News Items

  • news

    Visible to the public "Rhode Islander Charged with Phishing Political Candidates"

    A woman from Rhode Island has been charged with impersonating Microsoft to steal personal information from political candidates and their campaign staff. Diana Lebeau allegedly sent phishing emails to approximately 22 members of the campaign staff of a candidate for political office in or around January 2020. The 21-year-old allegedly posed as either the campaign's managers or one of the campaign's co-chairs in the emails. Recipients were directed to enter their account login details into an attached spreadsheet or to click on a link that took them to a Google Form that requested the same credentials. Lebeau is further accused of sending several phishing emails to the political candidate's spouse and colleagues at the spouse's workplace. In these emails, Lebeau allegedly impersonated Microsoft's Security Team or an employee of the workplace's technology helpdesk. Recipients were asked to add their account credentials to spreadsheets attached to the emails or were asked to enter sensitive data on a website spoofing that of the spouse's employer. According to the charging document, Lebeau's alleged actions were not motivated by financial or political aims and were not carried out to benefit any foreign government, instrumentality, or agent. Lebeau has been charged with attempted unauthorized access to a protected computer. If convicted, she could be sentenced to up to one year in prison, be placed under supervised release for up to 12 months and be fined up to $100,000.

    Infosecurity reports: "Rhode Islander Charged with Phishing Political Candidates"

  • news

    Visible to the public "Hackers Using Fake Streaming Site to Distribute BazaLoader Malware Dropper"

    Security researchers at Proofpoint discovered a new phishing campaign involving a fake movie-streaming website called BravoMovies that displays posters for popular films and other content in order to make it seem legitimate to unsuspecting visitors. The hackers behind the site sent carefully crafted emails to hundreds of recipients, notifying them that they subscribed to the BravoMovies streaming service on a 30-day free trial and will be charged $39.99 after the trial period ends. The emails themselves do not contain malicious attachments, but they do present a customer service number claimed to allow recipients to unsubscribe once called. When the recipient calls the customer service number, the fraudsters direct them to visit the Frequently Asked Questions (FAQ) page of the website, follow instructions to unsubscribe via the Subscription page, and download an Excel sheet to complete the process. The Excel sheet contains macros that download BazaLoader if enabled. BazaLoader is a downloader written in C++ used to download and execute additional modules. According to Proofpoint, multiple threat actors have been observed using BazaLoader as a loader for disruptive malware, including Ryuk and Conti ransomware. The Proofpoint researchers strongly believe that there is an overlap between the distribution and post-exploitation activity of BazaLoader and threat actors behind The Trick malware, also known as TrickBot. Previously observed BazaLoader email threat campaigns have required significant human interaction to execute the malware. The previous campaigns included subscription pharmaceutical services, flower orders, and more. Using attack chains that require a lot of human interaction, threat actors can evade automated threat detection services that only flag malicious links or attachments in email. This article continues to discuss the use of a fake streaming service to distribute the BazaLoader malware dropper and previous findings surrounding BazaLoader.

    TEISS reports "Hackers Using Fake Streaming Site to Distribute BazaLoader Malware Dropper"

  • news

    Visible to the public "Telegram Messenger Ads for 'Hacker' Software Hide Cryptocurrency Theft"

    Malicious actors have been observed using advertisements on the Telegram messenger app to distribute samples of cryptocurrency-stealing malware called HackBoss malware to would-be hackers. According to the cybersecurity firm Avast, the malware family's creators have more than 100 cryptocurrency wallet addresses, with the wallets containing a collective total of over $560,000 when the analysis was conducted. However, the real amount stolen using HackBoss malware might be less as the security firm found that some of the creators' wallet addresses were also associated with scams aimed at tricking users into purchasing fake software. This could mean that the operators behind HackBoss have used the same cryptocurrency wallet addresses to carry out other malicious campaigns. The malware actors have been running a Telegram messenger channel called HackBoss to advertise applications said to be "the best software for hackers" for cracking banking sites, social sites, cryptocurrency wallets, and more. In reality, these fake cracking applications attempt to steal cryptocurrency from other hackers. In addition to the Telegram messenger channel, the creators of HackBoss used YouTube channels with promotional videos and posted advertisements on public forums to promote their malware. Malware such HackBoss, emphasizes the need for organizations and individual users to use caution when dealing with cryptocurrency by confirming the wallet address to which they are sending money and setting up multi-factor authentication (MFA). This article continues to discuss the use of the Telegram messenger app to distribute the cryptocurrency-stealing malware HackBoss to other hackers, other malware campaigns that have involved Telegram, and how to defend against malware like HackBoss.

    Security Intelligence reports "Telegram Messenger Ads for 'Hacker' Software Hide Cryptocurrency Theft"

  • news

    Visible to the public "Hackers Exploit Post-COVID Return to Offices"

    Researchers at Cofense stated that with COVID-19 restrictions lifting and workers trickling back to offices, threat actors are sharpening their spear phishing ploys. The latest scam Cofense discovered includes pelting recipients with emails purportedly from their CIOs welcoming employees back into offices. The emails outline a company's post-pandemic cubicle protocols, and at the same time, attempts to steal company and personal credentials. The researchers stated that the body of the email appears to have been sent from a source within the company, giving the company's logo in the header and being signed spoofing the CIO. The spoofed CIO email prompts victims to link to a fake Microsoft SharePoint page with two company-branded documents, both outlining new business operations. In this step, the victim is not prompted to input any credentials. Instead of simply redirecting the victims to a login page, this additional step adds more depth to the attack and gives the impression that they are actual documents from within the company. However, if a victim decides to click on either document, a login panel appears and prompts the recipient to provide login credentials to access the files. When a victim provides their login credentials, a message comes up that states "Your account or password is incorrect" several times before taking the victim to an authentic Microsoft page, making them think they've successfully accessed the files.

    Threatpost reports: "Hackers Exploit Post-COVID Return to Offices"

  • news

    Visible to the public "Conti Ransomware Gang Victimized US Health Care, First-Responder Networks, FBI Says"

    The FBI recently posted an alert stating that they tracked at least 16 Conti ransomware attacks that struck U.S. health care and first-responder networks within the last year. That accounting only factors in attacks in the past year and incidents that the FBI itself identified. In all, the alert said Conti had hit 400 organizations, nearly 300 of which were in the U.S. The FBI said the recent first responder victims include 9-1-1 dispatch centers, emergency medical services, law enforcement agencies, and municipalities. According to the alert, the Conti gang has sought as much as $25 million to decrypt systems it locked up. Conti actors gain unauthorized access to victim networks through weaponized malicious email links, attachments, or stolen Remote Desktop Protocol (RDP) credentials. Conti weaponizes Word documents with embedded Powershell scripts, initially staging Cobalt Strike via the Word documents and then dropping Emotet onto the network, giving the actor access to deploy ransomware. The hackers tend to seek payment within two to eight days and will make Voice over Internet Protocol calls or communicate via ProtonMail to negotiate payment.

    CyberScoop reports: "Conti Ransomware Gang Victimized US Health Care, First-Responder Networks, FBI Says"

  • news

    Visible to the public "Chinese Phishing Attack Targets High-Profile Uyghurs"

    At Check Point and Kaspersky, security researchers have discovered a new Chinese phishing campaign targeting the ethnic minority Uyghur group with emails impersonating the United Nations, the UN Human Rights Council (UNHRC), and a fake human rights organization called TCAHF. The researchers stated that these attacks clearly utilize the theme of the UNHRC to trick its targets into downloading malicious malware. The researchers believe that these cyberattacks are motivated by espionage, with the end-game of the operation being the installation of a backdoor into the computers of high-profile targets in the Uyghur community. The researchers also stated that the attacks are designed to fingerprint infected devices, including all of its running programs. These attacks are ongoing, and new infrastructure is being created for what looks like future attacks.

    Infosecurity reports: "Chinese Phishing Attack Targets High-Profile Uyghurs"

  • news

    Visible to the public "Businesses Boost Security Budgets. Where Will the Money Go?"

    A new report revealed that most organizations plan to invest more money in cybersecurity. However, it remains unclear as to whether additional cybersecurity investments will prepare organizations to face advanced attacks that target the supply chain and cross hybrid infrastructure. The data management software company Splunk, in collaboration with the IT analyst, research, validation, and strategy firm Enterprise Strategy Group, surveyed 535 security leaders to gain further insight into security teams' spending challenges and priorities. More than 80 percent of the security leaders revealed that their organization will increase cybersecurity spending, with 35 percent having said that there will be a "significant" boost. Over half of the respondents said cyberattacks increased during the COVID-19 pandemic, and 84 percent said that they experienced a major security incident within the past two years. The most common types of attacks include email compromises, data breaches, mobile malware attacks, distributed denial-of-service (DDoS) attacks, phishing attacks, ransomware attacks, and regulatory compliance violations. Over 40 percent of the security leaders cited IT time and personnel needed for remediation as the primary cost of security incidents. Other significant costs behind security incidents include loss in productivity, disruptions to applications and systems, disruptions to business processes, the breach of confidential data, public breach disclosure, and employee termination or prosecution. Security spending is expected to increase significantly in cloud security, cyber risk management, network security, security operations, security analytics, endpoint security, and data privacy. This article continues to discuss the common attacks experienced by organizations during the pandemic and areas in which security spending is expected to increase.

    Dark Reading reports "Businesses Boost Security Budgets. Where Will the Money Go?"

  • news

    Visible to the public "CISA-FireEye: 16 Malware Families From China Infect Pulse Secure VPN Appliances"

    FireEye's Mandiant cyber forensics team, working together with the Cybersecurity and Infrastructure Security Agency (CISA) and Ivanti, provided details surrounding 16 malware families designed to infect Ivanti Pulse Connect Secure VPN appliances. These malware families have been used by China-linked cyber espionage groups. Mandiant reported that the compromises involving Pulse Secure's VPN appliances occurred at organizations within the defense, government, high tech, transportation, and financial sectors across the U.S. and Europe. According to the researchers, the espionage activity conducted by UNC2630 and UNC2717 supports significant Chinese government priorities. Many of the compromised organizations operate in verticals and industries aligned with Beijing's strategic objectives, which are highlighted by China's recent 14th Five-Year Plan. This article continues to discuss the discovery of 16 malware families custom-tailored for infecting Pulse Secure VPN appliances.

    SC Media reports "CISA-FireEye: 16 Malware Families From China Infect Pulse Secure VPN Appliances"

  • news

    Visible to the public "NASA Identified Over 6,000 Cyber Incidents in Past 4 Years"

    The U.S. National Aeronautics and Space Administration (NASA) identified over 6,000 cyber incidents in the last four years. NASA has institutional systems, including data centers, web services, computers, and networks that are used for daily work activities. The agency also has mission systems, such as those used to control spacecraft and process scientific data in support of aeronautics, space exploration, and science programs. NASA consists of over 4,400 applications, more than 15,000 mobile devices, about 13,000 software licenses, almost 50,000 computers, and 39,000 TB of data. An audit conducted by NASA's inspector general revealed an increase in the complexity and severity of cyber incidents aimed at stealing critical information. The audit also revealed the limitation of the agency's ability to detect, prevent, and mitigate attacks. In 2020, most incidents faced by NASA were related to improper usage, which includes installing unapproved software or accessing inappropriate materials. Such incidents increased from 249 in 2017 to 1,103 in 2020. NASA also believes that the increase in the number of detected incidents is a result of better network visibility. This article continues to discuss some key findings from a report published this month by NASA's Office of Inspector General pertaining to cyber incidents faced by the agency.

    Security Week reports "NASA Identified Over 6,000 Cyber Incidents in Past 4 Years"

  • news

    Visible to the public "CyLab's IoT Security and Privacy Label Effectively Conveys Risk, Study Finds"

    In 2020, a team of researchers at Carnegie Mellon University's CyLab revealed a prototype security and privacy "nutrition label" similar to that of the label placed on a food product to tell consumers how many calories it has. The security and privacy label is intended to raise consumer awareness about the risks associated with purchasing and using Internet of Things (IoT) devices. The label provided information such as what type(s) of data the device collects, with whom the data is shared, why this data is collected, and more. In order to find out how actual consumers perceive risk when given this information and how this information affects their purchasing behavior, the research team conducted a large-scale study. The study found that people perceived the risk associated with most of the tested attributes accurately. The participants' perceptions were also found to influence their willingness to purchase IoT devices. Although most of the security and privacy attributes displayed by the label produced accurate risk perceptions, there were some misconceptions. Many of the participants presented with the attribute "Average Time to Patch," which had values of either "one month" or "six months," perceived both to be high risk and lowered their willingness to purchase. According to some participants, a device that needs to be patched must not be secure. These findings suggest that manufacturers need to explain why patching may be necessary, why it takes a certain amount of time to patch a flaw, and why it may not be practical to patch vulnerabilities rapidly. Findings from the study will help improve the IoT privacy and security label, which can strengthen the safety and security of the IoT ecosystem. This article continues to discuss the goal of CyLab's security and privacy label, as well as findings from the study on how the information presented by the label changes consumers' risk perception and their willingness to purchase IoT devices.

    CyLab reports "CyLab's IoT Security and Privacy Label Effectively Conveys Risk, Study Finds"

  • news

    Visible to the public "5G Infrastructure Faces Foundational Threats"

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and the Office of the Director of National Intelligence (ODNI) released a report that explores the potential threat vectors to 5G infrastructure. The report draws further attention to the risks to 5G that threaten national and economic security and that could also affect other national and global interests. The 5G Threat Model Working Panel, which was formed as part of the "National Strategy to Secure 5G," reviewed existing work to develop an aggregated list of known and potential threats to 5G infrastructure. The panel identified sample scenarios in which 5G might be adopted, and then assessed the risks related to 5G core technologies. Although IT and communication firms are strengthening security with 5G, systems architectures are at risk because malicious actors may exploit both legacy and new vulnerabilities. The overlay of 4G legacy and 5G architectures may lead to the performance of a downgrade attack in which 5G network user is forced to use 4G. As a result, the malicious actor could exploit known 4G vulnerabilities. The increased use of information and communications technologies by 5G networks will also give malicious actors more potential points of entry. This article continues to discuss the main potential threat vectors to 5G networks identified by the new report.

    GCN reports "5G Infrastructure Faces Foundational Threats"

  • news

    Visible to the public "Vishing Attacks Spoof Amazon to Try to Steal Your Credit Card Information"

    The cybersecurity firm Armorblox examined two recent vishing campaigns that spoofed Amazon in an attempt to steal credit card information from unsuspecting victims. In a vishing (voice phishing) attack, a scammer uses social engineering to trick victims into giving up sensitive personal information and financial details, such as passwords and account numbers. Organizations are encouraged to supplement their native email security with additional protection, be on the lookout for signs of social engineering, avoid sharing sensitive information over the phone, implement Multi-Factor Authentication (MFA), prohibit the reuse of the same password across multiple accounts, and more, to avoid falling victim to vishing attacks and other threats. This article continues to discuss findings from Armorblox regarding two vishing attacks and the company's suggestions for organizations to fend off such attacks.

    TechRepublic reports "Vishing Attacks Spoof Amazon to Try to Steal Your Credit Card Information"

  • news

    Visible to the public "FBI Issues Fortinet Flash Warning"

    The United States Federal Bureau of Investigation issued a flash warning Thursday over the exploitation of Fortinet vulnerabilities by advanced persistent threat (APT) groups. According to the FBI, an APT actor group has been exploiting a FortiGate appliance since at least May 2021 to access a web server hosting the domain for a US municipal government. The APT actors may have established new user accounts on domain controllers, servers, workstations, and the active directories to help them carry out malicious activity on the network. The FBI stated that some of these accounts appear to have been created to look similar to other existing accounts on the network, so specific account names may vary per organization. However, the Feds warned organizations to be on the lookout for accounts created with the usernames "elie" or "WADGUtilityAccount." Once inside a network, the APT actors can conduct data exfiltration, data encryption, or other malicious activity. The alert comes just one month after the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) warned that APT actors had gained access to devices on ports 4443, 8443, and 10443 for Fortinet FortiOS CVE-2018-13379, and enumerated devices for FortiOS CVE-2020- 12812 and FortiOS CVE-2019-5591.

    Infosecurity reports: "FBI Issues Fortinet Flash Warning"

  • news

    Visible to the public Malvertising

    Hackers used fake ads on Google to trick users into downloading a malicious AnyDesk application. The ad campaign ranked higher in downloads than even the real AnyDesk ads. Researchers estimated that over 40% of users who clicked on the fake ad, downloaded and installed the malware, showing that this was a very successful strategy for the fraudsters.

  • news

    Visible to the public Malvertising

    Hackers used fake ads on Google to trick users into downloading a malicious AnyDesk application. The ad campaign ranked higher in downloads than even the real AnyDesk ads. Researchers estimated that over 40% of users who clicked on the fake ad, downloaded and installed the malware, showing that this was a very successful strategy for the fraudsters.

  • news

    Visible to the public "Nobelium Phishing Campaign Poses as USAID"

    The cybercriminal group behind the notorious SolarWinds attack is at it again with a sophisticated mass email campaign aimed at delivering malicious URLs with payloads enabling network persistence so the actors can conduct further nefarious activities. Microsoft Threat Intelligence Center (MSTIC) began tracking this latest campaign of Nobelium (previously known as Solarigate) in late January when it was in the reconnaissance stage and observed as it evolved over a series of waves demonstrating significant experimentation. The researchers have recently observed an escalation in the effort as the threat group began masquerading as a U.S.-based development organization to distribute emails, including the malicious URLs using a legitimate mass-emailing service, Constant Contact. The threat actors targeted a wide variety of organizations and industry verticals. The targets in the latest attack, which is ongoing, are 3,000 individual accounts across more than 150 organizations. MSTIC observed Nobelium changing tactics several times throughout its latest campaign. After initial reconnaissance, the group mounted a series of spear-phishing campaigns from February through April with a similar intent to compromise systems through an HTML file attached to the email. The group experimented with alterations to both the email and the HTML document throughout those months and how the malware infected victims' machines, the researchers stated.

    Threatpost reports: "Nobelium Phishing Campaign Poses as USAID"

  • news

    Visible to the public "Alert Overload Distressing 70% of SecOps Teams"

    Researchers at Trend Micro conducted a new study where they polled 2300 cybersecurity decision-makers that run Security Operations Centers (SOCs) or SecOps from within their iT security function. The researchers found that nearly three-quarters of security operations (SecOps) leaders say the stresses of alert overload are impacting their home lives. Over half (51%) of the participants stated that their team is being overwhelmed by the volume of alerts, and 55% admitted that they aren't confident in their ability to prioritize and respond to them. On average, respondents said they're spending over a quarter (27%) of their time dealing with false positives. This is taking its toll emotionally, with 70% of participants claiming they feel so stressed outside of work that they cannot switch off or relax and are irritable with friends and family. In the SOC or IT security department, many admitted to turning off alerts (43%), walking away from their computer (43%), hoping another team member would step in (50%), or ignoring alerts entirely (40%). The researchers stated that the research revealed the inadequacy of current tooling to help SOCs and SecOps to prioritize alerts generated from multiple security controls.

    Infosecurity reports: "Alert Overload Distressing 70% of SecOps Teams"

  • news

    Visible to the public What Path Would You Take?

    Visit the Hints page to solve the Puzzle in the May 2021 edition of Science News magazine. You can solve the puzzle using paper and pencil. (You do not need to write code!) If you're successful, you will have the words that answer the "hint".

  • news

    Visible to the public "Data Breach at Canada Post"

    Canada's primary postal operator, Canada Post, confirmed Wednesday that it had suffered a data breach. The security incident occurred following a cyberattack on one of the Crown corporation's suppliers, Commport Communications, which provides electronic data interchange solutions. Following the cyberattack, Canada Post has informed 44 of its commercial customers that data belonging to more than 950,000 customers has been compromised. The exposed information dates from July 2016 to March 2019, and most of it (97%) contains the name and address of the receiving customer. The customer's email address and/or phone number were included in 3% of the compromised data. Canada Post stated that a detailed forensic investigation into the data breach had not turned up any evidence of compromised financial information.

    Infosecurity reports: "Data Breach at Canada Post"

  • news

    Visible to the public "Number of Breached Records Soars 224% Annually"

    In a new study, researchers at Imperva found that the volume of compromised records globally has increased on average by 224% each year since 2017. There were more records reported as compromised in January 2021 alone (878 million) than for the whole of 2017 (826 million). The researchers also found that there has been a 34% rise in the number of reported breaches over between 2017 and 2021 and a 131% increase in the average number of compromised records per incident. Imperva is predicting that this year will see around 1500 data breach incidents and 40 billion records compromised. Of the 100 biggest incidents that led to the compromise of records over the past decade, the researchers claimed 42% came from Elasticsearch servers, a quarter (25%) from AWS S3 buckets, and 17% from MongoDB deployments.

    Infosecurity reports: "Number of Breached Records Soars 224% Annually"

  • news

    Visible to the public "Columbia Engineering Team Builds First Hacker-Resistant Cloud Software System"

    Columbia Engineering researchers have developed SeKVM, the first formally verified system that guarantees the security of virtual machines in the cloud. Formal verification is a process that proves the mathematical correctness of software, correct functionality of the program's code, and the absence of hidden security bugs. According to Jason Nieh, a Professor of Computer Science and Co-Director of the Software Systems Laboratory at Columbia University, this is the first time that a real-world multiprocessor software system has been proven to be mathematically correct. This will ensure that the software running in the cloud manages user data correctly, and that the data is protected from security bugs and hackers. The significant advancement of cloud computing has allowed companies and users to move their data and computation off-site into virtual machines in the cloud. Cloud computing providers use hypervisors to support these virtual machines. Hypervisors make cloud computing possible. The security of data stored on a virtual machine depends on the correctness and trustworthiness of the hypervisor. Even if a hypervisor is written 99 percent correctly, just one weak link can allow a hacker to take over a system. The researchers' work is the first to verify a commodity system, specifically the KVM hypervisor used by cloud providers such as Amazon to run virtual machines. They proved that SeKVM could guarantee that virtual computers are isolated. MicroV is a new framework for verifying the security properties of large systems, which was used to verify SeKVM. This hacker-resistant cloud software system is expected to change how cloud services are designed, developed, deployed, and trusted. This article continues to discuss the development and applications of SeKVM.

    Columbia University reports "Columbia Engineering Team Builds First Hacker-Resistant Cloud Software System"

  • news

    Visible to the public "New AI Technology Protects Privacy in Healthcare Settings"

    An interdisciplinary team of researchers from the Researchers from Imperial and Imperial College London (ICL), Technical University Munich (TUM)), and the non-profit organization OpenMined developed new technology to protect personal patient data while training healthcare Artificial Intelligence (AI) algorithms. According to the researchers, their new privacy-protecting techniques have shown better accuracy in diagnosing various types of pneumonia in children than existing algorithms. The effectiveness of AI algorithms used to support clinicians in diagnosing cancers and other illnesses depends on the quality and quantity of the medical data used to train them. Clinics often share patient data with each other to maximize the data pool. In order to protect this data, it usually goes through the processes of anonymization and pseudonymization. However, these safeguards have often been inadequate for the protection of patients' health data. The team developed a unique combination of AI-based diagnostic processes for radiological image data that maintains the privacy of patient data. The researchers applied federated learning where the deep learning algorithm is shared instead of the data itself. Machine Learning (ML) models were trained in different hospitals using local data and returned to the authors. The data owners did not need to share their data and maintained control. They used a technique called secure aggregation to prevent the identification of institutions where the algorithm was trained. Algorithms were combined in encrypted form, and only decrypted after they were trained with the participating institutions' data. This article continues to discuss the team's privacy-preserving AI method for healthcare settings, as well as the importance of ensuring the privacy and security of healthcare data.

    Imperial College London reports "New AI Technology Protects Privacy in Healthcare Settings"

  • news

    Visible to the public "Malware Used Zero-Day Exploit to Take Screenshots of Victims' Macs"

    Apple has patched a vulnerability, discovered by Jamf researchers, that malware actors have been exploiting to circumvent the Transparency Consent and Control (TCC) framework. The evasion of this framework allows the actors to take screenshots of an infected computer desktop without having to trick the user into granting permissions to them. Since the TCC system controls which resources and tools that different applications can access, bypassing it could have allowed the attackers to perform more malicious activities besides just taking screenshots, according to the researchers who found the flaw. Tests have shown that the same exploit could be used to avoid prompts that display when an application accesses the microphone and webcam. The exploit could also be used to bypass applications that are supposed to display prompts when accessing a user's personal files and folders. The zero-day exploit was leveraged by a malware program called XCSSET. This discovery brings further attention to the fact that non-Windows operating systems are increasingly being targeted and that attackers are actively looking for macOS vulnerabilities. This article continues to discuss the recently patched zero-day vulnerability found in macOS and its exploitation by attackers using XCSSET malware.

    SC Media reports "Malware Used Zero-Day Exploit to Take Screenshots of Victims' Macs"

  • news

    Visible to the public SoS Musings #49 - 911: We Have a Cybersecurity Emergency

    SoS Musings #49 -

    911: We Have a Cybersecurity Emergency

  • news

    Visible to the public Cyber Scene #56 - Part Deux: Cyber Climate Change with Chinese Characteristics

    Cyber Scene #56 -

    Part Deux: Cyber Climate Change with Chinese Characteristics

  • news

    Visible to the public "Bose Reveals Ransomware Attack Impacting Staff"

    Bose has told regulators that a sophisticated ransomware attack back in March led to unauthorized access of personal information on current and former employees. The company first detected the ransomware back on March 7, 2021. However, nearly two months later, on April 29, it found that human resources files were accessed. The personal information contained in these files includes names, Social Security Numbers, and compensation-related information. The company stated that the forensics evidence shows that the threat actor interacted with a limited set of folders within these files. Bose does not have any evidence to confirm that the data in these files were successfully exfiltrated but cannot verify that they were not. The company is engaged with third-party experts to scour the dark web for this data, to check if it is being actively used by cyber-criminals, and is also working with the FBI. As of May 19th, the company has not received any indication through its monitoring activities or from impacted employees that the data discussed has been unlawfully disseminated, sold, or otherwise disclosed. Only a small number of staff were affected, and the firm did not pay the ransom requested. To mitigate the risk of a worse attack in the future, the organization has started putting into place enhanced anti-malware, logging, and monitoring, blocking malicious IPs linked to the threat actor, changing passwords for all end-users, and changing access keys for all service accounts.

    Infosecurity reports: "Bose Reveals Ransomware Attack Impacting Staff"

  • news

    Visible to the public "UK Police Suffered Thousands of Data Breaches in 2020"

    Researchers at VPNoverview discovered that there were over 2300 data breach incidents reported by just 22 of the UK's police forces in 2020. The researchers requested information from the UK's 45 police forces and received responses from 31. The results revealed a national average of 299 data breaches per police station over the period dating from 2016 to the first four months of 2021. The researchers found that Lancashire Constabulary topped the list of forces suffering the most data breaches over the period (1300), followed by nearby Cheshire Constabulary (1193), Sussex Police force (980), and the Police Service of Northern Ireland (928). Five police forces reported fewer than ten incidents from 2016-21, while London's Metropolitan Police and Dorset Police claimed to have suffered no breaches in over four years. Sussex Police has already recorded 62 data breach incidents so far in 2021, followed by West Midlands Police (37), North Wales (24), and Wiltshire Constabulary (12).

    Infosecurity reports: "UK Police Suffered Thousands of Data Breaches in 2020"

  • news

    Visible to the public "Not as Complex as We Thought: Cyberattacks on Operational Technology Are on the Rise"

    FireEye's Mandiant cyber forensics team has released a new report focusing on the attack rates on control processes supported by Operational Technology (OT). Attacks on the control processes were previously considered complex because of access requirements and the need for malware that can compromise proprietary industrial technologies. However, the attack surface has been widened by vulnerable, Internet-facing OT endpoints. The number of less-sophisticated OT attack attempts is increasing, with hackers of varying levels of skill and resources having been observed using common IT tools and methods to gain access to exposed OT systems. These attackers have targeted solar energy panel networks, water control systems, and Building Automation Systems (BAS). According to the researchers, the main objectives behind attacks against OT systems seem to be ideological, egotistical, or financial rather than to cause significant damage. Attackers have been using Remote Access Services (RAS), Virtual Network Computing (VNC), and other methods to compromise OT assets. Graphical User Interfaces (GUI) are considered the low-hanging fruit that many attackers are going after as they allow them to modify control variables without being knowledgeable of a process. The researchers recommend the removal of OT assets from public, online networks whenever possible. Security audits should be conducted frequently to harden networks. Human Machine Interfaces (HMI), and other assets should also be configured to prevent potentially dangerous variable states. This article continues to discuss recent findings surrounding the rise in low sophistication OT compromises.

    ZDNet reports "Not as Complex as We Thought: Cyberattacks on Operational Technology Are on the Rise"

  • news

    Visible to the public "Cyber Insurance Industry Grapples With Evolving Security Risks"

    The growing frequency and severity of cyberattacks are increasing the demand for cyber insurance. However, a recent report from the US Government Accountability Office (GAO) reveals that insurers are struggling to adjust their policies to keep up with new cyber risks. According to the GAO report, the number of insurance customers who have opted for cyber insurance grew from 26 percent in 2016 to 47 percent in 2020. This increase in cyber insurance demand has also led to a rise in insurer costs, as indicated by GAO's survey of insurance brokers. Most of them revealed that their clients' insurance premiums rose between 10 and 30 percent in later 2020. GAO pointed out that the rapidly growing level of cyber risk is creating uncertainty surrounding the affordability and availability of cyber insurance policies, especially for healthcare, education, and other high-risk industries. Cyber risk will continue to evolve as technology and cyberattack techniques change, making it increasingly difficult for insurers to underwrite coverage. Challenges faced by cyber insurers include a lack of sufficient comprehensive data on cyber losses to quantify risk accurately, lack of clarity surrounding security-related terms for cyber insurance policies, aiding in ransomware payouts, and more. The GAO report also highlighted how insurers are becoming more selective when offering coverage to industries considered high-risk, such as healthcare and education. Insurers have been increasing coverage prices to reduce cyber coverage limits for riskier industry sectors that face more significant damage from ransomware attacks. This article continues to discuss findings shared by the GAO report regarding cyber insurance challenges.

    Decipher reports "Cyber Insurance Industry Grapples With Evolving Security Risks"

  • news

    Visible to the public "New Bluetooth Vulnerabilities Could Expose Many Devices to Impersonation Attacks"

    Researchers with France's national cybersecurity agency ANSSI have identified seven new flaws that affect devices supporting Bluetooth Core and Mesh specifications. These specifications define technical and policy requirements for devices that operate over Bluetooth connections. According to an advisory recently published by the CERT Coordination Center (CERT/CC) at Carnegie Mellon University, a malicious actor can exploit the vulnerabilities to impersonate legitimate devices as long as they are within Bluetooth range. Organizations whose products have been confirmed to be affected by the vulnerabilities identified by ANSSI include Cisco, Intel, Android Open-Source Project (AOSP), Cradlepoint, Microchip Technology, and Red Hat. Two dozen vendors appear to have confirmed that their products are not impacted by the flaws. There are 200 other vendors whose products could be vulnerable but still hold an "unknown" status in CERT/CC's advisory. The Android mobile operating system is affected by three of the vulnerabilities, but the upcoming updates will address only two of them. According to AOSP, the third vulnerability impacting the Android OS has a negligible security impact. Those vendors who have confirmed the vulnerabilities say their products appear to be impacted mostly by CVE-2020-26555 and CVE-2020-26558, which are both described as impersonation issues. The exploitation of CVE-2020-26555 requires the attacker to be able to identify the Bluetooth Device Address of the vulnerable device before they can execute the attack. If the attack is successful, the malicious actor can complete pairing with a known link key, encrypt communications with the vulnerable device, and access profiles allowed by a paired or bonded remote device that supports Legacy Pairing. This article continues to discuss the potential exploitation and impact of the new Bluetooth vulnerabilities.

    Security Week reports "New Bluetooth Vulnerabilities Could Expose Many Devices to Impersonation Attacks"

  • news

    Visible to the public "Three-Quarters of CISOs Predict Another SolarWinds-Style Attack"

    According to a new Splunk report, some 84% of global organizations have suffered a severe security incident over the past two years, and a majority are expecting another SolarWinds-style supply chain attack. Researchers interviewed 535 security leaders in nine leading economies across multiple industries to compile its latest report called "The State of Security 2021". Of the companies that were successfully attacked, email compromise (42%) was the most common incident, followed by data breaches (39%), mobile malware (37%), and DDoS (36%). Over three-quarters (78%) of the participants expressed concern about more sophisticated supply chain attacks coming in the future. The researchers also found that cloud complexity is emerging as a major threat to global organizations, with three-quarters (75%) of respondents already using multiple providers. Over half (53%) of the respondents claimed attacks had increased in this area during the pandemic, and 76% of the respondents claimed that remote workers are harder to secure. Nearly 90% of participants already run a substantial number of their business-critical applications in the public cloud. Two of the key challenges of securing cloud environments highlighted by respondents were maintaining and enforcing consistent policies (50%) and the complexity of using multiple security controls (42%). The researchers are urging organizations to modernize their Security Operations Centers (SOCs) with new SIEM platforms and more automation, such as in user and entity behavior analytics (UEBA) and security orchestration, automation, and response (SOAR) tools.

    Infosecurity reports: "Three-Quarters of CISOs Predict Another SolarWinds-Style Attack"

  • news

    Visible to the public "US to Regulate Pipeline Cybersecurity"

    The United States Department of Homeland Security (DHS) is to issue its first-ever set of cybersecurity regulations for pipelines. The news comes in the wake of a recent ransomware attack on the Colonial Pipeline that knocked operational systems offline for five days, triggering panic buying that led to fuel shortages in the Southeast. A senior DHS official has stated that a security directive will be issued this week requiring pipeline companies to report cybersecurity incidents to federal authorities. The directive will come from the Transportation Security Administration, a DHS unit. This directive will be followed by a meatier set of regulations in a couple of weeks. These rules are expected to layout in more detail what pipeline operators must do to protect their systems from cyberattacks. Post-breach behavior will also be regulated, with companies who succumb to a cyberattack ordered to adhere to a set of best practices. These mandatory regulations will replace the voluntary cybersecurity guidelines issued previously by the DHS.

    Infosecurity reports: "US to Regulate Pipeline Cybersecurity"

  • news

    Visible to the public "Two New Attacks Break PDF Certification"

    Researchers at Ruhr-University Bochum (RUB) have discovered a security issue in the certification signatures of PDF documents. This form of signed PDF files can be used in the conclusion of contracts. The certification signature allows certain changes to be made to the document after it has been signed so that a second contractual party can also sign the document, unlike a normal PDF signature. The researchers at the Horst Gortz Institute for IT Security in Bochum demonstrated that it is possible for the second contractual party to change the contract text when adding their digital signature, without invalidating the certification. The integrity of the protected PDF documents was undermined through the performance of two new attacks called the Sneaky Signature Attack (SSA) and the Evil Annotation Attack (EAA). These attacks allowed the researchers to display fake content in the document instead of the certified content. They did this without rendering the certification invalid or triggering the PDF applications to warn users. Out of the 26 PDF applications tested by the security experts, 24 were found to be affected by at least one of the attacks. They also discovered a vulnerability contained by Adobe products that attackers could exploit to insert malicious code into certified Adobe documents. This article continues to discuss the demonstration of two new attacks that can break PDF certification, along with the discovery of a weakness in Adobe products that can be used to implant malicious code into Adobe documents.

    RUB reports "Two New Attacks Break PDF Certification"

  • news

    Visible to the public "FBI Issues Conti Ransomware Alert as Attacks Target Healthcare"

    The FBI has released an alert about Conti ransomware following the identification of at least 16 Conti ransomware attacks against US healthcare and first responder networks, including law enforcement agencies, emergency medical services, municipalities, and more within the last year. The alert says that the operators of the Conti ransomware variant use malicious email links, attachments, or stolen Remote Desktop Protocol (RDP) credentials. Conti actors also weaponize Word files embedded with Powershell scripts, initially staging Cobalt Strike using the Word documents and then dropping Emotet onto the network, giving the attackers access to deploy the ransomware. According to an advisory published by the American Hospital Association, attacks linked to the Conti ransomware variant are believed to stem from criminal networks operating from a non-cooperative foreign jurisdiction. This article continues to discuss the FBI's alert about Conti ransomware attacks and other findings surrounding this ransomware variant.

    Dark Reading reports "FBI Issues Conti Ransomware Alert as Attacks Target Healthcare"

  • news

    Visible to the public Pub Crawl #50


    Pub_Crawl_web.jpgPub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers.

  • news

    Visible to the public Spotlight on Lablet Research #18 - Scalable Privacy Analysis

    Spotlight on Lablet Research #18 -

    Project: Scalable Privacy Analysis

  • news

    Visible to the public Cybersecurity Snapshots #18 - Oil And Gas Companies Need to Take Cybersecurity More Seriously

    Cybersecurity Snapshots #18 -

    Oil And Gas Companies Need to Take Cybersecurity More Seriously

  • news

    Visible to the public "Insurance Giant Reportedly Paid $40 Million Ransom"

    In late March, CNA Financial was hit by a variant of the Evil Corp-authored Hades ransomware called Phoenix Locker. They agreed to the ransom demand and paid the adversaries $40 million after its IT systems were locked down and threat actors stole data. CNA Financial noted in a security update that it did not believe that the record systems, claims systems, or underwriting systems, where most policyholder data is stored, were impacted by the attack. CNA Finacial is one of America's largest insurers. The FBI urges victims not to pay the ransom as it encourages more copycat attacks and does not guarantee that the organization's stolen files will not be monetized in the future or that it will even receive a working decryption key. Insurance companies like CNA Financial have been at the center of fierce debate recently over whether the industry should be assisting customers financially who have been struck by ransomware.

    Infosecurity reports: "Insurance Giant Reportedly Paid $40 Million Ransom"

  • news

    Visible to the public "Shape-Shifting Computer Chip Thwarts an Army of Hackers"

    A team of researchers at the University of Michigan has developed a new secure computer processor called Morpheus that can thwart attacks from hackers by rapidly and continuously randomizing elements of code and data. The randomization of such elements makes it significantly more difficult to hack the processor. Last summer, over 500 security researchers tried hacking the Morpheus processor as part of the US Defense Advanced Research Projects Agency's (DARPA) program to design a secure processor capable of protecting vulnerable software. All of them failed to hack the processor. Hackers must be familiar with the details of a processor's microarchitecture in order to place malicious code or malware onto vulnerable systems. Therefore, Morpheus randomizes these details to turn the computer into a puzzle that must be solved before a security exploit can be performed by hackers. Details, such as the commands executed by the processor or the format of program data, change between Morpheus machines. Software running on the Morpheus processor remains the same as these changes only occur at the microarchitecture level. A skilled hacker could reverse-engineer a Morpheus machine within a few hours. Therefore, Morpheus changes the microarchitecture once every few hundred milliseconds, thus requiring attackers to be fast at reverse-engineering the microarchitecture. The common approach behind computer security is to fix individual software flaws to prevent hacking. However, programmers need to write perfect software that has no bugs for patch-based techniques to succeed, which is considered impossible by many. The Morpheus processor's approach to security is to augment its underlying structure to make it harder for attackers to graft malware onto the device, which protects the vulnerable software running on it. This article continues to discuss how the Morpheus processor can thwart hackers, the research behind this processor, and other research efforts surrounding the use of hardware to help strengthen software security.

    The Conversation reports "Shape-Shifting Computer Chip Thwarts an Army of Hackers"

  • news

    Visible to the public "Personal Data of 4.5 Million Passengers Exposed in Air India Data Breach"

    India's national airline Air India released a statement to passengers, revealing that it had experienced a data breach in February this year. The data breach has led to the exposure of data belonging to 4.5 million Air India passengers worldwide. Unknown threat actors hacked Air India's data management service provider SITA Passenger Service System (SITA PSS), responsible for the storage and processing of Air India passengers' personal information. The data breach affects passengers who registered between August 26, 2011, and February 3, 2021. The attackers accessed a decade worth of passenger data, containing names, passport information, credit card details, birth dates, ticket information, contact information, and frequent flyer data. Air India did confirm that CVV/CVC numbers were not exposed. There is currently no sign that the leaked data is being misused. However, passengers are urged to change their passwords. This security incident affects multiple airlines, as SITA provides services to Star Alliance, Japan Airlines, Air New Zealand, Malaysia Airlines, Cathay Pacific, and more. This article continues to discuss the impact of the Air India data breach, the measures taken by the airline in response to the breach, other airlines affected by this incident, and what affected flyers need to do to avoid security risks.

    CISO MAG reports "Personal Data of 4.5 Million Passengers Exposed in Air India Data Breach"

  • news

    Visible to the public "Ireland Tests Decrypt Tool After 'Catastrophic' Ransomware Attack"

    Irish authorities are testing a decrypt tool to recover health data following the recent ransomware attack on the Health Service Executive (HSE) of Ireland, which led to disruption of healthcare and social services in hospitals and community centers across the country. Medical staff members have had to go back to paper records because of the attack. The attack has also resulted in a drop in appointments in some areas by 80 percent and many outpatient service cancellations. It has been reported that private IT specialist contractors and the Irish National Cyber Security Centre are assessing the integrity of a decryption tool to see if it can safely be applied to healthcare systems. According to the Irish broadcaster RTE, the HSE also secured a High Court order to prevent the hackers behind the ransomware attack and any other individuals or businesses from processing, sharing, or selling the sensitive medical information stolen during the cyberattack. The attackers' threats to leak the information and other patient data online to the public prompted the order. It has been confirmed that the human-operated double extortion ransomware variant called Conti was involved in the attack. Double extortion is a scheme in which hackers try to maximize their chances of making a profit by threatening to sell or auction data encrypted in a ransomware attack. However, the Irish government said that it has not paid the attackers' demanded ransom, and that the ransom will not be paid. This article continues to discuss the impact of the HSE ransomware attack and the decryptor tool being tested to recover stolen health data.

    Silicon UK reports "Ireland Tests Decrypt Tool After 'Catastrophic' Ransomware Attack"

  • news

    Visible to the public "Microsoft, Google Clouds Hijacked for Gobs of Phishing"

    Researchers at Proofpoint have found that threat actors are cashing in on the rapid shift to cloud-based business services during the pandemic by hiding behind ubiquitous, trusted services from Microsoft and Google to make their email phishing scams look legit. And it's working. In the first three months of 2021 alone, the researchers stated that 7 million malicious emails were sent from Microsoft 365 and a staggering 45 million sent from Google's infrastructure. The researchers also noted that cybercriminals had used Office 365, Azure, OneDrive, SharePoint, G-Suite, and Firebase storage to send phishing emails and host attacks. The researchers stated that the malicious message volume from these trusted cloud services exceeded that of any botnet in 2020. The trusted reputation of these domains, including outlook.com and sharepoint.com, increases the difficulty of detection for defenders. Because breaching a single account could potentially provide sprawling access, the researchers reported 95 percent of organizations were targeted for cloud account compromise, and of those, more than half were successful. Additionally, more than 30 percent of those organizations that were compromised experienced post-access activity, including file manipulation, email forwarding, and OAuth activity. Once attackers have credentials, they can easily move in and out of a range of services and use those to send additional, convincing phishing emails.

    Threatpost reports: "Microsoft, Google Clouds Hijacked for Gobs of Phishing"

  • news

    Visible to the public "Global Credential Stuffing Attempts Hit 193 Billion in 2020"

    Security researchers at Akamai did a new study that revealed the sheer scale of attempts to crack open users' accounts using previously breached credentials. The researchers found that 193 billion credential stuffing attempts occurred during 2020 as cyber-criminals looked to capitalize on surging numbers of online users. Their research was mainly focused on the financial sector. Akamai detected 3.4 billion credential stuffing attempts targeting the financial sector, which is a 45% increase from the previous year. Akamai also saw nearly 6.3 billion web application attacks in 2020, over 736 million of which were aimed at financial services organizations which is an increase of 62% from 2019. In the financial services industry, Local File Inclusion (LFI) attacks were the number one web application attack type in 2020, accounting for 52% of the total, followed by SQLi (33%) and cross-site scripting (9%). However, globally across all sectors, SQLi was in the top spot and accounted for 68% of all web application attacks in 2020. LFI attacks came second with 22%. The researchers also found that there was a rise of smishing and phishing attacks against the financial services sector, specifically via two popular toolkits: Kr3pto and Ex-Robotos.

    Infosecurity reports: "Global Credential Stuffing Attempts Hit 193 Billion in 2020"

  • news

    Visible to the public "100M Android Users Hit By Rampant Cloud Leaks"

    Researchers at Check Point Research found several mobile apps, some with 10 million downloads, have opened up users' personal data to the public internet, and most aren't fixed. More than 100 million Android users are at risk after 23 different mobile apps were found to leak personal data in the wake of rampant cloud misconfigurations. Anyone with internet access could access information including emails, chat messages, location data, passwords, photos, personal data, and more. Worryingly, the researcher stated that only "a few" of the apps had changed their settings after being contacted by the firm to make the information private. The researchers also found push-notification and cloud-storage keys embedded in a number of Android applications, which put developers' own internal resources, such as access to update mechanisms, storage, and more, at risk.

    Threatpost reports: "100M Android Users Hit By Rampant Cloud Leaks"

  • news

    Visible to the public "More Than 290 Enterprises Hit by 6 Ransomware Groups in 2021"

    According to a new report from the managed detection and response firm eSentire, six ransomware gangs have hit over 290 enterprises between January 1 and April 30 this year, bringing in an estimated $45 million for the attackers. The six ransomware groups include Ryuk/Conti, Sodin/REvil, Clop, DoppelPaymer/BitPaymer, DarkSide, and Avaddon, each of which has focused on specific industries and regions. For example, the Ryuk/Conti gang executed attacks against 352 organizations since 2018 and 63 this year, most of which have been manufacturing, construction, and transportation companies. Sodin/REvil ransomware operators focus on healthcare organizations and laptop manufacturers, such as Acer and Quanta. The DoppelPaymer/BitPaymer gang largely focuses on government institutions and schools. The Clop ransomware group has focused its efforts on exploiting a vulnerability in Accellion's file transfer system, which has led to attacks against the University of California, Stanford University, the Canadian jet manufacturer Bombardier, the global law firm Jones Day, and more. An attack on Colonial Pipeline by the DarkSide gang led to gas shortages and higher prices in the US. The Avaddon group was recently reported to have attacked the major European insurance company Axa, which provides cyber insurance to many companies and is known for pledging to stop reimbursing customers in France that pay ransoms. It is highly suspected that these groups are attacking many more entities than the public realizes. As no single sector or region is immune from ransomware, it is important that both public and private sector organizations put security protections in place to mitigate damages from ransomware attacks. This article continues to discuss findings from eSentire's report regarding the targets, capabilities, and impact of six ransomware groups.

    ZDNet reports "More Than 290 Enterprises Hit by 6 Ransomware Groups in 2021"

  • news

    Visible to the public CNA ransomware attack

    CNA, a US insurance giant, paid $40 million ransom to recover its systems in March. This was one of the largest payments so far. The attack was carried out using Phoenix CryptoLocker believed to have been used by Evil Corp a Russian cybercrime Network. Since the pandemic there has been a large increase in the number of ransomware attacks and ask payments by hackers. To defend against ransomware attacks, companies should secure

  • news

    Visible to the public "Security Framework for Protected Data Allows Researchers To Tap Oak Ridge Supercomputers"

    A new framework of security protocols, called CITADEL, will allow researchers to tap into supercomputers operating at Oak Ridge National Laboratory's National Center for Computational Sciences (NCCS) for projects that use protected data, including health information. CITADEL presents new security controls for handling large datasets consisting of private or health information as well as data protected by the Health Insurance Portability and Accountability Act (HIPAA) and International Traffic in Arms Regulations (ITAR). The new framework allows researchers to comply with the Federal Information Security Management Act (FISMA) when they work with highly protected data contained by supercomputers. With CITADEL, an encrypted parallel file system is utilized to enhance performance and security while ensuring that researchers are following all of the regulations implemented to protect the data. This article continues to discuss the development and features of the CITADEL security framework.

    GCN reports "Security Framework for Protected Data Allows Researchers To Tap Oak Ridge Supercomputers"

  • news

    Visible to the public "NIST Proposes Method for Evaluating User Trust in Artificial Intelligence Systems"

    The National Institute of Standards and Technology (NIST) has a new draft publication that delves into how humans decide whether or not to trust recommendations made by an Artificial Intelligence (AI) system. The report is a part of NIST's broader effort to help improve AI system trustworthiness. This latest publication focuses on how humans experience trust as they use or are impacted by AI systems. According to one of the publication's authors Brian Stanton, the issue stems from whether it is possible to measure human trust in AI systems, and if so, how can this trust be measured accurately and appropriately. There are many factors that contribute to humans' decisions about trust in AI systems, including how one thinks and feels about the system and the perceived risks associated with using it. The NIST publication suggests a list of nine contributing factors to a user's potential trust in an AI system. These factors include security, privacy, accuracy, reliability, resiliency, objectivity, safety, accountability, and explainability. The proposed factors are different from the technical requirements of trustworthy AI that NIST is establishing with the community of AI developers and practitioners. The document explores how a person may weigh the nine factors differently based on the task itself and the risk associated with trusting the AI's decision. This article continues to discuss the NISTIR 8332 document, NIST's proposed method for evaluating human trust in AI systems, and the importance of enhancing the trustworthiness of such systems.

    HS Today reports "NIST Proposes Method for Evaluating User Trust in Artificial Intelligence Systems"

  • news

    Visible to the public "Scheme Flooding Bug Threatens to Sink User Privacy"

    Researchers at the security provider FingerPrintJS discovered a vulnerability that can enable websites to track users across different desktop browsers, including Google Chrome, Apple Safari, Mozilla Firefox, and Tor, posing a significant threat to user privacy. They have explained how malicious actors can use a technique called scheme flooding to see what sites users are visiting even when they switch browsers, enable incognito mode, or access the Internet via a Virtual Private Network (VPN). The exploitation of the scheme flooding flaw allows sites to ping multiple third-party applications, such as Skype or Zoom, and then use the ping responses to create a list of apps on the user's system. This list can then be used to fingerprint a user across multiple browsers and Internet connections. A website could identify individuals for more sinister purposes based on the apps installed on a device. For example, a website may detect a government or military official on the Internet depending on their installed apps. The website may also associate browsing history that is supposed to be anonymous. According to the FingerPrintJS researchers, the scheme flooding bug stems from the way in which a website uses Application Program Interface (API) calls to bring up an application. This article continues to discuss the source and potential impact of the scheme flooding bug.

    SearchSecurity reports "Scheme Flooding Bug Threatens to Sink User Privacy"

  • news

    Visible to the public "Exchange Server Attackers Launched Scans Within Five Minutes of Disclosure"

    Researchers at Palo Alto Networks conducted a new study where they scanned 50 million IP addresses associated with 50 global enterprises. The research was carried out between January and March 2021. The researchers stated that threat actors are "winning the race" to find vulnerable assets to exploit, launching scans within minutes of CVE announcements. The researchers noted that scans began within 15 minutes after CVE announcements were released between January and March. Attackers worked faster for the Microsoft Exchange Server zero-days, launching scans within five minutes of Microsoft's March 2nd announcement. The researchers also found that on a typical day, attackers conducted a new scan once every hour, whereas global enterprises can take weeks. Remote Desktop Protocol (RDP) servers accounted for the largest number of security issues (32%), although in this case, attackers aren't scanning for software vulnerabilities but endpoints that can have their credentials brute-forced or cracked. It's an increasingly popular initial access vector for ransomware attackers.

    Infosecurity reports: "Exchange Server Attackers Launched Scans Within Five Minutes of Disclosure"