had been exposed, subsequent findings indicated far fewer customers and interested buyers were affected. During the investigation, it was found that the personal information of fewer than 1,000 individuals was compromised. The information leaked was comprised mainly of self-reported credit scores and a minimal number of driver's license numbers, social security numbers, credit card information, and dates of birth. To view the information, the company stated that one would need knowledge of special software programs and tools and that an internet search would not return any information contained in the exposed files. The individuals affected entered their information on dealer and Mercedes-Benz websites between January 1, 2014, and June 19, 2017. Although it's unlikely that threat actors managed to locate and access the information, it's unclear how long it had been exposed for. Mercedes Benz USA confirmed that none of its systems were compromised in the incident and said the issue had been mitigated and can't happen again.

    Infosecurity reports: "Mercedes Benz Data Leak Includes Card and Social Security Details"

  • news

    Visible to the public "Hackers Use Cracked Games To Make Crypto-Millions"

    Researchers at the antivirus firm Avast discovered malware in cracked versions of popular games, such as The Sims 4, Grand Theft Auto V, Far Cry 5, and more, that have been distributed for free on forums. Malware called Crackonosh was found in these games. According to Avast, this malware can disable security tools and Windows Update. Crackonosh also runs cryptocurrency mining software called XMRig to mine Monero cryptocurrency. Hackers have built the XMRig mining tool into different pieces of malware, secretly impacting computer systems, including corporate systems. Through the distribution of Crackonosh malware, criminals have generated more than $2 million in Monero since 2018. Avast has detected more than 200,000 infected users, with 800 added each day. As this figure only covers Avast users, the number of infections is likely significantly higher. The Philippines, Brazil, and India have the most infections. This article continues to discuss hackers' use of Crackonosh malware to bypass security tools and secretly mine cryptocurrency from gamers' computers.

    Silicon UK reports "Hackers Use Cracked Games To Make Crypto-Millions"

  • news

    Visible to the public "Bill Would Create Cyber Workforce Training Programs at CISA and VA"

    The recently introduced bipartisan Federal Cybersecurity Workforce Expansion Act aims to strengthen government cybersecurity by improving the cyber workforce through the creation of two new cybersecurity training programs. These programs include an apprenticeship program based out of the government's central cybersecurity office, the Cybersecurity and Infrastructure Security Agency (CISA), and another at the Veterans Affairs (VA) Department geared toward veterans. The legislation would require CISA to establish an apprenticeship program to prepare trainees for a position at CISA or a job with a company or other entity given that the job is certified by the director as contributing to the national cybersecurity of the U.S., and funded mostly through a contract, grant, or cooperative agreement with the agency. VA would be required to create a veteran-focused program that offers virtual platforms for training, hands-on skills labs, federal work-based learning opportunities, and more. Both programs would be required to adhere to the National Institute of Standards and Technology's (NIST) National Initiative for Cybersecurity Education (NICE) framework, which sets standards for work roles and associated tasks, knowledge, and skills. Recent breaches that impacted the federal government and critical infrastructure sectors have prompted the introduction of this cybersecurity workforce legislation. This article further discusses the goals and requirements of the Federal Cybersecurity Workforce Expansion Act, and the importance of bolstering the cyber workforce.

    NextGov reports "Bill Would Create Cyber Workforce Training Programs at CISA and VA"

  • news

    Visible to the public "USB Threats Could Critically Impact Business Operations"

    According to a report released by Honeywell, USB threats that can severely impact business operations increased significantly during a disruptive year when the usage of removable media and network connectivity also grew. Researchers found that 37% of threats were specifically designed to utilize removable media, which almost doubled from 19% from the 2020 report. The researchers also found that 79% of cyber threats originating from USB devices or removable media could lead to critical business disruption in the operational technology (OT) environment. There was also a 30% increase in the use of USB devices in production facilities last year, highlighting the growing dependence on removable media. The researchers stated that many industrial and OT systems are air-gapped or cut off from the internet to protect them from attacks, which means intruders are using removable media and USB devices as an initial attack vector to penetrate networks and open them up to significant attacks.

    Help Net Security reports: "USB Threats Could Critically Impact Business Operations"

  • news

    Visible to the public  "Four States Propose Laws to Ban Ransomware Payments"

    Following the ransomware attacks on Colonial Pipeline and top meat producer JBS, some government officials have called on Congress and the administration to ban organizations from making ransom payments to threat actors. The goal of such a ban would be to codify the FBI's current advice: Don't pay ransomware attackers lest you encourage more of the same. Despite some support at the federal level, most members of Congress don't seem to embrace the idea of an outright ban fully. But the picture is different at the state level. So far, four states have five pending pieces of legislation that would either ban paying a ransom or substantially restrict paying it. New York stands alone in terms of barring private sector businesses from paying a ransom. Legislatures in North Carolina, Pennsylvania, and Texas are all considering bills that would prohibit the use of state and local taxpayer money or other public money to pay a ransom payment. This public money prohibition would likely hamstring local governments from paying off ransomware attackers.

    CSO Online reports: "Four States Propose Laws to Ban Ransomware Payments"

  • news

    Visible to the public "Data of 500K Patients Accessed, Stolen After Eye Clinic Ransomware Attack"

    The Iowa-based Wolfe Eye Clinic was hit with a ransomware attack earlier this year in February, resulting in the access and possible theft of data belonging to 500,000 patients. An unauthorized individual was observed attempting to access the network on February 8. While the attack occurred in February, its complexity and scope were not determined until the end of May. The attacker accessed and possibly stole information, such as names, contact details, dates of birth, and Social Security numbers. The information accessed by the attacker varied by patient. For example, in some cases, medical and health information was affected. Patients impacted by the incident will be provided with one year of free identity monitoring. As part of the response, Wolfe Eye Clinic implemented additional safeguards and enhanced its security. This article continues to discuss the impact of the Wolfe Eye Clinic ransomware attack as well as other notable cyberattacks that have targeted healthcare organizations so far this year.

    SC Media reports "Data of 500K Patients Accessed, Stolen After Eye Clinic Ransomware Attack"

  • news

    Visible to the public Firmware Security Issues put 30 Million Dell Devices at Risk

    30 million Dell devices are at risk from firmware security issues. Researchers from Eclypsium report that 128 recent models including desktops, laptops, and tablets are exposed. The problems show up in a Dell feature called BIOSConnect which allows users to easily and even automatically receive firmware updates. While attackers need a foothold into the internal network, it is still an attractive target for hackers because of the ease of exploitation and insufficient monitoring.
  • news

    Visible to the public "74% of Q1 Malware Was Undetectable Via Signature-Based Tools"

    WatchGuard Technologies analyzed threat data collected from customer networks during the first quarter of 2021. The analysis revealed that 74 percent of threats detected were zero-day malware, which were able to evade signature-based threat detection tools and breach enterprise systems. According to the security vendor, the number of zero-day malware detections in the first quarter was the highest number that WatchGuard has ever seen in a single quarter. This finding calls on enterprises and organizations of all sizes to take proactive malware detection more seriously. Attackers continue to get better at repackaging old malware so that its binary profile does not match previous fingerprints used to detect it. Tools that make it easy for attackers to digitally alter the same malware in order to bypass signature-based systems are now more readily available. WatchGuard's analysis also found that network attack volumes reached a three-year high in the first quarter of this year, with over 4.2 million hits on its intrusion prevention systems at customer suites. The company's Firebox appliances blocked an average of 113 attacks per appliance, a 47 percent increase over the previous quarter. WatchGuard observed a decline in malware using encrypted communications during the first quarter. The vendor says malware sent over encrypted communication declined below 44 percent last quarter, which is a 10 percent decrease from the third quarter of 2020 and a 3 percent drop from the fourth quarter of 2020. Findings surrounding the first quarter of 2021 emphasize the need for organizations to implement more advanced protections than signature and pattern-based tools. Organizations need controls for blocking threats prior to execution and for detecting and responding to them after execution. This article continues to discuss WatchGuard's findings regarding the rise in zero-day malware and network attack volumes.

    Dark Reading reports "74% of Q1 Malware Was Undetectable Via Signature-Based Tools"

  • news

    Visible to the public "Data Breach at WorkForce West Virginia"

    Personal information belonging to job seekers residing in West Virginia may have been exposed during a security incident at WorkForce West Virginia. The breach was confirmed yesterday by West Virginia governor Jim Justice. In a breach notification that was sent out, the letters state that WorkForce learned on April 13 that an unauthorized individual had accessed a job-seekers database. The unknown cyber-criminal may have gained access to the database via the Mid-Atlantic Career Consortium Employment Services database or MACC website. West Virginians use the MACC to register for job services before applying for unemployment benefits. Data compromised in the incident may have included names, addresses, phone numbers, dates of birth, and Social Security numbers.

    Infosecurity reports: "Data Breach at WorkForce West Virginia"

  • news

    Visible to the public "Tulsa: Ransomware Attackers Leaked 18,000 Files"

    The City of Tulsa has learned that the persons responsible for the ransomware attack that it faced in May 2021 leaked more than 18,000 city files on the dark web. According to a statement from the city officials, most of the files are police citations and internal department files. The police citations include Personal Identifiable Information (PII), such as names, dates of births, addresses, and driver's license numbers. Brett Callow, a threat analyst with Emsisoft, identified the Conti ransomware group to be the attacker behind the incident. Callow says the Tulsa ransomware attack marks the 37th time a municipality has been hit with ransomware this year. Residents who have filed a police report, received a police citation, made a payment with the city, or interacted with the city online, in-person, or on paper before May 2021 are advised to take monitoring precautions. This article continues to discuss the May 2021 Tulsa ransomware attack, the leak of over 18,000 city files via the dark web, and what potential victims are advised to do to protect themselves.

    BankInfoSecurity reports "Tulsa: Ransomware Attackers Leaked 18,000 Files"

  • news

    Visible to the public "NSA Funds Development, Release of D3FEND"

    The federal research and development organization MITRE has released D3FEND, a framework for cybersecurity professionals to tailor defenses against specific cyber threats. The framework was funded by the National Security Agency (NSA) to strengthen the cybersecurity of National Security Systems, the Department of Defense, and the Defense Industrial Base. MITRE released the D3FEND technical knowledge base of defensive countermeasures for common offensive techniques as a complement to its ATT&CK framework, a knowledge base of cyber adversary tactics and techniques based on real-world observations. D3FEND establishes terminology of computer network defensive techniques and helps clarify previously unspecified relationships between defensive and offensive methods. In addition, this framework brings further attention to the complex interaction between computer network architectures, threats, and cyber countermeasures. The cybersecurity community is encouraged to promote the use of common language by cybersecurity professionals across government, industry, and academia. This article continues to discuss D3FEND and the importance of such frameworks.

    HS Today reports "NSA Funds Development, Release of D3FEND"

  • news

    Visible to the public "Cloud Database Exposes 800M+ WordPress Users' Records"

    According to Website Planet, a misconfigured cloud database exposed over 800 million records linked to WordPress users before its owner was notified. The trove was left online with no password protection by US hosting provider DreamHost. The data in the database appeared to date back to 2018. In the 86GB database, there was purportedly admin and user information, including WordPress login location URLs, first and last names, email addresses, usernames, roles, host IP addresses, timestamps, and configuration and security information. Some of the leaked information was linked to users with .gov and .edu email addresses, the researchers stated. The database was secured within hours of DreamHost receiving a responsible disclosure notice from the researchers. The researchers noted that it was unclear how long the database had been exposed, potentially putting users at risk of phishing. Threat actors scanning for exposed databases like this have in the past also stolen and ransomed the information contained within.

    Infosecurity reports: "Cloud Database Exposes 800M+ WordPress Users' Records"

  • news

    Visible to the public "Ransomware Attacks Decline as Gangs Focus on Lucrative Targets"

    Ransomware attacks fell by 50% in Q1 2021 as threat actors shifted from using mass spread campaigns to focusing on fewer, larger targets with unique samples, according to the McAfee Threats Report. The researchers stated that the traditional approach of using one form of ransomware to infect and extort payments from many victims is becoming less prominent, mainly because the targeted systems can recognize and block such attempts over time. Instead, the researchers see a trend towards fewer, customized Ransomware-as-a-Service (RaaS) campaigns tailored to larger, more lucrative organizations. The researchers found that the number of prominent ransomware family types declined from 19 in January 2021 to nine in March 2021. The most detected ransomware group in Q1 2021 was REvil, followed by RansomeXX, Ryuk, NetWalker, Thanos, MountLocker, WastedLocker, Conti, Maze, and Babuk strains. Another important finding from the report was that there was a 117% rise in the spread of cryptocurrency-generating coin mining malware, which McAfee said is a result of a spike in 64-bit CoinMiner applications. Unlike ransomware, in which victims' systems are locked up and held hostage until a cryptocurrency payment is made, Coin Miner malware infects organizations' systems and then silently produces cryptocurrency using those systems' computing capacity. This tactic means criminals do not need to interact with the victim, who may be completely unaware they are under attack. In total, McAfee detected an average of 688 new malware threats per minute in Q1 of 2021, representing an increase of 40 threats per minute compared to Q4 of 2020.

    Infosecurity reports: "Ransomware Attacks Decline as Gangs Focus on Lucrative Targets"

  • news

    Visible to the public "Columbia Engineering Researchers Design New Techniques to Bolster Memory Safety"

    Columbia Engineering researchers recently presented two major papers at the International Symposium on Computer Architecture (ISCA) that improve the security of computer systems. These new studies have zero to little effect on system performance and are already being used to create a processor for the Air Force Research Lab. Simha Sethumadhavan, associate professor of computer science, said memory safety, which has been a problem for nearly 40 years, continues to be a problem because its burden is not distributed fairly among software engineers and end-users. The two papers are believed to have found the right balance of burdens. Sethumadhavan's team found that most security issues take place within a computer's memory, specifically pointers. Pointers are used in the management of memory, and they can lead to memory corruption, which leaves the system vulnerable to hackers who hijack the program. Current mitigation methods for memory attacks consume a lot of energy and can break software. These methods also significantly impact system performance (e.g., cellphone batteries drain quickly, apps run slowly, and computers crash). The group created a novel memory security solution called ZeRO that features a set of memory instructions and a metadata encoding scheme, protecting a system's code and data pointers. This combination is said to eliminate performance overhead as it does not affect the speed of a system. The team's second paper presents a system called No-FAT that increases the speed at which security checks are performed without greatly affecting the computer's performance. According to the researchers, No-FAT speeds up fuzz testing and is easy for developers to add when building a system. Both ZeRO and No-FAT aim to make memory systems more resilient against attacks while having little to no impact on computer speed or power consumption. This article continues to discuss why memory safety has remained an issue for so long and the solutions developed by Columbia Engineering researchers to strengthen memory safety.

    Columbia Engineering reports "Columbia Engineering Researchers Design New Techniques to Bolster Memory Safety"

  • news

    Visible to the public "Google Announces Unified Schema to Make Sharing Vulnerabilities Easier"

    Google has announced a unified schema for describing vulnerabilities. The goal of the unified schema is to make it easier to share data on vulnerabilities between databases. An issue with existing vulnerability databases is that each ecosystem or organization uses its own format to describe vulnerabilities, thus requiring those tracking vulnerabilities across multiple databases to handle each separately. The lack of a common standard for data creation makes sharing vulnerabilities difficult. The new unified schema, designed by the Google Open Source Security Team, Go Team, and the broader open source community, will allow vulnerability databases, open source users, and security researchers to consume vulnerabilities across all of open source easily. This will provide a more complete view of vulnerabilities in open source for all users, potentially leading to faster detection and remediation times. The schema follows in the footsteps of Google's Open Source Vulnerabilities (OSV) database, which was launched in February to improve vulnerability triage for developers and consumers of open source software. The OSV database was launched with a dataset containing a few thousand vulnerabilities from the OSS-Fuzz project. In addition to the unified schema for describing vulnerabilities, Google announced the expansion of the OSV database to several key open source ecosystems, including Go, Rust, Python, and DWF. This article continues to discuss the new unified vulnerability schema for open source.

    SiliconANGLE reports "Google Announces Unified Schema to Make Sharing Vulnerabilities Easier"

  • news

    Visible to the public "Cyber-Attacks Are Primary Funding Source for North Korea"

    According to researchers at Venafi, cybercrime is now the primary means by which the North Korean state is funded. The researchers analyzed publicly available information on state-sponsored attacks directed by the hermit kingdom over the past four years. The researchers concluded that the Asian dictatorship now monetizes cyberattacks to circumvent economic sanctions and keep the Kim Jong-un regime alive. The researchers stated that North Korean attacks are often much more brazen and reckless than those sponsored by other states because they are not afraid of getting caught, making them particularly dangerous. It gives the cybercriminals they sponsor free reign to engage in highly destructive global attacks, such as the 2017 WannaCry attacks, affecting more than 200,000 users across at least 150 countries. North Korea is setting an example for other rogue states to follow. Belarus and even Myanmar can now see that cybercrime offers them a way of countering the worst effects of sanctions while making themselves more of a threat to the broader community. The researchers stated that global democracies must take more decisive action to mitigate the cyber threat from North Korea.

    Infosecurity reports: "Cyber-Attacks Are Primary Funding Source for North Korea"

  • news

    Visible to the public Pub Crawl #51


    Pub_Crawl_web.jpgPub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers.

  • news

    Visible to the public "BIOSConnect Code Execution Bugs Impact Millions of Dell Devices"

    Eclypsium researchers have discovered a series of vulnerabilities in the BIOSConnect feature of Dell SupportAssist that could allow attackers to remotely execute code on Dell machines. Dell SupportAssist is used to manage support functions, including troubleshooting and recovery. The BIOSConnect feature is used to update firmware and recover an OS when corruption occurs. The critical bug chain received a cumulative CVSS score of 8.3. The exploitation of the security flaws could enable malicious actors to impersonate the vendor and execute attacks on the BIOS/UEFI level in 128 Dell laptops, tablets, and desktop models, including those protected by Secure Boot. An attack launched through the abuse of these flaws would allow adversaries to take control over a device's boot process and subvert the OS and higher-layer security controls. When BIOSConnect connects to Dell's backend HTTP server, any valid wildcard certificate is accepted, thus allowing an attacker to impersonate Dell and deliver attacker-controlled content back to the victim device. The researchers discovered some HTTPS Boot configurations that use the same underlying verification code, potentially leaving them exploitable. Three of the vulnerabilities uncovered by the team are described as overflow bugs, two of which impacted the OS recovery process, while the other existed in the firmware update mechanism. Dell has issued a security advisory and scheduled BIOS/UEFI updates for impacted systems. This article continues to discuss the BIOSConnect code execution bugs affecting millions of Dell devices.

    ZDNet reports "BIOSConnect Code Execution Bugs Impact Millions of Dell Devices"

  • news

    Visible to the public "Zephyr RTOS Fixes Bluetooth Bugs That May Lead to Code Execution"

    Security patches were released earlier this month for the Zephyr real-time operating system (RTOS) used for embedded devices. The patches fix multiple vulnerabilities that can lead to a denial-of-service (DoS) condition and remote code execution if exploited by malicious threat actors. These vulnerabilities were found in Zephyr's Bluetooth LE Link Layer (LL) and its implementation of the Logical Link Control and Adaptation Protocol (L2CAP). Zephyr is a small open-source project backed by Facebook, Google, Intel, Nordic Semiconductors, Adafruit, and other big names in the industry. The Zephyr OS supports more than 200 boards with various CPU architectures, including ARM, Cortex-M, Intel x86, ARC, NIOS II, Tensilica Xtensa, SPARC V8, and RISC-V 32, thus making it attractive for those that make small embedded devices such as hearing aids, smart tags, distancing trackers, safety pods for smart PPE, IoT gateways, and portable backup devices. The vulnerabilities were discovered by Matias Karhumaa, a senior software engineer at Synopsys, after testing the lowest layers of the operating system's Bluetooth LE stack. Most of the flaws that were discovered in the Bluetooth LE Link Layer and the L2CAP implementation impact Zephyr versions 2.5.0 and 2.4.0. Some of the vulnerabilities were also found in Zephyr version 1.14. The exploitation of these flaws could allow attackers to prevent the targeted devices from functioning by causing them to freeze or behave differently in a way that stops other systems from connecting to them. One of the vulnerabilities received a high severity score as it could cause an information leak involving sensitive data. This article continues to discuss the discovery and potential impact of the Bluetooth-related vulnerabilities in the Zephyr RTOS.

    Bleeping Computer reports "Zephyr RTOS Fixes Bluetooth Bugs That May Lead to Code Execution"

  • news

    Visible to the public "Attacks Against Container Infrastructures Increasing, Including Supply Chain Attack"

    The frequency and sophistication of attacks against the container infrastructure continues to grow. Using internet scanning tools such as Masscan, a new vulnerable container can be detected within a few hours. Aqua Security's Cloud Native Report shares findings from the analysis of more than 17,000 attacks that hit its honeypots between June 2019 and December 2020. According to the report, it takes an average of five hours for adversaries to detect a new misconfigured container, with the fastest detection time being within a few minutes and the longest being 24 hours. In half of the cases, a new container was detected in less than one hour. Public search engines like Shodan and Censys continue to be used by some adversaries to find misconfigurations. When a host is compromised, the adversary will likely use worms to detect and infect new hosts, thus increasing the frequency of scanning and the likelihood of detecting new misconfigurations. Over 90 percent of the attacks were found to be designed to hijack cryptocurrency mining resources. Most of the attacks are related to the Kinsing malware campaign that downloads a cryptominer. Aqua also warned that more than 40 percent of the attacks involve backdoors. The frequency of attacks has increased significantly from an average of 12.6 per day in H2 2019 to 77 per day in H1 2020 and 97.3 in H2 2020. Based on the honeypots, Russia launched the greatest number of attacks, followed by the U.S. This article continues to discuss key findings from Aqua Security's Cloud Native Report on attacks against the container supply chain and infrastructure.

    Security Week reports "Attacks Against Container Infrastructures Increasing, Including Supply Chain Attack"

  • news

    Visible to the public SoS Musings #50 - Moving Automotive Cybersecurity into the Fast Lane

    SoS Musings #50 -

    Moving Automotive Cybersecurity into the Fast Lane

  • news

    Visible to the public Spotlight on Lablet Research #19 - Mixed Initiative and Collaborative Learning in Adversarial Environments

    Spotlight on Lablet Research #19 -

    Mixed Initiative and Collaborative Learning in Adversarial Environments

  • news

    Visible to the public Cyber Scene #57 - New Cybersecurity Developments

    Cyber Scene #57 -

    New Cybersecurity Developments

  • news

    Visible to the public Cybersecurity Snapshots #19 - Are Smart Home Gym Equipment and Health and Fitness Apps Secure?

    Cybersecurity Snapshots #19 -

    Are Smart Home Gym Equipment and Health and Fitness Apps Secure?

  • news

    Visible to the public "Gaming Industry Experiences 340% Spike in Web App Attacks"

    According to a new report by Akamai, researchers found that web application attacks targeting the video game industry grew by a higher rate than any other sector during the COVID-19 pandemic. Web application attacks surged by 340% in 2020 compared to 2019, totaling more than 240 million attempts against the video game industry. The most prominent web application attack vector was SQL injection, making up 59% of all attacks against the gaming sector. This method targets the login credentials and personal information of players. SQL injection was followed by local file inclusion, which comprised 24% of all attacks. This method focuses on sensitive details within apps and services that can further compromise game servers and accounts. Other prominent vectors in this category were cross-site scripting and remote file inclusion, accounting for 8% and 7% of attacks detected by the researchers. The video game industry also experienced a 224% increase in credential stuffing attacks in 2020 compared to 2019, a total of nearly 11 billion. The researchers stated that credential stuffing became so common that bulk lists of stolen usernames and passwords were available for as little as $5 on illicit websites. Surprisingly, there was a 20% reduction in DDoS attacks targeting the gaming industry.

    Infosecurity reports: "Gaming Industry Experiences 340% Spike in Web App Attacks"

  • news

    Visible to the public "Nearly 10% of SMB Defense Contractors Show Evidence of Compromise"

    Cybersecurity vendor BlueVoyant conducted a new study and analyzed a representative sample of 300 smaller contractors from a defense industrial base (DIB) estimated to have anywhere from 100,000-300,000 suppliers. The researchers uncovered signs of weaknesses in this complex ecosystem of contractors, potentially putting national security at risk. More than half of SMB contractors in the US defense supply chain are critically vulnerable to ransomware attacks. Half of the companies studied had unsecured ports vulnerable to ransomware attacks. In contrast, 48% had vulnerable ports and other weaknesses, including unsecured data storage ports, out-of-date software and operating systems, and other vulnerabilities rated severe by NIST. Unpatched flaws were particularly concerning: more than six months after critical F5 and Microsoft Exchange vulnerabilities were published, nine companies were yet to fix them. The researchers also found that a fifth (20%) of SMB contractors have multiple vulnerabilities and evidence of targeting, while 7% also featured evidence of compromise. In total, BlueVoyant found evidence of over 1300 email security issues, more than 400 vulnerabilities, and 344 indications that suggest "company resources are involved in anomalous or criminal activity." Over a quarter (28%) of appraised contractors showed evidence indicating they would fail to meet the most basic tier-1 requirement for the Cybersecurity Maturity Model Certification (CMMC). CMMC is a critical compliance standard designed to improve security best practices among US defense contractors.

    Infosecurity reports: "Nearly 10% of SMB Defense Contractors Show Evidence of Compromise"

  • news

    Visible to the public "Inglis Confirmed as First National Cyber Director"

    Former NSA'er Chris Inglis was confirmed by the Senate as the first national cyber director. His job is to make sure that all federal agencies are operating consistent with the national cyber policy. The director will be the Biden administration's main contact for cyber security problems when things go wrong as the coordinator for the response from the federal agencies with offensive and defenses responsibilities in cyberspace.

    SC Media reports "Inglis Confirmed as First National Cyber Director"

  • news

    Visible to the public "Connecting to Malicious Wi-Fi Networks Can Mess With Your iPhone"

    A bug has been discovered in iOS that can disable Wi-Fi connectivity for iPhones when they join a network that uses the SSID "%p%s%s%s%s%n." The device loses the ability to join any networks in the future when they connect to that Wi-Fi network. According to the reverse engineer Carl Schou, the internal logging functionality in the iOS Wi-Fi daemon, which uses the SSID inside of format expressions, causes the bug. In some cases, this condition makes it possible for unauthorized format strings to be injected into sensitive parts of the Apple OS. Schou and other security experts have said that the bug is not likely to be exploited to execute malicious code. Another analysis of the bug found that it stems from a flaw contained by an iOS logging component that uses the CONCAT function to convert the SSID string into a format string before it is written to the log file. Since the strings are not echoed to sensitive parts of the iOS, a hacker will likely be unsuccessful in maliciously abusing the logging feature. In addition, the exploitation of the bug would require a person to actively connect to a network containing a suspicious-looking name. Researchers from the security firm AirEye reached a different assessment, finding that it is possible for this technique to be used to circumvent security appliances sitting at the perimeter of a network to block unauthorized data from entering or exiting. This article continues to discuss the discovery and source of the iOS bug that causes a specific network name to disable Wi-Fi on iPhones.

    Ars Technica reports "Connecting to Malicious Wi-Fi Networks Can Mess With Your iPhone"

  • news

    Visible to the public "Average Time to Fix Critical Cybersecurity Vulnerabilities Is 205 Days"

    According to a new report from WhiteHat Security, the average time taken to fix critical cybersecurity vulnerabilities has increased from 197 days in April 2021 to 205 in May 2021. Organizations in the utility sector were found to have the highest window of exposure with their application vulnerabilities. More than 66 percent of applications used in the utility sector contained at least one exploitable vulnerability that was open throughout the year. Over 60 percent of applications in the manufacturing industry were also found to have a window of exposure of more than 365 days. The finance industry has a more balanced window of exposure outlook, with nearly 40 percent of applications having an exposure window of 365 days and about 30 percent having an exposure window of fewer than 30 days. The report pointed out the top five classes of vulnerabilities seen over the last three months, which include information leakage, insufficient session expiration, cross-site scripting, inadequate transport layer protection, and content spoofing. The WhiteHat Security researchers stressed that these types of vulnerabilities require little effort or skill to discover and exploit. This article continues to discuss key findings from WhiteHat Security's AppSec Stats Flash report and how organizations should address application vulnerabilities.

    ZDNet reports "Average Time to Fix Critical Cybersecurity Vulnerabilities Is 205 Days"

  • news

    Visible to the public "Over 30,000 Fertility Clinic Patients Hit by Ransomware Data Breach"

    Tens of thousands of Reproductive Biology Associates (RBA) patients have had sensitive personal and medical information stolen in a ransomware attack. Reproductive Biology Associates (RBA) is a US fertility clinic and was the first organization of its kind to offer IVF in the US state of Georgia and is the founding partner of the nationwide fertility clinic network My Egg Bank. In a new breach notification, RBA claimed to have first become aware of the cyber-incident on April 16 this year, when they discovered that a file server containing embryology data had been encrypted. Based on RBA's investigation, they believe the actor first gained access to their system on April 7, 2021 and subsequently to a server containing protected health information on April 10, 2021. On June 7, 2021 access to the encrypted files was regained, and RBA obtained confirmation from the actor that all exposed data was deleted and is no longer in their possession. In total, information of 38,000 patients was exposed in the incident, with full names, addresses, Social Security numbers, lab results, and "information related to the handling of human tissue" potentially impacted. RBA stated it also conducted web searches to check if any of the stolen information was being discussed or traded online and so far had no indication of such activity.

    Infosecurity reports: "Over 30,000 Fertility Clinic Patients Hit by Ransomware Data Breach"

  • news

    Visible to the public "Ohio Medicaid Provider Suffers Data Breach"

    On Monday, the Ohio Department of Medicaid warned that an unknown party had accessed data in the care of a company called Maximus for two days in May without authorization. The incident occurred from May 17th to May 19th. The department hired Maximus to carry out data management. The information exposed in the incident included names, dates of birth, and Social Security numbers belonging to the state's Medicaid providers. Data concerning Medicaid patients or beneficiaries were not affected by the security incident. The hacker accessed the information via an application. Once the intrusion had been detected, Maximus took the breached app offline and contacted law enforcement.

    Infosecurity reports: "Ohio Medicaid Provider Suffers Data Breach"

  • news

    Visible to the public "Process Ghosting: A New Executable Image Tampering Technique in the Wild"

    Elastic Security uncovered a new image tampering attack called Process Ghosting. Remote hackers are using this new type of executable image-altering technique to deploy malware on a targeted Windows system stealthily. Process Ghosting escapes anti-malware defenses and detection by using veiled malicious codes. Using this technique, an attacker can write a piece of malware to disk in a way that makes it difficult to scan or delete. According to researchers, this technique does not involve code injection, Process Hollowing, or Transactional NTFS (TxF). A gap exists between when a process is created and when security products are notified of its creation, providing a window for malware authors to tamper with the executable before the products can scan it. This article continues to discuss the flow of the new image tampering attack Process Ghosting.

    CISO MAG reports "Process Ghosting: A New Executable Image Tampering Technique in the Wild"

  • news

    Visible to the public "Amazon Prime Day - Beware of Phishing Deluge, Experts Warn"

    Security researchers at Tessian have warned online shoppers to beware of scam emails and texts over the next couple of days as the Amazon Prime Day e-commerce bonanza gets underway. The most common tactic used by scammers will be to impersonate Amazon in phishing emails, luring consumers with 'too good to be true' deals or prize offerings to encourage them into clicking malicious links or entering their details into fake websites. Another common technique used by adversaries is to impersonate logistics or delivery companies in text message scams, asking consumers to click a link to confirm delivery details, track orders, or reroute packages. Tessian detected a 133% increase in phishing emails related to Amazon Prime Day or Amazon Store on the second day of the event last year, compared to a normal daily average for the month. The researchers warn that the scams may continue even after the event itself has wound down. The researchers suggest that consumers should refrain from clicking on unsolicited text message links. The researchers also suggest that consumers should also be on the lookout for spelling and grammatical mistakes and deals that seem too good to be true.

    Infosecurity reports: "Amazon Prime Day - Beware of Phishing Deluge, Experts Warn"

  • news

    Visible to the public "Attackers Find New Way to Exploit Google Docs for Phishing"

    Researchers at the email and collaboration security firm Avanan have discovered a new method that attackers are using to trick victims into visiting malicious phishing websites via Google Docs. The attack begins with the threat actor sending an email, based on a likely topic of interest or relevance, to potential victims. The email comes with a link that directs the user to a Google Docs page with what seems to be a downloadable document. Although the page appears to be a typical Google Docs page for sharing documents outside the organization, it is actually a custom web page designed to look like a legitimate Google Docs page. The link to download the document redirects the user to a malicious phishing website that mimics the Google Docs sign-in page. This phishing website steals usernames and passwords entered by the victims. According to Gil Friedrich, CEO and Co-Founder of Avanan, this is the first time his company has seen Google Docs being used to render an entirely attacker-created web page. The Google Docs hack is one of the latest examples of the abuse of trusted cloud services such as Google Docs, AWS, and Microsoft Azure to host and distribute malicious content. New research from Proofpoint showed that growth in the adoption of cloud collaboration tools and services is accompanied by the increase in the abuse of such services. For example, in 2020, thousands of Proofpoint customers were targeted with around 60 million malicious messages via Microsoft Office 365 and 90 million messages sent or hosted on Google Cloud. This article continues to discuss the new way in which attackers are exploiting Google Docs for phishing and the increased abuse of trusted cloud services to send and host malicious content.

    Dark Reading reports "Attackers Find New Way to Exploit Google Docs for Phishing"

  • news

    Visible to the public "Bipartisan Bill to Prevent International Cybercrime Reintroduced"

    A bipartisan group of U.S. senators recently reintroduced the International Cybercrime Prevention Act, which is aimed at arming law enforcement with the tools needed to combat cybercrime and better protect Americans. The bill, first introduced in 2018, creates new criminal violations for those launching cyberattacks against critical infrastructure such as hospitals, election infrastructure, power plants, and dams. The International Cybercrime Prevention Act would prohibit cybercriminals from selling access to botnets to execute cyberattacks, improve prosecutors' ability to shut down botnets, allow authorities to seize communication devices and other property used to commit cybercrime, and more. This bill would also provide tools and resources to the Department of Justice for protecting the U.S. from future cyberattacks. This article continues to discuss the importance and goals of the International Cybercrime Prevention Act.

    MeriTalk reports "Bipartisan Bill to Prevent International Cybercrime Reintroduced"

  • news

    Visible to the public "CVS Health Records for 1.1 Billion Customers Exposed"

    Security researchers at WebsitePlanet found the non-password-protected database, which had no form of authentication in place to prevent unauthorized entry, on March 21. The database contained information about CVS Health customers. The researchers stated that the database included enough information to derive customers' PII. The total size of the database was 204 GB, according to the researchers. It held 1.1 billion records, or, to be precise, 1,148,327,940 files. They were labeled "production" and included information typed into search bars, such as the data types add to cart, configuration, dashboard, index-pattern, more refinements, order, remove from cart, search, and server. The records also exposed fields called Visitor ID, Session ID, and device information, such as whether customers were using an iPhone, an Android, an iPad, or a desktop PC. The team noted that by stringing together the data, they could reveal emails that could be targeted in a phishing attack, in social engineering, or "potentially used to cross-reference other actions." The researchers believe that the database was left open due to human error. The researchers stated that this instance is probably yet another incidence of rampant misconfiguration that is plaguing cloud-based storage, leading to exposure of sensitive data on an internal network. After the researchers contacted CVS Health, the naked database was closed off from public view.

    Threatpost reports: "CVS Health Records for 1.1 Billion Customers Exposed"

  • news

    Visible to the public "New Buer Malware Loader Spread Through DHL Scam Email"

    According to researchers at Proofpoint, attackers are using fake DHL shipping emails to trick recipients into opening malicious Word and Excel documents that lead to an infection of 'RustyBuer,' a new variant of the Buer Loader malware family written in the Rust programming language. The DHL-themed phishing emails deliver one of two Buer Loader variants, with the first variant being written in C and the second being written in Rust. RustyBuer's attachments come with more detailed content than those of the other variant written in C to better engage with recipients. Upon further investigation, Proofpoint discovered that a document macro includes the malware payload and requires user interaction. That macro applied an application bypass to avoid detection. Once RustyBuer is loaded, it uses a shortcut file to establish persistence at startup. In some cases, it then distributes a Cobalt Strike beacon. Malicious actors could establish a foothold into their victims' networks through the launch of this type of attack. This article continues to discuss the distribution of RustyBuer malware, possible reasons behind why Buer Loader's authors rewrote their malware in Rust for the DHL scam email campaign, and how organizations can defend themselves against email-borne Buer attacks.

    Security Intelligence reports "New Buer Malware Loader Spread Through DHL Scam Email"

  • news

    Visible to the public Chris Inglis confirmed as first national cyber director

    Former NSA’er Chris Inglis was confirmed by the Senate as the first national cyber director. His job is to make sure that all federal agencies are operating consistent with the national cyber policy. The director will be the Biden administration’s main contact for cyber security problems when things go wrong as the coordinator for the response from the federal agencies with offensive and defenses responsibilities in cyberspace. https://www.scmagazine.com/home/security-news/government-and-defense/inglis-confirmed-as-first-national-cyber-director/
  • news

    Visible to the public "Colorado Passes New Privacy Act"

    Colorado has unanimously passed a new data privacy act to safeguard Coloradoans' personal information. The Colorado Privacy Act is due to take effect on July 1, 2023, and now awaits the signature of state governor Jared Polis. Should the Act become law, Colorado will follow California and Virginia by enacting comprehensive privacy legislation. The Act gives consumers who reside in Colorado five key rights over their personal data. Firstly, they have the right to opt-out of the sale of their personal data, the processing of personal data for targeted advertising purposes, and automated profiling in furtherance of decisions that produce legal or similarly significant effects. The Coloradoans also have the right to access their personal data held by a data controller and the right to make corrections to their personal data if inaccuracies are identified. Finally, they have the right to be provided with their data in a portable and ready-to-use format and the right to have their personal data erased.

    Infosecurity reports: "Colorado Passes New Privacy Act"

  • news

    Visible to the public "A New Tool Wants to Save Open Source From Supply Chain Attacks"

    The NotPetya malware attack and the recent SolarWinds cyberespionage campaign both present real-world examples of software supply chain attacks in which a hacker slips malicious code into legitimate, widely used software. Supply chain security has become more important than ever as more software supply chain attacks emerge. The Sigstore platform, which is affiliated with the Linux Foundation and led by Google, Purdue University, and Red Hat, was developed in hopes of encouraging the adoption of code signing, an important practice for protecting software supply chains but is often overlooked by popular and widely used open-source software. Open-source developers do not always have the resources, time, or expertise to implement code signing with other nonnegotiable components required for their code to run. Software developers can use the Sigstore service to digitally sign their releases and other software artifacts, improving the security of the open-source software supply chain. Sigstore can coordinate complicated cryptography for its users. The service offers the option to let it handle everything for those developers who are unable or do not want to take on the extra work themselves. Developers can immediately start cryptographically signing their code as having been made by them at a specific time, using established, preexisting identifiers such as an email address or a third-party sign-in system like Sign In With Google or Sign In With Facebook. Sigstore also automatically produces a public, unchangeable open-source log of all activity, thus providing public accountability of every single submission as well as a place to investigate if something goes wrong. This article continues to discuss the importance of code signing for protecting software supply chains, why developers often overlook this practice, how the Sigstore tool encourages the adoption of code signing, and why open-source security is complicated.

    Wired reports "A New Tool Wants to Save Open Source From Supply Chain Attacks"

  • news

    Visible to the public "A Study Develops a New Protocol That Makes Cryptocurrency Transactions Faster and Safer"

    Security and privacy researchers at TU Wien, together with the IMDEA Software Institute and Purdue University, have developed a protocol aimed at improving the security and speed of transactions in cryptocurrencies such as Bitcoin. Cryptocurrencies are continuing to grow in popularity due to the many advantages they offer over Mastercard or Visa. Cryptocurrency transactions are usually decentralized, anonymous, and global. However, there is still progress to be made in regards to security, privacy, and efficiency. The team's improved protocol considers problems associated with Bitcoin transactions, such as possible fraud, users' discovery of each other's confidential information, the limited number of transactions, and the occurrence of delays. This article continues to discuss the growing popularity of cryptocurrencies and the new protocol developed to make cryptocurrency transactions more secure and faster.

    The IMDEA Software Institute reports "A Study Develops a New Protocol That Makes Cryptocurrency Transactions Faster and Safer"

  • news

    Visible to the public "Carnival Cruise Cyber-Torpedoed by Cyberattack"

    Carnival Corp., the world's largest cruise ship operator, has sprung another leak. Carnival, in a data breach notification, stated that it appears that in mid-March, an unauthorized third party gained access to certain personal information relating to some of their guests, employees, and crew. On Thursday, the company added that there is evidence indicating "a low likelihood of the data being misused." The improperly accessed information included names, addresses, phone numbers, passport numbers, dates of birth, health information, and, in some limited instances, additional personal information such as social security or national identification numbers. This is the fourth time in a bit over a year that Carnival has admitted to breaches, with two of them being ransomware attacks.

    Threatpost reports: "Carnival Cruise Cyber-Torpedoed by Cyberattack"

  • news

    Visible to the public "Government Faces Increasing Threat from Stolen Accounts"

    Findings from TransUnion's Public Sector Fraud Study suggest that despite the increase in the frequency and severity of fraud threats against government agencies during the COVID-19 pandemic, agencies still have not taken appropriate actions to address those threats. Over 50 percent of nearly 600 federal, state, and local agency officials, who participated in TransUnion's survey, said account takeover fraud had increased over the past two years. Most government employees also said the severity of these attacks is growing. However, only 41 percent of the respondents said senior leadership is prioritizing account takeover fraud, with only 38 percent saying that their IT systems are assessed regularly to prevent fraud. The increased use of online services during the pandemic has been linked to the rise in criminal attempts to swindle the government. These online services also include those that disburse unemployment payments. Mobile phones have been cited as the biggest threat to customer accounts, as more than 6 in 10 of the respondents said such devices are the most vulnerable to account takeovers. The survey pointed out the government's overall lack of investment as a key contributing factor to the rise in fraud. Emerging technologies such as Artificial Intelligence (AI) present a bright spot. According to the survey, more than 60 percent expect AI decision-making technology to help improve security, customer status tracking, and more. This article continues to discuss key findings from Transunion's study surrounding the increase in fraud threats to government agencies.

    NextGov reports "Government Faces Increasing Threat from Stolen Accounts"

  • news

    Visible to the public "Critical Flaws in Defibrillator Management Tool Pose Account Takeover, Credential Risk for Hospitals"

    The Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) has issued an Industrial Controls Systems (ICS) Medical Advisory on the discovery of multiple vulnerabilities in the ZOLL Defibrillator Dashboard. The exploitation of these vulnerabilities could allow a hacker to take control of an affected system. The ZOLL Defibrillator Dashboard is designed for biomedical engineering departments in the hospital environment and provides efficient management of defibrillators, enabling real-time device monitoring in the enterprise environment and across many sites. The six vulnerabilities were discovered in all versions of the dashboard released before 2.2. A hacker does not need to be highly skilled to exploit the flaws. Through the abuse of the vulnerabilities, the attacker could gain access to credentials as well as impact the availability, confidentiality, and integrity of the application. One of the flaws, warned by CISA to have a high likelihood of exploitation, is the dashboard's use of hard-coded cryptographic keys, which significantly increases the possibility of encrypted data being recovered by an attacker. The cryptographic key is in a hard-coded string value that is compared to the password. Therefore, it is likely that an attacker can read the key and compromise the system. This article continues to discuss the potential exploitation and impact of the critical flaws found in the ZOLL Defibrillator Dashboard.

    SC Media reports "Critical Flaws in Defibrillator Management Tool Pose Account Takeover, Credential Risk for Hospitals"

  • news

    Visible to the public "What is The Real Cost of Ransomware?"

    Cybereason released research findings from a global ransomware study of nearly 1,300 security professionals that reveals that more than half of organizations have been victims of a ransomware attack. The research also reveals that 80 percent of businesses that chose to pay a ransom demand suffered a second ransomware attack, often at the hands of the same threat actor group. More than half (66 percent) of organizations reported a significant loss of revenue following a ransomware attack, and 35 percent of businesses that paid a ransom demand shelled out between $350,000-$1.4 million, while 7 percent paid ransoms exceeding $1.4 million. More than half (53 percent) of organizations indicated that their brand and reputation were damaged as a result of a successful attack. The research also reveals that 32 percent of organizations reported losing C-Level talent due to ransomware attacks, and 29 percent of participants reported being forced to layoff employees due to financial pressures following a ransomware attack. A startling 26 percent of organizations reported that a ransomware attack forced the business to close down operations entirely.

    Help Net Security reports: "What is The Real Cost of Ransomware?"

  • news

    Visible to the public "This Strange Malware Stops You From Visiting Pirate Websites"

    Sophos researchers have discovered a new strain of malware that blocks infected users from visiting websites dedicated to software piracy. Some samples were found buried in archives disguised as software packages advertised through the Discord platform. Other samples were discovered being distributed directly via torrent. According to the principal researcher Andrew Brandt, the malware's creator has used the names of many software brands, games, productivity tools, and cybersecurity solutions to hide the malware. Therefore, it seems to be targeting users from gamers to business professionals who may not want to purchase a software license. The adversary's targets and tools suggest that this is an anti-piracy vigilante operation. This article continues to discuss the distribution and piracy website blocking process of the new piece of malware.

    ZDNet reports "This Strange Malware Stops You From Visiting Pirate Websites"