News Items

  • news

    Visible to the public "Azure Service Fabric Vulnerability Can Lead to Cluster Takeover"

    Microsoft has recently patched a vulnerability that could allow an attacker with access to an Azure Linux container to escalate privileges and take over the entire cluster. The vulnerability is tracked as CVE-2022-30137 and impacts Service Fabric, Microsoft's container orchestrator that provides management of services across container clusters. Microsoft says Service Fabric hosts over one million applications. According to security researchers at Palo Alto Networks, the security issue is exploitable only on containers with access to the Service Fabric runtime, which implies access to the log directory. The researchers noted that Service Fabric clusters consider hosted applications to be trusted, thus allowing them to access the Service Fabric runtime data by default, which means that applications can access information about their environment and write logs to specific locations. The security hole impacts Data Collection Agent (DCA), a Service Fabric component that "handles files that could be modified by containers," thus allowing for container escape and root access to the node. DCA uses the LoadFromFile and SaveToFile functions to read from and write to files. The researchers stated that this functionality results in a symlink race. An attacker in a compromised container could place malicious content in the file that LoadFromFile reads. The researchers noted that while it continues to parse the file, the attacker could overwrite the file with a symlink to a desirable path so that later SaveToFile will follow the symlink and write the malicious content to that path. According to Microsoft, an attacker able to execute code inside a container that has access to the Service Fabric runtime would also need read/write access to the cluster to successfully exploit the vulnerability. The vulnerability exists in both Linux and Windows clusters but can only be exploited on Linux. On May 26, Microsoft released a fix for the bug in Service Fabric runtime and delivered it to all Azure customers with automatic updates enabled.

    SecurityWeek reports: "Azure Service Fabric Vulnerability Can Lead to Cluster Takeover"

  • news

    Visible to the public "US Plans to Help Universities Protect Security of Research"

    The US Department of Commerce has announced a new initiative to collaborate with universities to protect potentially sensitive research products from theft by foreign agents. The Commerce Department's assistant secretary for export enforcement, Matthew S. Axelrod, announced the Academic Outreach Initiative during a speech at the annual meeting of the National Association of College and University Attorneys. The federal government wants to empower colleges and universities to prevent unauthorized exports, including releases of controlled technology, and to make better decisions about their future and ongoing partnerships with foreign universities and companies by working closely with universities that conduct research with potential national security implications. A part of the initiative is to identify the universities and research institutions considered to be at high risk because they conduct research for the Department of Defense, have ties to restricted foreign universities, or perform studies in sensitive technologies. The Academic Outreach Initiative also aims to provide training to prioritized research institutions on potential threats. This article continues to discuss the purpose, goals, and elements of the Academic Outreach Initiative.

    Inside Higher ED reports "US Plans to Help Universities Protect Security of Research"

  • news

    Visible to the public "Ransomware Suspected in Wiltshire Farm Foods Attack"

    A leading UK producer of frozen ready meals has revealed its systems are currently down after experiencing a serious cyberattack. Wiltshire Farm Foods said on Sunday that it is "currently experiencing severe difficulties" with its computer systems. Although the company released few other details about the attack, security experts were quick to single out the cause on social media. Many experts agreed that ransomware must have been the culprit. The ready meals producer, which is owned by parent company Apetito, said it hopes to get back on track by next week. Although Wiltshire Farm Foods is a relatively small UK manufacturer, its parent company Apetito is a German-based frozen food giant with revenues exceeding EU1bn. The adversaries knew this, so they targeted the smaller company hoping the parent company would decide to pay a large ransom. Jonathan Knudsen, head of global research at the Synopsys Cybersecurity Research Center, argued that every company is a software company today and must therefore embrace a more proactive approach to cybersecurity. Knudsen also stated that organizations must recognize that the software they use daily is part of their infrastructure, just like office buildings, stores, or factories. As such, organizations need to select, deploy, and operate software with an eye toward security at every step.

    Infosecurity reports: "Ransomware Suspected in Wiltshire Farm Foods Attack"

  • news

    Visible to the public "California DOJ Data Breach Exposes Personal Information of All Concealed Carry Permit Holders Across State"

    Personal information of all concealed carry permit holders in California was exposed after the state Department of Justice suffered a data breach. On Tuesday, the Fresno County Sheriff's Office learned of the breach from the California State Sherriff's Association. The sheriff's office noted that the breach occurred as part of the state DOJ's launch of its "2022 Firearms Dashboard Portal." It was noted that this public site allows access to certain information, however, personal information of Concealed Carry Weapon (CCW) permit holders is not supposed to be visible. According to the sheriff's office, the personal information included a person's name, age, address, Criminal Identification Index number, and license type. The state DOJ pulled down the dashboard site along with all related links after learning of the breach. However, officials warned that "portions of private information may have been posted on social media websites." The sheriff's office said it was unknown exactly how long the information was accessible. The California attorney general's office said it was investigating the exposure. The sheriff's office urges anyone who learns their identity was compromised to make an online report.

    NBC News reports: "California DOJ Data Breach Exposes Personal Information of All Concealed Carry Permit Holders Across State"

  • news

    Visible to the public "Federal Government Gets Serious About Post-Quantum Encryption Protection"

    The White House mandated post-quantum cybersecurity (PQC) earlier this year via the National Security Memorandum "Promoting US Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems." In addition, the Quantum Computing Cybersecurity Preparedness Act would direct the National Institute of Standards and Technology (NIST) and the Office of Management and Budget (OMB) to develop post-quantum cryptography mitigation measures. Meanwhile, the Department of Homeland Security (DHS) collaborated with NIST to create a road map for improved agency security. QuSecure, a post-quantum cybersecurity company, has been awarded a rare Small Business Innovation Research (SBIR) Phase III contract by the federal government. The contract, PQC's first and only, requires the company to develop an end-to-end solution for post-quantum cybersecurity that can be deployed to federal agencies as soon as possible. This article continues to discuss the need for federal cybersecurity safeguards that can withstand a world in which powerful quantum computers can decrypt today's most advanced encryption.

    NextGov reports "Federal Government Gets Serious About Post-Quantum Encryption Protection"

  • news

    Visible to the public SoS Musings #62 - Increasing the Power of Cybersecurity Deception

    SoS Musings #62 -

    Increasing the Power of Cybersecurity Deception

  • news

    Visible to the public Cybersecurity Snapshots #31 - Healthcare Organizations Are Being Inundated With Cyberattacks

    Cybersecurity Snapshots #31 -

    Healthcare Organizations Are Being Inundated With Cyberattacks

  • news

    Visible to the public "2022 CWE Top 25 Most Dangerous Software Weaknesses"

    The Homeland Security Systems Engineering and Development Institute, sponsored by the US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) and operated by MITRE, has released a list of the top 25 most dangerous software weaknesses. The list compiles the most common and critical errors that can lead to serious software vulnerabilities. It uses data from the National Vulnerability Database to compile the list. An attacker can exploit these flaws to gain control of a vulnerable system, obtain sensitive information, or cause a Denial-of-Service (DoS) condition. This article continues to discuss the 2022 Common Weakness Enumeration (CWE) Top 25 Most Dangerous Software Weaknesses list.

    CISA reports "2022 CWE Top 25 Most Dangerous Software Weaknesses"

  • news

    Visible to the public "New YTStealer Malware Aims to Hijack Accounts of YouTube Content Creators"

    Researchers at Intezer have discovered a new data-stealing malware dubbed YTStealer that targets YouTube content creators by stealing their authentication cookies. The malicious tool is likely sold as a service on the dark web, and it is distributed via fake installers that also include RedLine Stealer and Vidar. What distinguishes YTStealer from other stealers on the dark web market is that it is solely focused on harvesting credentials for a single service rather than grabbing everything it can reach. However, the malware's method of operation is similar to that of its counterparts in that it extracts cookie information from the web browser's database files in the user's profile folder. The reasoning behind targeting content creators is that it uses one of the installed browsers on the infected machine to gather YouTube channel information. It accomplishes this by launching the browser in headless mode and adding the cookie to the data store. Then it navigates to the user's YouTube Studio page using a web automation tool called Rod. The malware then collects information about the user's channels, such as the name, number of subscribers, and creation date, as well as whether it is monetized, an official artist channel, and if the name has been verified, and sends it to a remote server. Another noteworthy feature of YTStealer is its use of the open-source Chacal "anti-VM framework" to prevent debugging and memory analysis. This article continues to discuss findings surrounding the YTStealer malware.

    THN reports "New YTStealer Malware Aims to Hijack Accounts of YouTube Content Creators"

  • news

    Visible to the public "Amazon Quietly Patches 'High Severity' Android Photos App Vulnerability"

    Researchers at cybersecurity firm Checkmarx alerted Amazon about a high severity vulnerability affecting the Amazon Photos Android app in December. The app contained a flaw that allowed attackers to steal a user's Amazon access token, which is required for authentication across several Amazon Application Programming Interfaces (APIs). These APIs contain personal information such as names, emails, addresses, and more. Some would grant a hacker complete access to a user's files, such as the Amazon Drive API. Before a patch for the vulnerability was made available on December 18 for the Amazon Photos Android app, it had been downloaded more than 50 million times. The team discovered a number of issues with the app's various components, finding that if a malicious app had been installed, an Android user's Amazon access token could have been taken, leaving them open to ransomware or worse. With a stolen access token, an attacker could change files while erasing user history, making it impossible to restore the original content from file history. This article continues to discuss the potential exploitation and impact of the high severity vulnerability found in the Amazon Photos Android app.

    The Record reports "Amazon Quietly Patches 'High Severity' Android Photos App Vulnerability"

  • news

    Visible to the public "CISA-Funded Project Enables Students With Disabilities to Learn Cybersecurity"

    Cybersecurity workforce development organization CYBER.ORG recently announced the launch of Project Access, a national effort to provide cybersecurity education to blind and visually impaired students. The new project is funded by the Cybersecurity and Infrastructure Security Agency's Cybersecurity Education and Training Assistance Program (CETAP) grant and will include a series of summer camps meant to introduce students aged 13 to 21 to key cybersecurity topics and help them develop skills that will allow them to pursue potential careers in the industry. The program was first tried out in 2017 in collaboration with Virginia's Department for the Blind and Vision Impaired (DBVI) to create a cybersecurity curriculum for the blind and vision impaired. Ninety-four percent of the students participating in Virginia's DBVI programming have shown interest in pursuing cybersecurity education and careers. It was noted that nonvisual techniques will be used with students with no prior computer or technology experience, while those with secondary disabilities will have access to hands-on learning opportunities and STEM career exploration.

    SecurityWeek reports: "CISA-Funded Project Enables Students With Disabilities to Learn Cybersecurity"

  • news

    Visible to the public "Tencent Acknowledges Using Poisoned QR Code on QQ Chat Platform Attack"

    Chinese Internet company Tencent has confirmed a significant account hijacking attack on its messaging and social networking platform QQ. A number of QQ users claimed that their login credentials were no longer giving them access to their accounts. Tencent refers to this issue as "stolen" accounts. Tencent claims that the problem started when scammers uploaded QR codes offering gaming logins. After scanning the codes, users were given the option to verify using their QQ login information. The malicious actors hijacked and recorded the login behavior, which was later used by the criminals to send "bad picture ads." This also resulted in users getting locked out of their accounts. China is likely interested in Tencent and whoever created the malicious QR codes, given that the country recently made it clear that it wants its digital titans to take their responsibilities to the country seriously. If it is found that Tencent did not offer sufficient protection to prevent this issue, it might receive a "rectification notice." This article continues to discuss the poisoned QR code attack on the QQ chat platform.

    CyberIntelMag reports "Tencent Acknowledges Using Poisoned QR Code on QQ Chat Platform Attack"

  • news

    Visible to the public "'Raccoon Stealer' Scurries Back on the Scene After Hiatus"

    Three months after ceasing operations due to the death of its lead developer in Ukraine, the creators of "Raccoon Stealer," one of the most prolific information stealers of 2021, have launched a new and enhanced version of the malware. Researchers from the French cybersecurity company Sekoia have reported discovering live servers hosting Raccoon Stealer files earlier this month while looking for indications of the malware. The malware's creators had been selling the new version via their Telegram channel at least since May 17. According to Sekoia, the malware and administrative interface for Raccoon Stealer were completely rewritten by the malware's creators. The effectiveness and performance of the stealer appear to have been their main goals. The new Raccoon Stealer is fundamentally still a traditional information stealer, with a stronger emphasis on cryptocurrency wallets. It was made to steal information from most modern browsers, including passwords, cookies, credit card data, and autofill forms. Electrum, Exodus, MetaMask, and Coinomi are just a few of the desktop cryptocurrency wallets that the malware targets. Sekoia discovered that Raccoon Stealer V2 also included features for exfiltrating files from compromised computers, installing additional software on the systems, taking screenshots, logging keystrokes, and more. In a report summarizing its investigation last week, Sekoia noted that the malware employs almost no defense evasion tactics, such as anti-analysis or obfuscation. However, the researchers warned that those features will likely be added in the near future. This article continues to discuss the new and improved version of the Raccoon Stealer malware.

    Dark Reading reports "'Raccoon Stealer' Scurries Back on the Scene After Hiatus"

  • news

    Visible to the public "Bringing Ransomware Infrastructure Into the Light"

    Researchers at Cisco Talos uncovered previously unknown infrastructure operated by several ransomware groups, including DarkAngels, Snatch, and Quantum, using various methods and some helpful mistakes by the operators themselves. Ransomware groups typically hide their infrastructure on sites on the dark web accessible via TOR. Their goal is to keep their activities hidden from law enforcement and security researchers who want to expose them. Many groups use this method for both communication and payment sites, as well as a blog/leak site where they publish stolen data and the names of victims. Cisco Talos researchers used different techniques to correlate ransomware groups' hidden infrastructure with sites visible on the public Internet, such as matching TLS certificates used on TOR hidden services with those used on public sites. The researchers explain that a significant part of operating on the dark web is to maintain anonymity, so certificates providing identity attestation can help identify the operator behind a website. The ransomware group may be using an SSL/TLS site on the dark web to give their victims the impression that they are operating in a secure environment and that their operation is legitimate. The researchers successfully applied this method to Dark Angels, a ransomware group that has been identified as a rebranding of the Babuk ransomware group. They operate similarly to other groups in that they have established a blog website as a TOR hidden service with a countdown timer to the publication of victim data, as well as links for victims to use to enter a chat room with DarkAngels affiliates to negotiate ransom payments. The researchers discovered, using Shodan, that the DarkAngels operators used the same self-signed certificate that they use for their dark web site for a public site hosted in Singapore. That public site contains all of the same information as the hidden site, and the researchers were also able to identify some database information and a login portal for DarkAngels operators. This article continues to discuss the discovery of several ransomware groups' previously unknown infrastructure.

    Decipher reports "Bringing Ransomware Infrastructure Into the Light"

  • news

    Visible to the public "New Bumblebee Malware Loader Increasingly Adopted by Cyber Threat Groups"

    Bumblebee, a recently discovered malware loader, has been linked to several prominent ransomware groups as a key component of numerous cyberattacks. According to the Symantec Threat Hunter Team, the tool has links to threat groups such as Conti, Quantum, and Mountlocker. Findings indicate that the Bumblebee loader may have been used as a replacement for Trickbot and BazarLoader because of the overlap in recent activity involving Bumblebee and older attacks linked to these loaders. This implies that it was created by well-known actors, and the change to Bumblebee was pre-planned. One attack singled out by the team stemming from Quantum ransomware detailed how the Bumblebee loader is put into practice. The infection began with the use of a spear-phishing email with an ISO file attached. The malicious file in question contained a Bumblebee DLL file and an LNK file, which was then loaded by rundll32.exe. The Bumblebee loader then contacted a command-and-control (C2) server and created a duplicate file with a randomized name within the APPData folder. In addition, a Virtual Basic Script (VBS) file was created in the same location. The loader then established a scheduled task to run the VBS file every 15 minutes. After a few hours, the loader dropped a Cobalt Strike payload. This action resulted in two additional outcomes: the injection of a Metasploit DLL into a legitimate Windows process and the use of an AdFind tool to collect system information such as domain users and group permissions for the system. After this task was completed, Bumblebee unloaded the Quantum ransomware, allowing the ransomware group to encrypt files on the targeted system. Quantum was then able to scrape the system for user information using Windows Management Instrumentation (WMI) once inside. The ransomware payload also disabled any malware detection processes. This article continues to discuss findings surrounding the new Bumblebee malware loader and Bumblebee's connection to previous attacks.

    TechRepublic reports "New Bumblebee Malware Loader Increasingly Adopted by Cyber Threat Groups"

  • news

    Visible to the public "Researchers Uncover ZuoRAT Malware Targeting Home-Office Routers"

    Security Researchers at Black Lotus Labs discovered a new remote access trojan (RAT) called ZuoRAT, which targets remote workers via their small office/home office (SOHO) devices, including models from ASUS, Cisco, DrayTek, and NETGEAR. The researchers noted that ZuoRAT is part of a complex campaign that went undetected for nearly two years. The tactics, techniques, and procedures (TTPs) that analysts observed bear the markings of what is likely a nation-state threat actor. ZuoRAT is a multi-stage RAT developed for SOHO routers leveraging know vulnerabilities. In a recent campaign, ZuoRAT was used to enumerate the adjacent home network, collect data in transit, and hijack home users' DNS/HTTP internet traffic. The actor was also able to remain undetected by living on devices rarely monitored and by hijacking DNS and HTTP traffic. Director of threat intelligence for Black Lotus Labs, Mark Dehus, stated that router malware campaigns pose a grave threat to organizations because routers exist outside of the conventional security perimeter and can often have weaknesses that make compromise relatively simple to achieve. The researchers noted that organizations should keep a close watch on SOHO devices. To help mitigate the threat, organizations should ensure patch planning includes routers and confirm these devices are running the latest software available.

    Help Net Security reports: "Researchers Uncover ZuoRAT Malware Targeting Home-Office Routers"

  • news

    Visible to the public "CISA Says 'PwnKit' Linux Vulnerability Exploited in Attacks"

    The US Cybersecurity and Infrastructure Security Agency (CISA) says a Linux vulnerability tracked as CVE-2021-4034 dubbed PwnKit has been exploited in attacks. The flaw came to light in January and affects Polkit, a component designed for controlling system-wide privileges in Unix-like operating systems. Polkit is developed by Red Hat, but it's also used by other Linux distributions. CISA stated that PwnKit has been described as a memory corruption issue that can be exploited for privilege escalation, and it allows any unprivileged local user to elevate permissions to root. The vulnerability has been found to impact the products of several major companies. Juniper Networks, Moxa, IBM, VMware, Siemens, and others have released advisories to describe the impact of CVE-2021-4034. CISA recently added the vulnerability to its Known Exploited Vulnerabilities Catalog and instructed federal agencies to install patches by July 18.

    SecurityWeek reports: "CISA Says 'PwnKit' Linux Vulnerability Exploited in Attacks"

  • news

    Visible to the public Cyber Scene #69 - Looking Back, and Forward

    Cyber Scene #69 -

    Looking Back, and Forward

  • news

    Visible to the public Spotlight on Lablet Research #31 - Predicting the Difficulty of Compromise through How Attackers Discover Vulnerabilities

    Spotlight on Lablet Research #31 -

    Predicting the Difficulty of Compromise through How Attackers Discover Vulnerabilities

  • news

    Visible to the public "AMD Targeted by RansomHouse, Cybercriminals Claim to Have '450 GB' in Stolen Data"

    The extortion group RansomHouse claims to have data stolen from the processor designer AMD following an alleged security breach earlier this year. According to RansomHouse, the files were obtained from an intrusion into AMD's network on January 5, 2022, and that this is not data from a previous leak of AMD's intellectual property. This new group also claims it does not breach system security or create or use ransomware. Instead, it acts as a "mediator" between attackers and victims, ensuring payment for stolen data is made. RansomHouse said on its Tor-hidden website that it had 450 GB of data, but it is unclear whether the group means "gigabytes" or "gigabits." The group also posted samples of the data. RestorePrivacy, an online privacy specialist, stated in a blog post that it had examined the sample of data, which included network files, system information, and AMD passwords gathered in the alleged breach. RansomHouse group claims AMD used simple passwords to protect its network. RansomHouse is relatively new to the cybercrime scene, first appearing in December 2021. According to RestorePrivacy, the Saskatchewan Liquor and Gaming Authority (SLGA) was RansomHouse's first victim. The group lists a total of six victims, including ShopRite, a large African retail chain. Malwarebytes Labs threat intelligence researchers categorize RansomHouse as "grey hats" - black hat hackers with the potential to do good or white hats who take a step into the dark side while keeping one foot in the light. This article continues to discuss findings regarding RansomHouse and its alleged targeting of AMD.

    The Register reports "AMD Targeted by RansomHouse, Cybercriminals Claim to Have '450 GB' in Stolen Data"

  • news

    Visible to the public "97% Of UK Business Leaders Expect Quantum Computing to Disrupt Their Sectors"

    Security researchers at EY disocvered that nearly all (97%) of the executives surveyed expect quantum computing to disrupt their sectors to a high or moderate extent. Moreover, approximately half (48%) believe that quantum computing will reach sufficient maturity to play a significant role in the activities of most companies in their respective sectors by 2025. The researchers noted that only one-third (33%) of the organizations have started strategic planning to prepare for the technology's commercialization. Also, only 24% have organized pilot teams to explore its potential or are currently working to do so. Harvey Lewis stated that if the current trends persist, "quantum computing is likely to cause disruption sooner than many people think." During the study, the researchers also found that 72% of technology, media, and telecommunications (TMT) respondents say future cryptography-related tasks are their top priority for using quantum computing and related technologies. More than half (56%) of advanced manufacturing firms have begun strategic planning to prepare for quantum computing. The researchers also found that nearly all organizations surveyed (97%) intend to conduct strategic planning in relation to the use of quantum computing within the next five years. The researchers stated that quantum computing technology is "maturing fast," and UK organizations "need to get ready."

    Infosecurity reports: "97% Of UK Business Leaders Expect Quantum Computing to Disrupt Their Sectors"

  • news

    Visible to the public "Carnival Cruises Fined $5 Million for Cybersecurity Failures"

    Carnival Cruise Lines will have to pay more than $6.25 million to settle two lawsuits brought by 46 states in the U.S. after a series of cyberattacks allowed hackers to access private information about customers and workers. In 2019 the first breach happened as a result of a phishing email or password spray attack. In April 2020, the company disclosed that hackers had not only encrypted some of its data but had also downloaded thousands of people's names and addresses, Social Security numbers, driver's license, and passport numbers, as well as their health and financial information, in almost every state in the U.S. Between August 2020 and March 2021, there were three more breaches, two of which used ransomware and the other one involved phishing. As part of the settlement, Carnival agreed to create training requirements for employees, conduct phishing-focused exercises, and use multifactor authentication (MFA) for remote access to corporate email. Carnival is going to employ secure password storage systems, strong, complex passwords, and password rotating. Carnival will also be implementing third-party security evaluations and advanced behavior analytics tools to log and watch for potential security incidents on the Carnival network.

    iTech Post reports: "Carnival Cruises Fined $5 Million for Cybersecurity Failures"

  • news

    Visible to the public "Over 900,000 Kubernetes Instances Found Exposed Online"

    Over 900,000 misconfigured Kubernetes clusters were discovered to be vulnerable to potentially malicious scans on the Internet, with some even vulnerable to data-exposing cyberattacks. Kubernetes is an open-source container orchestration system with a uniform API interface for hosting online services and managing containerized workloads. Remote actors may be able to access internal resources and private assets that were not intended to be made public if Kubernetes is not properly configured. Furthermore, depending on the configuration, intruders may be able to escalate their privileges from containers in order to break isolation and pivot to host processes, granting them initial access to internal corporate networks for future attacks. Cyble researchers used similar scanning tools and search queries to those used by malicious actors to locate exposed Kubernetes instances across the Internet. The results revealed 900,000 Kubernetes servers, with 65 percent (585,000) located in the US, 14 percent in China, 9 percent in Germany, and 6 percent each in the Netherlands and Ireland. The most exposed TCP ports among the exposed servers were "443" with over a million instances, "10250" with 231, and "6443" with 84,400 results. The researchers emphasized that not all of these exposed clusters can be exploited, and even among those that can, the level of risk varies depending on the individual configuration. This article continues to discuss the exposure of over 900,000 misconfigured Kubernetes clusters on the Internet.

    Bleeping Computer reports "Over 900,000 Kubernetes Instances Found Exposed Online"

  • news

    Visible to the public "LockBit 3.0 Ransomware Emerges With Bug Bounty Program"

    The LockBit 3.0 ransomware operation has recently launched, and the gang is starting a bug bounty program offering up to $1 million for vulnerabilities and various other types of information. LockBit has been around since 2019. The LockBit 2.0 ransomware-as-a-service operation emerged in June 2021. Researchers stated that it has been one of the most active ransomware operations, accounting for nearly half of all ransomware attacks in 2022, with more than 800 victims being named on the LockBit 2.0 leak website. With the launch of LockBit 3.0, it seems the gang is reinvesting some of the profit in their own security via a "bug bounty program." Similar to how legitimate companies reward researchers to help them improve their security, LockBit operators claim they are prepared to pay out between $1,000 and $1 million to security researchers and ethical or unethical hackers. Rewards can be earned for website vulnerabilities, flaws in the ransomware encryption process, vulnerabilities in the Tox messaging app, and vulnerabilities exposing their Tor infrastructure.

    SecurityWeek reports: "LockBit 3.0 Ransomware Emerges With Bug Bounty Program"

  • news

    Visible to the public "Threat Actors Increasingly Use Third Parties to Run Their Scams"

    Abnormal Security discovered that in January 2022, the number of business email compromise (BEC) attacks impersonating external third parties surpassed those impersonating internal employees for the first time and has continued to exceed traditional internal impersonations each month since. The researchers noted that in May 2022, external, third-party impersonation made up 52% of all BEC attacks seen by Abnormal, while internal impersonation fell to 48% of all attacks. Just one year prior, internal impersonation accounted for 60% of all attacks, marking a 30% year-over-year increase in third-party impersonation. The researchers stated that financial supply chain compromise is a subset of business email compromise in which cybercriminals take advantage of known or unknown third-party relationships to launch sophisticated attacks. The attackers' goal is to use the legitimacy of the vendor name to trick an unsuspecting employee into paying a fraudulent invoice, changing billing account details, or providing insight into other customers to target. The researchers noted that these tactics are increasingly dangerous, with one attack stopped by Abnormal requesting $2.1 million for a fake invoice. According to the FBI, business email compromise has exposed organizations to $43 billion in losses over the past six years, and real losses continue to grow year over year, making up 35% of all losses to cybercrime in 2021 alone.

    Help Net Security reports: "Threat Actors Increasingly Use Third Parties to Run Their Scams"

  • news

    Visible to the public "CISA Alerts Healthcare Sector to OFFIS DCMTK Cybersecurity Vulnerabilities"

    High-severity cybersecurity flaws discovered in OFFIS DCMTK software could lead to Remote Code Execution (RCE) if exploited, according to a recent advisory released by the US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA). OFFIS advised all users to upgrade to version 3.6.7 or later as soon as possible. DCMTK is made up of libraries and applications that process Digital Imaging and Communications in Medicine (DICOM) files. It includes software for inspecting, constructing, and converting DICOM image files, as well as handling offline media and sending and receiving images over a network connection. It is used by hospitals and businesses globally for various purposes, including product testing and as a building block for research projects, prototypes, and commercial products. According to CISA, an attacker who successfully exploits the vulnerabilities could cause a Denial-of-Service (DoS) condition, write malformed DICOM files into arbitrary directories, and gain RCE. This article continues to discuss the potential exploitation and impact of the vulnerabilities found in OFFIS DCMTK software.

    HealthITSecurity reports "CISA Alerts Healthcare Sector to OFFIS DCMTK Cybersecurity Vulnerabilities"

  • news

    Visible to the public "APT Hackers Targeting Industrial Control Systems with ShadowPad Backdoor"

    An attack campaign targeting unpatched Microsoft Exchange Servers as an initial access vector to launch the ShadowPad malware is targeting entities in Afghanistan, Malaysia, and Pakistan. This activity has been attributed to a previously unknown Chinese-speaking threat actor. Organizations in the telecommunications, manufacturing, and transportation sectors are among the targets. During the initial attacks, the group used an MS Exchange vulnerability to deploy ShadowPad malware and infiltrate one of the victims' building automation systems. By gaining control of those systems, the attacker gains access to other, more sensitive systems within the attacked organization. ShadowPad, the successor to PlugX that debuted in 2015, is a privately sold modular malware platform that has been used by numerous Chinese espionage actors over the years. Although its design allows users to remotely deploy additional plugins that can extend ShadowPad's functionality beyond covert data collection, the malware's anti-forensic and anti-analysis techniques are what make it dangerous. This article continues to discuss the ShadowPad backdoor being used in the targeting of ICS.

    THN reports "APT Hackers Targeting Industrial Control Systems with ShadowPad Backdoor"

  • news

    Visible to the public "Android Malware Called 'Revive' Poses as 2FA App For Spain's BBVA Bank"

    A new Android banking malware called Revive impersonates the two-factor authentication (2FA) application required to access BBVA bank accounts in Spain. Rather than infecting customers of various financial institutions, this Trojan has a more focused strategy that targets the BBVA bank. Despite being in its early stages of development, Revive is already capable of performing sophisticated tasks such as intercepting 2FA codes and one-time passwords. To resume itself after being terminated, the malware uses a function with the same name. According to Cleafy's experts, the new malware targets potential victims via phishing attacks and convinces them to download an application that purports to be a 2FA tool required for improved bank account security. When Revive is installed, it requests permission to use the Accessibility Service, which grants it full access to the screen as well as the ability to tap the screen and navigate. Users are asked to enable access to SMS and phone calls when they use the app for the first time, which seems typical for a 2FA service. Following that, Revive operates in the background as a simple keylogger, capturing whatever the user enters on the device and routinely transferring it to the command-and-control (C2) server. This article continues to discuss the Revive malware posing as a 2FA app for BBVA bank accounts.

    CyberIntelMag reports "Android Malware Called 'Revive' Poses as 2FA App For Spain's BBVA Bank"

  • news

    Visible to the public "New Vulnerability Database Catalogs Cloud Security Issues"

    Because of the lack of a Common Vulnerability Enumeration (CVE) program, such as the one maintained by MITRE for publicly disclosed software security issues, organizations have traditionally struggled to track vulnerabilities in public cloud platforms and services. Therefore, a new community-based database has been launched to begin addressing that issue by providing a central repository of information about known cloud service provider security issues and the steps organizations can take to mitigate them. The database, cloudvulndb.org, was created by Wiz security researchers who have long argued for the need of a public list of vulnerabilities in systems and services used by companies like AWS, Microsoft, and Google. About 70 cloud security flaws and vulnerabilities, which the security researcher Scott Piper had previously assembled in a GitHub document titled "Cloud Service Provider security blunders," are already listed in the database. Anyone can suggest new issues to include on the website or brand-new solutions to problems already present. The objective is to compile a list of problems that a cloud service provider may have already solved. The centralized database enables businesses to review all previous security concerns with their cloud service provider at any time and determine whether the required corrective measures have been taken. The vulnerability database website currently does not have a mechanism in place to alert users immediately whenever new security flaws are added to it. One of the people responsible for maintaining the new database explains that the plan is to include an RSS feed or mailing list for that reason. This article continues to discuss the new community website for reporting and tracking security issues in cloud platforms and services.

    Dark Reading reports "New Vulnerability Database Catalogs Cloud Security Issues"

  • news

    Visible to the public "Project Improves Cybersecurity of Global Ship-Tracking System"

    Cybersecurity advancements made by the Georgia Tech Research Institute (GTRI) in collaboration with the US Navy could soon help strengthen protection for the Automated Identification System (AIS), which is used to track and identify commercial and military ships all over the world. AIS uses signals from transponders on ships to assist captains in avoiding collisions when the vessels are outside of busy ports. Since AIS is based on an open standard developed many years ago, the US Navy's Battlespace Awareness and Information Operations Program Office recognized that the system needed to be hardened to help address current cybersecurity conditions and expectations. GTRI researchers were initially asked to assess the system's potential vulnerabilities and then develop Bifrost, an add-on software system that works with AIS to filter messages from ships, protect against potentially malicious messaging, and provide critical alerts to ship captains. The Navy's Battlespace Awareness and Information Operations Program Office has received the Bifrost system, which is now being evaluated as a step toward potential deployment. The goal of AIS is to avoid collisions and enable everyone to work together to contribute information about where their ship is and which way it is heading so that everyone can predict where it will be, explained Shelby Allen, the project's lead GTRI research scientist. Trusting the information provided is critical to ensuring the safety of global maritime traffic. Along with GPS, AIS is critical to how forces operate across the seas. Due to the critical nature of the communications, the Bifrost system was designed to extract useful information from ship transmissions even if they do not meet all of the protocol specifications. Bifrost can detect deliberate misinformation, such as location updates that suggest speeds that vessels cannot achieve. Aside from cybersecurity hardening, Bifrost improves how the system handles emergency alerts, which may not be visible enough in the original AIS interface. This article continues to discuss the development, capabilities, and goals of GTRI's Bifrost system.

    GTRI reports "Project Improves Cybersecurity of Global Ship-Tracking System"

  • news

    Visible to the public "NIST Releases New Guidance and Resources on macOS Security"

    The National Institute of Standards and Technology (NIST) has published the final version of Special Publication (SP) 800-219, called "Automated Secure Configuration Guidance from the macOS Security Compliance Project (mSCP)." This document delves into mSCP resources that system administrators, security professionals, security policy authors, information security officers, and auditors can use to automate the security and assessment of macOS desktop and laptop systems. In addition, this publication introduces the mSCP, describes use cases for leveraging the mSCP content, and outlines the resources available on the project's GitHub site. The GitHub site offers practical and actionable advice in the form of secure baselines and associated rules, and it is constantly curated and updated to support each new macOS release. This article continues to discuss NIST's final version of SP 800-219 on macOS security.

    NIST reports "NIST Releases New Guidance and Resources on macOS Security"

  • news

    Visible to the public "Cyberattack Hits Lithuania After Sanctions Feud With Russia"

    On Monday, a cyberattack temporarily knocked out public and private websites in Lithuania, with a pro-Moscow hacker group reportedly claiming responsibility. A distributed-denial-of-service (DDOS) attack targeted a secure national data network. The State Tax Inspectorate and Migration Department were also among the public agencies forced to suspend online services for several hours. Services were restored later the same day. The incident came a week after Russian officials threatened to retaliate because Lithuania restricted the transit of steel and ferrous metals under EU sanctions. Local authorities in Lithuania had warned that cyberattacks were likely to follow. The ministry did not name the hackers, but a Baltic News Service said the pro-Kremlin group "Killnet" had claimed responsibility for the attack.

    Associated Press reports: "Cyberattack Hits Lithuania After Sanctions Feud With Russia"

  • news

    Visible to the public "House Passes ICS Cybersecurity Training Bill"

    The US House of Representatives has recently passed a new cybersecurity bill named the "Industrial Control Systems Cybersecurity Training Act. Specifically, the Industrial Control Systems Cybersecurity Training Act would amend the Homeland Security Act of 2002 to authorize the Cybersecurity and Infrastructure Security Agency (CISA) to establish a cybersecurity training initiative focusing on industrial control systems (ICS). The new act aims to provide the IT workforce with free ICS security training. This includes virtual and in-person training and courses that would be available at different skill levels to help participants develop and strengthen their skills. The courses will cover ICS cyber defense strategies, and they will be available to both government agencies and private sector entities. If the new bill becomes law, the House and the Senate will receive yearly reports describing the courses and participants. The reports will also include information on the plans to expand access to the training and recommendations for strengthening the state of ICS education and training. The bill was introduced after the US government issued a warning in April over a Russia-linked piece of malware named Incontroller/Pipedream that is designed to manipulate and disrupt industrial processes in energy facilities by targeting ICS.

    SecurityWeek reports: "House Passes ICS Cybersecurity Training Bill"

  • news

    Visible to the public "Wichita State Researchers Aim to Educate, Protect Refugees From Cyber-Scams"

    Dr. Mythili Menon, assistant professor of English and linguistics and director of linguistics at Wichita State University (WSU), was recently awarded $296,470 as part of the National Science Foundation's Early-concept Grants for Exploratory Research (EAGER) program to study refugees' responses to phishing and vishing attempts. EAGER provides exploratory funding for high-risk, high-reward research into the nation's pressing issues. Phishing or vishing can have serious consequences for anyone, but it can be especially devastating for refugees who may not understand the legal and justice systems in the US. The project titled "Enabling Interdisciplinary Collaboration: Studying Social Engineering Attacks Targeting Vulnerable Refugee Populations" or, as Menon has dubbed it, "Cybersecurity for All," will include two parts of Wichita's refugee population: 94 Congolese refugees and 94 Afghani refugees. The research team behind this project will also work with the Wichita branch of the International Rescue Committee. Menon's research will be divided into three phases: digital literacy education for study participants, phishing simulations, and additional education based on the gaps revealed by the phishing simulations. The study's digital education component will teach small groups of refugees the fundamentals of technology, such as how to use a phone, access email, set up email, and follow cybersecurity best practices. Phase two will take place in the spring and summer of 2023, with researchers staging phishing and vishing attacks on their students to gain insight into what they do when they encounter a social engineering attack, specifically what linguistics traits they fall for and whether they fall for certain linguistic patterns or keywords. The study participants will be brought back for an educational workshop at the end of the study in summer 2024, after which they will be equipped with a checklist and instructions on how to avoid falling victim to phishing or vishing attacks. This article continues to discuss the goals and support behind the Cybersecurity for All project.

    WSU reports "Wichita State Researchers Aim to Educate, Protect Refugees From Cyber-Scams"

  • news

    Visible to the public "Final Call for Views on Government App Security Proposals"

    The UK government is urging the cybersecurity industry to submit feedback on new proposals to place new security requirements on app store operators and developers. The consultation period for the plans ends at 11.45 pm BST on Wednesday, June 29, meaning industry experts have just days to submit their views before the government moves forward with the new code of practice. The proposals were published last month to provide more robust security and privacy protections for app users. The new code of practice would place numerous new requirements on app store operators and developers. This includes requiring app stores to have a vulnerability reporting process for each of their apps to ensure flaws can be found and fixed quicker. App developers and store operators would also be obliged to share more security and privacy information in an accessible way, such as explaining why an app requires access to users' contacts and location. All app stores for smartphones, game consoles, TVs, and other smart devices making apps available to UK users would be asked to commit to the new code of practice. Some companies that will be affected include Apple, Google, Amazon, Huawei, Microsoft, and Samsung.

    Infosecurity reports: "Final Call for Views on Government App Security Proposals"

  • news

    Visible to the public "Black Basta Ransomware Becomes Major Threat in Two Months"

    Security researchers have analyzed Black Basta ransomware and stated that it had become a significant new threat in just a couple of months. Evidence suggests it was still in development in February 2022 and only became operational in April 2022. Since then, the Black Basta group has claimed responsibility for 36 victims in English-speaking countries, and the number is growing. Researchers at Cybereason have recently reported that it became known in early June that the new Black Basta group has partnered with the QBot malware operation to spread their ransomware. The researchers noted that a QBot partnership is a well-worn path, with criminal groups including MegaCortex, ProLock, DoppelPaymer, Conti, and Egregor all having done the same. QBot has many built-in capabilities that are very useful for attackers. The researchers noted that Black Basta is copying the techniques of the major ransomware gangs. Its rapid rise has led to some researchers speculating that the gang might be related to Conti. The researchers noted that there are several similarities between the two operations, including the appearance of the leak Tor site, the ransom note, the payment site, and the behavior of the support team. However, Conti has denied this, saying, "BlackBasta is not conti it's... kids." Lior Div, Cybereason CEO, stated that Black Basta is likely operated by former members of the defunct Conti and REvil gangs. Like most groups operating targeted attacks, Black Basta employs the double extortion strategy. The researchers noted that it is too early to know how successful it is at gaining ransom payments, but the group has been seen demanding millions of dollars as the ransom fee.

    SecurityWeek reports: "Black Basta Ransomware Becomes Major Threat in Two Months"

  • news

    Visible to the public "Cybercriminals Use Azure Front Door in Phishing Attacks"

    Resecurity, Inc. (USA) has discovered an increase in phishing content delivered via Azure Front Door (AFD), a Microsoft cloud CDN service. In one of the malicious campaigns, the identified resources impersonated various services that appeared to be legitimately created on the "azurefd.net" domain. This enables malicious actors to deceive users and spread phishing content in order to intercept credentials from business applications and e-mail accounts. The majority of phishing resources were designed to target customers of SendGrid, Docusign, and Amazon, as well as several other major Japanese and Middle Eastern online service providers and corporations. Such tactics, according to experts, demonstrate how threat actors are constantly looking to improve their tactics and procedures to avoid phishing detection using well-known cloud services. Based on the analyzed phishing templates, the attackers are most likely using an automated method to generate their phishing messages, allowing them to scale their campaigns to eventually target a larger number of customers worldwide. Resecurity cybersecurity researchers identified multiple domains used in the new wave of phishing attacks dating back to the beginning of June, some of which are difficult to distinguish from legitimate correspondence because of their naming and reference to Azure Front Door. This article continues to discuss cybercriminals' use of AFD in the performance of phishing attacks.

    Help Net Security reports "Cybercriminals Use Azure Front Door in Phishing Attacks"

  • news

    Visible to the public "FTC Takes Action Against CafePress Over Massive Data Breach, Cover-Up"

    The Federal Trade Commission (FTC) recently announced that it has finalized an order against CafePress, requiring it to improve its security posture following a cybersecurity incident that the company attempted to cover up. CafePress is an online retailer of products such as T-shirts, bags, calendars, and mugs, which users can customize with their own graphics designs or texts. It also allows users to have virtual shops on the platform. The data breach occurred in 2019 and impacted 23 million accounts. Despite repeated attempts to get the company to take proper action, CafePress failed to secure its systems and decided not to inform impacted customers about this and other cybersecurity incidents. A complaint was filed against former CafePress owner Residual Pumpkin Entity, LLC, and against the current owner, PlanetArt, LLC. The complaint claims that CafePress retained user data longer than needed, stored Social Security numbers in plaintext, failed to secure its systems against known threats, and covered up the 2019 data breach. The FTC is now requiring Residual Pumpkin and PlanetArt to improve their security practices through the adoption of multi-factor authentication, to minimize the amount of collected data, and to store Social Security numbers encrypted. The two companies will now need to implement a comprehensive information security program within 60 days. Additionally, both companies are now required to have their information security programs assessed by a third party and to provide the FTC with a copy of the assessment that can be publicly shared. FTC also ordered Residual Pumpkin to pay $500,000 that will be sent as relief to the victims of the data breach and asked PlanetArt to notify consumers whose personal information was compromised. The two companies are now required to provide the FTC with an annual certification from a senior corporate manager, detailing both their compliance with the order and a description of any cyber incident that might have occurred during the certified period.

    SecurityWeek reports: "FTC Takes Action Against CafePress Over Massive Data Breach, Cover-Up"

  • news

    Visible to the public "Clever Phishing Method Bypasses MFA Using Microsoft WebView2 Apps"

    A new phishing method uses Microsoft Edge WebView2 applications to steal authentication cookies from victims, enabling threat actors to log into stolen accounts, bypassing multi-factor authentication (MFA). Stolen login credentials are widely available due to a large number of data breaches, Remote Access Trojan (RAT) attacks, and phishing campaigns. However, it is becoming more difficult to utilize these stolen credentials due to the growing use of MFA, unless the threat actor also has access to the target's one-time MFA passcodes or security keys. Threat actors and researchers have developed new strategies for getting around MFA, including using reverse proxies, zero-day vulnerabilities in websites, and methods such as the Browser in the Browser attack and using Virtual Network Computing (VNC) to show remote browsers locally. A new phishing technique developed by a cybersecurity researcher makes use of Microsoft Edge WebView2 applications to quickly and easily steal a user's authentication cookies and log into compromised accounts, even if they are protected by MFA. This new social engineering attack, called WebView2-Cookie-Stealer, involves a WebView2 executable that opens up a legitimate website's login form inside the application when launched. This article continues to discuss findings regarding the new WebView2-Cookie-Stealer social engineering attack.

    Bleeping Computer reports "Clever Phishing Method Bypasses MFA Using Microsoft WebView2 Apps"

  • news

    Visible to the public "Iran’s Steel Industry Hit by Cyberattack as Tensions With Israel Rise"

    The Iranian steel industry has been targeted in a significant cyberattack with hackers claiming to have taken over the systems of three state-owned enterprises. The Khuzestan Steel Company announced that it has shut down its factory until further notice due to technical problems brought on by a cyber intrusion. The Israel-linked hacking group, Gonjeshke Darande, which previously launched cyberattacks on Iranian infrastructure, posted a video on Twitter stating that it had hacked Khuzestan and two other steel businesses - the Moborakeh Steel Company and the Hormozgan Steel Company. The video appears to showcase footage of the hacker group allegedly seizing control of equipment inside one of the plants. Additionally, Gonjeshke Darande shared screenshots that appeared to be taken from within the computer systems of the businesses it had hacked. This article continues to discuss the cyberattack on the Khuzestan Steel Company, the group claiming to be behind the attack, the reason behind this attack, and the targeting of Iranian infrastructure in the cyberwar with Israel.

    TechMonitor reports "Iran's Steel Industry Hit by Cyberattack as Tensions With Israel Rise"

  • news

    Visible to the public "Python Packages For PyPI Were Found Emailing Unprotected Websites Using Stolen AWS Keys"

    Many malicious Python programs have been discovered in the PyPI repository, which steal sensitive data such as AWS credentials and send it to publicly accessible locations. Software developers can select the building blocks for their Python-based applications or share their work with the community through PyPI, an open-source package repository. PyPI usually responds quickly to reports of malicious packages on the platform, but because there is no actual filtering before submission, dangerous packages may remain on the platform for some time. Sonatype, a software supply-chain security firm, was able to identify packages as dangerous in this instance using sophisticated automated malware detection methods. These packages include loglib-modules, pyg-modules, pygrata, pygrata-utils, and hkg-sol-utils. All five packages share code connections or similarities, even if the first two attempt to imitate reputable and well-known projects on PyPI in order to trick unsuspecting or inexperienced users into installing them. The programs "loglib-modules" and "pygrata-utils," according to Sonatype analysts J. Cardona and C. Fernandez, were designed to steal environment variables, AWS login credentials, and network interface data. This article continues to discuss the discovery of malicious Python programs in the PyPI repository.

    CyberIntelMag reports "Python Packages For PyPI Were Found Emailing Unprotected Websites Using Stolen AWS Keys"

  • news

    Visible to the public "ShiftLeft Finds a 97 Percent Reduction in Open-Source Software Vulnerabilities"

    ShiftLeft recently reported AppSec news, revealing a 97 percent reduction in open-source software (OSS) vulnerabilities, based on millions of scans of its customers. According to the researchers, by identifying and prioritizing attackable OSS vulnerabilities, AppSec teams and developers can now fix what matters, ship code faster, and improve security with fewer and better fixes. ShiftLeft's report also said focusing on attackability and reducing false positives increases the speed at which developers carry out fixes and reduces mean-time-to-remediate (MTTR). ShiftLeft reported a 37 percent year-over-year reduction in MTTR, improving overall security posture and reducing the likelihood of attacks by reducing the time vulnerabilities are exposed. Rapid scans, according to the report, now allow security teams to scan more frequently, improving security by allowing better coverage of very large applications that previously required hours or days to scan. This article continues to discuss key findings from ShiftLeft's report on application security.

    SC Media reports "ShiftLeft Finds a 97 Percent Reduction in Open-Source Software Vulnerabilities"

  • news

    Visible to the public "Project Will Make sel4 Cyber Security Technology Usable in More Complex Computer Systems"

    The British government will provide support to UNSW Sydney researchers in the improvement of their world-leading cybersecurity technology aimed at protecting critical computer systems against cyberattacks. The UK's National Cyber Security Centre (NCSC) will fund UNSW Engineering's Trustworthy Systems research group to accelerate the development of its seL4 microkernel technology, the world's most advanced cybersecurity technology. According to Scientia Professor Gernot Heiser, leader of the Trustworthy Systems team that invented the technology, the NCSC has been evaluating seL4 for some time and is currently collaborating with defense industry partners to deploy it in real-world computer systems. The seL4 technology is already in use by the UK government and other countries, in addition to many civilian applications. When built into the core of a computer's operating system, Trustworthy Systems' pioneering seL4 technology provides bullet-proof isolation between computer programs, preventing an affected component from compromising others. The Trustworthy Systems group is also conducting research in collaboration with the United Arab Emirates and the Swiss technology company Neutrality, among others, to deploy the seL4 microkernel in mobile phones, drones, Internet of Things (IoT) devices, and more. This article continues to discuss the support and continued efforts behind the seL4 microkernel technology.

    UNSW Sydney reports "Project Will Make sel4 Cyber Security Technology Usable in More Complex Computer Systems"

  • news

    Visible to the public "Professor Receives Grant as Part of $14 Million Industry Collaboration to Improve Secure Communications"

    The Intelligence Advanced Research Projects Activity (IARPA) has awarded a $14 million contract to fund a collaborative project between BAE Systems and a team of researchers at Virginia Tech in order to meet the growing demand for secure communications research and development. The award aims to create tools for deciphering an ever-increasing number of radio frequency signals to quickly and accurately help secure mission-critical information. The Virginia Tech team will provide expertise in Machine Learning (ML)-based strategies for radio frequency anomaly detection. The team will focus on reservoir computing, a type of computing used to predict a network's activity and occupancy based on observations of a small sample piece of that network. When it comes to secure communications, looking at a small section to predict activity on a larger scale is especially important because analyzing the entire network in a time-sensitive situation would be nearly impossible. As information travels quickly, threats can cause widespread damage in seconds. It is critical to be able to identify a threat as soon as possible in order to prevent damage on a large scale. Signal characterization will also be used by the team to identify the types of signals being sent within the secure communications network. The hope is that the technology developed using these prediction and characterization techniques will improve situational awareness, help target threats, and secure communications against malicious attacks. BAE Systems will provide suggestions and guidance to the team on setting up the experiment. This assistance includes providing a baseline of simulated data before moving on to actual hardware testbed data. The advanced defense technology company will then collaborate with the Virginia Tech team to review the success of the proposed candidate technologies, including how well they work to analyze anomalies and threats, and provide suggestions and feedback based on those test runs. This article continues to discuss the collaborative project aimed at improving secure communications.

    Virginia Tech reports "Professor Receives Grant as Part of $14 Million Industry Collaboration to Improve Secure Communications"

  • news

    Visible to the public "Researchers: Oracle Took 6 Months to Patch 'Mega' Vulnerability Affecting Many Systems"

    Security researchers PeterJson of VNG Corporation and Nguyen Jang of VNPT have published technical details on a critical Fusion Middleware vulnerability that Oracle took six months to patch. Tracked as CVE-2022-21445 (CVSS score of 9.8), the vulnerability is described as a deserialization of untrusted data, which could be exploited to achieve arbitrary code execution. The researchers noted that identified in the ADF Faces component, the issue can be exploited remotely, without authentication. The researchers reported the vulnerability to Oracle in October 2021, and Oracle released a fix as part of its April 2022 Critical Patch Update six months after the initial report. According to the researchers, the pre-authentication RCE issue, which they described as a "mega" vulnerability, impacts all applications that rely on ADF Faces, including Business Intelligence, Enterprise Manager, Identity Management, SOA Suite, WebCenter Portal, Application Testing Suite, and Transportation Management. The researchers also discovered CVE-2022-21497 (CVSS score of 8.1), a server-side request forgery (SSRF) vulnerability that could be chained with CVE-2022-21445 to achieve pre-authentication remote code execution in Oracle Access Manager, a component used for SSO in numerous Oracle online services. The researchers named their attack "The Miracle Exploit" and said that all of Oracle's online systems and cloud services that rely on ADF Faces are impacted. They also noted that any website that uses the ADF Faces framework is vulnerable.

    SecurityWeek reports: "Researchers: Oracle Took 6 Months to Patch 'Mega' Vulnerability Affecting Many Systems"

  • news

    Visible to the public "Teaching Physics to AI Can Allow it to Make New Discoveries All on Its Own"

    Researchers at Duke University have discovered that incorporating known physics into machine learning algorithms can help the enigmatic black boxes attain new levels of transparency and insight into the characteristics of materials. The researchers used a sophisticated machine learning algorithm in one of the first efforts of its type to identify the characteristics of a class of engineered materials known as metamaterials and to predict how they interact with electromagnetic fields. The researchers stated that the algorithm was essentially forced to show its work since it first had to take into account the known physical restrictions of the metamaterial. The researchers noted that this method enabled the algorithm to predict the properties of the metamaterial with high accuracy, more quickly, and with additional insights than earlier approaches. Willie Padilla, professor of electrical and computer engineering at Duke, stated that by incorporating known physics directly into machine learning, the algorithm can find solutions with less training data and in less time. Padilla noted that while this study was mainly a demonstration showing that the approach could recreate known solutions, it also revealed some insights into the inner workings of non-metallic metamaterials that nobody knew before. The results were published in the journal Advanced Optical Materials.

    SciTechDaily reports: "Teaching Physics to AI Can Allow it to Make New Discoveries All on Its Own"

  • news

    Visible to the public "Biden Signs Two Cybersecurity Bills Into Law"

    The Federal Rotational Cyber Workforce Program Act of 2021 and the State and Government Cybersecurity Act of 2021 were signed into law on Tuesday, June 21, 2022, by US President Joe Biden. The Federal Rotational Cyber Workforce Program Act proposes a program under which certain federal employees can be temporarily moved to other agencies in an effort to boost their skills. The State and Local Government Cybersecurity Act of 2021 is meant to improve collaboration between the Department of Homeland Security and state, local, tribal, and territorial governments. The bill requires the National Cybersecurity and Communications Integration Center (NCCIC) to coordinate with the Multi-State Information Sharing and Analysis Center (MS-ISAC) to aid state, local, tribal, and territorial government entities with cybersecurity exercises, training, education, and awareness.

    SecurityWeek reports: "Biden Signs Two Cybersecurity Bills Into Law"

  • news

    Visible to the public "Ransomware Hacker Spotted Using Zero-Day Exploit on Business Phone VoIP Device"

    A vulnerability in a Voice over Internet Protocol (VoIP) business device was used by a hacker to infect a company with ransomware. According to researchers at the security firm Crowdstrike, the hacker exploited a new vulnerability in a Linux-based VoIP appliance from the business phone provider Mitel. Because the VoIP device had few built-in security measures, the ensuing zero-day attack allowed the hacker to access the company's network through it. The goal of the attack was to effectively take control of the Linux-based VoIP equipment so that the hacker could access other areas of the network. Due to security software noticing the suspicious behavior over the victim's network, Crowdstrike was able to identify the hacker's presence. The business also informed Mitel of the previously undiscovered vulnerability, and in April, Mitel distributed a patch to affected clients. The incident highlights the mounting concern that ransomware organizations would employ zero-day vulnerabilities to target additional victims. This article continues to discuss the exploitation of a zero-day flaw in a business VoIP device to spread ransomware.

    PCMag reports "Ransomware Hacker Spotted Using Zero-Day Exploit on Business Phone VoIP Device"

  • news

    Visible to the public "Businesses Risk 'Catastrophic Financial Loss' From Cyberattacks, US Watchdog Warns"

    The Government Accountability Office (GAO) warns that private insurance companies are increasingly declining to cover damages caused by major cyberattacks, leaving American businesses vulnerable to catastrophic financial loss unless another insurance model is introduced. GAO's new report requests that the government assess whether a federal cyber insurance option is required. The report uses threat assessments from the National Security Agency (NSA), the Office of the Director of National Intelligence (ODNI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Justice (DOJ) to quantify the risk of cyberattacks on critical infrastructure, identifying vulnerable technologies that could be attacked as well as a variety of threat actors capable of exploiting them. According to an annual threat assessment by the ODNI, hacking groups linked to Russia, China, Iran, and North Korea, and certain non-state actors such as organized cybercriminal gangs, pose the greatest threat to US infrastructure. The number of cyber incidents is rapidly expanding due to the wide and increasingly skilled variety of individuals ready to target US organizations. Although federal agencies do not have a comprehensive inventory of cybersecurity incidents, there are several key federal and industry sources that show a rise in most types of cyberattacks across the US, including those impacting critical infrastructure, and increasing costs for cyberattacks. There were 26,074 incidents in 2021, with a roughly $2.6 billion total cost. This article continues to discuss the GAO's report on cyber insurance that calls for action to assess potential federal response to catastrophic cyberattacks.

    The Verge reports "Businesses Risk 'Catastrophic Financial Loss' From Cyberattacks, US Watchdog Warns"

  • news

    Visible to the public "Unsecured APIs Could Be Costing Firms $75bn Per Year"

    Security researchers at Imperva discovered that global businesses could be exposing themselves to billions in annual losses because they aren't properly securing their APIs. Imperva teamed up with the Marsh McLennan Cyber Risk Analytics Center to analyze nearly 117,000 unique cybersecurity incidents for their report, Quantifying the Cost of API Insecurity. The researchers found that vulnerable and unsecured APIs cause an estimated 7.5% of cyber events and losses globally, rising to 18-23% in the IT and information sector. Professional services (10-15%) and retail (6-12%) rounded out the top three. The researchers stated that APIs are an increasingly common feature of digital transformation projects, connecting applications, data, and experiences. The researchers estimated that around half of businesses have 50-100 APIs deployed internally or publicly, and some have thousands. The researchers warned that deploying many APIs could unwittingly expand a company's digital attack surface.

    Infosecurity reports: "Unsecured APIs Could Be Costing Firms $75bn Per Year"