News Items

  • news

    Visible to the public "New Technique Improves Effectiveness of Timing Channel Attacks"

    Researchers at the Indian Institute of Technology Kanpur have discovered a new technique called "DABANGG," which improves the effectiveness of timing channel attacks. A timing channel attack refers to the analysis of how long it takes for a targeted system to respond to various queries in order to discover vulnerabilities and extract private data. DABANGG increases the success of flush-based attacks such as Flush+Reload and Flush+Flush. DABANGG-enabled attacks present another challenge to the micro-architectural security community as these attacks have been significantly more precise, making flush-based attacks more feasible. According to the researchers, the DABANGG timing channel attack can be used against Intel and AMD processors, as well as non-Linux systems. This article continues to discuss how the new technique DABANGG improves the effectiveness of flush-based attacks.

    Security Week reports "New Technique Improves Effectiveness of Timing Channel Attacks"

  • news

    Visible to the public "Education App Reveals Users' Sensitive Information, Research Finds"

    Security researchers found that 8Belts, maker of language-learning apps, left a database containing sensitive information about hundreds of thousands of users exposed online. The unsecured 8Belts database, which has now been taken down, revealed national identity numbers, names, email addresses, and phone numbers belonging to customers worldwide. 8Belts' major clients include Huawei, Decathlon, and PricewaterhouseCoopers. Security professionals have stressed the lack of expertise among organizations regarding the secure movement of customer information into the cloud despite cloud providers' efforts to increase the ease with which databases can be set up securely. This article continues to discuss the discovery of the poorly secured 8Belts database, what information was exposed by the database, which companies were impacted by this leak, other unsecured databases that were uncovered this year, and the continued problems with securely moving customer information into the cloud.

    CNET reports "Education App Reveals Users' Sensitive Information, Research Finds"

  • news

    Visible to the public "Revealed: Advanced Java-Based Ransomware PonyFinal"

    Microsoft is warning organizations about new Java-based ransomware, called "PonyFinal." The tech giant considers PonyFinal to be human-operated ransomware because it is not a variant distributed in an automated manner. According to Microsoft's Security Intelligence group, the ransomware can encrypt files at a specific date and time, allowing attackers to choose the most convenient time to deploy the payload. Organizations are encouraged to conduct regular audits of vulnerabilities and ensure that their internet-facing assets, including VPNs and other remote access infrastructure, are kept up-to-date with patches in order to reduce their attack surface. This article continues to discuss the distribution, operation, and capabilities of the PonyFinal ransomware, as well as what organizations should do to prevent such attacks.

    Infosecurity Magazine reports "Revealed: Advanced Java-Based Ransomware PonyFinal"

  • news

    Visible to the public "41% of Organizations Have Not Taken Any Steps to Expand Secure Access For The Remote Workforce"

    Organizations are struggling to adjust to the new normal caused by the COVID-19 pandemic. In a new survey by Bitglass, researchers discovered that 41 percent of the respondents said that their organizations had not taken any steps to expand secure access for the remote access workforce. Most organizations now enable personal devices to access managed applications (65 percent). Remote workers believe that organizations are most concerned about securing file sharing (68%), web applications (47%), and video conferencing (45%). Anti-malware is the most-used tool to secure remote work. 63 percent of the respondents believe that remote work was going to impact their compliance with regulatory mandates, such as GDPR.

    Help Net Security reports: "41% of Organizations Have Not Taken Any Steps to Expand Secure Access For The Remote Workforce"

  • news

    Visible to the public "New Android Malware Channels Malicious Activity Through Accessibility Services"

    Security researchers at ESET have discovered a new strain of Android malware, called "DEFENSOR ID." The malware performs malicious activities through the abuse of a device's Accessibility Services. These services enable the malware to execute 17 commands from an attacker, such as opening an app and performing a click action remotely. The control of a device's Accessibility Services allows attackers to gain access to a victim's cryptocurrency wallet or banking account, and to read SMS text messages. This article continues to discuss the capabilities of DEFENSOR ID, other recent discoveries of Android malware that abuse Accessibility Services, and how security professionals can help defend their organizations against such malware.

    Security Intelligence reports "New Android Malware Channels Malicious Activity Through Accessibility Services"

  • news

    Visible to the public "IoT Labels Will Help Consumers Figure out Which Devices Are Spying on Them"

    When we want to know how many calories are in a certain portion of food or drink, we look at nutrition labels. However, if we want to know about the security and privacy practices behind a new Internet of Things (IoT) device, this information is not easily found. Therefore, a team of researchers at Carnegie Mellon University's CyLab developed a prototype security and privacy "nutrition label." The label would provide information such as what type(s) of data the device collects, how long it retains it, how the data is shared, and more. The researchers also developed an IoT label generator for manufacturers to create labels for their devices easily. This article continues to discuss the goal of IoT labels, what information these labels would provide to consumers, the study behind the development of these labels, and the need for transparency in the collection and use of consumer data.

    CyLab reports "IoT Labels Will Help Consumers Figure out Which Devices Are Spying on Them"

  • news

    Visible to the public "Tel Aviv University and IDC Herzliya Researchers Thwart Large-Scale Cyberattack Threat"

    Researchers at Tel Aviv University and the Interdisciplinary Center (IDC) of Herzliya say that vulnerabilities in the Domain Name System (DNS) could have been used to execute a much more massive attack than that of the infamous Mirai botnet. A study conducted by the researchers shares new details about a technique called "NXNSAttack" (Non-Existent Name Server Attack), which abuses the vulnerabilities contained by commonly used DNS software. Malicious actors could have applied the threatening method to execute distributed denial-of-service (DDoS) attacks on a larger scale using a relatively small number of computers. Several makers of the DNS software, in addition to companies responsible for the Internet's infrastructure, including Google, Microsoft, Amazon, and Dyn, were notified about these findings, which led to software updates to address the problem. This article continues to discuss the Mirai botnet's impact in 2016, the NXNSAttack technique, and the research behind this method.

    EurekAlert! "Tel Aviv University and IDC Herzliya Researchers Thwart Large-Scale Cyberattack Threat"

  • news

    Visible to the public "NSA Warns About Sandworm APT Exploiting Exim Flaw"

    The NSA has warned in a security advisory published on Thursday that the Russian APT group Sandworm has been exploiting a critical Exim flaw (CVE-2019-10149) to compromise mail servers since August 2019. When this flaw is successfully exploited, threat actors can execute code of their choosing. When Sandworm exploited the flaw, the victim's machine subsequently downloads and executes a shell script from a Sandworm-controlled domain. The script then attempts to add privileged users, update SSH configuration to enable additional remote access, disable network security settings, and execute an additional script to enable follow-on exploitation.

    Help Net Security reports: "NSA Warns About Sandworm APT Exploiting Exim Flaw"

  • news

    Visible to the public "Vulnerability Disclosures Drop in Q1 for First Time in a Decade"

    An analysis recently published by Risk Based Security reveals a decrease in the number of vulnerabilities reported in the first quarter of 2020 by 20%. Although the decline in reported vulnerabilities occurred in the same quarter as the surge of remote workers resulting from the coronavirus pandemic, a clear connection still has not been determined as to why there are fewer vulnerabilities. Brian Martin, vice president of intelligence for Risk-Based Security, emphasized the emergence of outliers observed by security professionals because of COVID-19. One of the reasons behind the drop in vulnerabilities could be the disruption of security operations and the reduction of security workers due to the pandemic. This article continues to discuss the decline in the number of reported vulnerabilities in Q1 2020 and why this number could be lower due to COVID-19's impact.

    Dark Reading reports "Vulnerability Disclosures Drop in Q1 for First Time in a Decade"

  • news

    Visible to the public "External Attacks on Cloud Accounts Grew 630 Percent From January to April"

    In a new survey by Macafee, researchers found that overall enterprise adoption of cloud services spiked by 50 percent between January and April, including manufacturing and financial services that typically rely on legacy on-premises applications and networking and security more than others. The use of cloud collaboration tools increased by up to 600 percent. The education sector saw the most growth in the use of cloud collaboration tools since more students are required to adopt distance learning practices. Threat events against cloud services and collaboration tools from external actors increased by 630 percent between January and April. Most of these external attacks targeted collaboration services like Microsoft 365 and were large-scale attempts to access cloud accounts with stolen credentials.

    Help Net Security reports: "External Attacks on Cloud Accounts Grew 630 Percent From January to April"

  • news

    Visible to the public "External Threats Outpace Insider-Related Breaches in Healthcare"

    According to the latest Verizon Data Breach Investigations Report (DBIR), the healthcare sector faced an increase in attacks last year with external threats exceeding the number of incidents caused by insiders. Verizon's DBIR highlights findings from the analysis of 3,950 data breaches and 157,252 security incidents experienced by companies across 16 sectors in four different regions. The report revealed that 51% of healthcare data breaches were caused by external actors, while 48% were insider-related. However, healthcare organizations remain the most impacted by insider threats. The report also pointed out the top patterns behind healthcare data breaches in 2019, which include web application attacks, business email compromise, and the misdelivery of emails. This article continues to discuss the insider threats faced by the healthcare sector and how healthcare organizations can prevent insider-related breaches, along with healthcare's ransomware problem and the most common patterns observed with data breaches in 2019.

    HealthITSecurity reports "External Threats Outpace Insider-Related Breaches in Healthcare"

  • news

    Visible to the public "Qatar: 'Huge' Security Weakness in COVID-19 Contact-Tracing App"

    Amnesty International discovered critical vulnerabilities in Qatar's mandatory coronavirus contact-tracing app, which have now been fixed. The app is intended to help slow down the spread of COVID-19 by alerting users when they are near someone who has tested positive for the infectious disease. The discovery of serious weaknesses in Qatar's EHTERAZ contact-tracing app configuration, further emphasizes the need for governments to implement privacy safeguards for such apps. Findings from the investigation of the app conducted by Amnesty's Security Lab revealed a vulnerability that would have allowed attackers to gain access to highly sensitive information about more than one million users, such as names, health status, location, and more. This article continues to discuss the purpose of Qatar's contact-tracing app, Amnesty's discovery of vulnerabilities contained by the app, and the importance of incorporating privacy and data protection into the design of such apps.

    Amnesty reports "Qatar: 'Huge' Security Weakness in COVID-19 Contact-Tracing App"

  • news

    Visible to the public "Florida Tech Student Finds Privacy Flaws in Connected Security and Doorbell Cameras"

    Florida Tech computer science student Blake Janes discovered systematic design flaws in internet-connected doorbells and security cameras manufactured by Ring, Nest, SimpliSafe, and eight other manufacturers. Janes found that a shared account can still have access to a video feed despite it appearing to have been removed. The mechanism implemented for removing user accounts does not function as it should because it fails to remove active user accounts. Malicious actors could exploit this flaw to maintain access to a camera system for an unlimited time. They can use this time to record audio and video, posing a significant threat to users' privacy. This invasion of privacy can be achieved using the devices' companion applications, which eliminates the need for advanced hacking tools. The devices found to contain flaws include the Blink Camera, D-Link Camera, Canary Camera, and many more. This article continues to discuss the security flaws found in connected security and doorbell cameras, as well as how vendors have responded to this discovery.

    Florida Tech reports "Florida Tech Student Finds Privacy Flaws in Connected Security and Doorbell Cameras"

  • news

    Visible to the public "A New Android bug, Strandhogg 2.0, Lets Malware Pose as Real Apps and Steal User Data"

    Researchers at a security firm called Promon, have discovered a new vulnerability, called Strandhogg 2.0. This vulnerability affects all devices running Android 9.0 and earlier. This vulnerability lets malware imitate legitimate apps to steal app passwords and other sensitive data. The user would have to download a malicious app (disguised as a normal app) to exploit the Strandhogg 2.0 vulnerability.

    TechCrunch reports: "A New Android bug, Strandhogg 2.0, Lets Malware Pose as Real Apps and Steal User Data"

  • news

    Visible to the public "Android Security Vulnerabilities Differ by Country, Say Researchers"

    According to researchers at F-Secure, Android devices manufactured by Huawei, Samsung, Xiaomi, and others are being shipped and sold with significantly different levels of on-board security in different regions. The differences in Android security vulnerabilities by region emphasize the importance of increasing knowledge and understanding of Android device security globally. This discovery also highlights the value of vulnerability research. F-Secure's researchers have stressed the importance of raising awareness among device manufacturers in different countries about how problematic the growth of custom-Android builds can be in regard to security. This article continues to discuss the distribution of Android devices that offer different levels of security to users located in different regions, what different levels of on-board security by country indicate, and the security vulnerabilities contained by devices tested by F-Secure's researchers.

    Computer Weekly reports "Android Security Vulnerabilities Differ by Country, Say Researchers"

  • news

    Visible to the public "Malware Opens RDP Backdoor Into Windows Systems"

    Researchers at SentinelOne have discovered a new version of the Sarwent malware. Sarwent is a malware that started as a loader for other malware but has recently been updated with more functionalities. The new variant of Sarwent can open the Remote Desktop Protocol (RDP) port on Windows computers to ensure that the adversaries can find their way back into the system through the backdoor. The malware can also now execute commands via Windows Command Prompt and PowerShell. It can also create a new Windows user account, enable the RDP service for it, and make changes to the Windows firewall so that RDP access to the infected machine is allowed. Removing this malware from an infected computer will not automatically close the RDP "hole". Users will have to remove the user account set up by the malware and close the RDP access port in the firewall.

    Help Net Security reports: "Malware Opens RDP Backdoor Into Windows Systems"

  • news

    Visible to the public SoS Musings #37 - The Double-Edged Sword of AI and ML

    SoS Musings #37 -

    The Double-Edged Sword of AI and ML

  • news

    Visible to the public Cyber Scene #44 - Tracing Tracks: So Near Yet So Far Away

    Cyber Scene #44 -

    Tracing Tracks: So Near Yet So Far Away

  • news

    Visible to the public  Cybersecurity Snapshots #6 - Will Biometric Authentication Soon Replace Password Authentication?

    Cybersecurity Snapshots #6 -

    Will Biometric Authentication Soon Replace Password Authentication?

  • news

    Visible to the public Spotlight on Lablet Research #6 - Contextual Integrity for Computer Systems 

    Spotlight on Lablet Research #6 -

    Project: Contextual Integrity for Computer Systems

  • news

    Visible to the public "Hackers Can Target Rockwell Industrial Software With Malicious EDS Files"

    Rockwell Automation and the U.S. Cybersecurity and Infrastructure Security Agency (CISA) published advisories about vulnerabilities associated with the Electronic Data Sheet (EDS) subsystem discovered by researchers at the industrial cybersecurity firm Claroty. An EDS file holds configuration data for a device. Network management tools use EDS files for identification and commissioning. According to the Claroty researchers, the security flaws they found could be exploited by hackers to launch denial-of-service (DoS) attacks and execute malicious SQL statements. These attacks can allow hackers to write or manipulate files. The vulnerabilities impact FactoryTalk Linx, RSLinx Classic, RSNetWorx, and Studio 5000 Logix Designer. This article continues to discuss the security holes that hackers can abuse to target Rockwell industrial software.

    Security Week reports "Hackers Can Target Rockwell Industrial Software With Malicious EDS Files"

  • news

    Visible to the public The Queens of Code

    The Queens of Code will be presenting four talks about NSA's Computing Women from the 60s, 70s, and 80s as part of the Cyber Center for Education & Innovation (CCEI) series on the NEPRIS platform. These computing pioneers contributed to early technology development and the national defense--a secret they've kept for over 50 years. The programs are free, NEPRIS registration is required. The talks are geared to middle and high school students, but all are welcomed.

  • news

    Visible to the public "70 Percent of Mobile, Desktop Apps Contain Open-Source Bugs"

    Researchers at Veracode analyzed 351,000 external libraries in 85,000 applications and found that open-source libraries are widespread. Many application developers use open-source libraries to help create their applications because it allows them to add basic functionality to their applications quickly. The researchers discovered that 70 percent of applications today have at least one security flaw stemming from the use of an open-source library. The four main libraries (PHP, Go, .NET, and Swift) represent most of the open-source bugs found in applications.

    Threatpost reports: "70 Percent of Mobile, Desktop Apps Contain Open-Source Bugs"

  • news

    Visible to the public Pub Crawl #38


    Pub_Crawl_web.jpgPub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers.

  • news

    Visible to the public "DOE Says Supercomputers Handling COVID-19 Data Are Hacker Targets"

    The Department of Energy (DOE) has observed a surge in cyberattacks against national laboratories and interest in U.S. coronavirus research from foreign nations. The FBI and the Cybersecurity and Infrastructure Security Agency (CISA) are currently investigating attacks faced by U.S. organizations researching COVID-19. Government agencies and private experts have also brought further attention to the continued growth in cyberattacks during the coronavirus pandemic as more people work remotely because of stay-at-home restrictions. This article continues to discuss hackers' recent attempts to steal U.S. coronavirus-related research and the rise in cyberattacks during the pandemic.

    SIW reports "DOE Says Supercomputers Handling COVID-19 Data Are Hacker Targets"

  • news

    Visible to the public "The Dark Web is Flooded With Offers to Purchase Corporate Network Access"

    Researchers from Positive Technologies have found an increase in interest in accessing corporate networks on the dark web. In Q1 2020, the number of postings advertising access to these networks increased by 69 percent compared to the previous quarter. The researchers believe that this may pose a significant risk to corporate infrastructure, especially since many employees are working remotely. "Access for sale" on the dark web is a generic term, which usually refers to credentials, software, exploits, or anything else that allows illicitly controlling one or more remote computers. In Q4 2019, over 50 access points to the networks of major companies worldwide were publicly available for sale on the dark web. In Q1 2020, this number rose to 80. Adversaries usually sell access to industrial companies, finance, science and education, IT, and professional services companies.

    Help Net Security reports: "The Dark Web is Flooded With Offers to Purchase Corporate Network Access"

  • news

    Visible to the public "60% of Insider Threats Involve Employees Planning to Leave"

    New research shows that more than 80% of employees with plans to leave an organization take data with them before they go. According to the 2020 Securonix Insider Threat Report based on the analysis of over 300 confirmed incidents, these employees considered "flight-risk" were involved in about 60% of insider threats. Most insider threats involved the exfiltration of sensitive data, while others included privilege misuse, data aggregation, and infrastructure sabotage. Employees exhibit flight-risk behavior between two to eight weeks before they make their exit. The most common data exfiltration methods include moving sensitive information via email, uploading the information to cloud storage websites, using data downloads, storing data on unauthorized removable devices, and snooping for data through SharePoint. Shareth Ben, director of Insider Threat and Cyber Threat Analytics with Securonix calls on IT security operations teams to be on the lookout for red flags such as web browsing activities related to job searching and attempts to access administrative accounts. Another significant flag is the movement of sensitive information via email, collaboration tools, or USB devices. Depending on the industry in which the insider works, they may steal valuable intellectual property, banking data, or personally identifiable information. This article continues to discuss key findings from the 2020 Securonix Insider Threat Report related to flight-risk behavior, the most common techniques used by insiders to exfiltrate sensitive information, why IT security operations teams struggle to draw conclusions from insider threats, ways to detect flight-risk employees, and the variation of targeted data by industry.

    Dark Reading reports "60% of Insider Threats Involve Employees Planning to Leave"

  • news

    Visible to the public "Beware of Phishing Emails Urging For a LogMeIn Security Update"

    Researchers from Abnormal Security have discovered a new phishing campaign targeting LogMeIn users. The phishing email has been made to look like it is coming from LogMeIn and pertains to a security update. The company logo is featured prominently in the mail body, the sender's identity has been spoofed, and the phishing link looks like it might be legitimate. However, when a user clicks on the link, it takes them to a spoofed phishing page. If the user enters their login credentials, their login information will be sent directly to the adversary. Since LogMeIn has SSO with Lastpass as LogMeIn is the parent company, the attackers may be attempting to obtain access to the user's password manager.

    Help Net Security reports: "Beware of Phishing Emails Urging For a LogMeIn Security Update"

  • news

    Visible to the public "RUSI to Investigate Impact of Cyber Insurance on Secure Behaviours"

    The Royal United Services Institute (RUSI), an independent think tank engaged in defense and security studies, is partnering with the University of Kent (UoK) to conduct research on how cyber insurance impacts security behavior. The project, titled "Incentivising Cybersecurity through Cyber Insurance (ICCI)," will delve into the different factors that drive organizations, including small and medium-sized enterprises (SMEs), to implement adequate measures for managing cyber risk. The study will also explore why an enterprise may not feel compelled to introduce such measures to prevent cyberattacks. It will examine the use of cyber insurance to push enterprises toward better security behavior. RUSI and UoK researchers will work with practitioners and policymakers in government, industry, and academia during the project. This article continues to discuss the aim of this research.

    RUSI reports "RUSI to Investigate Impact of Cyber Insurance on Secure Behaviours"

  • news

    Visible to the public "Over Half of Security Leaders Still Rely on Spreadsheets"

    Panaseer conducted a survey to which more than 400 security leaders within large financial services companies responded. The results of the global survey reveal the many difficulties faced by security leaders in trying to understand their organization's cyber posture and the measures that should be taken to maintain security controls. These challenges are associated with processes, people, and technologies. The survey also highlights the continued use of spreadsheets by most security leaders to produce metrics for measuring their cyber posture. This article continues to discuss the biggest challenges faced by security leaders in financial services companies regarding security measurement and metrics.

    Help Net Security reports "Over Half of Security Leaders Still Rely on Spreadsheets"

  • news

    Visible to the public "The Dangers of Sharing Personal Information on Social Media"

    According to Joseph Turow, a Professor of Communication at the Annenberg School for Communication, sharing photos and other personal information on social media creates more opportunities for hackers to gain access to accounts. Photos posted on social media platforms, such as Facebook, can give hackers more insight into the context of a user and their relationships that may indicate their location. These kinds of posts increase users' vulnerability to hackers attempting to hijack online accounts. Scammers can scan social media posts for photo hashtags related to graduating in order to find the name of a user's high school and their graduation year, which are answers to two of the most common security questions for bank accounts, retirement funds, and other financial online accounts. The Better Business Bureau (BBB) has also expressed similar concerns about people posting personal information on social media about their vehicles, favorite athletes, favorite shows, and more as it could lead to greater success for online scams and hacks. This article continues to discuss the potential risks posed by sharing personal information on social media and what precautions users should take before engaging in social media trends involving such information.

    Penn Today reports "The Dangers of Sharing Personal Information on Social Media"

  • news

    Visible to the public "Fraudulent Unemployment, COVID-19 Relief Claims Earn BEC Gang Millions"


    An infamous business email compromise (BEC) gang called Scattered Canary has submitted hundreds of fraudulent claims with state-level U.S. unemployment websites and coronavirus relief funds. The cybercriminals may have made millions so far from the fraudulent activity. Scattered Canary is a highly organized Nigerian cyber gang that employs dozens of threat actors to target U.S. government institutions and enterprise organizations. Since April 29th, Scattered Canary has filed more than 200 fraudulent claims on the online unemployment websites of 8 U.S. states. They sent 174 fraudulent claims with the state of Washington, and 17 fraudulent claims with the state of Massachusetts. So far, the gang has targeted the unemployment websites of Florida, Oklahoma, North Carolina, Massachusetts, Rhode Island, Wyoming, and Washington. Recently, on May 17th, researchers discovered that Scattered Canary filed its first two unemployment claims on Hawaii's Department of Labor and Industrial Relations website. The researchers believe that the group is setting their sights on Hawaii as their next target of fraudulent unemployment claims. The threat group also filed at least 82 fraudulent claims for the Covid-19 relief fund between April 15 and April 29, using the Internal Revenue Service (IRS)-backed relief fund website to process claims from individuals who weren't required to file tax returns. Of these filed claims, at least 30 were accepted and paid out by the IRS so far.

    Threatpost reports: "Fraudulent Unemployment, COVID-19 Relief Claims Earn BEC Gang Millions"

  • news

    Visible to the public "Lend Me an Ear"

    The continued advancement of the Internet of Things will expand the use of biometrics. Fingerprint sensing, iris scanning, and facial recognition are biometrics commonly implemented in smartphones for authentication. Retina scanning, vein recognition, and palm print recognition are other forms of biometric authentication methods expected to grow in popularity. Research recently published in the Journal of Electronic Imaging proposes using ear recognition as an alternative biometric identification method to improve the security of smart homes via smartphones. Researchers at the University de Tunis El Manar propose an approach to ear recognition for smart home access that involves the combination of local and frequency domain features. Distinct ear features such as the helix, concha, intertragic notch, and more, can be fused into an identifying feature through a number of estimations and extractions. This article continues to discuss the most common forms of biometrics, the growing importance of incorporating biometrics into smart homes, the proposed use of the earprint as an alternative to other popular biometrics, the advantages of using the earprint, and the results from the recent study on ear recognition.

    SPIE reports "Lend Me an Ear"

  • news

    Visible to the public "Bluetooth Flaw Exposes Countless Devices to BIAS Attacks"

    Researchers discovered a new vulnerability in the Bluetooth wireless communication protocol that exposes a wide range of devices, such as smartphones, laptops, and smart-home devices, to the so-called Bluetooth Impersonation Attacks (BIAS). The attack is made possible by the flaws in the Bluetooth Classics specification. Any standard-compliant Bluetooth device can be expected to be vulnerable. The researchers tested the security weakness on a variety of devices with different versions of the Bluetooth protocol. The researchers conducted BIAS attacks on more than 28 unique Bluetooth chips. They were able to test chips from Apple, Intel, Samsung, Cypress, CSR, and Qualcomm. All the devices that were tested were vulnerable to the BIAS attack. The researchers disclosed their findings to the industry in December 2019. Some vendors might have implemented workarounds for the vulnerability on their devices. If your device was updated after December 2019, then the flaw might be fixed. If your device was not updated after December 2019, then it is likely still vulnerable to a BIAS attack.

    WeLiveSecurity reports: "Bluetooth Flaw Exposes Countless Devices to BIAS Attacks"

  • news

    Visible to the public "Hackers Target Air-Gapped Military Networks"

    Hackers believed to be operating in China are targeting air-gapped military networks located in Taiwan and the Philippines. The hacking group, known as Tropic Trooper or KeyBoy, has been active since 2011, targeting government, military, healthcare, transportation, and more, in Hong Kong, Taiwan, and the Philippines with spear-phishing emails. According to Trend Micro, the group has been using stealthy USB malware, called USBferry, since December 2014. The malware is being used to steal sensitive data from military/navy agencies, government institutions, military hospitals, and banks via USB storage. This article continues to discuss the history, targets, techniques, and operations of the Tropic Trooper hacking group.

    Security Week reports "Hackers Target Air-Gapped Military Networks"

  • news

    Visible to the public "NTT Report Demonstrates Changing Approaches of Cybercriminals"

    NTT's 2020 Global Threat Intelligence Report (GTIR) highlights advancements in cybercriminals' attack methods, which are presenting significant challenges for organizations. According to the global technology service company, remote code execution and injection were the most common methods used by malicious actors in 2019. These methods remain effective because of organizations' inadequate practices surrounding the configuration of networks, operating systems, and applications. Organizations' testing and maintenance of security controls are also lacking. This article continues to discuss key findings from the report in relation to the most common attack methods, the weaponization of Internet of Things (IoT) devices, the sector most targeted by cybercriminals, and the exploitation of the current global crisis in the launch of cyberattacks.

    Infosecurity Magazine reports "NTT Report Demonstrates Changing Approaches of Cybercriminals"

  • news

    Visible to the public "Money Is Still the Main Motivating Factor for Hackers, Verizon Report Finds"

    Verizon recently released its annual Data Breach Investigation Report, which is based on the assessment of 157,000 security incidents faced by Verizon clients across different industries. According to the report, financially motivated data breaches grew from 71% in 2018 to 86% in 2019. Attackers are continuing to re-use usernames and passwords, and launch phishing attacks in their efforts to generate revenue. Other findings shared in the report touch on the increase in errors such as cloud misconfigurations, the growth in organized criminal groups over state-affiliated hackers, and the state of vulnerability patching. This article continues to discuss the rise in financially motivated data breaches in 2019, the growing number of misconfiguration errors, the increased involvement of organized crime groups, and improvements in patching.

    CyberScoop reports "Money Is Still the Main Motivating Factor for Hackers, Verizon Report Finds"

  • news

    Visible to the public "Clever Phishing Attack Bypasses MFA to Nab Microsoft Office 365 Credentials"

    Researchers at Cofense have discovered a new phishing campaign that can bypass multi-factor authentication (MFA) on Office 365 to access victims' data stored on the cloud and use it to extort a Bitcoin ransom and to find new victims to target. The phishing campaign leverages the OAuth2 framework, and OpenID Connect (OIDC) protocol and uses a malicious SharePoint link to trick users into granting permissions to a rogue application.

    Threatpost reports: "Clever Phishing Attack Bypasses MFA to Nab Microsoft Office 365 Credentials"

  • news

    Visible to the public "EasyJet Hack: 9 Million Customers Hit And 2,000 Credit Cards Exposed"

    UK budget airline easyJet recently disclosed a massive data breach affecting 9 million of its customers. The airline did not disclose when the breach occurred or how it happened. The adversaries gained access to 9 million customers' email addresses and travel details. The adversaries were also able to obtain 2,209 credit card details.

    ZDNet reports: "EasyJet Hack: 9 Million Customers Hit And 2,000 Credit Cards Exposed"

  • news

    Visible to the public "API Attacks Increase During Lockdown"

    The Calfornia-based cybersecurity software company Cequence has published new threat research that reveals a recent surge in the targeting of API endpoints in cyberattacks during the COVID-19 lockdown. Cequence researchers observed an increase in malicious traffic by 40%, with 28 million events generated by several campaigns in the week of April 17. The volume of attacks has continued to grow since then. One of the more significant campaigns targeted a login API endpoint for the Android application. According to researchers, this particular API was highly targeted because an attack was successful at that endpoint. Attackers may have also assumed that the API endpoint is old and poorly monitored. This article continues to discuss the observed rise in malicious traffic and the significant growth in API attacks during the lockdown, as well as the importance of effectively separating malicious traffic from legitimate traffic as the use of residential IP addresses increases during the pandemic.

    Infosecurity Magazine reports "API Attacks Increase During Lockdown"

  • news

    Visible to the public "Open-Sourcing New COVID-19 Threat Intelligence"

    Cybercriminals have been taking advantage of the coronavirus pandemic to attack individuals and companies. Recent reports have highlighted the rise in ransomware and phishing attacks based on COVID-19 information. In response to the increased exploitation of the global threat in recent cyberattacks, Microsoft has decided to open-source its coronavirus threat intelligence to help businesses and security researchers develop better solutions for safeguarding, detecting, and defending against COVID-19 themed attacks. Microsoft's list of coronavirus-related attack indicators comes from trillions of signals processed each day. These signals are generated across cloud services, applications, emails, and more. Customers who use Microsoft Threat Protection (MTP) through Defender Advanced Threat Protection (ATP) and email with Office 365 ATP are already protected against threats identified by the indicators. The list of new indicators will still be made available to those not protected by MTP. This information is available in the Azure Sentinel GitHub and through the Microsoft Graph Security API. This article continues to discuss the importance of sharing threat information, Microsoft's open-sourcing of new COVID-19 threat intelligence, how this information can be accessed, and the use of such intelligence by the security community.

    Microsoft reports "Open-Sourcing New COVID-19 Threat Intelligence"

  • news

    Visible to the public Android Spyware Hidden in Apps for 4 Years: Report"

    Researchers at a security firm called Bitdefender discovered a sophisticated cyber-espionage campaign using spyware called Mandrake that has been targeting Android users for at least four years, with the malware hiding in apps available on the Google Play Store. Bitdefender found initially 7 applications on the Google Play Store that contained the Mandrake malware: Abfix, CoinCast, SnapTune Vid, Currency XE Converter, Office Scanner, Horoskope, and Car News. Each of these applications had hundreds or thousands of downloads before they were removed from the Google Play Store. After Google Play Store deleted the other applications, Bitdefender discovered new ones several days later and found that the new round of applications with Mandrake spyware generated over 5,000 new installations each in several days. Mandrake malware can be used to take near-total control of an infected device and can collect a range of data from targeted Android users. The malware can steal usernames and passwords from banking and social media accounts; take screenshots and capture recordings; collect and send SMS messages; track GPS location data, and can deploy a "kill switch" that wipes the malware from the device when the data collection is done.

    Bank Info Security reports: "Android Spyware Hidden in Apps for 4 Years: Report"

  • news

    Visible to the public "Supercomputers Hacked Across Europe to Mine Cryptocurrency"

    Cryptocurrency mining malware has infected multiple supercomputers across Europe. Supercomputers housed in the UK, Germany, Switzerland, and Spain were reported to have been impacted by crypto-mining malware, forcing them to shut down for investigation. Those supercomputers hacked to mine cryptocurrency include the UK's ARCHER supercomputer, the Hawk supercomputer at the University of Stuttgart's High-Performance Computing Center Stuttgart (HLRS), and the Taurus supercomputer at the Technical University in Dresden. Findings from the examination of malware samples and network compromise indicators from some of these reported incidents suggest that attackers gained access to supercomputer clusters using stolen SSH credentials. The SHH credentials appear to have been taken from members of universities in Canada, China, and Poland. This article continues to discuss the recent infection of several supercomputers in Europe with crypto-mining malware.

    ZDNet reports "Supercomputers Hacked Across Europe to Mine Cryptocurrency"

  • news

    Visible to the public "22 Million Emails Found in Mystery Open Database"

    Security researcher and creator of Have I Been Pwned, Troy Hunt, was informed about an unsecured Elasticsearch database containing 22.8 million emails in February. Security researchers are still not sure about where the origins of the database. According to Hunt, the databases could come from a customer relationship management system. This article continues to discuss the mystery database, the potential origins of the database, and other unsecured large databases that have been discovered in the last few months.

    SC Media reports "22 Million Emails Found in Mystery Open Database"

  • news

    Visible to the public "Criminals Boost Their Schemes With COVID-19 Themed Phishing Templates"

    Cybercriminals are continuing to use the COVID-19 pandemic as an opportunity to steal credentials through coronavirus-themed phishing campaigns. Proofpoint researchers recently discovered that phishers are increasing their efforts to create custom COVID-19 payment phishing templates convincing enough to trick users into revealing their personal information. One template found by the researchers spoofs the legitimate Canadian government website. Another template impersonates the US Internal Revenue Service (IRS). The cybercriminals are trying to steal credentials for online account accounts, including Gmail, Office 365, and Outlook, as well as social security numbers, insurance numbers, addresses, and other sensitive information. This article continues to discuss the use of COVID-19 themed phishing templates by cybercriminals.

    Help Net Security reports "Criminals Boost Their Schemes With COVID-19 Themed Phishing Templates"

  • news

    Visible to the public "Researchers Expose New Malware Designed to Steal Data From Air-Gapped Networks"

    A Slovakian anti-virus company called ESET has discovered a new malware called Ramsay. Ramsay is a malicious software framework designed to steal files from air-gapped systems. The main goal of adversaries that use Ramsay is to use a local file system on a target machine to smuggle data out of an air-gapped network. Researchers believe that Ramsay is intended to be used in targeted attacks only. The researchers at ESET made their findings public so that other cyber researchers can try to identify more information about the malware.

    Cyberscoop reports: "Researchers Expose New Malware Designed to Steal Data From Air-Gapped Networks"

  • news

    Visible to the public "Preventing AI From Divulging Its Own Secrets"

    A computer system's secrets can be revealed by studying its power usage patterns as it conducts operations. Therefore, researchers are working to protect AI systems' power signatures from snoopers. According to researchers, the AI systems most vulnerable to these attacks are machine learning (ML) algorithms employed by smart home devices or smart cars to identify images or sounds. The specialized computer chips embedded in such devices use a class of ML algorithms known as neural networks. As these algorithms are designed to run on chips in smart devices rather than inside a cloud computing server in a hard-to-reach location, it is easier for hackers to reverse-engineer the chip using differential power analysis. Researchers at North Carolina State University have demonstrated what they say is the first countermeasure against differential power analysis attacks targeting neural networks. The countermeasure uses an approach, called masking, which was borrowed from work on cryptography research and adapted for use in neural network security. The masking defense approach can be used on any type of computer chip that can run a neural network, such as Field Programmable Gate Arrays (FPGA) and Application-specific Integrated Circuits (ASIC). This article continues to discuss differential power analysis attacks, the first countermeasure developed for protecting neural networks from these attacks, and the need to continue research behind such countermeasures.

    IEEE Spectrum reports "Preventing AI From Divulging Its Own Secrets"

  • news

    Visible to the public "Group Behind WannaCry Now Using New Malware"

    The Lazarus Group, also known as Hidden Cobra, is associated with the North Korean Government and has been tied to several high-profile attacks, including WannaCry. They are now using three new malware variants, according to CISA researchers. The first malware variant they are using is called CopperHedge. CopperHedge is a remote access Trojan (RAT) and has the capabilities that include executing arbitrary commands, performing system reconnaissance, and exfiltrating data. The second malware variant they are using is called TaintedScribe. TaintedScribe is a Trojan that uses fake Transport Layer Security protocols for session authentication as well as Linear Feedback Shift Register algorithm for encryption. TaintedScribe can upload, download, execute, and delete files. It can also create Windows Command Line access, create and terminate processes, and perform target system enumeration. The third malware variant they are using is called PebbleDash. This malware acts as a remote access tool and allows the adversary to maintain a presence on the targeted network.

    Bank Info Security reports: "Group Behind WannaCry Now Using New Malware"

  • news

    Visible to the public "Audit Trails Critical for Tracking Network Activity"

    As the distribution and complexity of networks continue the grow, it is becoming more difficult for IT professionals to keep track of the events that occur on their networks. However, logging network activity remains essential in detecting, tracking, and responding to suspicious users and events. IT professionals are encouraged to use audit trails to collect detailed records containing information about network events and activities as their organizations move their networks and applications to hybrid cloud and multicloud computing environments. Audit trails can help organizations discover the source of problems on their networks, thus increasing the speed at which they respond to and remediate them. This article continues to discuss the importance of audit trails, how audit trails can help IT professionals identify and address network vulnerabilities, as well as the use of forensic information gathered from an audit to identify threat actors.

    GCN reports "Audit Trails Critical for Tracking Network Activity"

  • news

    Visible to the public "Ninety-One Percent of Commercial Applications Contain Outdated or Abandoned Open Source Components"

    Synopsys' 2020 Open Source Security and Risk Analysis (OSSRA) report discusses findings from the examination of more than 1,250 audited commercial codebases. The report highlights the latest shifts and patterns in the use of open source components in software development and deployment. According to the report, over 90% of commercial codebases contain at least one open source component, with open source making up 70% of the audited code. The most concerning trends observed in the analysis include the continued widespread use of outdated or abandoned open source components, the increasing use of vulnerable open source components, and the prevalence of open source conflicts that put intellectual property at risk. These findings bring further attention to the continued struggle faced by organizations to track and manage the risk posed by open source software and components. This article continues to discuss key findings shared in the 2020 OSSRA report.

    EE Journal reports "Ninety-One Percent of Commercial Applications Contain Outdated or Abandoned Open Source Components"