News Items

  • news

    Visible to the public "Individuals May Legitimize Hacking When Angry With System or Authority"

    According to a new study conducted by researchers at the University of Kent, individuals are more likely to support hackers' disruptive actions when they are against systems or authorities that they believe are unjust or dismissive of their demands. Based on participants' responses to a number of fictional scenarios in which authorities perceived as unjust are faced with a cybersecurity breach, people are willing to legitimize the hacking activity behind the breach at an organization's expense if they feel it is on their behalf. This article continues to discuss the performance of this study and what its findings suggest about individuals' support for different forms of hacking.

    Science Daily reports "Individuals May Legitimize Hacking When Angry With System or Authority"

  • news

    Visible to the public "Feds: Iran Behind ‘Proud Boys’ Email Attacks on Democratic Voters"

    Federal officials have discovered that Iranian threat actors are trying to interfere with the election. Iranian threat actors are behind two separate email campaigns that went out to Democratic voters this week. The emails contain threats to "vote for Trump or else." The adversaries tried to make the emails seem like they came from the Proud Boys group. On October 20th and on October 21st, two specific email campaigns were sent out and threatened Democrat voters in Alaska, Arizona, and Florida. Iran also distributes other content to mislead voters, including a video that implies that individuals can cast fraudulent ballots.

    Threatpost reports: "Feds: Iran Behind 'Proud Boys' Email Attacks on Democratic Voters"

  • news

    Visible to the public "Finally: A Usable and Secure Password Policy Backed by Science"

    The password-focused research group at Carnegie Mellon's CyLab Security and Privacy Institute developed a scientifically-backed password policy said to maintain the balance between security and usability. The policy developed by the group does away with requirements about numbers, symbols, uppercase letters, and lowercase letters. Instead, a user's password would have to meet a minimum strength and a minimum length of 12 characters. The researchers developed an artificial neural network-driven password-strength meter that provides a strength score along with suggestions to users in real-time. Then they discovered a threshold between password strength and length that would allow users to create stronger and more usable passwords. This article continues to discuss the development and research behind the proposed password policy.

    CyLab reports "Finally: A Usable and Secure Password Policy Backed by Science"

  • news

    Visible to the public "This New Malware Uses Remote Overlay Attacks to Hijack Your Bank Account"

    IBM security researchers discovered a new malware variant called Vizom that is focused on compromising bank accounts via large Brazilian banks' online financial services. The malware applies remote overlay techniques and DLL hijacking to remain hidden and compromise user devices. Vizom is distributed through a spam-based phishing campaign and masquerades as popular video conferencing software. This article continues to discuss Vizom's distribution, techniques, capabilities, and prime targets.

    ZDNet reports "This New Malware Uses Remote Overlay Attacks to Hijack Your Bank Account"

  • news

    Visible to the public "Pharma Giant Pfizer Exposes Patient Data on Unsecured Cloud Storage"

    The pharmaceutical giant Pfizer has experienced a data breach that exposes sensitive patient information. According to researchers at vpnMentor, the exposed data was discovered on a misconfigured Google Cloud storage bucket. The data included transcripts of conversations between Pfizer's automated customer support software and users of its prescription pharmaceutical drugs, which reveals full names, home addresses, email addresses, and additional medical information. They could use this information to increase the effectiveness of phishing campaigns targeting patients. The leaked data could be used to trick patients into providing additional data that can be used for fraud, such as identity theft. This article continues to discuss the patient data exposed in the breach of Pfizer's unsecured cloud storage, what hackers could do with this data, Pfizer's response to this discovery, and the potential consequences that could be faced by the company for this incident.

    SiliconANGLE reports "Pharma Giant Pfizer Exposes Patient Data on Unsecured Cloud Storage"

  • news

    Visible to the public "Facebook: A Top Launching Pad For Phishing Attacks"

    Researchers have found that Facebook has been a top cybercriminal favorite in phishing attacks so far this year. There were 4.5 million phishing attempts on the social media platform between April and September 2020. Messenger app WhatsApp is the second-top platform leveraged by attackers (with 3.7 million phishing attempts), followed by Amazon (3.3 million attempts), Apple (3.1 million attempts), and Netflix (2.7 million attempts). Google's offerings (including YouTube, Gmail, and Google Drive) took the sixth position, with 1.5 million phishing attempts altogether.

    Threatpost reports: "Facebook: A Top Launching Pad For Phishing Attacks"

  • news

    Visible to the public "Safari, Other Mobile Browsers Affected by Address Bar Spoofing Flaws"

    A security researcher has recently discovered address bar spoofing vulnerabilities in several mobile browsers. These vulnerabilities could allow adversaries to trick victims into sharing sensitive information through legitimate-looking phishing sites. The vulnerabilities discovered affect the UC Browser, Opera Mini, Yandex Browser, and RITS Browser for Android. Other vulnerabilities discovered affect Opera Touch, Bolt Browser, and Safari for iOS.

    Help Net Security reports: "Safari, Other Mobile Browsers Affected by Address Bar Spoofing Flaws"

  • news

    Visible to the public "Modern Attacks Include Supply Chain 'Hopping' and Reversing Agile Environments"

    Cybercriminal groups are getting more creative in the execution of attacks against digitally transformed and agile environments, as indicated by a new report by VMware Carbon Black. According to the report, more than 80% of attacks now include cases of counter incident response (IR), which refers to an attacker's move into a destructive attack mode in response to being spotted by the defender. An attacker may respond by dropping wiper malware, launching ransomware, altering time stamps on logs, and more. Organizations are encouraged to make their response and hunting efforts less visible to attackers. There has also been an increase in island hopping, where an attacker uses an organization's network to attack other businesses along the supply chain. This article continues to discuss the increased rates of counter IR, the need to change how IR is conducted, the concept of island hopping, and the growing sophistication of cybercrime groups.

    Infosecurity Magazine reports "Modern Attacks Include Supply Chain 'Hopping' and Reversing Agile Environments"

  • news

    Visible to the public Michael Rausch & William Sanders win Best Paper Award at QEST 2020

    Congratulations to Michael Rausch & William Sanders for winning the Best Paper Award at QEST 2020! 

    "Sensitivity Analysis and Uncertainty Quantification of State-Based Discrete-Event Simulation Models through a Stacked Ensemble of Metamodels" was presented by Michael Rausch on behalf of himself and Dr. Sanders on day 3 of QEST 2020.

    A recording of the awards ceremony is available here.

  • news

    Visible to the public Himanshu Neema wins Best Paper Award at HoTSoS 2020

    Congratulations to Himanshu Neema for winning the Best Paper Award at HoTSoS 2020! 

    "Simulation Testbed for Railway Infrastructure Security and Resilience Evaluation" was submitted to HoTSoS 2020 earlier this year and presented by Dr. Neema, on behalf of himself and his team, on the first day of the symposium. The Best Paper Award was given to him that same day. Dr. Neema's team was comprised of Xenofon Koutsoukos, Bradley Potteiger, CheeYee Tang, and Keith Stouffer. 

    A recording of the awards ceremony is not publicly available.

  • news

    Visible to the public "NSA Warns Defense Contractors of Recent Chinese Government-Backed Hacking"

    The National Security Agency (NSA) is warning that defense contractors should be wary of Chinese government-backed hackers who are actively exploiting a multitude of known vulnerabilities. The hackers are specifically going after 25 known vulnerabilities that primarily affect products used for remote access or for external web services. Vulnerabilities the Chinese hackers are exploiting include those of Pulse Secure VPNs, which could allow attackers to steal victim passwords, as well as F5 Networks' Big-IP Traffic Management User Interface, Windows Domain Name System servers, a series of flaws in Citrix ADC and Gateway devices, and several others.

    Cyberscoop reports: "NSA Warns Defense Contractors of Recent Chinese Government-Backed Hacking"

  • news

    Visible to the public "$1M Cyber Resiliency Fund Launched to Support Security Operations Impacted by Pandemic"

    The Cybersecurity Collaborative is a membership organization that facilitates the collaboration between senior cybersecurity leaders to share best practices and address complex enterprise security challenges. Together with its parent CyberRisk Alliance, the Cybersecurity Collaborative has announced the launch of a $1M fund to help organizations whose security operations have been affected by the COVID-19 pandemic. The goal of the Cyber Resiliency Fund is to help companies access cybersecurity resources and tools that help defend against ransomware, phishing, and other cyber threats. The fund will also help organizations address the security challenges associated with work-from-home environments. This article continues to discuss the Cybersecurity Collaborative, CyberRisk Alliance, and Cyber Resiliency Fund.

    SC Media reports "$1M Cyber Resiliency Fund Launched to Support Security Operations Impacted by Pandemic"

  • news

    Visible to the public "75% U.S. States and Territories Graded 'C' for Poor Cybersecurity"

    A survey conducted by the cybersecurity firm SecurityScorecard found that more than 75% of U.S. states and territories have a 'C' grade or lower in regard to cyberhealth, making their IT infrastructure three times more likely to be hit with a cyberattack. The states with the highest scores include Kentucky, Kansas, and Michigan, while North Dakota, Illinois, and Oklahoma have the lowest scores. The states with the lowest cyberhealth scores are found to be more vulnerable to phishing attacks and threats stemming from third-party vendors. These findings call for an increase in IT investment by state governments. This article continues to discuss key findings from SecurityScorecard's survey and practices recommended for U.S. states to defend against potential cyberattacks.

    CISO MAG reports "75% U.S. States and Territories Graded 'C' for Poor Cybersecurity"

  • news

    Visible to the public "Microsoft is the Most-Imitated Brand for Phishing Emails"

    Researchers at Check Point have found that hackers are impersonating Microsoft and using Microsoft products and services in nearly a fifth of all global brand phishing attacks in the third quarter of this year. Adversaries are still trying to capitalize on remote workforces created by the coronavirus pandemic. Behind Microsoft (related to 19 percent of all phishing attempts globally) were: shipping company DHL (9 percent); Google (9 percent); PayPal (6 percent); Netflix (6 percent); Facebook (5 percent); Apple (5 percent); WhatsApp (5 percent); Amazon (4 percent); and Instagram (4 percent).

    Threatpost reports: "Microsoft is the Most-Imitated Brand for Phishing Emails"

  • news

    Visible to the public "Research to Bring More Secure Software for Autonomous Battlefield Operations"

    In collaboration with Princeton University, Purdue University will lead research on the protection of Artificial Intelligence (AI) software in drones and other autonomous systems used on the battlefield to save human lives. The project aims to bolster the security of Machine Learning (ML) algorithms applied by these systems for decision-making and adaptation on the battlefield. Researchers will develop a system called SCRAMBLE (Secure Real-time Decision-Making for Autonomous Battlefield) that will be capable of closing the loopholes that could be used by hackers to compromise ML algorithms on different platforms in an autonomous operation. This article continues to discuss the goal, support, development, features, and evaluation of SCRAMBLE.

    Purdue University reports "Research to Bring More Secure Software for Autonomous Battlefield Operations"

  • news

    Visible to the public "SocialBlock: Technology That Could Improve Data Security in Smart Cities"

    Smart cities refer to urban areas that employ different types of technologies to improve upon the quality of life for those residing in these areas. As these technologies are expected to serve whole urban regions in the future, it is essential to develop more solutions to secure the data managed and accessed by such cities. Victor Garcia Font, a researcher at the Universitat Oberta de Catalunya's (UOC) Internet Interdisciplinary Institute (IN3) presented a model called SocialBlock that applies blockchain technology to manage data security and control in smart cities. This article continues to discuss how the proposed SocialBlock architecture could strengthen data security in smart cities.

    UOC reports "SocialBlock: Technology That Could Improve Data Security in Smart Cities"

  • news

    Visible to the public "Critical Vulnerability Allows Hackers to Disrupt SonicWall Firewalls"

    Researchers at Tripwire and Positive Technologies discovered a critical vulnerability that impacts several versions of SonicOS, the operating system run by SonicWall firewalls. The researchers have described the flaw as a stack-based buffer overflow. This vulnerability was found in the SonicWall Network Security Appliance (NSA), a firewall solution that provides Virtual Private Network (VPN) capabilities for organizations. According to Tripwire, the vulnerability stems from the HTTP/HTTPS service used for device management and VPN access. The exploitation of this flaw involves sending a specially crafted HTTP request to the vulnerable service. Attackers could abuse the vulnerability to launch Denial-of-Service attacks and execute arbitrary code. This article continues to discuss what the exploitation of this critical vulnerability could allow hackers to do and how SonicWall responded to the discovery of this flaw.

    Security Week reports "Critical Vulnerability Allows Hackers to Disrupt SonicWall Firewalls"

  • news

    Visible to the public "Cybercrime Losses Up 50%, Exceeding $1.8B"

    Fewer organizations are reporting cyber incidents. However, for those that are experiencing these incidents, the attacks have increased in severity. According to the 2020 Cyber Readiness Report released by Hiscox, a Bermuda-based insurance provider, the total cyber losses among impacted companies rose to $1.8 billion within the past 12 months, a 50% increase from last year's total of $1.2 billion. Large organizations were the most targeted by cybercriminals, and the most willing to pay demanded ransoms. Organizations within the energy, manufacturing, and financial services sectors are considered the most vulnerable to attacks due to their low cyber resilience maturity level and tolerance for high-impact outages. In addition, the most commonly used attack vectors are still malware, ransomware, Business Email Compromise (BEC), and Distributed Denial-of-Service (DDoS). This article continues to discuss key findings shared by the 2020 Cyber Readiness Report.

    Dark Reading reports "Cybercrime Losses Up 50%, Exceeding $1.8B"

  • news

    Visible to the public "VoIP Firm Broadvoice Leaks 350 Million Customer Records"

    Researchers discovered 10 unprotected Elasticsearch database clusters belonging to Broadvoice on October 1st that contained over 350 million customer records. One of the databases included more than 275 million records. The records included full caller name, identification number, phone number, state, and city. Another one of the databases included 200,000 records and included names, phone numbers, and call transcripts.

    Infosecurity reports: "VoIP Firm Broadvoice Leaks 350 Million Customer Records"

  • news

    Visible to the public "Barnes & Noble Hack: A Reading List for Phishers and Crooks"

    Barnes & Noble is warning that it has been hacked, potentially exposing personal data for shoppers. The cyberattack occurred on October 10 and resulted in unauthorized and unlawful access to certain Barnes & Noble corporate systems. The IT team at Barnes & Nobel does not know if personal information was exposed, but the systems that were hit contained personal data, so it may have been. The data that could have been breached includes email addresses, billing and shipping addresses, telephone numbers, and transaction and purchase histories. Payment-card information is encrypted and tokenized and was not involved in the possible data breach.

    Threatpost reports: "Barnes & Noble Hack: A Reading List for Phishers and Crooks"

  • news

    Visible to the public Solicitation: NSF Secure and Trustworthy CyberSpace (SaTC) [Solicitation 21-500]

    Secure and Trustworthy Cyberspace (SaTC)

    PROGRAM SOLICITATION
    NSF 21-500

    REPLACES DOCUMENT(S):
    NSF 19-603

    National Science Foundation

    Directorate for Computer and Information Science and Engineering
         Division of Computer and Network Systems
         Division of Computing and Communication Foundations
         Division of Information and Intelligent Systems
         Office of Advanced Cyberinfrastructure

  • news

    Visible to the public "Carnival Confirms Passenger Data Compromised"

    During an investigation, Carnival Corporation has discovered that passenger and employee data from three different cruise lines were accessed in a ransomware attack in August. The cruise lines affected include Carnival Cruise Line, Holland America Line, and Seabourn. The investigation is still ongoing. Carnival stated that the information accessed by the threat actors might include names, addresses, phone numbers, passport numbers, and dates of birth. They also anticipate additional information that may have been impacted, include Social Security numbers, health information, or other personal information.

    Infosecurity reports: "Carnival Confirms Passenger Data Compromised"

  • news

    Visible to the public "CISA Urges Patch of Windows Remote Code Execution TCP/IP Flaw, DoS Risk"

    The Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) has advised organizations to apply the patch released for a Remote Code Execution (RCE) vulnerability discovered in the Microsoft Windows Transmission Control (TCP)/IP stack handling Internet Control Message Protocol version 6 (ICMPv6) Router Advertisement packets. The exploitation of this flaw could allow attackers to execute code on a victim's server or client as well as launch Denial-of-Service (DoS) attacks. This article continues to discuss the potential abuse and impact of the Windows RCE TCP/IP flaw in addition to other security vulnerabilities highlighted by Microsoft this month.

    HealthITSecurity reports "CISA Urges Patch of Windows Remote Code Execution TCP/IP Flaw, DoS Risk"

  • news

    Visible to the public "Some Employees More Likely to Adhere to Information Security Policies Than Others"

    A new study conducted by Binghamton University, State University of New York, suggests that an organization's subcultures influence whether or not employees violate Information Security Policies (ISP). As each subculture within an organization responds differently to the organization-wide ISP, researchers recommend that the development of ISP involves consulting with each of these subcultures. Organizations are encouraged to examine the design and implementation of ISP, and to work closely with employees to figure out how they could fit ISP compliance into their work responsibilities and priorities. This article continues to discuss the performance and findings of the study on how subcultures influence ISP compliance.

    Binghamton University reports "Some Employees More Likely to Adhere to Information Security Policies Than Others"

  • news

    Visible to the public "Hackers Claim to Have Access to 50,000 Home Security Cameras"

    A hacking group composed of over 1,000 global members is advertising access to more than 50,000 hacked home security cameras for sale on the messaging platform Discord. The group claims to have shared over 3 TB of video clips and stills with members. The clips are said to show victims from all around the world, including South Korea, Singapore, and Thailand, in compromising positions. This footage was likely taken from IP security cameras. This article continues to discuss the advertisement of 50,000 hacked home security cameras, the footage reportedly being shared by the hacking group, and the importance of improving access controls for cameras connected to the internet.

    Infosecurity Magazine reports "Hackers Claim to Have Access to 50,000 Home Security Cameras"

  • news

    Visible to the public "New Website Predicts Likelihood of Cyberattacks Between Nations"

    A team of computer scientists and international studies students at Johns Hopkins University developed a new online database called the Cyber Attack Predictive Index (CAPI) that can predict the likelihood of a cyberattack between nations. The site predicts where in the world, the next major cyber conflict might occur based on the analysis of existing data gathered from past attacks. Nations are given a score from 1 to 5 for each common element identified in national cyberattacks within the past 15 years. These elements include cyber strength, sophistication, fear of serious repercussions, motivation to attack, and more. As a nation's total score increases, they are more likely to launch an attack. A CAPI Advisory Board has been established to regularly gather project stakeholders to discuss activities around the world that may result in cyber conflict and to update the database. This article continues to discuss the purpose and methodology behind the online CAPI Heat Index.

    JHU reports "New Website Predicts Likelihood of Cyberattacks Between Nations"

  • news

    Visible to the public "Cybercriminals Steal Nearly 1TB of Data from Miami-Based International Tech Firm"

    Researchers have discovered nearly a terabyte of data that was stolen during a ransomware attack from a Miami-based tech firm called Intcomex on a Russian-language hacker forum. The databases stolen by the adversaries were uploaded to the hacker forum on September 14th and September 20th. The data uploaded to the hacker forum include full credit card numbers, expiration dates, CVV2, the card holder's full name, social security numbers, and full driver-license info. The data also includes document scans of passports, including full passport info for both U.S. and Latin American passport holders.

    Threatpost reports: "Cybercriminals Steal Nearly 1TB of Data from Miami-Based International Tech Firm"

  • news

    Visible to the public "Fooling Deepfake Detectors"

    Deepfakes refer to synthetic media, including images and videos, created using Artificial Intelligence (AI). Deepfakes remain a significant issue despite recent developments in security measures that can detect many of them. Bart Kosko, a professor in the Ming Hsieh Department of Electrical and Computer Engineering, underlined the expected advancement in the generation of deepfakes and the increased difficulty in detecting them as computers and learning algorithms grow more sophisticated. In a new paper from Professor Kosko's neural learning and computational intelligence course, Electrical and Computer Engineering masters students Apurva Gandhi and Shomik Jain showed the vulnerability of deepfake detectors to adversarial perturbations. This article continues to discuss the expected advancement of deepfakes, the results of the study, and the researchers' strategies for improving vulnerable deepfake detectors.

    Homeland Security News Wire reports "Fooling Deepfake Detectors"

  • news

    Visible to the public "Security Researchers Awarded over $250,000 for Reporting 55 Vulnerabilities in Apple's Bug Bounty Program"

    As part of Apple's bug bounty program, a team of researchers analyzed the company's online services and found a total of 55 vulnerabilities, 11 of which were flagged as critical. The team received a reward of $288,500 for their findings. According to the researchers, the exploitation of these vulnerabilities would have allowed attackers to take over customer and employee applications, launch a worm that can take over iCloud accounts, and more. Attackers could have abused one critical bug discovered in the Apple Distinguished Educator (ADE) program's website to access the administrator console and execute arbitrary code. This article continues to discuss the security flaws found in Apple's online services and the malicious activities that attackers could have performed through the exploitation of these vulnerabilities.

    Security Boulevard reports "Security Researchers Awarded over $250,000 for Reporting 55 Vulnerabilities in Apple's Bug Bounty Program"

  • news

    Visible to the public "Compliance Activities Cost Organizations $3.5 Million Annually"

    Researchers at Telos have discovered that organizations are struggling to keep up with IT security and privacy compliance regulations. Researchers at Telos surveyed 300 IT security professionals in July and August. The survey revealed that, on average, organizations must comply with 13 different IT security and/or privacy regulations and spend $3.5 million annually on compliance activities. Compliance audits, on average, consume 58 working days each quarter.

    Help Net Security reports: "Compliance Activities Cost Organizations $3.5 Million Annually"

  • news

    Visible to the public "Protecting Device Software from Zero-Day Attacks with TrustMS"

    The Department of Homeland Security (DHS) Science and Technology Directorate (S&T), in partnership with Intelligent Automation, Inc. (IAI), developed a new technology called the Trusted Mobile System (TrustMS). This cybersecurity tool secures device software by preventing attackers from exploiting vulnerabilities, including those considered zero-day. TrustMS adds extra protection below the application layer. This technology monitors software as it launches to detect attacks at the lowest levels. Once threats are identified, TrustMS eliminates them. TrustMS protects against stack manipulation, buffer overflows, the execution of unintended code, and other exploits. Vincent N. Sritapan, manager of the S&T Mobile Security R&D program, said this technology will significantly improve the security of devices, apps, and embedded systems. This article continues to discuss how TrustMS secures mobile and embedded devices from cyberattacks, as well as the development of this technology and its potential use in different sectors to defend critical infrastructure and secure operations.

    DHS reports "Protecting Device Software from Zero-Day Attacks with TrustMS"

  • news

    Visible to the public "Facebook Debuts Bug-Bounty ‘Loyalty Program’"

    Facebook is creating a loyalty program as part of its bug-bounty offering, hoping to incentivize researchers to find vulnerabilities in its platform. Facebook bounty hunters will be placed into tiers by analyzing their score, signal, and the number of submitted bug reports, which will dictate new bonus percentages. The new program is called "Hacker Plus" and offers bonuses, bounty awards, access to more products and features that researchers can stress-test, and invites to Facebook annual events.

    Threatpost reports: "Facebook Debuts Bug-Bounty 'Loyalty Program'"

  • news

    Visible to the public "Election Systems Under Attack via Microsoft Zerologon Exploits"

    The Cybersecurity Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) are warning that advanced persistent threat actors (APTs) are now leveraging Microsoft's severe privilege-escalation flaw, dubbed "Zerologon," to target elections support systems. The adversaries use VPN vulnerabilities to gain initial access and then Zerologon as a post-exploitation method, to compromise government networks. Exploiting the bug allows an unauthenticated attacker, with network access to a domain controller, to completely compromise all Active Directory identity services. Microsoft released a patch for the Zerologon vulnerability in August. Despite the patch being issued, many companies have not yet applied the patch to their system. Cybercriminals are taking advantage of that in a recent slew of government-targeted attacks.

    Threatpost reports: "Election Systems Under Attack via Microsoft Zerologon Exploits"

  • news

    Visible to the public "25% of BEC Cybercriminals Based in the US"

    The Agari Cyber Intelligence Division (ACID) published the results of a study on the operations of Business Email Compromise (BEC) attacks. These results give insight into the global footprint of BEC activity. Researchers looked at information on 9,000 defense engagements between May 2019 and July 2020, 2,200 of which allowed them to identify where attackers are likely located. They were able to identify BEC attackers in over 50 different countries. According to ACID's report, 25% of those behind BEC attacks were based in the United States, with nearly half of them located in California, Florida, Georgia, New York, and Texas. Sixty percent of the perpetrators behind these attacks were based in 11 African countries, with 83% of them based in Nigeria. This article continues to discuss key findings of the study on the locations of BEC cybercriminals and BEC money mules.

    Dark Reading reports "25% of BEC Cybercriminals Based in the US"

  • news

    Visible to the public "Fitbit Spyware Steals Personal Data via Watch Face"

    Using the Fitbit application API, Kev Breen, the director of cyber research for Immersive Labs, built a malicious Fitbit application. This app contains spyware that can steal user information such as gender, age, heart rate, and weight, as well as calendar information, which could expose names and locations. Breen also demonstrated the abuse of Fitbit's fetch API to turn the malicious app into a primitive network scanner, posing a threat to the enterprise as it could identify and access routers, firewalls, and more. The app was made available through the Fitbit Gallery at which various third-party and in-house apps are showcased. This article continues to discuss the development, capabilities, and delivery of the malicious Fitbit app, and Fitbit's response to this research.

    Threatpost reports "Fitbit Spyware Steals Personal Data via Watch Face"

  • news

    Visible to the public "Watchdog Urges More Action to Protect Planes from Hackers"

    The Government Accountability Office (GAO) calls on federal regulators to increase efforts toward strengthening the security of airliners' computer systems against hackers. The agency pointed out that the Federal Aviation Administration (FAA) has not developed a program for cybersecurity training or testing potentially vulnerable airplane computer systems. It is recommended that the FAA conducts a risk assessment for avionics systems and trains inspectors on how to judge the security of these systems. As the complexity of avionics systems grows, opportunities for attackers to target commercial transport airplanes increase, making it essential for federal regulators to take more action to address vulnerabilities in these systems. This article continues to discuss the GAO's report on the vulnerability of plane systems to hacking as well as recommended actions to bolster airline cybersecurity.

    MBT reports "Watchdog Urges More Action to Protect Planes from Hackers"

  • news

    Visible to the public "Hackers Chain Windows, VPN Bugs to Access Government Systems"

    Vulnerability chaining is a tactic in which multiple bugs are used to compromise a network or application. According to a joint statement released by CISA and the FBI, hackers have recently applied this tactic by exploiting a combination of Windows and VPN bugs to gain access to federal and state, local, tribal, and territorial government networks. This activity has resulted in unauthorized access to elections support systems. However, there is no evidence suggesting that the integrity of election information was compromised. This article continues to discuss the recent exploitation of Windows and VPN bugs to access government networks and the vulnerability of state and federal agencies to being hacked.

    SC Media reports "Hackers Chain Windows, VPN Bugs to Access Government Systems"

  • news

    Visible to the public "How Lack of Visibility Over IaaS Cloud Infrastructure Fuels Cyberattacks"

    The COVID-19 crisis has sped up the adoption of cloud technologies, further emphasizing the importance of strengthening cloud security. Although more businesses are adopting cloud technologies to protect their data and networks, their processes are weak. According to a new report from SailPoint, an identity management firm, the rush to adopt Infrastructure-as-a-Service (IaaS) for cloud infrastructure has created security challenges. More than 40% of cyberattacks stem from the lack of visibility and control deficiencies associated with IaaS infrastructure management and access. This article continues to discuss the increased use of IaaS cloud environments during the pandemic and the hurdle created by this rush in IaaS adoption.

    CISO MAG reports "How Lack of Visibility Over IaaS Cloud Infrastructure Fuels Cyberattacks"

  • news

    Visible to the public "Microsoft And Partners Cut Off Key Trickbot Botnet Infrastructure"

    A coalition of tech companies headed by Microsoft has struck a serious blow against the adversaries behind the Trickbot botnet. The researchers disrupted Trickbot through a court order they obtained and the technical action they executed in partnership with telecommunication providers worldwide. They were able to successfully cut off key infrastructure, so those operating Trickbot will no longer be able to initiate new infections or activate ransomware already dropped onto computer systems.

    Help Net Security reports: "Microsoft And Partners Cut Off Key Trickbot Botnet Infrastructure"

  • news

    Visible to the public "Microsoft Warns of 'Continuously Evolving' Android Ransomware"

    Microsoft has identified a new strain of Android ransomware known as AndroidOS/MalLocker.B. According to Microsoft researchers, the authors of this malware have been continuously been updating it. The new variant applies various methods to circumvent the protections implemented by Google to prevent malicious apps from taking over a device's home screen and disabling functions. This article continues to discuss the techniques used by the latest MalLocker.B ransomware variant to get victims to pay the demanded ransom and the methods used by other Android ransomware families.

    Decipher reports "Microsoft Warns of 'Continuously Evolving' Android Ransomware"

  • news

    Visible to the public "Zero Trust Becoming Cyber Strategy of Choice Across Defense Department"

    Several agencies with the U.S. Department of Defense (DoD) are building a zero-trust architecture. This architecture secures IT systems by treating all users as potential threats. All users must be authenticated, and their access must be authorized before they can access data and resources. According to Brandon Iske, the Defense Information Systems Agency (DISA) Security Enablers Portfolio Chief Engineer, the Nationational Security Agency (NSA), DISA, U.S. Cyber Command, and the DoD Office of the CIO are working together on a zero-trust pilot. COVID-19 is one driving factor behind the increased adoption of zero-trust as a cyber strategy. This article continues to discuss how component agencies are embracing zero-trust.

    MeriTalk reports "Zero Trust Becoming Cyber Strategy of Choice Across Defense Department"

  • news

    Visible to the public "C&C Panels of 10 IoT Botnets Compromised by Researchers"

    Two security researchers from SecNiche Security Labs were able to access the command and control (C&C) panels of Internet of Things (IoT) botnets, including Mana, Vivid, 911-Net, Purge Net, Goon, Kawaii, 0xSec. The compromise of IoT botnets' C&C panels allowed them to delve deeper into the capabilities and operation of these threats. The researchers gathered information on commands supported by the IoT botnets, differences between different panels, and administrator options such as those used to execute DDoS attacks. They also shared details on techniques that could be used to create additional attack scenarios and develop measures to defend against such scenarios. This article continues to discuss how researchers accessed C&C panels of 10 IoT botnets and the importance of compromising these panels.

    Security Week reports "C&C Panels of 10 IoT Botnets Compromised by Researchers"

  • news

    Visible to the public "ATM Cash-Out: A Rising Threat Requiring Urgent Attention"

    The PCI Security Standards Council (PCI SSC) and the ATM Industry Association (ATMIA) have started to warn financial institutions of ATM cash-out attacks. Adversaries usually insert malware via phishing or social engineering methods into a financial institution or payment processor's systems to carry out an ATM cash-out attack. An ATM cash-out attack is an attack where criminals breach a bank or payment card processor, manipulate fraud detection controls, and alter customer accounts so that there are no limits to withdraw money from numerous ATMs in a short period of time. The adversaries often manipulate balances and withdrawal limits to allow ATM withdrawals until ATMs are empty of cash.

    Help Net Security reports: "ATM Cash-Out: A Rising Threat Requiring Urgent Attention"

  • news

    Visible to the public "Finding the Origins of a Hacker"

    Sarah Freeman is senior industrial control systems cybersecurity analyst at Idaho National Laboratory (INL) who looks at the different aspects of cyberthreats facing critical infrastructure. Attacks against pipelines, transportation networks, and other critical infrastructure are continuing to grow in frequency and sophistication. Part of Freeman's work is to solve puzzles regarding who is behind an attack against critical infrastructure in order to help the government better defend against perpetrators. Freeman looks at the characteristics of target industrial control systems, attack techniques, and more. This article continues to discuss what Freeman and other analysts look at in the performance of cyber attribution.

    Homeland Security News Wire reports "Finding the Origins of a Hacker"

  • news

    Visible to the public "US Seizes Domains Used to Spread Disinformation"

    The US seized 92 domains allegedly used by Iran's Islamic Revolutionary Gaurd Corps (IRGC) to spread disinformation. Four of the websites seized by the US appeared to be genuine online news outlets. However, the US alleges that these sites were IRGC's propaganda machines aimed at influencing American foreign and domestic policy. The other domains were allegedly used to spread Iranian propaganda to countries other than the US. John Demers, the Assistant Attorney General for National Security, stated that the US will continue to leverage all of its tools to prevent the Iranian Government and other authoritarian countries from abusing US companies and social media platforms to spread disinformation and attempting to influence the American public. Such efforts call for continued cooperation among tech leaders and law enforcement. This article continues to discuss the successful takedown of 92 domains used to spread disinformation and continued efforts to stop authoritarian countries' misuse of social media and US companies to secretly spread propaganda.

    Infosecurity Magazine reports "US Seizes Domains Used to Spread Disinformation"

  • news

    Visible to the public "Are Brain-Computer Interface Spellers Secure?"

    A Brain-Computer Interface (BCI) allows people to use their brain activity to interact with a computer. A team of researchers led by Professor Dongrui Wu from the Huazhong University of Science and Technology (HUST) explored the security of electroencephalogram (EEG)-based BCI spellers, which enables text entry using EEG signals, helping to restore communication for severely disabled individuals. The examination of P300 and SSVEP spellers revealed that an attacker could cause them to misclassify characters through the generation of tiny adversarial EEG perturbation templates. Adversarial attacks on EEG-based BCI spellers could lead to usability problems, misdiagnosis in clinical applications, and other consequences, posing a threat to patients' safety. This research aims at bringing further attention to the need to strengthen security for BCI systems. This article continues to discuss the findings and next steps of this study on the security of BCI systems.

    ScienMag reports "Are Brain-Computer Interface Spellers Secure?"

  • news

    Visible to the public  "Only 27.9% of Organizations Able to Maintain Compliance With The PCI DSS"

    Global organizations are still putting their customers' cardholder data at risk due to a lack of long term payment security strategy and execution, flags the Verizon report. Payment data remains one of the most sought after and lucrative targets by cybercriminals, with 9 out of 10 data breaches being financially motivated. On average, only 27.9 percent of global organizations maintained full compliance with the Payment Card Industry Data Security Standard (PCI DSS). The PCI DSS was developed to help businesses that offer card payment facilities protect their payment systems from breaches and theft of cardholder data. The researchers also found that this is the third successive year that a decline in compliance has occurred with a 27.5 percentage point drop since compliance peaked in 2016.

    Help Net Security reports: "Only 27.9% of Organizations Able to Maintain Compliance With The PCI DSS"

  • news

    Visible to the public "Emotet Is Back and Phishing State and Local Governments, CISA Warns"

    The Cybersecurity and Infrastructure Security Agency (CISA) published an alert about the recent resurgence of the credential-stealing malware Emotet. Since its return, there has an increase in Emotet attacks against U.S. state and local governments. Researchers discovered that Emotet is now applying new tactics, including the use of subject lines in phishing email attacks that capitalize on the COVID-19 crisis. The Emotet downloader is also now contained in a password-protected archive file to avoid the security gateways implemented to protect email accounts. This article continues to discuss CISA's warning about the return of Emotet, researchers' findings surrounding this malware's new tactics, and suggested steps that state and local IT organizations can take to avoid falling victim to Emotet attacks.

    StateScoop reports "Emotet Is Back and Phishing State and Local Governments, CISA Warns"

  • news

    Visible to the public "QNAP Fixes Critical Flaws That Could Lead to Device Takeover"

    QNAP has fixed two critical vulnerabilities that could allow attackers to take over its network-attached storage (NAS) devices. The vulnerabilities were contained by Helpdesk, an app built into QNAP's NAS devices that admins could use to send requests for help from the QNAP support team. The app also has a remote support feature to allow remote connections to the device with the owner's permission. QNAP has also brought further attention to the recent rise in ransomware attacks targeting publicly exposed NAS storage devices. This article continues to discuss the two Helpdesk security flaws fixed by QNAP and the recent surge in ransomware attacks against NAS devices.

    Bleeping Computer reports "QNAP Fixes Critical Flaws That Could Lead to Device Takeover"

  • news

    Visible to the public "Food Delivery Service Chowbus Experiences Data Breach"

    Chicago-based Asian food delivery service Chowbus has suffered a data breach with more than 800,000 customer records and 444,000 unique email addresses exposed. Customers reported receiving emails labeled "Chowbus data" that contained links where they could download company databases containing contact information for restaurants and customers. Chowbus has not confirmed how many customers were affected or how the breach happened but did confirm that credit card information and account passwords were not stolen.

    Info Security reports: "Food Delivery Service Chowbus Experiences Data Breach"