News Items

  • news

    Visible to the public "Keksec Cybergang Debuts Simps Botnet for Gaming DDoS"

    Security researchers at Uptyc's have discovered a new malware that infects IoT devices in tandem with the prolific Gafgyt botnet, using known security vulnerabilities. A recently developed botnet named "Simps" has emerged from the cyber-underground to carry out distributed denial-of-service (DDoS) attacks on gaming targets and others, using internet of things (IoT) nodes. It's part of the toolset used by the Keksec cybercrime group, researchers said. Simps was first seen in April being dropped on IoT devices by the Gafgyt botnet. Gafgyt (a.k.a. Bashlite) is a Linux-based botnet that was first uncovered in 2014. It targets vulnerable IoT devices like Huawei routers, Realtek routers, and ASUS devices, which it then uses to launch large-scale DDoS attacks and download next-stage payloads to infected machines. It recently added new exploits for initial compromise for Huawei, Realtek, and Dasan GPON devices. In the current campaign, researchers stated that Gafgyt infects Realtek (CVE-2014-8361) and Linksys endpoints and then fetches Simps. According to the analysis, Simps uses Mirai and Gafgyt modules for DDoS functionality. Another variant of the attack uses shell scripts for downloading Simps.

    Threatpost reports: "Keksec Cybergang Debuts Simps Botnet for Gaming DDoS"

  • news

    Visible to the public "Center for Internet Security (CIS) Releases CIS Controls v8 to Reflect Evolving Technology, Threats"

    The Center for Internet Security (CIS) officially announced the launch of CIS Controls v8. The Controls have been enhanced to keep up with evolving threats and technology, including modern systems and software. The CIS Controls are prioritized Safeguards that mitigate the most common cyberattacks targeting networks and systems. They are referenced by many legal, policy, and regulatory frameworks. The continued integration of cloud resources and mobile devices into enterprise networks prompted the update to the CIS Controls. CIS Controls v8 combines and consolidates the CIS Controls based on activities rather than by who manages the devices. The new version of CIS controls. Attempts to streamline the Controls and organize them by activity have decreased the number of Controls from 20 to 18. The 18 top-level Controls consist of 153 Safeguards intended to help enterprises improve their cybersecurity posture. The whole ecosystem surrounding the Controls has been or will soon be updated too. This ecosystem includes the CIS Controls Self-Assessment Tool (CSAT) (Hosted & Pro), Community Defense Model (CDM), CIS Risk Assessment Method (CIS RAM), CIS Controls Mobile Companion Guide, CIS Controls Cloud Companion Guide, and more. This article continues to discuss the development and launch of CIS Controls v8 and updates to the whole ecosystem surrounding these controls.

    CIS reports "Center for Internet Security (CIS) Releases CIS Controls v8 to Reflect Evolving Technology, Threats"

  • news

    Visible to the public "Enhancing Defenders' Predictive Power in Cyberspace"

    Researchers at the RAND Corporation have developed a new model that improves upon existing frameworks to help organizations proactively protect themselves against cyber threats. The process-based Scalable Warning and Resilience Model (SWARM) developed by RAND focuses on cyber threats stemming from state-sponsored actors but without the assumption of access to classified assets or information. This model prioritizes threat detection and aids the improvement of cyber incident prediction. It combines processes aiming to help organizations anticipate and defend against malicious actors in order to enhance network resilience. SWARM adapts data collection, cyber threat intelligence, and penetration testing to the specific type of intrusion sets most likely to target an organization's network. The model adapts the concept of applying both resilience and Indications and Warning (I&W) frameworks to information environments. It incorporates a combination of tailored threat modeling and emulation. SWARM adapts across organizations, provides advance warning for cyber incidents through early technical and nontechnical indicators, improves network resilience against targeted cyber incidents, and more. The RAND Corporation's new report includes a case study, demonstrating how the model could help defenders by proactively protecting their systems through early warning of cyber incidents before they happen. This article continues to discuss how SWARM can help organizations proactively defend against cyber threats as well as the need for organizations to have a tailored and targeted approach to cybersecurity.

    Homeland Security News Wire reports "Enhancing Defenders' Predictive Power in Cyberspace"

  • news

    Visible to the public "The Basics of Security Code Review"

    Developers should be more responsible for the security of their code. One of the best ways to ensure software quality is to perform source code reviews to identify and remediate security risk before an application moves into production. Developers already spend a significant number of hours finding and fixing bugs in code. According to a recent survey conducted by the software firm Rollbar, 32 percent of developers spend up to 10 hours a week remediating bugs, while 16 percent spend up to 15 hours a week, and 6 percent dedicate up to 20 hours a week fixing bugs instead of writing new code. Open-source code is also widely used in software development. Currently, 99 percent of codebases have at least one open-source component, and 91 percent have components that are either out-of-date by more than fours or have not seen development activity in the last two years. Efforts for securing open-source code remain in the wild west phase. Some of the best tactics for performing security code review include determining the most common vulnerabilities for the type of application that you are working with, tracking data flow, ensuring your application is using secure settings based on best practices, and findings the right tools that can help remediate security issues more efficiently. This article continues to discuss how much time developers dedicate to finding and fixing bugs in code, and some best practices for performing security code reviews.

    Help Net Security reports "The Basics of Security Code Review"

  • news

    Visible to the public "Aqua Security Researchers Discover 90% of Companies Are Vulnerable to Security Breaches Due to Cloud Misconfigurations"

    Aqua Security has published new research from Team Nautilus, revealing that most companies that have transitioned to multi-cloud environments are failing to configure their cloud-based services properly. Findings from Aqua's "2021 Cloud Security Report: Cloud Configuration Risks Exposed" bring further attention to the threat that these misconfigurations pose to the security of organizations. For example, improperly configured blog or bucket storage can open companies up to major security breaches, resource hijacking, denial-of-service (DoS) attacks, and other severe cyber risks. Aqua's research team examined anonymized cloud infrastructure data from hundreds of organizations in a 12-month period. They divided users into two groups based on the volume of cloud resources they scanned. One group consisted of SMBs (small and medium-sized businesses), which scanned between one and several hundred resources. The other group was composed of enterprise users who scanned from several hundred up to a few hundred thousand distinct resources. Less than 1 percent of enterprise organizations fixed all detected issues, while less than 8 percent of SMBs fixed all the issues they detected. Over half of all organizations receive alerts about misconfigured services with open ports. However, only 68 percent of the organizations fixed these issues, taking an average of 24 days to address them. It was also discovered that over 40 percent of users had at least one misconfigured Docker API, with the average number of days to remediate being 60. This article continues to discuss findings from research conducted by Team Nautilus regarding most organizations' failure to fix cloud misconfiguration issues promptly.

    PR Newswire reports "Aqua Security Researchers Discover 90% of Companies Are Vulnerable to Security Breaches Due to Cloud Misconfigurations"

  • news

    Visible to the public "Credential Stuffing Reaches 193 Billion Login Attempts Annually"

    Akamai's new "State of the Internet" report reveals that the number of credential stuffing attacks reached 193 billion in 2020. The number of login attempts using stolen or reused credentials increased more than 310 percent from 47 billion in 2019. An unspecified amount of the login attempts was attributed to an increase in customers and an improved view of credential stuffing attacks. The increases not only show that attackers are throwing more requests at websites but also an increase in threats. Many businesses have moved a greater portion of their infrastructure to the cloud to enable access to corporate applications and data for remote works, over the past year. Therefore, attackers have focused more on cloud services that are accessible using a username-password combination. They have also been focusing more on Virtual Private Network (VPN) gateways. Akamai also emphasized the leak of millions of new usernames and passwords in early 2020, which contributed to the significant increase in credential stuffing observed later in the year. Akamai blocked a smaller volume of Web application attacks. However, such attacks can pose considerable danger. SQL injection (SQLi) attacks, which are executed against databases used to power websites, made up more than two-thirds of overall Web application attacks. Local File Inclusion (LFI) attacks follow SQLi attacks, accounting for nearly 22 percent of the total number of such attacks. This article continues to discuss key findings from Akamai's report on the state of the Internet.

    Dark Reading reports "Credential Stuffing Reaches 193 Billion Login Attempts Annually"

  • news

    Visible to the public "Bug Exposes Eufy Camera Private Feeds to Random Users"

    Owners of Eufy home security cameras were warned this week of an internal server bug that allowed strangers to view, pan, and zoom in on their home video feeds for approximately one day. Inversely, customers were also suddenly given access to do the same to other users. The China-based parent company Anker quickly patched the vulnerability, which occurred during a planned server upgrade on Monday. Eventually, Anker acknowledged that the situation occurred due to a glitch during a server update and was discovered 40 minutes after it first occurred and fixed about an hour later. The company tweeted an easy fix to the problem at 4:51 p.m. EST Monday, instructing users to "Please unplug and then reconnect the device" and then "Log out of the Eufy security app and log in again." However, by then, the damage to the company's reputation for privacy had been done, as users complained that Anker didn't act fast enough to let people know about the problem, allowing for privacy violations across its home security system. Security issues with cloud-based home security cameras are not uncommon. Google Nest and Amazon Ring also have experienced problems due to vulnerabilities that have threatened user privacy.

    Threatpost reports: "Bug Exposes Eufy Camera Private Feeds to Random Users"

  • news

    Visible to the public "Recruiter’s Cloud Snafu Exposes 20,000 CVs and ID Documents"

    A team of security researchers at Website Planet discovered an AWS S3 bucket left unprotected and unsecured by FastTrack Reflex Recruitment, now TeamBMS. The 5GB trove contained 21,000 files, including CVs featuring personal information such as email addresses, full names, mobile phone numbers, home addresses, and social network URLs. Other details included dates of birth, passport numbers, and applicant photos, according to Website Planet. The data could have been used to commit follow-on identity theft, fraud, and craft phishing attacks designed to steal more personal details or deploy malware if found by threat actors. The researchers also claimed that the information contained in the bucket could have been used for corporate espionage or to target victims' homes for burglary. The research team discovered the leak on December 29 last year and reached out several times to TeamBMS's parent company TeamResourcing and the UK CERT. The bucket was finally secured on March 23.

    Infosecurity reports: "Recruiter's Cloud Snafu Exposes 20,000 CVs and ID Documents"

  • news

    Visible to the public "Graphene Key for Novel Hardware Security"

    More private data is being stored and shared digitally, making it more important than ever to explore the different ways in which data could be protected against attacks. Silicon technology, used today, exploits the tiny differences between computing components to produce secure keys. However, there are Artificial Intelligence (AI) techniques that malicious actors can use to predict these keys and gain access to data. A team of Penn State researchers has developed a new method to make it more difficult to crack encrypted keys. The researchers used graphene, which is a layer of carbon one atom thick, to develop a new reconfigurable, scalable, and low-power hardware security device. This security device is said to be significantly resilient against AI attacks. According to the researchers, the device is the first demonstration of a graphene-based Physically Unclonable Function (PUF). A PUF is a device that uses the inherent, unique variations introduced during manufacturing to give physical entities unique fingerprints. PUFs are useful for authentication, identification, preventing counterfeiting, and more. The fabrication process, along with the physical and electrical properties of graphene, increase the energy efficiency, scalability, and security of the novel PUF against AI attacks that threaten silicon PUFs. The team tested their graphene-based PUFs using Machine Learning (ML). They trained AI with graphene PUF simulation data to observe whether the AI could use this training to make predictions regarding encrypted data and to reveal system vulnerabilities. The researchers emphasized that the PUF's resistance to ML attacks strengthens its security so that potential hackers would not be able to use breached data to reverse engineer a device for future exploitation. This article continues to discuss the graphene-based PUF developed by Penn State researchers to improve hardware security.

    Penn State reports "Graphene Key for Novel Hardware Security"

  • news

    Visible to the public "Families of Missing Persons Receive Fake Ransom Demands"

    The FBI is warning families of missing persons to be on their guard for extortion demands from cyber-criminals claiming to have abducted their loved ones. The adversaries typically scour social media posts to gather information about missing persons and their families. They'll carry out open-source research to find out more about the individual to make their claims more realistic. The adversaries will then contact those family members online or call/message them using third-party apps to disguise their phone numbers. Usually, they'll request between $5000 and $10,000 in ransom, the FBI claimed. The FBI stated that generally, offenders do not offer proof of life. However, in one instance, an accomplice made telephone calls to family members claiming to be the missing person. Offenders often claim the missing person is ill or injured, adding to the urgency of the situation and putting additional pressure on family members to pay the ransom. Since the onset of COVID-19 nationwide stay-at-home orders, law enforcement has received several reports of scammers targeting families who have posted on social media about their missing family member. Such scams had increased over the past three years, with COVID-19 offering extortionists more opportunities to strike the vulnerable. The FBI is urging anyone who has been targeted in this way to contact their local law enforcement agency or FBI field office, file an online complaint with the Internet Crime Complaint Center and be sure to keep all records of communication with the individuals concerned.

    Infosecurity reports: "Families of Missing Persons Receive Fake Ransom Demands"

  • news

    Visible to the public "Consumers Warned About Surge in Meal Kit Delivery Scams"

    Security researchers at a cybersecurity firm called Tessian have uncovered a number of SMS scams impersonating well-known meal kit delivery companies, including Gousto and HelloFresh. The surge in meal kit delivery scams is because of the rising demand for these DIY recipe kits during the COVID-19 lockdown. These scams come in a number of forms. In one example, several phishing campaigns impersonate Gousto and ask recipients to rate their delivery to enter a prize draw. The link in the message takes them to a fake website designed to steal personal and financial information or harvest important credentials. There is also significant variation in the sophistication of these scam messages, with a particularly easy one to spot stating: "Your Gousto box is now delivered. Enjoy the reoipej! Rate delivesy and enter wrize diaw at 'URL'." The researchers also added that thousands of these SMS and WhatsApp messages are typically sent out at the same time.

    Infosecurity reports: "Consumers Warned About Surge in Meal Kit Delivery Scams"

  • news

    Visible to the public "Patient Data Could Be 'Abused' after Health Service Attack, Warns Irish Government"

    The Irish Health Service Executive (HSE) recently faced a ransomware attack that led to disruptions to essential healthcare and social services in hospitals and community centers throughout Ireland. The Irish government warns that the attackers could leak sensitive medical information and other patient data. Experts have confirmed that the attack involved the human-operated ransomware variant called Conti. HSE's systems were also found to contain a remote access tool called Cobalt Strike Beacon, which the hackers used to move within the computer networks before carrying out the attack and demanding a ransom. Conti uses double extortion attacks in which hackers threaten to leak stolen information to the public if the victim chooses not to give in to ransom demands. However, the Irish government has confirmed that it will not pay the attackers' demanded ransom. Early findings indicate that the Eastern European-based threat group known as Wizard Spider was behind the attack on Ireland's health care system. This article continues to discuss the impact of the HSE ransomware attack, the use of the Conti variant in the attack, the threat group suspected to be behind the incident, and what HSE is doing to restore impacted computer systems.

    ZDNet reports "Patient Data Could Be 'Abused' after Health Service Attack, Warns Irish Government"

  • news

    Visible to the public "House Members Reintroduce Pipeline Security Act"

    More than a dozen members of the US House Committee on Homeland Security have reintroduced the Pipeline Security Act. This bipartisan legislation aims to explicitly codify Transportation Security Administration (TSA) and Cybersecurity and Infrastructure Security Agency (CISA) roles in securing critical infrastructure pipelines. It will also require TSA to develop a personnel strategy for security staffing, as well as improve mechanisms for stakeholder engagement and congressional oversight of TSA's efforts. The reintroduction of this bill, which was initially introduced in 2020, follows the ransomware attack launched by the criminal group DarkSide against Colonial Pipeline's IT systems. The ransomware attack led to gas shortages and higher prices, further emphasizing the need for Congress to improve efforts to strengthen critical infrastructure and cybersecurity capabilities. This article continues to discuss the reintroduction and goals of the Pipeline Security Act.

    NextGov reports "House Members Reintroduce Pipeline Security Act"

  • news

    Visible to the public "Making Zero-Day Flaws Disappear"

    According to Maddie Stone, a security researcher with Google's Project Zero bug-hunting team, about 21 zero-day vulnerabilities have been discovered so far in 2021. The number of zero-day vulnerabilities is expected to reach more than 60 if that pace continues. The team found a total of 24 zero-day flaws last year. The significant growth in zero-day vulnerabilities is said to be a result of improved visibility into the bigger picture. Stone says the key to battling zero-day exploits is raising defensive barriers and employing new methods that increase work for exploit writers. There are various ways to raise attacker costs, including time and money. Software developers are encouraged to write better patches to ensure that associated vulnerabilities are addressed by one patch, as nearly 25 percent of zero-day flaws discovered in 2020 were closely related to previously disclosed vulnerabilities. The window of time between the detection of a zero-day flaw and patch release must also be minimized, as this timeline often stretches from a few weeks to a couple of months. To shrink this timeline, Stone calls on the reimagination of vulnerability mitigation for software and devices, with emphasis on making mitigation options available within seven days to weaken the impact of the flaw. It is also important to increase the adoption of Rust, Go, and other memory-safe programming languages designed to prevent programmers from introducing certain types of bugs related to how memory is used. This article continues to discuss the growth in zero-day vulnerabilities and different strategies for raising costs for attackers in the exploitation of such flaws.

    InfoRiskToday reports "Making Zero-Day Flaws Disappear"

  • news

    Visible to the public "Two-thirds of CISOs Unprepared for Cyber-attack"

    Researchers from Proofpoint conducted a new global survey of CISOs and have discovered that two-thirds of respondents said they do not feel their organization is prepared enough to cope with a targeted cyberattack. The researchers surveyed more than 1,400 CISOs employed by mid-to large-size organizations. Just under two-thirds of CISOs (64%) reported feeling at risk of suffering a material cyberattack in the next 12 months. More than half (53%) said they are more concerned about the repercussions of such an attack in 2021 than they were in 2020. Just over a third of respondents (34%) anticipated tackling Business Email Compromise (BEC) attacks, 31% thought insider threats would create a problem, and 33% were wary of cloud account compromise affecting O365 or G Suite accounts. Supply chain attacks, which have been prominent in the news of late, were a concern for 29% of respondents. Ransomware was the seventh most anticipated attack.

    Infosecurity reports: "Two-thirds of CISOs Unprepared for Cyber-attack"

  • news

    Visible to the public "CISA: Disconnect Internet for 3-5 Days to Evict SolarWinds Hackers From Network"

    The US Cybersecurity and Infrastructure Security Agency (CISA) has provided guidance to organizations impacted by the SolarWinds attack, which includes steps for evicting the attackers from compromised networks. The sophisticated cyberespionage campaign, attributed to Russian Foreign Intelligence Service (SVR) actors, affected many US government agencies, security vendors, and other different organizations. CISA's analysis report, AR21-134A, is tailored for federal agencies that used impacted versions of SolarWinds' Orion IT monitoring software and have discovered SolarWinds attacker activity in their environments. The report provides resource-intensive and highly complex steps that organizations should take to evict the adversaries from their compromised environments. These steps require disconnecting the enterprise network from the Internet for three to five days. The remediation plans outlined by CISA include steps to detect and identify adversary activity within the network, actions to remove the attacker from on-premises and cloud environments, and measures to ensure the success of the eviction operation. This article continues to discuss CISA's recently released eviction guidance for networks affected by the SolarWinds attack.

    Security Week reports "CISA: Disconnect Internet for 3-5 Days to Evict SolarWinds Hackers From Network"

  • news

    Visible to the public "Toshiba Business Reportedly Hit by DarkSide Ransomware"

    Toshiba Tec Corporation, a subsidiary of Japanese tech giant Toshiba, has admitted that they suffered a cybersecurity breach caused by the DarkSide ransomware gang. Toshiba Tec Corporation makes printing, scanning, and other office equipment. Although the update did not confirm whether any customer data was taken in the incident, Toshiba admitted that it is possible that the criminal gang may have leaked some information and data. The firm has contacted the relevant authorities in Europe, where the attackers struck, and are working with third-party cyber experts to find out exactly what happened. During the investigation by cyber experts, they found that over 740GB of data had been stolen, including passport scans and other personal information.

    Infosecurity reports: "Toshiba Business Reportedly Hit by DarkSide Ransomware"

  • news

    Visible to the public "Pipeline Attacker DarkSide Suddenly Goes Dark—Here's What We Know"

    The DarkSide ransomware group behind the shutdown of the Colonial Pipeline seems to have gone dark, making it unclear as to whether the group is ceasing or altering its operations or is attempting to pull an exit scam. All eight of the dark web sites used by DarkSide to communicate with the public went down. The crime gang announced in a post that its website and content distribution infrastructure had been taken down by law enforcement, and the cryptocurrency it had received from victims had been confiscated. The group also said it would distribute a free decryptor to all victims who have yet to pay a ransom. However, there's no evidence that proves the group's claims. When law enforcement from US and Western European countries seize a website, they typically post a notice on the site's front page that discloses the seizure. However, none of the DarkSide sites display that notice. Most of them show blank screens or time out. DarkSide's claims follow the announcement from a prominent criminal underground forum called XSS that it was banning all ransomware activities. The site has served as a significant resource for ransomware groups, including REvil, Babuk, DarkSide, LockBit, and Nefilim, for recruiting affiliates who use the malware to infect victims and, in exchange, share a cut of the revenue generated. The decision by XSS will significantly disrupt the ransomware ecosystem as it removes a key recruiting tool and source of revenue. This article continues to discuss the alleged shutdown of the DarkSide ransomware operation and the future of the ransomware ecosystem.

    Ars Technica reports "Pipeline Attacker DarkSide Suddenly Goes Dark--Here's What We Know"

  • news

    Visible to the public The Empire strickes back at the DarkSide Ransomware Group

    The DarkSide Ransomware group lost all its servers used to pull off ransomware attacks such as the recent one against Colonial Pipeline. The hackers said they had lost access to key parts of their infrastructure--the servers used for its blog, payment processing, and denial of service operations. DarkSide didn't release where those servers were located or which country's law enforcement had seized them. The takedown rattled other underground ransomware forums.

  • news

    Visible to the public "When AI Becomes the Hacker"

    Bruce Schneier, an internationally renowned security technologist, has been examining the potential unintended consequences of Artificial Intelligence (AI) on society, particularly how AI systems could evolve in a way that enables them to automatically and inadvertently abuse societal systems. Schneier highlights the idea of the AI being the hacker rather than malicious actors hacking AI systems. The main question posed in his research is, "what if artificial intelligence systems could hack social, economic, and political systems at the computer scale, speed, and range such that humans couldn't detect it in time and suffered the consequences?" It's the stage at which AI systems can creatively find hacks. Schneier points out that AI systems are already doing that in software to find vulnerabilities in computer code but are not very proficient at it. However, AI systems will likely improve while humans stay the same in their capability to discover vulnerabilities. He predicts that AI systems will soon be able to defeat humans in capture-the-flag hacking contests because AI technology will evolve and surpass human abilities. We should be prepared for AI systems that can create their own solutions regarding hacks and vulnerabilities, and the use of this evolution by humans to make money. According to Schneier, the biggest risk posed by AI systems is that they will find a way to hack rules without humans realizing it. The core problem is that AI doesn't have the same human cognitive functions like empathy or a hunch that could allow it to know where not to cross the line. There are many studies on incorporating context, ethics, and values into AI programs, but they still aren't built-in functions of AI systems used today. Schneier admits that the idea of AI systems being hackers remains speculative, but it's an issue that should be considered and addressed. He recommends using AI to improve defense activities, such as finding and fixing all vulnerabilities in a program before it is released. This article continues to discuss key insights shared by Bruce Schneier in his research on the potential dangers of AI hackers.

    Dark Reading reports "When AI Becomes the Hacker"

  • news

    Visible to the public "Ransomware’s New Swindle: Triple Extortion"

    Ransomware attacks are exploding at a staggering rate, and so are the ransoms being demanded. Now security experts are warning against a new threat called triple extortion. Triple extortion means that attackers are expanding out to demand payments from customers, partners, and other third parties related to the initial breach to grab even more cash for their crimes. Researchers at Check Point discovered that ransomware payments have spiked by 171 percent over the past year, averaging about $310,000. Researchers said the first case of triple extortion they observed in the wild was in October when a Finnish psychotherapy clinic was breached. Even after the clinic paid the ransom, the attackers threatened patients of the clinic with releasing their therapy session notes unless they too paid up.

    Threatpost reports: "Ransomware's New Swindle: Triple Extortion"

  • news

    Visible to the public "Publishing Exploits Early Doesn't Encourage Patching or Help Defense, Data Shows"

    A new study conducted by Kenna Security and the Cyentia Institute explores whether exploit code releases before patch availability help or harm security defenders. Some believe that releasing exploit code as soon as a vulnerability is discovered helps in penetration testing, presents an incentive for patching, and makes the vulnerability seem more real. Others believe that the early publication of exploits allows hackers, including those who would otherwise be unable to generate the code themselves, to reappropriate the exploit code. Kenna Security and the Cyentia Institute analyzed 6 billion vulnerabilities impacting 12 million active assets across almost 500 organizations during the study. Three key hypotheses explored in the study are that publishing exploit code encourages fixes, published exploits improve defense, and releasing exploit code accelerates breaches. They found that publishing exploits had minimal impact on whether organizations applied fixes, and releasing exploits pre-patch left a larger window of time between publishing a vulnerability and creating defensive signatures. It was discovered that network defenders were nearly exactly as likely to mitigate a problem when an exploit had been published before the patch. Patches were found to be more common when the first exploit was released after the patch. According to the study, hackers are also more likely to target vulnerabilities when an exploit is released, as vulnerabilities with exploit code were exploited 15 times more than those without a published exploit. This article continues to discuss key findings from the study on whether publishing exploits before patches are available does more harm than good.

    SC Media reports "Publishing Exploits Early Doesn't Encourage Patching or Help Defense, Data Shows"

  • news

    Visible to the public "Colonial Reportedly Paid $5 Million Ransom"

    The East Coast fuel pipeline was offline for five days after an attack struck last Thursday. However, contrary to initial reports that it refused to engage with the DarkSide threat group, the company actually paid the ransom within hours of the attack. Colonial Pipeline paid the adversaries 5 million dollars. It is unclear whether the company's cyber-insurance policy funded the payment. Researchers stated that the biggest factor at play here is the feedback loop of malicious activity created by surrendering and paying the ransom. Paying the ransom allows the groups to achieve a greater level of sophistication during their next attacks, whether that be via training, new tooling, purchasing credentials, or recruitment. Researchers also stated that feeding this industry only ensures that they become collectively more of a threat, in the long run, facilitating more breaches and more payments. Thus, the cycle continues. The news of the company paying the ransom comes as new figures from Check Point revealed that the number of ransomware victims it is monitoring has soared 102% year-on-year at the start of 2021. In April, the most heavily targeted sector was healthcare, with average weekly attacks during the month hitting nearly 110, followed by utilities (59) and insurance/legal (34).

    Infosecurity reports: "Colonial Reportedly Paid $5 Million Ransom"

  • news

    Visible to the public  "All Wi-Fi Devices Impacted by New FragAttacks Vulnerabilities"

    Mathy Vanhoef, a researcher at New York University Abu Dhabi, discovered a set of new Wi-Fi security vulnerabilities dubbed FragAttacks (fragmentation and aggregation attacks). These vulnerabilities impact all computers, smartphones, and other Wi-Fi devices released since 1997. Three of the vulnerabilities are said to be Wi-Fi 802.11 standard design flaws in the frame aggregation and fragmentation functionalities, while the other vulnerabilities stem from widespread programming mistakes made in Wi-Fi products. Experiments conducted by Vanhoef show that every Wi-Fi product is affected by at least one of the vulnerabilities and that most Wi-Fi products are impacted by many vulnerabilities. According to Vanhoef, the discovered vulnerabilities affect all Wi-Fi security protocols, including WEP and WPA3. Attackers have to be in the Wi-Fi range of targeted devices in order to abuse these design and implementation flaws. The exploitation of these flaws can allow attackers to steal sensitive user data and execute malicious, which could lead to the full takeover of devices. Vendors are developing patches for their products to mitigate the FragAttacks bugs. Cisco Systems, HPE/Aruba Networks, Juniper Networks, Microsoft, and more, have already released security updates and advisories for FragAttacks security. This article continues to discuss the discovery, impact, and mitigation of the FragAttacks vulnerabilities.

    Bleeping Computer reports "All Wi-Fi Devices Impacted by New FragAttacks Vulnerabilities"

  • news

    Visible to the public "NCSU Team Builds Smallest RFID Chip, Could Mean Better Security"

    Researchers at North Carolina State University (NCSU) have developed what is believed to be the smallest Gen2-compatible RFID (Radio Frequency Identification) chip. This chip is expected to drive the cost of RFID tags down. The chip's design also allows RFID tags to be embedded into computer chips and other high-value chips, thus strengthening the security of supply chains for high-end technologies. Gen2-compatible RFID chips are state-of-the-art and are already widely deployed, but the new RFID chips differ in that their size measures 125 micrometers by 245 micrometers. Manufacturers have made smaller RFID chips using earlier technologies, but the researchers have not been able to identify smaller RFID chips compatible with the current Gen2 technology. The design of the circuits used by the team is compatible with a wide range of semiconductor technologies, including those implemented into conventional computer chips. As this makes it possible to incorporate RFID tags into computers, users will be able to track individual chips throughout their lifecycle, which could help reduce counterfeiting and enable the ability to verify whether a component is what it claims to be. According to the researchers, these new RFID chips can be built using existing manufacturing technologies. This article continues to discuss the creation of the smallest Gen2-compatible RFID chip by a team of NCSU researchers, as well as the advantages and future of these chips.

    WRAL TechWire reports "NCSU Team Builds Smallest RFID Chip, Could Mean Better Security"

  • news

    Visible to the public "66% of CISOs Feel Unprepared for Cyberattacks"

    Proofpoint's 2021 Voice of the CISO report shares findings from a survey to which more than 1,400 CISOs at mid-sized to large companies across different industries worldwide responded. According to these findings, 66 percent of CISOs feel unprepared to handle cyberattacks. Over 50 percent of the CISOs expressed more concern about the consequences of a cyberattack in 2021 than in 2020. The survey also revealed that most CISOs consider human error the greatest vulnerability, which stems from the increase in remote work due to the COVID-19 pandemic. The security challenges presented by the widespread work-from-home model are expected to extend into the next year and beyond. CISOs are encouraged to increase efforts to secure more points of attack and educate users on long-term remote and hybrid work. This article continues to discuss key findings from the Proofpoint 2021 Voice of the CISO report regarding CISOs' growth in concerns surrounding cyberattacks in 2021 and the types of attacks that are of top concern to them.

    Dark Reading reports "66% of CISOs Feel Unprepared for Cyberattacks"

  • news

    Visible to the public "Four Years On: Two-thirds of Global Firms Still Exposed to WannaCry"

    According to new research, over two-thirds (67%) of organizations are still running an insecure Windows protocol. Security researchers at ExtraHop used its network detection and response (NDR) capabilities to analyze anonymized metadata from an unspecified number of customer networks to understand better where they may be vulnerable to outdated protocols. The resulting security advisory report revealed the widespread use of Server Message Block version one (SMBv1), which contained a buffer overflow vulnerability which was exploited by the NSA-developed EternalBlue and related attack tools. North Korean threat actors used this insecure Windows protocol for WannaCry, and Russian state operatives use this protocol for their NotPetya operation. The researchers also found that this wasn't the only insecure protocol. They also discovered that 81% of enterprises still use HTTP plaintext credentials, and a third (34%) have at least 10 clients running NTLMv1, which could enable attackers to launch machine-in-the-middle (MITM) attacks or take complete control of a domain. The researchers also warned that 70% of enterprises are also running LLMNR, which can be exploited to access users' credential hashes. These, in turn, could be cracked to expose log-in information, the researchers claimed.

    Infosecurity reports: "Four Years On: Two-thirds of Global Firms Still Exposed to WannaCry"

  • news

    Visible to the public "Biden Executive Order Mandates Zero Trust and Strong Encryption"

    President Biden has issued a long-awaited executive order (EO) designed to improve supply chain security, incident detection, response, and overall resilience to threats. The executive order comes amidst unprecedented attacks on the US government and critical infrastructure, in the form of the SolarWinds, Exchange Server, and Colonial Pipeline attacks, to name just a few. Among the key measures is a requirement for all federal government software suppliers to meet strict rules on cybersecurity. Eventually, the plan is to create an "energy star" label so both government and public buyers can quickly and easily see whether software was developed securely. Other measures included in the executive order are an "aircrash investigation-style" Cybersecurity Safety Review Board, which will make recommendations for improvements after any significant incident, and a standardized playbook for government incident response. The executive order will also mandate a drive to secure cloud services and zero trust, including multi-factor authentication and data encryption at rest and in transit, by default. Security experts have welcomed the executive order.

    Infosecurity reports: "Biden Executive Order Mandates Zero Trust and Strong Encryption"

  • news

    Visible to the public "Faster and More Precise: Researcher Improves Performance of Image Recognition Neural Network"

    There have been advancements in Machine Learning (ML) regarding image recognition as this technology can now identify objects in photographs and videos. The adoption and implementation of image recognition continue to grow. However, such systems still call for improvements. Andrey Savchenko, a Professor at HSE University, developed an image recognition algorithm that functions 40 percent faster than analogues. It has been demonstrated to be capable of speeding up the real-time processing of video-based image recognition systems. Convolutional Neural Networks (CNNs) include a sequence of convolutional layers. They are widely used in computer vision. Savchenko was able to speed up the work of a pre-trained CNN using arbitrary architecture, containing 90 to 780 layers. This resulted in a 40 percent increase in recognition speed while at the same time controlling accuracy loss to no more than 0.5 to 1 percent. He used statistical methods like sequential analysis and multiple hypothesis testing. High accuracy is essential for image recognition systems. An incorrect decision made by a face recognition system can lead to someone from the outside gaining access to confidential information or the user being denied access repeatedly due to the neural network's inability to identify them. Sometimes speed can be sacrificed, but it is important in the application of video surveillance systems where there is a desire to make decisions in real-time. Professor Savchenko emphasizes the need to recognize an object in a video quickly without losing accuracy. This article continues to discuss the image recognition algorithm developed by Professor Savchenko that can speed up the real-time processing of video-based image recognition systems while controlling the loss in accuracy.

    HSE University reports "Faster and More Precise: Researcher Improves Performance of Image Recognition Neural Network"

  • news

    Visible to the public "Home Working Parents and Young Adults Are Most Risky IT Users"

    During new research conducted by researchers at HP Inc., they surveyed 8443 adults and 1100 IT decision-makers. The researchers found that young adults and parents of young children could be inviting cyber-threats by using work devices for risky personal tasks. Most (71%) of employees surveyed are accessing more company data more frequently from home than they did pre-pandemic, with over three-quarters (76%) admitting that working-from-home (WFH) has blurred the lines between their personal and professional lives. While a third (33%) of respondents are now downloading more to their devices from the internet, the figure rises to 60% for those aged 18-24-years-old. The researchers stated that this age group is more likely (60%) to watch online streaming services than the average (36%). In addition, over two-fifths (43%) of parents of children aged 5-16-years-old admitted to using work devices to play more games today than pre-pandemic. Over half (57%) of this group are also likely to use their work device for homework and online learning, versus an average of 40%. The researchers stated that this matters because threat actors are increasingly looking to target these behaviors. The research also revealed a significant number of home workers are using potentially insecure personal devices for work to access corporate applications (37%) and networks/servers (32%). Over half (51%) of IT decision-makers have seen evidence of compromised personal PCs being used to access company and customer data over the past year.

    Infosecurity reports: "Home Working Parents and Young Adults Are Most Risky IT Users"

  • news

    Visible to the public "Kansas Identity Theft Spike Could Be Linked to Data Breach"

    A Department of Labor data breach may have impacted the state with the highest identity theft rate in the country. According to new data released by the Federal Trade Commission (FTC), the reported rate of identity theft in Kansas in 2020 was higher than that of any other state and more than three times greater than the national average. Last year, 43,211 Kansans informed the FTC that someone had stolen or attempted to steal their identity, a year-on-year increase of 1,802%. Kansas lawmakers are investigating the possibility of a connection between the surge in identity theft and an alleged data breach at the Kansas Department of Labor (KDOL). An investigation into a possible breach was launched after a woman accidentally entered the wrong Social Security number into the KDOL website in February and was shown someone else's personal information. A February report from the Kansas Legislative Post Audit Division stated that just under a quarter ($600m) of the roughly $2.6bn Kansas paid in state and federal unemployment benefits in 2020 could have been fraudulent.

    Infosecurity reports: "Kansas Identity Theft Spike Could Be Linked to Data Breach"

  • news

    Visible to the public "Protecting Critical Energy Infrastructure"

    Both Israel and the US are facing more costly cyberattacks that could result in significant damage to critical energy infrastructure. A new consortium led by Ben-Gurion University of the Negev (BGU) and Arizona State University (ASU) will receive up to $6 million under a U.S.-Israel Energy Center research funding grant for energy infrastructure cybersecurity. Georgia Tech Research Corporation (GT) and several other tech partners are also included in the consortium. The consortium is working on a project titled "Comprehensive Cybersecurity Technology for Critical Power Infrastructure AI-Based Centralized Defense and Edge Resilience." This consortium aims to develop, integrate, and test technologies, as well as demonstrate high-value technologies capable of mitigating cyberattacks on the energy infrastructure. Data analytics, Artificial Intelligence (AI), and Machine Learning (ML) will be applied. This article continues to discuss the new consortium that brings BGU, ASU, and GT together and allocates resources to develop new technology for improving the cybersecurity of critical energy infrastructure.

    Homeland Security News Wire reports "Protecting Critical Energy Infrastructure"

  • news

    Visible to the public "Artificial Intelligence Could Accelerate Breach Notification Time, Expert Says"

    Dr. Frederic Lemieux, faculty director and professor of the practice for applied intelligence at Georgetown University, has brought further attention to the use of Artificial Intelligence (AI) in cybersecurity to increase the speed of data breach notifications. Lemieux suggested that increasingly efficient pattern recognition is helping companies detect anomalies in large pools of data. AI is helping to point out possible security issues to human analysts, such as an employee logging on to sensitive networks at odd hours, an email attachment including malicious data, and other unusual behavior. Cybersecurity costs are prohibitive, and companies are experiencing situations where the average cost of a data breach is about $8 million in the US. The time to discover a data breach can go up to 28 days, with the average number of days for containment being 80, thus increasing the appeal for AI solutions. Security professionals are also using AI tools for asset inventories to help highlight areas of a company that are vulnerable to digital threats. This article continues to discuss how AI tools are helping security professionals improve the cybersecurity of their companies.

    CyberScoop reports "Artificial Intelligence Could Accelerate Breach Notification Time, Expert Says"

  • news

    Visible to the public "NIST Previews Post-Quantum Cryptography Challenges"

    The National Institute of Standards and Technology's (NIST) National Cybersecurity Center of Excellence (NCCoE) has released the final version of a white paper titled "Getting Ready for Post-Quantum Cryptography: Exploring Challenges Associated with Adopting and Using Post-Quantum Cryptographic Algorithms." The purpose of this paper is to help organizations prepare for post-quantum cryptography. NIST has been working with researchers to develop cryptographic algorithms that can withstand the privacy and security threats that quantum computers will present. The paper emphasizes that the transition from today's standards to the new post-quantum public-key standards will likely be more challenging than the introduction of new classical cryptographic algorithms. As there is still a lack of implementation planning, it may take decades before the community replaces most of the vulnerable public-key systems being used today. It will not be easy to replace currently used encryption standards with quantum-resistant ones as some quantum-resistant candidate algorithms involve enormous signature sizes, require excessive processing, and use significantly large public or private keys. These factors would make it challenging to implement the solution widely. NIST emphasizes the need for various post-quantum algorithms in order to overcome sensitivity to large signature sizes and other implementation constraints. This article continues to discuss NIST's key points surrounding post-quantum cryptography challenges and how to overcome them.

    GCN reports "NIST Previews Post-Quantum Cryptography Challenges"

  • news

    Visible to the public "Energy Department Leading White House Interagency Response to Pipeline Attack"

    The White House has formed an interagency task force in response to the ransomware attack on Colonial Pipeline Company, which transports 45% of the US East Coast's supply of diesel, gasoline, and jet fuel. According to the FBI, the attack was executed by the cybercriminal ransomware group called DarkSide. The interagency team includes the Department of Homeland Security's (DHS) Cybersecurity and Infrastructure Security Agency (CISA), the FBI, the Department of Transportation (DOT), the Department of Defense (DOD), and other agencies, with the Department of Energy (DOE) as the lead agency for incidence response in this case. The Transportation Security Administration (TSA) has oversight over pipeline cybersecurity. Colonial Pipeline Company has said that its operations team is currently working to develop a restart plan for its pipeline system. This article continues to discuss the interagency response to the pipeline attack, Colonial's response to the attack, and the FBI's suggestion to companies not to pay ransoms demanded by cybercriminals.

    NextGov reports "Energy Department Leading White House Interagency Response to Pipeline Attack"

  • news

    Visible to the public "Scientists Will Protect the Smart City from Cyber Threats"

    St. Petersburg is participating in the development of a Smart City program that will provide new services to increase citizens' safety. This system depends on digital services. The environment adapts to the needs of humanity through the use of Internet of Things (IoT) systems. Therefore, cyberattacks against this infrastructure could pose a significant danger. Specialists at Peter the Great St. Petersburg Polytechnic University (SPbPU) developed a methodology for assessing cyber risks in a Smart City's intelligent system. They tested the methodology on the "smart crossroads" test bench, which is a component of the smart transport system of a Smart City. The scientists pointed out that cybercriminals' goals are to disrupt large enterprises and urban infrastructure and to intercept the control over them. Using wireless links, attackers can remotely infiltrate a target subnet or a group of devices, intercept traffic, launch denial-of-service (DoS) attacks, and hijack IoT devices to create botnets. The methodology developed by SPbPU researchers can be used to analyze cybersecurity risks, identify threats, calculate risks, and analyze the resulting risk values. It is based on a quantitative approach and is said to be easily computable. This article continues to discuss the Smart City program, potential cyberattacks against digital infrastructures in a Smart City, and the methodology developed by SPbPU researchers to assess cyber risks in the intelligent systems of a Smart City.

    EurekAlert! reports "Scientists Will Protect the Smart City from Cyber Threats"

  • news

    Visible to the public "Amazon: We Blocked 10 Billion Bad Listings in 2020"

    Amazon claims to have blocked billions of "bad" listings before they went live on its e-commerce platform last year in a bid to prevent rampant counterfeiting on the site. Amazon also thwarted over six million attempts to create new selling accounts during 2020, up from the 2.5 million reported in 2019. The e-commerce giant claimed that fewer than 0.01% of products sold on the platform received a counterfeit-related complaint from a customer, but the problem is serious. Only 6% of attempted new seller account registrations passed Amazon's verifications processes. Last year the company claimed to have seized and destroyed more than two million products sent to its fulfillment centers after detecting last minute that the products were counterfeit. Amazon has invested over $700 million in 2020 and employed more than 10,000 people to fight fraud and abuse on the platform. Counterfeit items aren't the only challenge facing Amazon. A mass scheme to pay consumers for fake reviews has recently emerged. E-commerce fraud is expected to surge by 18% from 2020 to top $20 billion globally by the end of this year as scammers continue to target shoppers driven online by the pandemic.

    Infosecurity reports: "Amazon: We Blocked 10 Billion Bad Listings in 2020"

  • news

    Visible to the public "200K Veterans’ Medical Records Likely Stolen by Ransomware Gang"

    A cybersecurity researcher named Jeremiah Fowler found an exposed database sitting exposed online without even basic password protection on April 18th. The database was filled with the medical records of nearly 200,000 U.S. military veterans. The database was exposed online by a vendor working for United Valor which is a Veterans Administration. The exposed data included patient names, birth dates, medical information, contact information, doctor information, and appointment times. All of this data could be used in socially engineered attacks, Fowler explained. The database also exposed unencrypted passwords and billing details. Fowler stated that the database was set to open and visible in any browser (publicly accessible), and anyone could edit, download or even delete data without administrative credentials. The researcher also found evidence that ransomware attackers might have exfiltrated the data. The dataset also contained a ransomware message titled "read_me" that claimed all of the records were downloaded, and they would be leaked unless 0.15 Bitcoin ($8,148) was paid.

    Threatpost reports: "200K Veterans' Medical Records Likely Stolen by Ransomware Gang"

  • news

    Visible to the public "Making Bitcoin More Secure"

    Guan-Hua Tu, an assistant professor in the College of Engineering at Michigan State University (MSU), and his team are developing ways to protect popular bitcoin applications used for cryptocurrency management. Tu and his team are finding vulnerabilities in these apps that could leave a user's money and personal information at risk of theft by cybercriminals. They are also raising awareness about these vulnerabilities to help users better protect themselves and developing an app aimed at addressing those vulnerabilities. Users are encouraged not to use smartphone wallet apps developed by untrusted developers and to manage their bitcoin using a computer instead of a smartphone. The researchers developed the Spartan app, which is designed to run simultaneously on the same phone as a wallet and monitor for intrusions. The app alerts users when an attack occurs and provides remedies based on the type of attack. For example, the app can add noise to outgoing bitcoin messages to prevent an attacker from retrieving accurate information. The team is developing the app for Android phones and plans to make it available for download in the Google Play app store. This article continues to discuss the vulnerabilities found in bitcoin wallet apps, the attacks made possible by these vulnerabilities, the Spartan app designed to protect against those attacks, and how users can protect themselves from the security flaws of a smartphone bitcoin wallet app.

    MSU Today reports "Making Bitcoin More Secure"

  • news

    Visible to the public "University Cancels Exams After Cyber-Attack"

    Rensselaer Polytechnic Institute (RPI) was forced to shut down most of their computer network after unauthorized access was detected on Friday. Student assessments, research, and other academic activities have been impacted. All final examinations, term papers, and project reports that were due between May 8th and May 10th have been canceled. Rensselaer Polytechnic Institute, which has around 7,900 students, is a private university situated in Troy, New York. Information Technology and Web Science are among the academic disciplines taught at the institute. RPI did not share any further details of the incident, such as what information may have been accessed. The institute has also not shared when its network will be up and running again. The university is currently making modifications to grading policies to accommodate for the disruption caused by the cyberattack.

    Infosecurity reports: "University Cancels Exams After Cyber-Attack"

  • news

    Visible to the public "An Ambitious Plan to Tackle Ransomware Faces Long Odds"

    A public-private partnership has been formed in support of developing a coordinated response to ransomware attacks. A comprehensive framework, supervised by the Institute for Security and Technology's (IST) Ransomware Task Force (RTF), proposes the use of a more aggressive public-private response to ransomware instead of the traditional piecemeal approach. Members of the task force include Amazon Web Services, Cisco, Microsoft, the Federal Bureau of Investigation (FBI), the Department of Homeland Security's (DHS) Cybersecurity and Infrastructure Security Agency (CISA), and the United Kingdom National Crime Agency (NCA). The framework includes recommendations from cybersecurity firms, incident responders, nonprofits, government agencies, and academics. It also calls on organizations in the public and private sector to increase efforts towards improving defenses, developing response plans, regulating cryptocurrencies, and strengthening and expanding international law enforcement collaboration. The report outlines the threat posed by ransomware actors and actions that could minimize the threat. It delves into how the US could work out diplomatic relationships to involve more countries in ransomware response, and engage those that have served as safe havens for ransomware groups. This article continues to discuss the purpose and recommendations of the RTF report, along with questions surrounding the new framework aimed at tackling ransomware in a coordinated manner.

    Wired reports "An Ambitious Plan to Tackle Ransomware Faces Long Odds"

  • news

    Visible to the public "An Uncrackable Combination of Invisible Ink and Artificial Intelligence"

    Although electronic records continue to advance, paper is still a common method of preserving data. Invisible ink can be used to hide classified economic, commercial, or military information, but many popular inks have toxic compounds or can be seen with predictable methods like chemicals, light, or heat. Carbon nanoparticles, which are low in toxicity, can be invisible under ambient lighting but can create vibrant images when exposed to ultraviolet (UV) light. Advances in Artificial Intelligence (AI) models can ensure that messages can only be deciphered on properly trained computers. A team of researchers trained an AI model to identify and decrypt symbols printed in a fluorescent carbon nanoparticle ink that reveal hidden messages when exposed to UV light. They taught the AI model, made up of multiple algorithms, to recognize the symbols illuminated by UV light and decode them through the use of a special code book. Then they tested whether the AI model can decode messages printed using a combination of regular red ink and the UV fluorescent ink. The AI model read the regular ink symbols as "STOP," with 100% accuracy. When a UV light illuminated the writing, the invisible ink showed the desired message "BEGIN." According to the researchers, since these algorithms can notice modifications in symbols, this approach has the potential to encrypt messages securely using hundreds of different unpredictable symbols. This article continues to discuss the approach to improving paper information recording and security protection using invisible ink and AI.

    Science Daily reports "An Uncrackable Combination of Invisible Ink and Artificial Intelligence"

  • news

    Visible to the public "Ransomware Takes Down East Coast Fuel Pipeline"

    After a ransomware attack that knocked offline the country's largest fuel pipeline, the US government has been forced to issue emergency legislation. The government legislation put in place is designed to relax rules restricting the transportation of fuel by road. Colonial Pipeline confirmed over the weekend that it had suffered a severe cyber attack. The attack was launched by the Russian-speaking DarkSide group, who claim to have also stolen 100GB of data in a classic "double extortion" play. Colonial Pipeline stated that they proactively took specific systems offline to quickly contain the threat after learning of the attack. Their mainlines (Lines 1, 2, 3, and 4) remain offline. Some smaller lateral lines between terminals and delivery points are now operational. Researchers suggest that if the outage persists, there are likely to be shortages and price rises across the 12 states the pipeline travels through and beyond. It is estimated that the pipeline carries 2.5 million barrels a day, representing nearly half of the East Coast's supply of diesel, gasoline, and jet fuel.

    Infosecurity reports: "Ransomware Takes Down East Coast Fuel Pipeline"

  • news

    Visible to the public "US Physics Laboratory Exposed Documents, Credentials"

    A group of security researchers found weaknesses at the Fermilab physics laboratory in the US that could lead to the exposure of documents, proprietary applications, project details, and more. Fermilab is a particle accelerator and physics laboratory in Batavia, Illinois, and is a part of the US Department of Energy (DOE). The lab has remediated the security issues that were unintentionally exposing a lot of information. One database they discovered allowed them to have unauthenticated access to over 5,700 documents and more than 50,000 file entries. They used Amass to enumerate Fermilab's subdomains. They also used dirsearch and Nmap for discovering open ports and enumerating services. These probes revealed multiple entry points. One of the entry points led into the lab's IT ticketing system, which revealed 4,500 trouble tickets. A malicious actor could gather project names, configuration data, and communication information by viewing the ticketing system. The researchers also found that part of a web application exposed names, emails, user IDs, security workgroups, assigned login groups, and documents. It was emphasized that Fermilab's security issues could have made its network and equipment targets for a ransomware attack. This article continues to discuss the discovery of Fermilab's security issues and the lab's quick response to the researchers' findings.

    Data Breach Today reports "US Physics Laboratory Exposed Documents, Credentials"

  • news

    Visible to the public "Closing Network Pathways to Sensitive Data to Help Secure Medical Devices"

    The Cybersecurity and Infrastructure Security Agency (CISA) released ICS Medical Advisory (ICSMA-21-084-01) that covers a specific vulnerability discovered in the Philips Gemini PET/CT family of scanners. These scanners store patient data in detachable media without access control. Legacy medical devices like this line of PET/CT scanners heighten the problem of unsecured Protected Health Information (PHI) storage. Due to the irregularity and, in some cases, lack of support for operating systems, many of the vulnerabilities impacting these devices are difficult or impossible to remediate. However, it would be significantly capital intensive for organizations to do a mass replacement of older devices. Therefore, a different approach must be taken to address PHI availability and future remediation requirements. Many healthcare networks are flat or segmented by department, creating issues when entire departments are hit with ransomware attacks in which malware is spread laterally and infects all devices in a large segment. Edge micro-segmentation is the recommended approach for medical device security, which fills healthcare networks with endpoints that are each on their own protected segment. This new network architecture design also applies security to traffic as it enters and exits a micro-segment. The adoption of this approach would prevent the direct exposure of medical devices within a network and the lateral spread of malware. This article continues to discuss the challenges faced in protecting healthcare networks from security threats, the expansion of the attack surface by flat and minimally segmented networks, and how edge micro-segmentation improves medical device security.

    Homeland Security Today reports "Closing Network Pathways to Sensitive Data to Help Secure Medical Devices"

  • news

    Visible to the public Possible security threats linked to recycled phone numbers.

    Possible security threats linked to recycled phone numbers.

  • news

    Visible to the public "CaptureRx Data Breach Impacts Healthcare Providers"

    At least three American healthcare providers have suffered a data breach after a cyber-attack on an administrative services company in Texas. CaptureRx, which is based in San Antonio, fell victim to a ransomware attack on February 6. On February 19, an investigation into the attack determined that certain files had been accessed without authorization. Cybercriminals exfiltrated files containing the personal health information (PHI) of more than 24,000 individuals during the attack. CaptureRx serves the Mohawk Valley Health System affiliate Faxton St. Luke's Healthcare in New York, Thrifty Drug Stores (Thrifty White), and Gifford Health Care of Randolph, Vermont, among others. A review of the attack, completed on March 19, determined that the security breach impacted 17,655 patients of Faxton St. Luke's Healthcare and a further 6,777 patients at Gifford Health Care. The number of Thrifty Drug Store patients affected by the attack has not yet been determined. CaptureRx is currently unclear how many of its healthcare provider clients have been affected by the attack. Nor has the company finished its final tally of how many individuals had their PHI exposed because of the incident. Data exposed and stolen by the ransomware attackers included names, dates of birth, prescription information, and, for a limited number of patients, medical record numbers.

    Infosecurity reports: "CaptureRx Data Breach Impacts Healthcare Providers"

  • news

    Visible to the public "#COVID19 Researchers Lose a Week's Work to Ryuk Ransomware"

    According to security researchers at Sophos, an organization involved in COVID-19 research lost a week's worth of critical data after a Ryuk attack that used a stolen password. The problem was traced back to one of the university students that the European research institute collaborates with as part of its outreach programs. That student obtained what they thought was a 'crack' version of a data visualization tool they needed, except that it contained information-stealing malware. The malware harvested keystrokes, stealing browser, cookies, clipboard data, and, it transpired, the student's log-ins for the research institute. Thirteen days later, a remote desktop protocol (RDP) connection was registered on the institute's network using the student's credentials, the researchers stated. Although the unnamed biomolecular specialist had backups, they were not fully up-to-date, meaning that a week's worth of vital research was lost. The firm also suffered a significant operational cost as all computer and server files had to be rebuilt from the ground-up before data could be restored. The researchers stated that it is unlikely that the operators behind the 'pirated software' malware are the same as those who launched the Ryuk attack.

    Infosecurity reports: "#COVID19 Researchers Lose a Week's Work to Ryuk Ransomware"

  • news

    Visible to the public "Millions of Older Broadband Routers Have These Security Flaws, Warn Researchers"

    A new investigation conducted by the consumer watchdog Which? in collaboration with security researchers, discovered the vulnerability of millions of old broadband routers used in the UK to hacking. Which? identified 13 older routers commonly used by consumers in the UK and found that nine of them do not meet modern security standards. The consumer watchdog estimated that up to 7.5 million users in the UK might be impacted. The vulnerable routers give attackers an opportunity to spy on users as they browse the Internet or redirect them to malicious websites. Some of the router models have not been updated since 2018 or, in some cases, since 2016. Sky's SR101 and SR102, the Virgin Media Super Hub and Super Hub 2, and TalkTalk's HG523a, HG635, and HG533 have been highlighted for their lack of updates. EE's Brightbox 2 has been discovered to contain a vulnerability that could allow a hacker to take full control of the device. In addition to a lack of regular updates, many of the older routers were found to come with weak, easily guessable default passwords. In an effort to increase the implementation of security in the design of devices, the UK's Department for Digital, Culture, Media, and Sport announced a new law that will prohibit manufacturers from using default passwords. The law will also require manufacturers to tell customers how long their devices will receive security updates as well as provide a public point of contact for security vulnerability disclosure. This article continues to discuss flaws found in older routers that are still commonly used by consumers in the UK and efforts to better protect consumers from cyberattacks.

    ZDNet reports "Millions of Older Broadband Routers Have These Security Flaws, Warn Researchers"

  • news

    Visible to the public "Counterfit: Open-Source Tool for Testing the Security of AI Systems"

    Microsoft has decided to open-source a tool it developed to test the security of its own Artificial Intelligence (AI) systems and assess them for vulnerabilities. The tool named Counterfit will help organizations verify the robustness, reliability, and trustworthiness of the AI algorithms that they use. Counterfit started out as a set of attack scripts written to target individual models. Microsoft then transformed Counterfit into an automation tool that can attack multiple AI systems at scale. Counterfit is a command-line tool that organizations can install and use locally or in a cloud. Security professionals can use it to perform a penetration test and conduct red teaming operations on AI systems. They can also use it to scan the systems for vulnerabilities and log attacks against a target model. The tool also works on AI models using different types of data, including text, images, and generic input. This article continues to discuss the purpose, capabilities, and applications of the Counterfit tool.

    Help Net Security reports "Counterfit: Open-Source Tool for Testing the Security of AI Systems"