News Items

  • news

    Visible to the public "How Math and Language Can Combine to Map the Globe and Create Strong Passwords, Using the Power of 3 Random Words" 

    There is an app and web-based service named What3words that provides a geographic reference for every 3-meter-by-3-meter square on Earth using three random words. For example, a square in the middle of the Rochester Institute of Technology Tigers Turf Field is coded to "brilliance.bronze.inputs." This new method of geocoding is beneficial for a number of reasons. It is more specific than normal street addresses, and three words are easier for humans to remember and communicate than extensive latitude and longitude values. As a result of these benefits, some automakers are beginning to integrate What3words into their navigation systems. While three random words are being used to map the Earth, the National Cyber Security Centre (NCSC) in the United Kingdom is recommending that they be used as passwords. Password selection and related security analyses are more difficult than connecting three words to small squares on the globe. If you string together an ordered triple of words such as "brilliancebronzeinputs," you get a long password that a human should be able to remember more easily than a random string of letters, numbers, and special characters designed to meet traditional password complexity rules. This article continues to discuss the possibility of creating strong passwords using the power of 3 random words.

    The Conversation reports "How Math and Language Can Combine to Map the Globe and Create Strong Passwords, Using the Power of 3 Random Words"

  • news

    Visible to the public  "Latin America Governments Are Prime Targets For Ransomware Due to Lack of Resources, Analysis Argues"

    Security researchers at Recorded Future's Inskit Group discovered that some Latin American countries may present as easy targets for ransomware attackers due to a general deficit of cyber resources, specifically education, hygiene, and overall infrastructure. The researchers stated that the situation in many of these countries is such that ransomware attacks on local, provincial, or federal government entities "could constitute a credible national and geopolitical security risk." The researchers stated that many of the successful breaches analyzed were due to the combination of compromised valid credential pairs and session cookies, which are harvested from a successful infostealer infection and sold by initial access brokers on the dark web forums. Anecdotal observations by the researchers reflect a "minor" but "sustained increase" in references to initial access sales and database leaks related to Latin American governments starting around March 2022. The researchers stated that they also identified a significant increase in Q1 2022, beginning in February 2022, of references to domains owned by government entities in Latin America on dark web shops and marketplaces such as Russian Market, Genesis Store, and 2easy Shop, relative to the same time period in 2021. Between January and May 2022, successful ransomware attacks were recorded in Costa Rica, Peru, Mexico, Ecuador, Brazil, and Argentina. The researchers noted that ransomware crews such as ALPHV, LockBit 2.0, and BlackByte have been active in the region.

    CyberScoop reports: "Latin America Governments Are Prime Targets For Ransomware Due to Lack of Resources, Analysis Argues"

  • news

    Visible to the public "'Taste of The Future' First Artificial Intelligence-Created Craft Beer to be Released at NOLA Brewing"

    In June, locals in New Orleans will have a chance to try the first craft beer created by an artificial intelligence (AI) platform. The beer was an experiment between The Australian Institute for Machine Learning (AIML) and Barossa Valley Brewing (BVB), founded by D'Silva. D'Silva stated that about 10 million people review beers every day. The researchers wanted to know what would happen if AI combed through the reviews and then manipulated the data to create a recipe. The producer would then use the recipe to create the beer. D'Silva stated that AI will make it easier for brewers to produce their products. It was noted that AI helps create the recipe, but the beer is still brewed manually. The researchers stated that AI will not replace the jobs of brewers. The AI beer will only be available in New Orleans for a limited time.

    WGNO reports: "'Taste of The Future' First Artificial Intelligence-Created Craft Beer to be Released at NOLA Brewing"

  • news

    Visible to the public "Jury Convicts Seattle Woman in Massive Capital One Hack"

    Recently a federal jury convicted a former Seattle tech worker of several charges related to a massive hack of Capital One bank and other companies in 2019. Paige Thompson, 36, a former Amazon software engineer who used the online handle "erratic," obtained the personal information of more than 100 million people during a data breach that prompted Capital One to reach a tentative $190 million settlement with affected customers. The Treasury Department also fined the company $80 million for failing to protect the data. Paige was found guilty of wire fraud, unauthorized access to a protected computer, and damaging a protected computer. Federal prosecutors said she didn't just steal the data but also planted software on servers she unlawfully accessed to steal computing power to mine cryptocurrency. Federal prosecutors also stated that she exploited mistakes to steal valuable data and sought to enrich herself. Wire fraud is punishable by up to 20 years in prison, while the other charges can bring a five-year maximum.

    SecurityWeek reports: "Jury Convicts Seattle Woman in Massive Capital One Hack"

  • news

    Visible to the public "QNAP Customers Hit by Double Ransomware Blitz"

    Customers of a popular network-attached storage (NAS) vendor appear to be caught in the middle of two ransomware campaigns. Taiwanese manufacturer QNAP released an advisory late last week warning of a critical threat from the DeadBolt variant, which it said appeared to be targeting users running outdated versions of QTS 4.x. The company stated to secure your NAS, they strongly recommend updating QTS or QuTS hero to the latest version immediately. The company noted that if your NAS has already been compromised, take the screenshot of the ransom note to keep the bitcoin address, then upgrade to the latest firmware version, and the built-in Malware Remover application will automatically quarantine the ransom note which hijacks the login page. Security researchers at G Data Malware have warned of a resurgent eCh0raix campaign targeting the same devices. The ransomware, also known as QNAPCrypt, is currently only being detected by 28 out of 58 vendors. This is not the first time that both variants have targeted QNAP devices. In May, the vendor warned that devices using weak passwords or outdated QTS firmware may be susceptible to attack. To avoid being compromised, the company advised customers to use stronger passwords for admin accounts, enable IP access protection to mitigate the risk of brute force attacks, avoid using ports 443 and 8080, and update QTS and all associated apps to the latest versions. In the same month, QNAP issued a separate advisory warning of an earlier DeadBolt campaign. DeadBolt also struck in January this year. Bud Broomhead, CEO at Viakoo, explained that around 10 out of CISA's 700+ listed known exploited vulnerabilities affect QNAP. Broomhead stated that QNAP devices are very attractive to cybercriminals whose strategy is to ask a large number of victims for a small amount of money, as opposed to a few victims being asked for large amounts. Broomhead noted that the $900 asked for as a ransom is at a level where many operators of the devices will choose to pay rather than get their IT or security teams involved.

    Infosecurity reports: "QNAP Customers Hit by Double Ransomware Blitz"

  • news

    Visible to the public "Governance Gap Raises AI Security Concerns"

    Security researchers at Juniper Networks conducted a new study and found that cybersecurity is now viewed as the most critical factor in AI adoption, but governance needs to catch up with the potential risks associated with the technology. The researchers polled 700 AI managers in global companies during their new study. The researchers found that 63% of respondents believe they are "most of the way" to their planned AI adoption goals. A majority of respondents argued that when AI doesn't receive appropriate oversight, then "accelerated hacking," terrorism (55%), and privacy (55%) emerge as the most significant risks to organizations. Nearly all of the participants (95%) agreed that in order to minimize potential negative impacts, companies must have policies in place for AI governance and compliance. Unfortunately, many are falling behind, just 9% saying their AI governance is mature. In recent years, many European governments have stepped in to regulate data collection, storage, and usage, spurring organizations to take a more proactive approach to internal AI governance. The researchers stated that as a result, organizations are starting to develop comprehensive AI and data governance policies to protect against financial and reputational loss. The researchers believe that as AI use grows, we will see more being done to effectively govern and secure it.

    Infosecurity reports: "Governance Gap Raises AI Security Concerns"

  • news

    Visible to the public "Breach at Eye Care Software Vendor Hits Millions of Patients"

    The personal information of millions of individuals may have been stolen by adversaries due to a data breach at Eye Care Leaders. The Durham, North Carolina-based company, which sells eye care management software solutions, claims to work with more than 9,000 ophthalmologists and optometrists. At least 23 of these eye care providers have been impacted by a data breach that Eye Care Leaders disclosed in December 2021. The company took down the compromised systems within 24 hours after the breach was detected, but not before the attackers accessed databases and files containing patient records. Potentially compromised information included names, addresses, birth dates, gender, phone numbers, email addresses, driver's license numbers, health insurance information, medical record numbers, Social Security numbers, and eye care-related medical information. During the forensic investigation, it was revealed that the databases and files compromised as part of the incident did not include credit card or financial information. Approximately 2.2 million patients were potentially compromised in the Eye Care Leaders data breach. However, given the large number of customers the vendor claims to have, the number of impacted individuals could be much higher.

    SecurityWeek reports: "Breach at Eye Care Software Vendor Hits Millions of Patients"

  • news

    Visible to the public "GTRI 'Hacks' Solutions for Pressing Cybersecurity Challenges"

    Since spring 2021, the Georgia Tech Research Institute's (GTRI) Cybersecurity, Information Protection, and Hardware Evaluation Research (CIPHER) Laboratory has competed in Capture-The-Flags (CTFs) and hackathon events, winning monetary awards and prestige. For example, GTRI won $10,000 and placed second in the US Navy's HACKtheMACHINE event in March 2021, where participants attempted to hack commercial maritime electronics meant for laboratory use to assess their vulnerabilities. Although the terms "hackathons" and "CTFs" are frequently used interchangeably, CTFs are team-based competitions where participants apply cybersecurity tools and techniques to locate clues or flags. The team that finds the most hints or flags hidden in purposely vulnerable programs or websites wins. Meanwhile, hackathons are events in which developers, designers, and even non-technical individuals work together to develop new programs and technologies, and they do not always entail vulnerability identification. The majority of hackathons and CTFs are available to all students, researchers, and professionals worldwide. This article continues to discuss GTRI's participation in CTFs and hackathon events, as well as how such events help strengthen the cybersecurity field.

    GTRI reports "GTRI 'Hacks' Solutions for Pressing Cybersecurity Challenges"

  • news

    Visible to the public "Chicago Expands and Activates Quantum Network, Taking Steps Toward a Secure Quantum Internet"

    Scientists with the Chicago Quantum Exchange (CQE) at the University of Chicago's Pritzker School of Molecular Engineering have announced that they have connected the city of Chicago and suburban labs with a quantum network for the first time, almost doubling the length of what was one of the longest in the US. The Chicago network will be open to academia and industry soon, becoming one of the nation's first publicly available testbeds for quantum security technology. Currently, the network is actively operating quantum security protocols through the use of Toshiba technology, distributing quantum keys over fiber optic cable at a speed of more than 80,000 quantum bits per second between Chicago and the western suburbs. Toshiba's involvement in the initiative elevates the Chicago network to a one-of-a-kind collaboration involving academia, government, and industry. Researchers will use the Chicago network to test new communication devices, security protocols, and algorithms that will eventually connect distant quantum computers throughout the country and the world. The effort is the next step toward a national quantum internet, which will have far-reaching effects on communications, computation, and national security. This article continues to discuss the Chicago quantum network, how it makes an advancement towards a secure national quantum Internet, and how the rise of quantum computers presents a significant opportunity and threat.

    UChicago reports "Chicago Expands and Activates Quantum Network, Taking Steps Toward a Secure Quantum Internet"

  • news

    Visible to the public "Staffing Firm Robert Half Says Hackers Targeted Over 1,000 Customer Accounts"

    HR consulting firm Robert Half has recently revealed their customer's personal and financial information might have been compromised after hackers targeted their RobertHalf.com accounts. During an investigation, it was found that threat actors targeted Robert Half between April 26 and May 16. The incident, discovered on May 31, impacted 1,058 individuals. Upon detection, the company required customers to reset their account passwords and took steps to strengthen authentication controls for the website. The targeted accounts store information such as name, address, social security number, and wage and tax information. The company noted that bank account numbers for direct deposits are stored in these accounts, but only the last four digits are visible. The company stated they do not have evidence that this information was actually accessed or downloaded, but they wanted to inform their customers about this incident. The company noted that the incident appears to involve credential stuffing, where attackers take usernames and passwords stolen in previous data breaches and attempt to use those credentials to access accounts on other online services where the victim may have used the same username and password combination.

    SecurityWeek reports: "Staffing Firm Robert Half Says Hackers Targeted Over 1,000 Customer Accounts"

  • news

    Visible to the public  "Which Stolen Data Are Ransomware Gangs Most Likely to Disclose?"

    Security researchers at Rapid7 wanted to answer a research question they had which is "if your organization gets hit by a ransomware gang that has also managed to steal company data before hitting the encrypt button, which types of data are more likely to end up being disclosed as you debate internally on whether you should pay the ransomware gang off?" The researchers analyzed 161 data disclosures performed by ransomware gangs using the double extortion approach between April 2020 and February 2022. They found that the most commonly leaked data is financial (63%), followed by customer/patient data (48%). The researchers also found that files containing intellectual property (e.g., trade secrets, research data, etc.) are rarely disclosed (12%) by ransomware gangs, but if the organization is part of the pharmaceutical industry, the risk of IP data being disclosed is considerably higher (43%). The researchers noted that this is likely due to the high value placed on research and development within this industry. The researchers said that the data most disclosed depends on what sector is breached. The researchers found that victims in the financial services sector should mainly worry about customer data being released. It happened in 82% of the analyzed cases, while the average percentage for all disclosures across all sectors is 41%. The researchers noted that stolen employee PII and HR data, as well as finance and accounting data, are also leaked often (59% and 50%, respectively). The researchers stated that victims in the healthcare sector have their finance and accounting data leaked in 71% of cases and their customer and patient data leaked in 66% of cases. The researchers noted that organizations in the pharma sector should worry especially about their IP being released, as well as their finance and accounting data (71%). The researchers advise companies to make backups and ensure the data in them can be quickly restored. The researchers also noted that organizations should counter the data disclosure threat by using file encryption, rendering any files unreadable to unauthorized eyes, and to minimize attackers' movements via network segmentation.

    Help Net Security reports: "Which Stolen Data Are Ransomware Gangs Most Likely to Disclose?"

  • news

    Visible to the public "Law Enforcement Dismantle Infrastructure of Russian 'RSOCKS' Botnet"

    The United States recently announced in a report about the takedown of a botnet operated by Russian cybercriminals that ensnared millions of devices worldwide. The botnet was dubbed "RSOCKS." The botnet initially targeted Internet of Things (IoT) devices, including industrial control systems, routers, content streaming devices, and various smart devices, but later expanded to compromising Android devices and conventional computers as well. It was stated that the purpose of the botnet was to abuse the IP addresses of the compromised devices to reroute internet traffic for paying customers, thus allowing them to hide their real IPs. It was noted that legitimate proxy services lease IP addresses from ISPs and then provide those IPs to their customers for a fee. The RSOCKS botnet offered access to the IP addresses of hacked devices without the permission or the knowledge of the owners. The report stated that individuals could access a web-based "storefront" where they could rent access to proxies for a specific time period. The RSOCKS botnet's operators asked for $30 per day for access to 2,000 proxies, but the price could go up to $200 per day for access to 90,000 proxies. Following the purchase, the customer was provided with a list of IP addresses and ports for the botnet's backend servers and could start routing their internet traffic through the compromised devices. The report claimed that customers of proxy servers such as the RSOCKS botnet were likely launching large scale phishing campaigns and credential stuffing attacks against authentication services and were hiding their real IPs when accessing compromised social media accounts. To identify the RSOCKS botnet's infrastructure, FBI investigators made undercover purchases. In early 2017, the FBI identified roughly 325,000 hacked victim devices, which were compromised via brute force attacks. The investigation also revealed that, in addition to home businesses and individuals, the RSOCKS botnet had compromised large public and private entities, including a hotel, a university, an electronics manufacturer, and a television studio. The DoJ announced that US authorities worked together with law enforcement in Germany, the Netherlands, and the United Kingdom to take down the botnet's infrastructure.

    SecurityWeek reports: "Law Enforcement Dismantle Infrastructure of Russian 'RSOCKS' Botnet"

  • news

    Visible to the public "NakedPages Phishing Toolkit is Now Available on Cybercrime Forums"

    Cybersecurity researchers at CloudSEK have discovered a new sophisticated phishing toolkit for sale across several cybercrime forums and Telegram channels. The researchers dubbed the toolkit "NakedPages." The toolkit was developed using NodeJS Framework, runs JavaScript code, is fully automated, and comes preloaded with over 50 phishing templates and site projects. One post on the cybercrime forum, viewed by the researchers, stated, "NakedPages is the phishing tool any serious developer/spammer needs with more features than any other reverse proxy combined or PHP phishing framework combined." The researchers stated that NakedPages is designed to work on Linux and asks for read, write, and execute permissions from the 'user' and further requests for read and execute permissions from both 'group' and 'others' in order to work. The toolkit also reportedly features fully-integrated and battle-based anti-bot functionalities, capable of detecting bots of different types from over 120 countries. Regarding the threat actor behind the new phishing toolkit, the researchers stated that it is a new user on GitHub and the cybercrime forum, with both accounts being less than a month old.

    Infosecurity reports: "NakedPages Phishing Toolkit is Now Available on Cybercrime Forums"

  • news

    Visible to the public "Cybersecurity Researchers Find Several Google Play Store Apps Stealing Users Data"

    In May, cybersecurity researchers from Dr. Web discovered several apps on the Google Play Store with built-in adware and information-stealing malware. The researchers noted that the most dangerous of these apps are spyware tools capable of stealing information from other apps' notifications, mainly to capture one-time two-factor authentication (2FA), one-time passwords (OTP), and take over accounts. Most apps containing the allegedly malicious code had been removed by the Play Store, but several remain online. One is PIP Pic Camera Photo Editor, a malicious app with over a million downloads that reportedly steals people's Facebook credentials. Other malicious apps spotted by the researchers (including those that are no longer online) are Wild & Exotic Animal Wallpaper, an adware app that changed its name to SIM Tool Kit after installation that currently has 500,000 downloads, and Magnifier Flashlight, an adware app with 10,000 downloads. The researchers also discovered ZodiHoroscope, a Facebook credential-stealing app. The researchers stated that while apps stealing apps' notifications content had overall decreased in May, the activity of advertising trojans had increased throughout the month. The researchers noted that in May, Android.Spy.4498, which steals information from other apps' notifications, was again the most common mobile threat. Advertisement trojans from the Android.HiddenAds family also remained among the most widespread Android threats.

    Infosecurity reports: "Cybersecurity Researchers Find Several Google Play Store Apps Stealing Users Data"

  • news

    Visible to the public "Severe Flaw in Anker Eufy Smart Home Hubs Makes Them Vulnerable to RCE Attacks"

    Anker's primary smart home device hub, Eufy Homebase 2, was discovered to have three flaws, one of which was a severe Remote Code Execution (RCE) vulnerability. The Homebase 2 serves as a video storage and networking gateway for all of Anker's Eufy smart home products, including video doorbells, interior security cameras, alarm systems, smart locks, and more. Homebase is a central hub for Eufy devices, connecting to the cloud to enable services such as expanded product functionality and app-based remote control. According to Cisco Talos researchers, Homebase 2 has three potentially severe vulnerabilities that could lead to privacy intrusion, service interruption, and code execution. Before the flaws were made public, Cisco Talos notified Anker of the issues, allowing them time to address them with security upgrades. Anker addressed these security issues in April 2022 with firmware versions 3.1.8.7 and 3.1.8.7h. However, most Homebase 2 devices that have not had their firmware updated since purchase are still vulnerable to the exploitation of the discovered flaws. This article continues to discuss the potential exploitation and impact of the three security flaws found in the Eufy Homebase 2 smart home device hub.

    CyberIntelMag reports "Severe Flaw in Anker Eufy Smart Home Hubs Makes Them Vulnerable to RCE Attacks"

  • news

    Visible to the public "Internet Explorer Now Retired but Still an Attacker Target"

    On June 15, Microsoft officially ended support for the Internet Explorer (IE) 11 desktop application, putting an end to a browser that has been around for nearly 27 years. However, IE will continue to be a tempting target for attackers because some organizations are still using it despite Microsoft's long-known plans to deprecate the technology. Meanwhile, Microsoft has kept the MSHTML (aka Trident) IE browser engine in Windows 11 until 2029, allowing enterprises to run in IE mode while transitioning to the Microsoft Edge browser. IE is not dead yet, and neither are the threats to it. On Windows 10, Microsoft Edge has officially replaced the IE 11 desktop app, but as the MSHTML engine remains a part of the Windows operating system until 2029, enterprises are vulnerable to browser engine vulnerabilities even if they no longer use IE. According to Maddie Stone, a security researcher at Google's Project Zero bug-hunting team, IE has contained a number of zero-day vulnerabilities in recent years, despite its decreasing use. For example, the Project Zero team monitored four zero-days in IE last year, the most since 2016, when the same number of zero-days were detected in the browser. Three of the four zero-day vulnerabilities discovered last year (CVE-2021-26411, CVE-2021-33742, and CVE-2021-40444) targeted MSHTML and were attacked via techniques other than the Web. This article continues to discuss why IE is still an attractive target for attackers.

    Dark Reading reports "Internet Explorer Now Retired but Still an Attacker Target"

  • news

    Visible to the public "Over a Million WordPress Sites Forcibly Updated to Patch a Critical Plugin Vulnerability"

    WordPress websites that use the popular Ninja Forms plugin have been automatically updated to address a severe security vulnerability suspected of being actively abused in the wild. The problem, which involves a case of code injection, is rated 9.8 out of 10 in terms of severity and impacts various versions beginning with 3.0. Ninja Forms is a contact form builder with more than 1 million installs. The problem allowed unauthenticated attackers to call a limited number of methods in different Ninja Forms classes, including a method that unserialized user-supplied material, resulting in Object Injection. This could enable attackers to execute arbitrary code or delete arbitrary files on sites with a separate property-oriented programming chain, according to Wordfence's Chloe Chamberland. This article continues to discuss the potential exploitation and impact of the critical plugin vulnerability.

    THN reports "Over a Million WordPress Sites Forcibly Updated to Patch a Critical Plugin Vulnerability"

  • news

    Visible to the public "MaliBot Malware Bypasses Multi-Factor Authentication to Steal Your Passwords"

    Cybersecurity researchers at F5 Labs have detailed a newly discovered form of Android malware dubbed MaliBot, which is capable of stealing passwords, bank details, and cryptocurrency wallets from users. MaliBot can also access text messages, steal web browser cookies, and take screen captures from infected Android devices. In addition, MaliBot can bypass Multi-Factor Authentication (MFA). MaliBot, like many other Android malware threats, spreads by sending phishing messages to users' phones via SMS text messages or luring them to fake websites. Victims are enticed to click on a link that downloads the malware on their phone in both cases. So far, researchers have discovered two malicious websites used to distribute MaliBot, one of which is a spoof of a legitimate cryptocurrency-tracking app with over a million downloads on the Google Play Store. MaliBot asks the victim for access and launcher permissions after being downloaded in order to monitor the device and perform malicious operations. This article continues to discuss the delivery and capabilities of the MaliBot Android malware, and how users can avoid falling victim to this malware or other Android malware attacks.

    ZDNet reports "MaliBot Malware Bypasses Multi-Factor Authentication to Steal Your Passwords"

  • news

    Visible to the public "Sensitive Proprietary Patterns Discovered in Data Mining Given Privacy Boost"

    Researchers at Chongqing University have boosted the privacy and protection of proprietary or other sensitive information during data mining without compromising the ability to discover useful patterns in huge datasets. Data mining is the discovery of patterns in enormous sets of data and the sharing of that information for useful purposes, which often involves Machine Learning (ML). Oftentimes, data mining hits a roadblock when such data patterns are proprietary, undermine privacy, or compromise security. However, such data sharing or publication pushes further discovery of useful patterns that benefit the owners of those datasets and society at large. This article continues to discuss the importance of data mining and the technique developed by the researchers to support association rule mining on published datasets while providing privacy for certain rules.

    SCIENMAG reports "Sensitive Proprietary Patterns Discovered in Data Mining Given Privacy Boost"

  • news

    Visible to the public "Engineers Develop Cybersecurity Tools to Protect Solar, Wind Power on the Grid"

    Engineers at Iowa State University are working on a project aimed at securing renewable energy sources from cyberattacks. Solar panels and wind turbines, which are expected to generate 44 percent of America's electricity by 2050, pose a cybersecurity risk. They have sensors, controllers, actuators, or inverters connected to the Internet, either directly or indirectly. Many have insecure connections to legacy electric grid systems. Therefore, cybersecurity systems are needed to prevent, detect, and mitigate attacks on renewable sources sending power to the grid. The team of researchers is developing those cybersecurity systems as part of a $12 million, six-project effort by the US Department of Energy (DOE). With a three-year, $2 million grant, the energy department is supporting the Iowa State-led effort. Through the project, dubbed "GridDeep," the researchers will explore, build, and demonstrate a physics-based system that uses Artificial Intelligence (AI) tools to strengthen the cybersecurity of the country's energy delivery systems. Next-generation, AI-integrated cyber-physical security technology and tools developed as part of the project can help ensure that energy delivery systems are designed, installed, operated, and maintained to quickly recover from cyberattacks. As those energy delivery systems continue to grow in complexity, AI technology will help electricity producers better understand their systems, quickly respond to attacks, and restore critical functions. This article continues to discuss the goals and support of the GridDeep project.

    ISU reports "Engineers Develop Cybersecurity Tools to Protect Solar, Wind Power on the Grid"

  • news

    Visible to the public "66% of Organizations Store 21%-60% of Their Sensitive Data in The Cloud"

    Security researchers 451 Research found that 45% of businesses have experienced a cloud-based data breach or failed audit in the past 12 months, up 5% from the previous year, raising even greater concerns regarding protecting sensitive data from cybercriminals. The researchers noted that globally, cloud adoption and notably multicloud adoption remain on the rise. In 2021, organizations worldwide were using an average amount of 110 software as a service (SaaS) applications, compared with just eight in 2015, showcasing a startlingly rapid increase. The researchers stated that with increasing complexity of multicloud environments comes an even greater need for robust cybersecurity. When asked what percentage of their sensitive data is stored in the cloud, 66% of participants said between 21-60%. However, only 25% said they could fully classify all data. Additionally, 32% of respondents admitted having to issue a breach notification to a government agency, customer, partner, or employees. The respondents also reported an increasing prevalence of cyberattacks, with 26% citing an increase in malware, 25% in ransomware, and 19% reporting seeing an increase in phishing. The researchers stated that these findings should be a cause for concern among enterprises with sensitive data, particularly in highly regulated industries.

    Help Net Security reports: "66% of Organizations Store 21%-60% of Their Sensitive Data in The Cloud"

  • news

    Visible to the public "Global Police Arrest Thousands in Fraud Crackdown"

    Interpol has recently announced a successful two-month anti-fraud operation that saw thousands of suspects arrested and tens of millions of dollars intercepted. Operation First Light 2022 took place in March-May this year, with 76 countries participating in the crackdown on email and phone-based fraud. During the operation, police raided 1770 locations, including call centers used in phone scams, and arrested at least 2000 "operators" and suspected fraudsters and money launderers. Police also identified 3000 suspects, froze 4000 bank accounts, and intercepted $50m in illicit funds. According to the FBI, romance scams and email-based fraud were among the key cybercrime types police focused on. Among the successes was the arrest of eight individuals in Singapore on suspicion of running a Ponzi scheme. The police also arrested a Chinese national wanted in connection with a Ponzi scheme that defrauded 24,000 victims out of EU34m ($35m). Separately, Singapore police rescued a teenage victim who had been tricked into pretending to be kidnapped. The victim sent videos of himself with fake wounds to his parents in a bid to elicit a EU1.5m ($1.6m) ransom.

    Infosecurity reports: "Global Police Arrest Thousands in Fraud Crackdown"

  • news

    Visible to the public "Corporate Network Access Selling for Under $1000 on Dark Web"

    According to researchers at Kaspersky, specialist hackers are selling access to enterprise networks for under $1000, thanks partly to a cybercrime underground flooded with compromised credentials. The researchers stated that the average cost for access to a large company's systems sits between $2000 and $4000. However, this can vary significantly depending on the target organization's revenue, sector, region, and type of access offered. Across the 200 dark web posts the researchers analyzed, 43% offered access for under $1000, with just 17% charging more than $5000. The researchers noted that the vast majority (75%) of posts were selling various types of RDP access. According to the researchers, the top three methods of gaining initial access to corporate networks are vulnerability exploitation, phishing, and obtaining legitimate credentials via stealer logs and password mining.

    Infosecurity reports: "Corporate Network Access Selling for Under $1000 on Dark Web"

  • news

    Visible to the public "Email Threats Still Managing to Evade Defenses"

    According to a new study conducted by Cyren, enterprise email perimeter protections are often ineffective in blocking well-crafted email attacks. In one month, an average of 75 malicious messages per 100 mailboxes pass through email security filters such as Microsoft 365 Defender, meaning a company with 5,000 mailboxes would need to detect and respond to 3,750 harmful inbox threats per month. Most of these threats are phishing emails with URLs to site content intended to steal login credentials, personal information, or payment information. These are frequently the precursors to other types of attacks, such as ransomware. More than half of all reported phishing, imposter, and malware email attacks impacted more than one user. However, two-thirds of email attacks were delivered to one to ten users, indicating that the attacks were targeted. Such targeted or one-of-a-kind email attacks are more difficult to detect. The most common method used by attackers to avoid detection is to send emails from well-known webmail domains. These tactics account for 32 percent of all evasive techniques deployed. This article continues to discuss key findings from Cyren's research on business email perimeter defenses and phishing attacks.

    BetaNews reports "Email Threats Still Managing to Evade Defenses"

  • news

    Visible to the public "Sophisticated Android Spyware 'Hermit' Used by Governments"

    Security researchers at Lookout have analyzed a sophisticated Android spyware family that appears to have been created to serve nation-state customers. The spyware was dubbed Hermit and appears to be the first publicly identified mobile spyware developed by Italian vendor RCS Lab S.p.A. and Tykelab Srl, which claims to be a telecommunications solutions company, but which is likely a front company. Tykelab appears closely connected to RCS Lab, with its employees claiming on LinkedIn to be working at both companies. Active for three decades, RCS Lab appears to operate in the same market as Pegasus developer NSO Group and FinFisher creator Gamma Group. The researchers stated that the government of Kazakhstan currently uses Hermit to target entities within the country and has found evidence that Hermit was previously used by Italian authorities in 2019 and by an unknown actor in a predominantly Kurdish region of Syria. The researchers believe that the Android surveillanceware is being distributed via SMS messages that claim to come from legitimate sources. An iOS version of the threat also exists, but the researchers were unable to obtain a sample. The researchers stated that the spyware supports 25 modules, each with unique capabilities, to exploit rooted devices, make and redirect calls, record audio and take screenshots, and collect call logs, contacts, messages, browser data, photos, device location, and more. The researchers say they retrieved and analyzed 16 of these modules. The researchers noted that Hermit's modular design also allows it to hide its malicious intent through packages that are downloaded when needed. The initial application functions as a framework with minimal surveillance capability but can fetch modules and activate their functionality as instructed. One researcher stated that this approach "ensures that automated analysis of the app cannot find any of the spying functionality and makes even manual analysis significantly harder."

    SecurityWeek reports: "Sophisticated Android Spyware 'Hermit' Used by Governments"

  • news

    Visible to the public "Elasticsearch Server With No Password or Encryption Leaks a Million Records"

    Researchers at the security product recommendation service Safety Detectives reported discovering data on nearly a million customers exposed on an Elasticsearch server run by the Malaysian point-of-sale (POS) software vendor StoreHub. According to Safety Detectives, the StoreHub server stored unencrypted data and was not password protected. Therefore, the security researchers were able to infiltrate and access 1.7 billion records totaling more than a terabyte, describing the affairs of almost a million people. Safety Detectives noted that the exposed data included full names, phone numbers, physical addresses, email addresses, and device types. Customers' orders, as well as the locations from which they ordered and the times at which they ordered, were all exposed. Order details were found to contain partially masked credit card information. Information pertaining to StoreHub's staff was also exposed. This article continues to discuss the exposure of data stored on StoreHub's Elasticsearch server.

    The Register reports "Elasticsearch Server With No Password or Encryption Leaks a Million Records"

  • news

    Visible to the public "Facebook Messenger Scam Duped Millions"

    Security researchers at PIXM security have analyzed a well crafted phishing message sent via Facebook Messenger that ensnared 10 million Facebook users and counting. The researchers noted that the scam is still active and continues to push victims to a fake Facebook login page where victims are enticed to submit their Facebook credentials. The phishing campaign began last year and ramped up in September. The researchers assert the campaign is tied to a single person located in Colombia. The reason PIXM believes the massive Facebook scam is tied to a single individual is because each message links back to code "signed" with a reference to a personal website. The researchers stated that the crux of the phishing campaign centers around a fake Facebook login page. It might not look immediately suspicious, as it closely copies Facebook's user interface. The researchers noted that when a victim enters their credentials and clicks "Log In," those credentials are sent to the attacker's server. Then, the threat actor would login to that account and send out the link to the user's friends via Facebook Messenger. Any friends that click the link are brought to the fake login page. If they fall for it, the credential-stealing message is forwarded to their friends. Post-credential phish, victims are redirected to pages with advertisements, which in many instances also included surveys. The researchers noted that each of these pages generates referral revenue for the attacker. The researchers stated that the adversary of this campaign managed to circumvent the social media platform's security checks by utilizing a technique that Facebook missed. When a victim clicks on a malicious link in Messenger, the browser initiates a chain of redirects. The first redirect points to a legitimate "app deployment" service. After the user has clicked, the victim will be redirected to the actual phishing page. But, in terms of what lands on Facebook, it's a link generated using a legitimate service that Facebook could not outright block without blocking legitimate apps and links as well. The researchers were able to access the hacker's own pages for tracking the campaigns. The data indicated that nearly 2.8 million people fell for the scam in 2021 and 8.5 million have so far this year. The researchers warn that as long as these domains remain undetected by using legitimate services, these phishing tactics will continue to flourish.

    Threatpost reports: "Facebook Messenger Scam Duped Millions"

  • news

    Visible to the public "This Bug in Cisco Secure Email Lets Hackers Waltz Past Security Protections"

    A vulnerability in Cisco Email Security Appliance (ESA) and Cisco Secure Email and Web Manager could enable threat actors to bypass security measures and log into endpoints with non-default configurations. According to a Cisco advisory, the company discovered the flaw when resolving a support request via Cisco TAC. While it maintains there is no indication of the bug being exploited in the wild, it has now been assigned the CVE-2022-20798 designation. A fix is already available, and users are encouraged to apply it as soon as possible. According to Cisco, it stems from endpoint authentication checks using the Lightweight Directory Access Protocol (LDAP) for external authentication. The issue only affects appliances that use external authentication and LDAP. These features, however, are disabled by default. This article continues to discuss the critical flaw found in Cisco Secure Email and Web Manager that lets attackers bypass authentication.

    TechRadar reports "This Bug in Cisco Secure Email Lets Hackers Waltz Past Security Protections"

  • news

    Visible to the public "A Microsoft Office 365 Feature Could Help Ransomware Hackers Hold Cloud Files Hostage"

    A "dangerous piece of functionality" in the Microsoft 365 suite has been uncovered that might be used by a malicious actor to hold assets stored on SharePoint and OneDrive at ransom as well as execute attacks on cloud infrastructure. According to researchers at Proofpoint, the cloud ransomware attack allows file-encrypting malware to encrypt files saved on SharePoint and OneDrive in a way that makes them unrecoverable without dedicated backups or a decryption key. In addition, the infection sequence can be carried out using a combination of Microsoft Application Programming Interfaces (APIs), command-line interface (CLI) scripts, and PowerShell scripts. The attack is based on a Microsoft 365 feature called AutoSave, which copies older file versions whenever users make changes to a file stored on OneDrive or SharePoint Online. It begins with getting unauthorized access to a target user's SharePoint Online or OneDrive account, which is then used to exfiltrate and encrypt contents. The three most popular ways for a malicious actor to gain an initial footing are to directly breach the account via phishing or brute-force attacks, trick a user into authorizing a rogue third-party OAuth application, or hijack a logged-in user's web session. This article continues to discuss how the Microsoft Office 365 feature can help cloud ransomware attacks.

    THN reports "A Microsoft Office 365 Feature Could Help Ransomware Hackers Hold Cloud Files Hostage"

  • news

    Visible to the public "Hackers Exploit Three-Year-Old Telerik Flaws to Deploy Cobalt Strike"

    A threat actor called 'Blue Mockingbird' is exploiting Telerik UI vulnerabilities to compromise servers, install Cobalt Strike beacons, and mine Monero by taking over system resources. The attacker exploited CVE-2019-18935, a critical severity (CVSS v3.1: 9.8) deserialization flaw in the Telerik UI library for ASP.NET AJAX, which leads to Remote Code Execution (RCE). Attackers must obtain the encryption keys that protect Telerik UI's serialization on the target in order to exploit CVE-2019-18935. This can be done by exploiting another vulnerability in the target web app or by utilizing CVE-2017-11317 and CVE-2017-11357. There are still valid targets available for exploitation as many web apps were projects that embedded the Telerik UI framework version available at the time of their development and then were discontinued or forgotten. Once the keys have been obtained, the attackers can compile a malicious DLL containing the deserialization code and run it in the context of the 'w3wp.exe' process. In the recent attacks, Blue Mockingbird employed a readily available proof-of-concept (PoC) exploit, which handles the encryption logic and automates the DLL compilation. This article continues to discuss findings surrounding the exploitation of Telerik UI vulnerabilities by Blue Mockingbird.

    Bleeping Computer reports "Hackers Exploit Three-Year-Old Telerik Flaws to Deploy Cobalt Strike"

  • news

    Visible to the public "Critical Citrix Bugs Impact All ADM Servers, Agents"

    Citrix is advising users of its Application Delivery Management (ADM) solutions to update their systems to protect themselves from two newly discovered vulnerabilities tracked under CVE-2022-27511 and CVE-2022-27512. The first vulnerability could allow system corruption leading to the admin password being reset after reboot, while the second bug could enable a threat actor to temporarily disrupt the ADM license service. This article continues to discuss what the exploitation of the Citrix ADM vulnerabilities could allow malicious actors to do.

    Dark Reading reports "Critical Citrix Bugs Impact All ADM Servers, Agents"

  • news

    Visible to the public "Research Team Looking to Patch Code in Embedded Systems, Aid in Cybersecurity"

    A team of researchers from Purdue University, the University of California, Santa Barbara, and Swiss Federal Institute of Technology Lausanne (EPFL) received a $3.9 million grant from the Defense Advanced Research Projects Agency (DARPA) in support of research aimed at improving the process of patching code in vulnerable embedded systems. Their project titled "Assured Micropatching" is expected to last four years. Many embedded systems, such as those found in trucks, planes, and medical devices, run old code for which the source code and original compilation toolchain are no longer available. Many of the older software components in these systems are known to be vulnerable but patching them to fix vulnerabilities is not always possible or easy. Patching a vulnerability without source code requires directly editing the binary code. Furthermore, even in a patched system, there is no guarantee that the patch will not interfere with the device's original functionality. Because of these difficulties, the researchers claim the code running in embedded systems is frequently left unpatched, even when it is known to be vulnerable. The approach proposed by the team involves defining and validating a set of properties that a patch must have to ensure it does not interfere with the device's original functionality. Their work also intends to create automatic and minimal code patching for devices vulnerable to cyberattacks. This article continues to discuss the team's project on patching code in embedded systems.

    Purdue University reports "Research Team Looking to Patch Code in Embedded Systems, Aid in Cybersecurity"

  • news

    Visible to the public "Researchers Demonstrate They Can Steal Data During Homomorphic Encryption"

    A team of researchers from North Carolina State University and Dokuz Eylul University demonstrated the first side-channel attack on homomorphic encryption, which could be used to leak data while the encryption process is in progress. They were not able to crack homomorphic encryption using mathematical tools, so they used side-channel attacks instead. They monitored power consumption in a device that is encoding data for homomorphic encryption in order to read the data as it is being encrypted, thus demonstrating that even next-generation encryption technologies are in need of protection against side-channel attacks. Their paper titled "RevEAL: Single-Trace Side-Channel Leakage of the SEAL Homomorphic Encryption Library" reveals a power-based side-channel leakage of Microsoft SEAL prior to version 3.6 that implements the Brakerski/Fan-Vercauteren (BFV) protocol. Microsoft has been a leader in homomorphic encryption, developing the SEAL Homomorphic Encryption Library to help the broader research community conduct homomorphic encryption research and development. SEAL versions 3.6 and later use a different sampling algorithm, according to the researchers, who warn that newer versions of the library may be vulnerable to another weakness. This article continues to discuss the team's demonstration of the first side-channel attack on homomorphic encryption.

    Security Boulevard reports "Researchers Demonstrate They Can Steal Data During Homomorphic Encryption"

  • news

    Visible to the public "Large Supermarket Chain in Southern Africa Hit With Ransomware"

    The Shoprite Group, one of the largest supermarket chains in Southern Africa, has been infected with ransomware. The chain recently issued a statement announcing the cyberattack for which the RansomHouse ransomware group claimed responsibility. The company, which operates over 2,943 stores in Africa and employs over 149,000 people, revealed that it became aware of a suspected data compromise affecting a specific subset of data. This data could impact some customers who engaged in money transfers to and within Eswatini, Namibia, and Zambia. Access to affected network areas has been restricted. Names and ID numbers were compromised, but no financial information or bank account numbers were affected. RansomHouse openly announced being behind the attack on the supermarket chain, claiming on Telegram that the company was storing large amounts of personal data in plain text/raw photos packed in archived files, completely unprotected. The gang released a sample of the stolen data, stating that it invited the company to negotiate a ransom. This article continues to discuss the ransomware attack on the Shoprite Group and the RansomHouse ransomware group claiming to be behind the attack.

    The Record reports "Large Supermarket Chain in Southern Africa Hit With Ransomware"

  • news

    Visible to the public "BeanVPN leaks 25 million user records"

    According to an investigation by Cybernews, free VPN software provider BeanVPN has reportedly left almost 20GB of connection logs accessible to the public. Cybernews stated that the cache of 18.5GB connection logs allegedly contained more than 25 million records, including user device and Play Service IDs, connection timestamps, IP addresses, and more. During a routine checkup, the researchers found the database using an ElasticSearch instance, which the company has reportedly closed. If picked up by malicious actors, the information could be exploited to de-anonymize and thus identify BeanVPN's users and their approximate location. The researchers stated that the Play Service ID could also be used to find out the user's email address that they are signed in to their device with. According to the BeanVPN website, its privacy policy clearly states they don't collect logs of user activity, including no logging of browsing history, traffic destination, data content, or DNS queries. The privacy policy also says BeanVPN does not collect IP addresses, outgoing VPN IP addresses, connection timestamps, or session durations. Cybernews stated that BeanVPN is not following its privacy policy since the cache the researchers discovered contained all user data BeanVPN says it does not collect.

    Infosecurity reports: "BeanVPN leaks 25 million user records"

  • news

    Visible to the public "Prolific Ransomware Affiliate Groups Deploy BlackCat"

    According to new Microsoft research, two of the most prolific affiliate threat organizations, DEV-0237 and DEV-0504, which have been linked to various ransomware families, including Hive, Conti, and Ryuk, are now using the BlackCat Ransomware-as-a-Service (RaaS). Researchers are finding it difficult to track BlackCat deployments because BlackCat relies on the RaaS affiliate model. No two BlackCat deployments will look the same, with various affiliates employing different strategies. For example, Microsoft recently observed two separate BlackCat deployments involving two initial access vectors - one using compromised credentials and the other exploiting a vulnerable Microsoft Exchange server. They also observed the use of different persistence, credential exfiltration, and lateral movement methods. This can make it difficult to identify regularly used tactics, techniques, and procedures (TTPs) for the ransomware. Nonetheless, the end result of BlackCat is the same: data is encrypted, exfiltrated, and used for double extortion. Researchers urge organizations to address common vulnerabilities such as poor credential hygiene or misconfigurations to defend against the BlackCat ransomware family. This article continues to discuss the difficulty in tracking BlackCat deployments, the most prolific affiliate threat groups now deploying BlackCat, and recently observed BlackCat incidents.

    Decipher reports "Prolific Ransomware Affiliate Groups Deploy BlackCat"

  • news

    Visible to the public "CISA, FBI, NSA Provide Tips For Countering China-Backed Cyber Threats"

    The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the Federal Bureau of Investigation (FBI) issued a joint cybersecurity advisory on protection against cyber threats backed by China. The agencies have seen People's Republic of China state-sponsored cyber actors exploiting publicly known vulnerabilities to construct a broad network of compromised infrastructure. Threat actors have targeted public and private sector institutions worldwide, launching massive campaigns that exploit common vulnerabilities and exposures (CVEs). Over the last few years, a number of high-severity network device vulnerabilities gave cybercriminals the ability to exploit and gain access to vulnerable infrastructure devices. Furthermore, cyber defenders often overlook these devices as they try to maintain and keep up with software patching of Internet-facing services and endpoint devices. The government agencies urge critical infrastructure organizations to ensure their products and systems are always patched. Organizations are also encouraged to immediately remove or isolate infected devices as well as segment networks to prevent lateral movement. This article continues to discuss key points made in the joint advisory pertaining to countering China-backed cyber threats.

    HealthITSecurity reports "CISA, FBI, NSA Provide Tips for Countering China-Backed Cyber Threats"

  • news

    Visible to the public "SAP Patches Critical NetWeaver and ABAP Platform Vulnerabilities"

    SAP, a business software and solutions provider, recently released several new security notes on its June 2022 security patch day. In particular, the document outlined ten new notes and two updated ones. One vulnerability mentioned in SAP's June notes is (CVE)-2022-27668. The company stated that the flaw is an improper access control related to the SAProuter proxy in NetWeaver and ABAP Platform and has a CVSS score of 8.6. According to SAP, depending on the configuration of the route permission table in a specific file, an unauthenticated attacker can execute SAProuter administration commands in SAP NetWeaver and ABAP Platform from a remote client. Another vulnerability noted in SAP's June notes includes a vulnerability with a 7.8 CVSS score, which refers to potential privilege escalation in SAP PowerDesigner Proxy 16.7. This vulnerability allows an attacker with low privileges and has local access with the ability to work around system's root disk access restrictions to write/create a program file on system disk root path. The company noted that the program file can then be executed with elevated privileges during application startup or reboot, potentially compromising confidentiality, integrity, and availability of the system. The other vulnerabilities mentioned in the June note are medium or low priority. The company stated that most of the vulnerabilities mentioned in its June 2022 security patch day advisory have now available fixes and advised companies to update their systems as soon as possible.

    Infosecurity reports: "SAP Patches Critical NetWeaver and ABAP Platform Vulnerabilities"

  • news

    Visible to the public "New Peer-To-Peer Botnet Panchan Infects Linux Servers With Cryptominers"

    Around March 2022, a new peer-to-peer botnet called Panchan emerged in the wild, mining cryptocurrencies on Linux computers in the education sector. Panchan is equipped with SSH worm functions such as dictionary attacks and SSH key abuse, allowing rapid lateral movement to workstations in the infiltrated network. It also offers powerful detection evasion features, such as employing memory-mapped miners and dynamically detecting process monitoring to promptly halt the mining module. According to Akamai, whose analysts discovered and studied the unique threat, the threat actor behind this new project is most likely Japanese. Panchan is written in Golang, a versatile programming language that allows for simpler targeting of various system architectures. It spreads to new hosts by discovering and exploiting existing SSH keys or brute-forcing usernames and passwords. Following success at this stage, Panchan creates a secret folder in which it hides itself under the name "xinetd." The malware then runs the binary and sends an HTTPS POST request to a Discord webhook, which is most likely used to watch the user. To maintain persistence, the malware copies itself to "/bin/systemd-worker" and establishes a new systemd service to begin after a reboot, masquerading as a normal system service. Akamai reverse-engineered the malware in order to map it and discovered 209 infected systems, 40 of which are still operational. This article continues to discuss recent findings regarding the Panchan peer-to-peer botnet and what creates ideal conditions for the botnet to expand.

    Bleeping Computer reports "New Peer-To-Peer Botnet Panchan Infects Linux Servers With Cryptominers"

  • news

    Visible to the public "Cyber Threats Target US Election Officials With Phishing Campaign"

    On March 29, the FBI issued a warning about an ongoing and extensive phishing campaign aimed at US election officials. Since October 2021, attackers have attempted to obtain officials' login credentials in at least nine states by using fake invoice inquiries and hacked email accounts. If successful, this activity could offer cybercriminals long-term undetected access to a victim's systems, according to the FBI's Private Industry Notification. On October 5, 2021, unidentified threat actors sent phishing emails to US election authorities and National Association of Secretaries of State (NASS) representatives. These emails were sent from at least two different email accounts, one of which was discovered to be a compromised email account belonging to a US government official. A malicious file called INVOICE INQUIRY.PDF was attached to the emails, directing recipients to a website that collected credentials. Similar instances occurred on October 18 and 19, allegedly using email accounts from private US businesses. These attacks targeted county election officials and personnel. The phishing emails contained Microsoft Word documents disguised as invoices, which also lured users to credential-harvesting websites. As the incidents all happened within a short period of time and used the same phishing approach, the attacks were likely launched by the same threat actor. The FBI's alert did not specify whether any systems or data were compromised as a result of these incidents, but these types of attacks are expected to continue or worsen in the lead-up to the 2022 midterm elections. This article continues to discuss the phishing attempts targeting US election officials and recommendations from the FBI on how to prevent phishing attacks.

    Security Intelligence reports "Cyber Threats Target US Election Officials With Phishing Campaign"

  • news

    Visible to the public "24+ Billion Credentials Circulating on the Dark Web in 2022 -- So Far"

    Security researchers at Digital Shadows Photon Research stated that passwordless technology might be one of the most hyped categories in cybersecurity at the moment, but the reality on the ground is that passwords are still widely entrenched and wildly insecure. The researchers recently discovered that some 24.6 billion complete sets of usernames and passwords are currently circulating in cybercriminal marketplaces as of this year. The researchers noted this number equates to four complete sets of credentials for every person on Earth and a 65% increase since the last time this study was conducted, in 2020. The researchers noted that within the data set of credentials on the Dark Web, approximately 6.7 billion of the offerings had a unique pairing of username and password, indicating that the combination was not duplicated across databases. That's 1.7 billion more than what researchers found in 2020. Many of the passwords examined in these stolen data stores were not very secure in the first place. The researchers stated that this is just one in a multitude of reasons why security advocates and technology-standards organizations have been pushing so hard for more usable passwordless technology across the globe. According to a recent Dark Reading report, only 26% of IT decision-makers said they work in a passwordless organization, and 87% admitted they had at least one credential category that still depended on passwords.

    Dark Reading reports: "24+ Billion Credentials Circulating on the Dark Web in 2022 -- So Far"

  • news

    Visible to the public "Malaysian Hacktivists Target Indian Websites as Payback"

    A hacktivist group named DragonForce Malaysia has claimed responsibility for attacking and defacing at least 70 Indian government and private sector websites. According to the Times of India, the group claims the attacks are an act of retaliation for anti-Muslim remarks made by a now-suspended spokesperson of India's ruling Bharatiya Janata Party. Operators of DragonForce Malaysia's Telegram channel posted a recruitment message for Operation Patuk or "OpsPatuk." DragonForce Malaysia made a similar announcement on Twitter, listing about 70 websites it claimed to have attacked. The alleged victims include educational institutions such as Delhi Public School and Nagpur's Institute of Science, travel and logistics companies S.M. Transport Services and R.R. Logistics, and government websites such as the Indian Embassy of Israel. This article continues to discuss the targeting of Indian Websites by Malaysian activities, alleged victims, and the Indian Computer Emergency Response Team's (CERT-In) new cybersecurity directive requiring entities to report incidents to the agency within six hours.

    DataBreachToday reports "Malaysian Hacktivists Target Indian Websites as Payback"

  • news

    Visible to the public "Critical Code Execution Vulnerability Patched in Splunk Enterprise"

    Splunk recently announced the release of out-of-band patches that address multiple vulnerabilities across Splunk Enterprise, including a critical issue that could lead to arbitrary code execution. Splunk uses Splunk Enterprise deployment servers to distribute configurations and content updates to various Enterprise instances, including forwarders, indexers, and search heads. Tracked as CVE-2022-32158 (CVSS score of 9.0), the newly addressed critical-severity vulnerability exists because Splunk Enterprise deployment servers prior to version 9.0 allow clients to leverage the server to deploy forwarder bundles to other clients. Due to this issue, an attacker could compromise a Universal Forwarder endpoint and then abuse it to execute arbitrary code on other endpoints connected to the deployment server. Splunk has resolved the issue by releasing Enterprise deployment server version 9.0 and encourages customers to update their instances to this version or higher. This week, the company also announced that it has resolved multiple high-severity bugs in Splunk Enterprise, including one where deployment servers in versions before 9.0 allow for forwarder bundles to be downloaded without authentication (CVE-2022-32157). The researchers stated that to resolve this issue, customers need to update their deployment servers to version 9.0 and then configure authentication for deployment servers and clients, which ensures that only universal forwarder versions 9.0 and later can be managed. The researchers noted that although the vulnerability does not directly affect Universal Forwarders, remediation requires updating all Universal Forwarders that the deployment server manages to version 9.0 or higher prior to enabling the remediation. Splunk noted that these vulnerabilities do not impact the Splunk Cloud Platform (SCP) because it does not offer or use deployment servers. Splunk has also resolved multiple TLS certificate validation issues, which could result in machine-in-the-middle attacks or could allow for connections from peers or nodes without valid certificates to not fail by default. Splunk stated that customers should upgrade to Splunk Enterprise version 9.0 or higher to resolve all of these flaws. Splunk says it has no evidence of these vulnerabilities being exploited in attacks.

    SecurityWeek reports: "Critical Code Execution Vulnerability Patched in Splunk Enterprise"

  • news

    Visible to the public "New 'Hertzbleed' Remote Side-Channel Attack Affects Intel, AMD Processors"

    A team of academic researchers from the University of Texas at Austin, the University of Illinois Urbana-Champaign, and the University of Washington have identified a new side-channel method that can allow hackers to remotely extract sensitive information from a targeted system through a CPU timing attack. The researchers named the attack Hertzbleed. According to the researchers, Hertzbleed shows that power side-channel attacks can be turned into remote timing attacks, allowing attackers to obtain cryptographic keys from devices powered by Intel, AMD, and possibly other processors. Hertzbleed does not require any direct power measurement and instead relies on a feature called dynamic frequency scaling, which modern processors use to reduce power consumption. The researchers noted that under certain circumstances, periodic CPU frequency adjustments depend on the current CPU power consumption, and these adjustments directly translate to execution time differences (as 1 hertz = 1 cycle per second). The researchers stated that an analysis of these time differences can allow an attacker or sometimes a remote attacker to target cryptographic software and obtain valuable cryptographic keys. The attack was demonstrated against SIKE, or Supersingular Isogeny Key Encapsulation, a post-quantum key encapsulation mechanism that is used by companies such as Microsoft and Cloudflare. The researchers noted that while Hertzbleed is not an actual vulnerability, two CVE identifiers were assigned to it: CVE-2022-23823 and CVE-2022-24436. Intel has published two advisories to inform customers about Hertzbleed attacks. The chipmaker has confirmed that all of its processors are impacted. AMD has also published an advisory for Hertzbleed. The company has listed several desktop, mobile, Chromebook, and server processors that are impacted. The researchers have notified ARM, whose products also implement frequency scaling, but the company has not provided any feedback on whether its products are affected. The researchers noted that workarounds are also available, but they can significantly impact performance.

    SecurityWeek reports: "New 'Hertzbleed' Remote Side-Channel Attack Affects Intel, AMD Processors"

  • news

    Visible to the public "BNPL Fraud Alert as Account Takeovers Surge"

    Security researchers at Imperva found that account takeover (ATO) attacks targeting the financial services sector surged 58% from April to May this year, raising fears that fraudsters are focusing more on buy now, pay later (BNPL) schemes. The researchers noted that BNPL has become increasingly popular as the cost of living has increased, enabling consumers to buy the products they want by splitting purchases into smaller, interest-free payments. The global market is predicted to be worth a staggering $4tn by 2030. However, the researchers warned that new and emerging sectors like BNPL are often favorite targets of fraudsters, as they may initially have gaps in security and regulation which can be exploited. The researchers stated that both ATO and new account fraud (NAF) could impact the BNPL sector. The researchers noted that an ATO occurs when a fraudster takes over an existing BNPL account and uses it to make unauthorized purchases. In a NAF context, fraudsters use stolen and synthetic data to create new fake BNPL accounts to make purchases.

    Infosecurity reports: "BNPL Fraud Alert as Account Takeovers Surge"

  • news

    Visible to the public "Travel-Related Cybercrime Takes Off as Industry Rebounds"

    Security researchers at Intel 471 are warning that the post-COVID upsurge in travel has painted a bullseye on the travel industry and has spurred related cybercrimes. The researchers have seen an uptick in adversaries targeting the theft of airline mileage reward points, website credentials for travel websites, and travel-related database breaches. Since January, the researchers detected multiple hacks used by cybercriminals to trade the credentials linked to travel websites. The researchers noted that the threat actors were specifically interested in "mileage rewards accounts with at least 100,000 miles." Access to these accounts allowed actors to leverage the rewards to book travel reservations for themselves and other customers. The accounts and their respective rewards points could also be resold to other actors looking to conduct similar types of travel fraud activity. The researchers have also observed an uptick in cybercriminals targeting travel-related databases, which are ripe with employee and traveler personal identifiable information (PII) that threat actors can sell for money. The researchers observed travel-related hackers leveraging a database of "40,000 people employed in Illinois". The stolen database included the PII of employees. In one instance, Intel 471 researchers observed cybercriminals use PII to create illicit travel documents used for border crossings. The researchers suggest that customers stay vigilant while making arrangements and that they should book flights from a trusted source, handle payment cautiously, and refrain from getting phished in any dubious vacation-related offers.

    Threatpost reports: "Travel-Related Cybercrime Takes Off as Industry Rebounds"

  • news

    Visible to the public "Researchers Demonstrate Two Security Methods That Efficiently Protect Analog-To-Digital Converters From Powerful Attacks"

    According to MIT researchers, analog-to-digital converters contained by smart devices, which encode real-world signals from sensors into digital values that can be processed computationally, are vulnerable to electromagnetic side-channel attacks. A hacker could measure the analog-to-digital converter's power supply current and apply Machine Learning (ML) to reconstruct output data. In two new papers, the MIT researchers show that analog-to-digital converters are also vulnerable to a stealthier type of side-channel attack, and provide methods to efficiently block both attacks. When conducting a power side-channel attack, a malicious agent typically solders a resistor onto the device's circuit board to evaluate its power usage. A noninvasive electromagnetic side-channel assault, on the other hand, uses an electromagnetic probe capable of detecting electric current without touching the device. The researchers demonstrated that an electromagnetic side-channel attack on an analog-to-digital converter was just as successful as a power side-channel attack, even when the probe was held 1 centimeter away from the chip. A hacker might use this exploit to obtain sensitive data from an implantable medical device. To prevent these attacks, the researchers randomized the ADC conversion process. This article continues to discuss the methods developed by MIT researchers to protect analog-to-digital converters in smart devices from power and electromagnetic side-channel attacks.

    MIT reports "Researchers Demonstrate Two Security Methods That Efficiently Protect Analog-To-Digital Converters From Powerful Attacks"

  • news

    Visible to the public "Cloudflare Thwarts Off Record-Breaking HTTPS DDoS Attack"

    Cloudflare has announced that it successfully mitigated a 26 million request per second (RPS) Distributed Denial-of-Service (DDoS) attack, which is the most powerful HTTPS DDoS attack to date. The attack originated from Cloud Service Providers instead of weaker Internet of Things (IoT) devices from hacked Residential Internet Service Providers, so the threat actor most likely used hijacked servers and virtual machines. According to Cloudflare, the attacker also used a small but powerful botnet composed of 5,067 machines, each capable of generating about 5,200 RPS at peak. To contrast the size of this botnet, Cloudflare has been tracking another much larger but less powerful botnet of more than 730,000 devices. The larger botnet could not generate over one million RPS. The smaller botnet was, on average, 4,000 times stronger because of its use of virtual machines and servers. This is one of many large-scale volumetric attacks detected by Cloudflare in recent years, including a brief HTTP DDoS attack in August 2021 that reached 17.2 million RPS. In April 2022, Cloudflare also repelled a 15.3 million RPS attack that used 6,000 bots to target a Cloudflare customer running a crypto launchpad. This article continues to discuss Cloudflare's recent mitigation of a record-breaking HTTPS DDoS attack, other large-scale volumetric attacks, and why HTTPS DDoS attacks are expensive.

    CyberIntelMag reports "Cloudflare Thwarts Off Record-Breaking HTTPS DDoS Attack"

  • news

    Visible to the public "Beware the 'Secret Agent' Cloud Middleware"

    If cloud services weren't complicated enough for the typical business today to properly configure and secure, there's also a lesser-known layer of middleware that cloud providers run that can harbor hidden security flaws. Researchers from Wiz.io recently unveiled an open source cloud middleware database on GitHub that details the specific middleware agents that Amazon Web Services (AWS), Google, and Microsoft install on their cloud customers' virtual machines. The researchers aim to shine a light on this traditionally hidden proprietary software layer and its potential software flaws that can leave a cloud customer unknowingly at risk of attack. The researchers stated that cloud providers often silently install these "secret agent" middleware programs on their customers' virtual machines, with the highest privileges, as a "bridge" between their cloud services and their customers' VMs. The Cloud Middleware Dataset database project aims to provide cloud customers insight into this layer of software they rarely know exists on their virtual machines in a cloud service and the potential security risks associated with it. The researchers stated that these agents are adding an additional attack surface, and cloud customers don't know about those agents. If they come pre-installed, organizations have no idea.

    Dark Reading reports: "Beware the 'Secret Agent' Cloud Middleware"

  • news

    Visible to the public "Understanding and Mitigating Single Sign-on Risk"

    On average, enterprises use almost 1,000 applications, so it's no surprise that single sign-on (SSO) has become a critical gatekeeper. It provides ease of access and can eliminate the sprawl of usernames and passwords that haunt users and frustrate administrators. Security researchers stated that while SSO is useful, it's not without inherent risk. Since it uses a one-to-many architecture, if an identity is breached, an attacker instantly gains access to all of the resources that a particular account holder is authorized to use. Security researchers recommend that combining multifactor authentication (MFA) and identity verification will help secure some of the gaps in SSO. The researchers stated that identity-proofing all employees before issuing credentials is a strong first step toward bringing SSO into the zero-trust world, which requires reauthentication when risk factors are elevated. However, to implement zero-trust access, organizations must validate a user's identity and not just require an additional authentication factor. The researchers stated that without this fundamental understanding of identity, any authentication method, including SSO, cannot be trusted. The researchers said that if an SSO implementation is still based on passwords, it's extremely important to establish a secure password reset process. The researchers noted that SSO's one-to-many architecture is both a significant advantage and a weakness. The researchers concluded that by supplementing SSO with identity verification and advanced MFA, it is possible to eliminate passwords in a safe and secure fashion.

    Dark Reading reports: "Understanding and Mitigating Single Sign-on Risk"