News Items

  • news

    Visible to the public "Over Three-Quarters of UK Adults Hit by Online Scams"

    Security researchers believe that more than 40 million UK consumers have been targeted by digital fraudsters so far in 2022, a double-digit increase from the same time last year. The researchers polled over 2000 UK adults in May, asking if they had been contacted by scammers since the start of the year. Some 14% more people than last year said they had been targeted. The most common scams involved delivery/postal services (55%), government spoofing (41%), investment fraud (29%), rebates and refunds (28%), banking (27%), online shopping (24%), healthcare (13%) and energy-related scams (13%). The researchers are urging users to think twice if presented with online offers that seem too good to be true and to take a step back if they feel rushed into making a decision, are asked for personal information, or have been told they must pay in an unusual way, such as via gift cards.

    Infosecurity reports: "Over Three-Quarters of UK Adults Hit by Online Scams"

  • news

    Visible to the public "Kennesaw State Researchers Highlight Gaps in Data Security Considerations for Brainwave Tech"

    Researchers at Kennesaw State University (KSU) are bringing attention to the importance of bolstering the cybersecurity of emerging brainwave technologies, which they say are vulnerable to hacking and data breaches. Adriane Randolph, professor of information systems at KSU, and doctoral student Rosemary Tufon wrote a research paper on security threats faced by brainwave technology. Brainwave technologies can be used with a wired cap that feeds and decodes data directly into a computer, or wirelessly by wearing sensors on the scalp and broadcasting waves that are picked up by Bluetooth and then decoded. This technology helps people whose ability to communicate is impaired by a disability. According to Randolph and Tufon, these neurophysiological tools could be more vulnerable to manipulation and the exposure of sensitive information than previously thought. Randolph says a user's identity can be correlated to their brainwave patterns when all the advances in Machine Learning (ML) and processing are overlayed. Randolph and Tufon hope their research will help encourage industries that use brainwave technology to prioritize information security. This article continues to discuss the KSU's study highlighting vulnerabilities in data security considerations regarding brainwave technology.

    KSU reports "Kennesaw State Researchers Highlight Gaps in Data Security Considerations for Brainwave Tech"

  • news

    Visible to the public "NYFD Calls for Help With Doxing"

    The New York City Fire Department (NYFD) is seeking cybersecurity consultants to assist it in preventing the doxing of its 16,000 firefighters, emergency medical technicians, and administrative support personnel. Doxing is the weaponization of an individual's personal information to punish, harass, or encourage threats. This activity is becoming a bigger problem, potentially affecting police, poll workers, school officials, and more. In a request for information (RFI), NYFD says it is looking for consultants that provide expertise and software solutions, including managed detection, response services, real-time threat mitigation, and recovery capabilities. NYFD also wants vendor, experienced in working with large organizations, that can provide protection and strategies for addressing the misuse of Personal Identifiable Information (PII). This article continues to discuss NYFD's call for cybersecurity consultants to help protect responders' PII.

    GCN reports "NYFD Calls for Help With Doxing"

  • news

    Visible to the public "Only 10% of Vulnerabilities Are Remediated Each Month"

    Security researchers from SecurityScorecard and The Cyentia Institute revealed only 60% of organizations have improved their security posture despite a 15-fold increase in cyberattacks over the last three years. The joint research sought to measure the speed of vulnerability remediation from 2019 to 2022 and revealed only modest progress in the area of vulnerability remediation. The researchers found that 53% of the 1.6 million organizations assessed had at least one exposed vulnerability to the internet, while 22% of organizations amassed more than 1,000 vulnerabilities each, confirming more progress is required to protect organizations' critical assets. The researchers also found that the financial sector had among the slowest remediation rates (median to fix 50% = 426 days), while utilities ranked among the fastest (median = 270 days). The researchers found that surprisingly, despite a 15-fold increase in exploitation activity for vulnerabilities with published exploit code, there was little evidence that organizations in this sector fixed exploited flaws faster. Regardless of how many total vulnerabilities existed across their domain(s), organizations typically fixed about 10% of weaknesses each month. The researchers stated that the information sector (62.6%) and public sector (61.6%) had the highest prevalence of open vulnerabilities. The financial sector (48.6%) exhibited the lowest proportion of open vulnerabilities.

    Help Net Security reports: "Only 10% of Vulnerabilities Are Remediated Each Month"

  • news

    Visible to the public "Syslogk Linux Malware Has a Sneaky Way of Staying Hidden"

    Syslogk is a newly discovered stealthy piece of Linux malware that delivers a backdoor, which remains hidden on the targeted machine until its controller transmits so-called 'magic packets' from anywhere on the Internet. According to Avast researchers, the Syslogk Linux rootkit distributes the Rekoobe backdoor Trojan and employs various techniques to keep the backdoor hidden until it is required. The version of Syslogk Avast analyzed was discovered to only work on older versions of the Linux kernel. However, the malware appears to be under development. Rekoobe malware has been used by APT31, also known as Zirconium, a Chinese state-sponsored threat actor. It is based on TinyShell, an open-source UNIX backdoor project. There are references in the Syslogk rootkit to TinyShell that date back to December 13, 2018. Meanwhile, Syslogk is primarily based on Adore-Ng, a Chinese open-source kernel rootkit for Linux. Syslogk adds new features to make the user-mode application and kernel rootkit more difficult to detect than Adore-Ng, which can already conceal files, processes, and the kernel module. This article continues to discuss the Avast researchers' findings surrounding the Syslogk Linux malware.

    ZDNet reports "Syslogk Linux Malware Has a Sneaky Way of Staying Hidden"

  • news

    Visible to the public "Human Error to Blame for Eight Out of 10 Data Breaches"

    According to a new CybSafe analysis of data from the UK Information Commissioner's Office (ICO), human error was responsible for 80 percent of data breaches reported in 2021. Last year, the ICO received 2,692 reports, 80 percent of which could be attributed to end-user actions. Oz Alashe, CEO of CybSafe, pointed out that human error is a major factor allowing attackers to gain access to sensitive information and encrypted channels within organizations. Cybercriminals will frequently choose the path of least resistance and exploit employee vulnerabilities. Therefore, we must shift our focus to user security behaviors within our organizations. Alashe says combatting the threat of cybersecurity breaches calls on organizations to abandon box-ticking awareness exercises in favor of addressing the human side of cybersecurity in order to achieve genuine behavioral change. An empathetic and understanding approach is more likely to achieve the desired result of increasing employees' security awareness and behavior while avoiding negative consequences. People play an important role in protecting the companies for which they work, and human cyber risk can almost always be significantly reduced by encouraging changes in employee cyber awareness, behavior, and culture. This article continues to discuss the key findings from CybSafe's analysis and the importance of increasing efforts to reduce human error.

    BetaNews reports "Human Error to Blame for Eight Out of 10 Data Breaches"

  • news

    Visible to the public "Bill Calls on FDA to Regularly Update Medical Device Security Guidelines"

    The Strengthening Cybersecurity for Medical Devices Act would require the US Food and Drug Administration (FDA) to review and update its medical device security guidelines more frequently. Senators Jacky Rosen (D-NV) and Todd Young (R-IN) introduced the bipartisan legislation, calling on the FDA to collaborate with the US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) to review industry guidance, make appropriate updates every two years, and provide the industry with new information about how to strengthen medical device cybersecurity. This information would include guidelines for identifying and addressing medical device security vulnerabilities, as well as how providers, health systems, and medical device manufacturers can effectively get assistance from CISA, the US Department of Health and Human Services (HHS), and other government entities. The bill would also require the Government Accountability Office (GAO) to produce a report that evaluates the challenges that providers, health systems, and manufacturers face in accessing federal support when addressing medical device security vulnerabilities. The GAO's report would include guidance on how federal agencies can improve coordination to improve medical device security.

    HealthITSecurity reports "Bill Calls on FDA to Regularly Update Medical Device Security Guidelines"

  • news

    Visible to the public "Iran Spear-Phishers Hijack Email Conversations in New Campaign"

    Security researchers at Check Point have uncovered a major new state-backed spear-phishing operation targeting multiple high-ranking Israeli and US officials. The researchers traced the campaign to the Iranian Phosphorus APT group. Dating back to at least December 2021, it has targeted former Israeli foreign minister and deputy Prime Minister Tzipi Livni, a former major general in the Israeli Defense Forces (IDF), and a former US ambassador to Israel. The researchers noted that other targets included a senior executive in Israel's defense industry and the chair of one of the country's leading security think tanks. The researchers stated that the methodology is fairly straightforward. The attacker compromises the inbox of a frequent contact of the target and then hijacks an existing conversation between the two. They then open a new spoofed email address impersonating the same contact, with a format resembling joe.doe.corp[@]gmail.com. The attacker then attempts to continue the conversation using this new email address, exchanging multiple messages. The researchers noted that real documents are sometimes used as part of the exchange to add legitimacy and relevance to the scam. The researchers stated that the most sophisticated part of the operation is social engineering. The attackers use real hijacked email chains, impersonations of well-known contacts of the targets, and specific lures for each target. The operation implements a highly targeted phishing chain that is specifically crafted for each target.

    Infosecurity reports: "Iran Spear-Phishers Hijack Email Conversations in New Campaign"

  • news

    Visible to the public "Conti Ransomware Develops Proof-of-Concept Code for Firmware Attacks"

    An examination of leaked Conti ransomware gang chats revealed that the cybercrime group was planning firmware attacks against the Intel Management Engine (ME). There are several implementations of the firmware, including the Intel Manageability Engine (before SkyLake), the Intel Converged Security and Management Engine (SkyLake and later), the Intel Trusted Execution Environment (Atom processors), and Server Platform Services (Server). Intel ME offers a number of features, including anti-theft protection and out-of-bound management. The compromise would allow threat actors to install a backdoor on Intel devices and execute commands without being detected by operating system-based security tools. Furthermore, the chats appear to confirm the link between the Conti ransomware gang and the Russian Foreign Service Bureau (FSB). The Conti ransomware group intended to exploit ME firmware to gain indirect access to the UEFI/BIOS, drop additional payloads, and gain runtime control of the system beneath the operating system via System Management Mode (SMM). According to the analysis, the attackers attempted to access SPI (i.e., the flash memory used by the UEFI/BIOS system firmware) from the ME to generically bypass other protection. This article continues to discuss the Conti ransomware group's developed proof-of-concept code for firmware attacks, the possible exploitation of the supply chain to deliver firmware malware, and firmware attack deployment scenarios.

    CPO Magazine reports "Conti Ransomware Develops Proof-of-Concept Code for Firmware Attacks"

  • news

    Visible to the public "Operator of 'DownThem' DDoS Service Sentenced to 24 Months in Prison"

    Recently the operator of an infamous service that allowed users to launch distributed denial-of-service (DDoS) attacks was sentenced to 24 months in prison. Matthew Gatrel, 33, of St. Charles, Illinois, was convicted in September 2021 on three counts of computer-related and wire fraud felonies. According to court documents, Gatrel owned and operated DownThem.org, a website that allowed users to purchase subscriptions to launch powerful DDoS attacks. Gatrel also owned AmpNode.com, which provided bulletproof hosting services to paying customers and facilitated server spoofing and DDoS attack amplification. Records obtained when DownThem was taken down in 2018 showed that the DDoS attack (or booting) service had roughly 2,000 users and had been used to launch over 200,000 attacks on targets such as government websites, financial institutions, schools, universities, and homes. DownThem provided customers with multiple subscription plans, differentiated in price and attack capability, some allowing users to launch several simultaneous attacks. Juan Martinez, 29, of Pasadena, a co-administrator of DownThem and co-defendant in the case, who pleaded guilty in August 2021, was sentenced to five years' probation.

    SecurityWeek reports: "Operator of 'DownThem' DDoS Service Sentenced to 24 Months in Prison"

  • news

    Visible to the public "Attack on Kaiser Permanente Exposes Data on 70,000 Customers"

    A leading US healthcare provider, Kaiser Permanente, has warned that as many as 70,000 individuals may have had personally identifiable information (PII) stolen by a malicious third party. A data breach notice sent to customers earlier this month claimed that the company discovered the unauthorized access incident on April 5. The IT team terminated the unauthorized access within hours after it began and promptly commenced an investigation to determine the scope of the incident. During the investigation, it was determined that protected health information was contained in the emails accessed by the malicious third party, and while they have no indication that the unauthorized party accessed the information, they cannot completely rule out the possibility. The protected health information potentially exposed included first and last name, medical record number, dates of service, and laboratory test result information. Kaiser Permanente noted that the information did not include sensitive information such as Social Security numbers and credit card numbers. The healthcare provider said it reset the affected employee's password and provided them with additional training to mitigate the risk of such an incident happening again.

    Infosecurity reports: "Attack on Kaiser Permanente Exposes Data on 70,000 Customers"

  • news

    Visible to the public "Hello XD Ransomware Now Drops a Backdoor While Encrypting"

    Researchers with Palo Alto Networks Unit 42 report a rise in the activity of the Hello XD ransomware, whose operators are now using an updated sample with stronger encryption. The Hello XD ransomware family, which was first observed in November 2021, was based on the leaked source code of Babuk. It was involved in a few double-extortion attacks in which threat actors stole corporate data prior to device encryption. According to a new report from the researchers, the ransomware's author has developed a new encryptor featuring custom packing for detection evasion and changes in the encryption algorithm, thus marking a major shift from the Babuk code. This also indicates the author's intention to create a new ransomware strain with unique capabilities and features for stronger attacks. This article continues to discuss the latest version of Hello XD ransomware.

    Bleeping Computer reports "Hello XD Ransomware Now Drops a Backdoor While Encrypting"

  • news

    Visible to the public "Drupal Patches 'High-Risk' Third-Party Library Flaws"

    The Drupal security team has recently released an advisory to call attention to serious vulnerabilities in a third-party library and warned that hackers can exploit the bugs to hijack Drupal-powered websites remotely. The security team stated that the vulnerabilities, tracked as CVE-2022-31042 and CVE-2022-31043, were found and fixed in Guzzle, a third-party library that Drupal uses to handle HTTP requests and responses to external services. The security team noted that the vulnerabilities do not affect Drupal core but may affect some contributed projects or custom code on Drupal sites. Guzzle has rated these vulnerabilities as high-risk. The security team recommends its users install the latest versions (Drupal 9.2 through Drupal 9.4). The security team noted that it is important to note that all versions of Drupal 9 prior to 9.2.x are end-of-life and do not receive security coverage.

    SecurityWeek reports: "Drupal Patches 'High-Risk' Third-Party Library Flaws"

  • news

    Visible to the public "Hackers From Iran Seen Employing New DNS Hijacking Malware in Latest Cyberattacks"

    Lyceum, an Iranian Advanced Persistent Threat (APT) group, has switched to deploying a new custom .NET-based backdoor in recent attacks targeting the Middle East. According to Avinash Kumar and Niraj Shivtarkar of Zscaler ThreatLabz, the .NET-based DNS backdoor is a modified version of the open-source application 'DIG.net.' The malware employs a DNS attack technique known as 'DNS Hijacking,' which involves an attacker-controlled DNS server that manipulates and resolves DNS query responses. DNS hijacking is a redirection attack in which DNS requests for legitimate domains are intercepted and used to redirect a user to attacker-controlled fake pages. Unlike cache poisoning, DNS hijacking attacks the website's DNS record on the nameserver instead of the resolver's cache. This article continues to discuss the new DNS hijacking malware being used by Lyceum against targets in the Middle East, as well as the history of the APT group.

    CyberIntelMag reports "Hackers From Iran Seen Employing New DNS Hijacking Malware in Latest Cyberattacks"

  • news

    Visible to the public "Cybercriminals, State-Sponsored Threat Actors Exploiting Confluence Server Vulnerability"

    Security researchers at Microsoft discovered a recently patched Confluence Server vulnerability is being exploited by multiple cybercrime and state-sponsored threat groups. The security hole, tracked as CVE-2022-26134, can be exploited by an unauthenticated attacker for remote code execution. The researchers stated that it affects all supported versions of Confluence Server and Data Center, and it has been patched by Atlassian with the release of versions 7.4.17, 7.13.7, 7.14.3, 7.15.2, 7.16.4, 7.17.4, and 7.18.1. The researchers noted that the zero-day vulnerability was exploited before its existence came to light, but the volume of attacks has increased significantly following disclosure. The researchers stated that in the days immediately after the disclosure of the flaw, researchers reported seeing thousands of internet-exposed Confluence servers that could have been vulnerable to attacks. The researchers noted that the initial attacks exploiting CVE-2022-26134 appeared to come from China and focused on delivering web shells. Threat intelligence company GreyNoise has so far seen more than 1,700 unique IP addresses attempting to exploit the vulnerability. Microsoft named two groups that have been observed targeting CVE-2022-26134: DEV-0401 and DEV-0234. The former is a China-based ransomware operator that has been known to deploy various ransomware families, including LockFile, AtomSilo, and Rook. The researchers stated that in the attacks aimed at Confluence Server instances, they had seen the delivery of a piece of ransomware named Cerber2021.

    SecurityWeek reports: "Cybercriminals, State-Sponsored Threat Actors Exploiting Confluence Server Vulnerability"

  • news

    Visible to the public "DoS Vulnerability Allows Easy Envoy Proxy Crashes"

    Researchers uncovered a Denial-of-Service (DoS) vulnerability in Envoy Proxy that allows attackers to crash the proxy server. According to JFrog Security Research, which revealed the vulnerability, this could result in performance degradation or the unavailability of resources handled by the proxy. Envoy is a popular open-source edge and service proxy server designed for cloud-native applications and high-traffic websites. It can decompress GZip and Brotli data (two compression formats). However, it lacks a size restriction for the latter's output buffer, meaning that a "zip bomb," a malicious archive file designed to crash or render a software or system useless, could jam the buffer with a near-unlimited quantity of data. A malicious actor could exploit the vulnerability by uploading a Brotli zip bomb to the server, causing severe performance issues. Users are advised to upgrade to Envoy version 1.19.5, 1.20.4, 1.21.3, or 1.22.1, to fix the issue. This article continues to discuss the DoS vulnerability discovered in the Envoy Proxy.

    Dark Reading reports "DoS Vulnerability Allows Easy Envoy Proxy Crashes"

  • news

    Visible to the public "Chinese 'Gallium' Hackers Using New PingPull Malware in Cyberespionage Attacks"

    Gallium, a Chinese Advanced Persistent Threat (APT) group, has been spotted deploying a previously unknown Remote Access Trojan (RAT) in its espionage attacks targeting companies in Southeast Asia, Europe, and Africa. According to new research published by Palo Alto Networks Unit 42, the RAT called "PingPull" is a difficult-to-detect backdoor that uses the Internet Control Message Protocol (ICMP) for command-and-control (C2) communications. PingPull is a Visual C++-based malware that allows a threat actor to access a reverse shell and execute arbitrary commands on a compromised computer, which includes carrying out file operations, enumerating storage volumes, and timestamping files. Researchers have also identified PingPull variants relying on HTTPS and TCP to communicate with its C2 server instead of ICMP and more than 170 IP addresses associated with the group since late 2020. This article continues to discuss the history of the Gallium APT group, its expanded victimology, and its use of the new PingPull malware in cyberespionage attacks.

    THN reports "Chinese 'Gallium' Hackers Using New PingPull Malware in Cyberespionage Attacks"

  • news

    Visible to the public "Researchers: Wi-Fi Probe Requests Expose User Data"

    A group of academic researchers from the University of Hamburg in Germany has recently discovered that mobile devices leak identifying information about their owners via Wi-Fi probe requests. The researchers noted that mobile devices use these probe requests to receive information about nearby Wi-Fi access points and establish connections to them when a probe response is received. The researchers found that attackers that can sniff network traffic can use these probe requests to track and identify devices and even pinpoint their location. According to the researchers, roughly a quarter of probe requests contain the Service Set Identifier (SSIDs) of networks the devices were previously connected to, which could be used to reveal home addresses or visited locations. The researchers stated that the probe requests can be used to "trilaterate the location of a device with an accuracy of up to 1.5 meters" or to follow the movement of a device to essentially track its owner.

    SecurityWeek reports: "Researchers: Wi-Fi Probe Requests Expose User Data"

  • news

    Visible to the public "Gone in 130 Seconds: New Tesla Hack Gives Thieves Their Own Personal Key"

    Tesla released an upgrade last year that made it easier to start its vehicles after unlocking them with their NFC key cards. A researcher has now demonstrated how the function may be used to steal cars. For years, drivers who used their Tesla NFC key card to unlock their vehicles had to place the card on the center console before they could start driving. Following the change, drivers could immediately operate their vehicles after unlocking them with the card. The NFC card is one of three means for unlocking a Tesla, with a key fob and a phone app being the other two. Martin Herfurt, a security researcher in Austria, spotted something strange about the new function right away. It not only enabled the car to start automatically after 130 seconds of being unlocked with the NFC card, but it also enabled the car to accept new keys with no authentication and notification provided by the in-car display. This article continues to discuss Herfurt's discovery of how the key card feature introduced by Tesla could be exploited to add an unauthorized key that enables an attacker to open and start a Tesla vehicle.

    Ars Technica reports "Gone in 130 Seconds: New Tesla Hack Gives Thieves Their Own Personal Key"

  • news

    Visible to the public "Chinese Hackers Adding Backdoor to iOS, Android Web3 Wallets in 'SeaFlower' Campaign"

    Security researchers at Confiant have discovered that cybercriminals likely operating out of China are distributing backdoored versions of iOS and Android Web3 wallets in an effort to steal users' seed phrase. According to the researchers, the hackers have targeted the iOS and Android versions of applications such as Coinbase Wallet, MetaMask Wallet, TokenPocket, and imToken. The researchers noted that the attackers have not actually compromised these apps. Instead, they have created backdoored versions that keep the wallet's legitimate functionality while also exfiltrating the user's seed phrase, which can then be leveraged to steal the victim's cryptocurrency. The researchers stated that SeaFlower drastically differs from the other web3 intrusion sets they track, with little to no overlap from the infrastructure in place, but also from the technical capability and coordination point of view: reverse engineering iOS and Android apps, modding them, provisioning, and automated deployments. The researchers noted that the fake apps have been distributed through websites set up by the attackers. These sites are clones of the app's legitimate website. The researchers stated that potential victims are lured here via search engine poisoning, with Baidu and other Chinese search engines being targeted. In the case of iOS devices, the SeaFlower backdoored apps are installed using provisioning profiles. The researchers have notified Apple about the developer IDs linked to these profiles, and the tech giant has revoked the ones identified so far.

    SecurityWeek reports: "Chinese Hackers Adding Backdoor to iOS, Android Web3 Wallets in 'SeaFlower' Campaign"

  • news

    Visible to the public "Businesses Are Leaving Bot Attacks Unchallenged for Almost Four Months"

    Netacea has published new research on how businesses are dealing with bot attacks, revealing one critical area where companies are failing to combat such attacks. According to Netacea's report, bots have been going undetected for an average of 16 weeks, an increase of two weeks from last year's findings. The study polled 440 organizations in the travel, entertainment, eCommerce, financial services, and telecommunications sectors in the US and the UK. It is a follow-up to last year's research, and it reveals that businesses appear to be doing worse than last year in the battle against bots in almost every measure. In addition to finding that bot attacks are going undiscovered for a longer time, Netacea discovered a shift among bot owners, with 60 percent of businesses detecting attacks on Application Programming Interfaces (APIs) and 39 percent detecting attacks on mobile apps (up from 46 percent and 23 percent from 2021 respectively). Each of the four major forms of bot attacks--sniper, account checker, scalper, and scraper--has increased by 7 to 9 percent since 2021. Account checker bot attacks are currently detected by 53 percent of companies. Nearly 97 percent of all businesses reported that bot attacks have impacted consumer satisfaction. This article continues to discuss key findings from Netacea's research into how businesses are handling bot attacks.

    Help Net Security reports "Businesses Are Leaving Bot Attacks Unchallenged for Almost Four Months"

  • news

    Visible to the public "Potent Emotet Variant Spreads Via Stolen Email Credentials"

    Emotet's return in April appears to be the comeback for what was considered the most dangerous malware in the world, as researchers have noticed new malicious phishing campaigns involving hijacked emails to spread new variations of the malware. Deep Instinct's Charles Everette highlighted in a blog post that the "new and improved" version of Emotet is collecting and exploiting stolen credentials, which are then weaponized to further distribute the Emotet binaries. Emotet continues to use many of the same attack vectors it has in the past, but the problem is that these attacks are becoming more complex and are evading today's standard security technologies for detecting and filtering such attacks. This article continues to discuss the resurgence and history of the Emotet malware.

    Threatpost reports "Potent Emotet Variant Spreads Via Stolen Email Credentials"

  • news

    Visible to the public "FIU Awarded $2 Million to Develop Artificial Intelligence Cybersecurity Tools"

    Researchers at Florida International University's (FIU) College of Engineering and Computing have been awarded $2 million by the US Department of Energy (DOE) in support of developing technology for preventing, detecting, analyzing, and mitigating cyberattacks on US energy systems. The FIU team, experienced in cybersecurity and smart energy grids, will lead the project to advance state-of-the-art methods in cyberattack detection and bolster the security of power grids. The project, called "Artificial Intelligence-Enabled Tools (ArtIT) for Cyber Hardening of Power Grids," entails developing Artificial Intelligence (AI) methods and analytics for identifying attacks in real-time and creating intelligent controllers to improve the attack resiliency of the bulk power system. The team will validate and test their tools with utility and industry partners. Each element of the project will address a specific problem. For example, one of the goals of this project is to enhance Moving Target Defense (MTD), a strategy used to confuse cyberattackers. This project is one of six new DOE-funded research, development, and demonstration projects totaling $12 million. These awards are also being given to university teams at Iowa State University, New York University, Texas A&M Engineering Experiment Station, the University of Illinois at Chicago, and Virginia Polytechnic Institute and State University. This article continues to discuss the support and goals of FIU's project on ArtIT for strengthening the cybersecurity of power grids.

    FIU reports "FIU Awarded $2 Million to Develop Artificial Intelligence Cybersecurity Tools"

  • news

    Visible to the public "Hackers Depend on Trust. Don't Give It to Them: U of G Cybersecurity Researcher"

    As more social media users claim that their accounts have been hacked and transformed into scam accounts, a University of Guelph cybersecurity expert believes that many hackers are employing sophisticated tactics to exploit trust and carry out these schemes. Dr. Ali Dehghantanha, the director of both the Cyber Science Lab and the master of cybersecurity and threat intelligence program at the University of Guelph pointed out several ways in which hackers exploit a user's trust. One involves hijacking an organization's business website to lure in victims. If an organization has not implemented proper security, hackers can take over their website, use deepfake technology to display fake images, and more. As long as the deepfakes remain on the website, they can change the users' perception of whatever they are presenting, allowing the hackers to gain the trust of the users. When a user clicks on a link to a service, such as a dog grooming service, the hacker can access the user's bitcoin, NFTs, or other digital assets or take over their account completely. Through the information contained in screenshots, hackers can also gain access to a user's digital assets or account. When a user sends a screenshot to a hacker, the malicious actor now has personalized information about that user and can then exploit it. This article continues to discuss key points made by Dehghantanha on how hackers gain the trust of users.

    UG reports "Hackers Depend on Trust. Don't Give It to Them: U of G Cybersecurity Researcher"

  • news

    Visible to the public "InfiRay Thermal Camera Flaws Can Allow Hackers to Tamper With Industrial Processes"

    Security researchers at SEC Consult have discovered that InfiRay thermal cameras are affected by vulnerabilities that could allow malicious hackers to tamper with industrial processes. InfiRay is a brand of China-based iRay Technology that manufactures optical components. InfiRay specializes in the development and manufacturing of infrared and thermal imaging solutions, with its products being sold in 89 countries and regions. The security researchers discovered that at least one of the vendor's thermal cameras, the A8Z3 model, is affected by several potentially serious vulnerabilities. According to the researchers, the product is affected by five types of potentially critical vulnerabilities. One issue is related to hardcoded credentials for the camera's web application. Since these accounts cannot be deactivated and their passwords cannot be changed, they can be considered backdoor accounts that can provide an attacker access to the camera's web interface. From there, an attacker can leverage another vulnerability for arbitrary code execution. The researchers also found a buffer overflow in the firmware and multiple outdated software components that are known to contain vulnerabilities. They also found a Telnet root shell that, by default, is not protected by a password, giving an attacker on the local network the ability to execute arbitrary commands as root on the camera. The A8Z3 is used in industrial environments to check/control temperatures. The researchers stated that an attacker would be able to report wrong temperatures and thus create inferior products or halt the production. SEC Consult reported its findings to the vendor more than a year ago, but the company has been unresponsive, so it's unclear if patches are available.

    SecurityWeek reports: "InfiRay Thermal Camera Flaws Can Allow Hackers to Tamper With Industrial Processes"

  • news

    Visible to the public "US Water Utilities Prime Cyberattack Target, Experts"

    The Center on Cyber and Technology Innovation (CCTI) and the Cyberspace Solarium Commission (CSC 2.0) have released policy statements based on a recent panel discussion on strengthening the cybersecurity of American water utilities. The panel included representatives from government and environmental agencies, including the Environmental Protection Agency (EPA), American Water Works Association, and congresspersons within the United States House of Representatives. Water may be the most vulnerable component of our national infrastructure, according to Samantha Ravich, chair of CCTI. She noted that much of the problem derives from the fact that water systems are so decentralized. Each of these systems runs in a distinct threat environment, frequently with limited funds and even fewer cybersecurity specialists to deal with security risks. Ravich pointed out that it is inherently difficult to conduct federal oversight of, and provide adequate federal aid to, such a distributed network of utilities. According to the panelists, safeguarding key water infrastructure systems from hacking is more important than securing healthcare and the power grid, which includes nuclear plants. This article continues to discuss the vulnerability of US water utilities to cyberattacks.

    Threatpost reports "US Water Utilities Prime Cyberattack Target, Experts"

  • news

    Visible to the public "Chinese Cyberspy Group 'Aoqin Dragon' Targeting Southeast Asia, Australia Since 2013"

    Security researchers at SentinelOne have analyzed the operations of a Chinese cyberespionage group that has been actively targeting education, government, and telecommunication organizations in Australia and Southeast Asia since at least 2013. The researchers dubbed the group Aoqin Dragon. The group was observed switching from the use of malicious documents to employing a fake antivirus, and more recently using a fake removable drive to lure intended victims into installing malware on their systems. The researchers stated that the group heavily relies on the USB shortcut technique to infect additional targets. The group typically drops one of two backdoors on a compromised system, namely Mongall or a modified variant of Heyoka. According to the researchers, the ongoing Aoqin Dragon activity has focused on spying on organizations in Australia, Cambodia, Hong Kong, Singapore, and Vietnam. Between 2012 and 2015, it mainly targeted victims with malicious documents exploiting CVE-2012-0158 and CVE-2010-3333. The researchers stated that the targeting of Aoqin Dragon closely aligns with the Chinese government's political interests. Considering this long-term effort and continuous targeted attacks for the past few years, the researchers assess the threat actor's motives are espionage-oriented.

    SecurityWeek reports: "Chinese Cyberspy Group 'Aoqin Dragon' Targeting Southeast Asia, Australia Since 2013"

  • news

    Visible to the public "Since 2004, the Average American Has Had at Least 7 Data Breaches"

    According to a recent report by IT security firm Surfshark, US citizens face the most cyber threats compared to people worldwide. Surkshark discovered that the average American had been affected by at least seven data breaches since 2004 after analyzing nearly two decades of data on cyber incidents. US citizens have been subjected to an estimated 2.3 billion account compromises, while Russia ranks second with 2.2 billion account compromises, followed by China, Germany, and France. Agneska Sablovskaja, data researcher at Surfshark, revealed that 191 accounts are breached per 100 people on a global basis, but in the US, this number increases to 694 per 100 people. The number of hacked American accounts is so large that it accounts for roughly 15 percent of all breached users worldwide. Statistically, every Internet user in the US has lost 27 data points on average due to online breaches, the majority of which were emails, passwords, and usernames. Since 2004, a total of 8.7 billion American last names, IP addresses, first names, passwords, usernames, and other data have been sold or leaked online. This means that a specific username is quite likely to have been grouped with other personal data, providing hackers easy access to other victims' accounts, emails, images, or documents. This article continues to discuss the key findings from Surfshark's analysis of global data on cyber incidents.

    SC Media reports "Since 2004, the Average American Has Had at Least 7 Data Breaches"

  • news

    Visible to the public "Researchers Disclose Critical Flaws in Industrial Access Control System from Carrier"

    Carrier's LenelS2 HID Mercury access control system, which is widely used in healthcare, education, transportation, and government buildings, has been discovered to contain eight zero-day vulnerabilities. According to Trellix security researchers Steve Povolny and Sam Quinn, the vulnerabilities discovered allowed them to demonstrate the ability to remotely unlock and lock doors, manipulate alarms, and degrade logging and notification systems. The critical security flaws could be weaponized by a threat actor to gain complete system control, including the ability to control door locks. One of the bugs involves an unauthenticated remote execution vulnerability with a CVSS severity rating of 10 out of 10. The other flaws could lead to command injection, Denial-of-Service (DoS), user modification, information spoofing, and arbitrary file write. This article continues to discuss the critical flaws discovered in the Carrier's widely used LenelS2 HID Mercury access control system.

    THN reports "Researchers Disclose Critical Flaws in Industrial Access Control System from Carrier"

  • news

    Visible to the public "Researchers Block Two Million Extortion Emails Daily"

    Security researchers at Proofpoint are warning users to be on the lookout for extortion scams. Proofpoint claimed that it blocks, on average, a million extortion emails every 24 hours, rising to two million on high volume days. The researchers stated that such threats are not new, but the data shows how widespread they have become. The researchers noted that victim information such as passwords is often included in the email to add legitimacy to the threat actor's claim that they have hijacked the machine. The researchers stated that cryptocurrency payments are a key part of these threats, enabling the attacker to remain anonymous. The researchers noted that the extortion branch of the BEC taxonomy would not be as successful or as profound as it is today without cryptocurrency.

    Infosecurity reports: "Researchers Block Two Million Extortion Emails Daily"

  • news

    Visible to the public "Strange Ransomware Markets Decryptor on Roblox Game Pass Store"

    A decryptor for a new ransomware called 'WannaFriendMe' is being sold on the Roblox gaming platform using the service's in-game Robux currency. Roblox is a popular game, with more than 50 million daily active users worldwide. The gaming platform allows users to make their own games and monetize them by selling Game Passes, providing players access to in-game products, unique features, and more. Members must use Robux, a virtual currency, to purchase these Game Passes. According to the MalwareHunter Team, the WannaFriendMe ransomware imitates the Ryuk ransomware, but it is a variation of the Chaos ransomware. In June 2021, a malicious actor began selling a Chaos ransomware builder, which allowed would-be criminals to customize ransom notes, encrypted file extensions, and other aspects of their ransomware epidemic. This article continues to discuss the WannaFriendMe ransomware and the decryptor made available for purchase on the Roblox gaming platform.

    CyberIntelMag reports "Strange Ransomware Markets Decryptor on Roblox Game Pass Store"

  • news

    Visible to the public "States Try Incentive-Based Cybersecurity"

    Three states have passed cybersecurity laws that place the burden of proof on the accused, which means that an organization that suffers a breach can avoid disciplinary action if it can demonstrate that it adhered to recognized cybersecurity frameworks and implemented the best controls available at the time. During a session titled "The State(s) of Cyber Incentives - Creative Laws Driving Better Security" at the 2022 RSA Conference, panelists said that providing a financial incentive prompts better security. The panelists also pointed out the need and difficulties of getting cyber insurance plans. It was assumed that insurers would set cybersecurity standards, similar to how insurers inform building codes, but it is easier to predict the impact of natural disasters than the effects of ransomware or Denial-of-Service (DoS) attacks. This article continues to discuss key points made by panelists at RSA pertaining to incentive-based cybersecurity, the Cybersecurity Standards Act, the Ohio Data Protection Act (ODPA), Utah's Cybersecurity Affirmative Defense Act, and cyber insurance policies.

    GCN reports "States Try Incentive-Based Cybersecurity"

  • news

    Visible to the public "Phishing at All-Time High; 1 Million Attacks in Q1 2022"

    According to the APWG's latest Phishing Activity Trends Report, 1,025,968 total phishing assaults were observed in the first quarter of 2022, marking the first time the three-month total surpassed one million. In March 2022, APWG observed a record monthly total of 384,291 phishing attacks. APWG founding member OpSec Security revealed in the first quarter of 2022 that phishing attacks against the financial sector, including banks, account for 23.6 percent of all phishing. Attacks on webmail and Software-as-a-Service (SaaS) providers were still prevalent, while attacks on retail/eCommerce sites decreased from 17.3 to 14.6 percent following the holiday shopping season. Phishing against social media sites increased dramatically, from 8.5 percent of all attacks in the fourth quarter of 2021 to 12.5 percent in the first quarter of 2022. Phishing attacks targeting cryptocurrency exchanges and wallet providers grew from 6.5 percent to 6.6 percent. This article continues to discuss key findings shared in APWG's new Phishing Activity Trends Report.

    Security Magazine reports "Phishing at All-Time High; 1 Million Attacks in Q1 2022"

  • news

    Visible to the public "MIT Researchers Uncover ‘Unpatchable’ Flaw in Apple M1 Chips"

    Security researchers at MIT have discovered that Apple's M1 chips have an "unpatchable" hardware vulnerability that could allow attackers to break through its last line of security defenses. The researchers stated that the vulnerability lies in a hardware-level security mechanism utilized in Apple M1 chips called pointer authentication codes, or PAC. The researchers noted that this feature makes it much harder for an attacker to inject malicious code into a device's memory and provides a level of defense against buffer overflow exploits, a type of attack that forces memory to spill out to other locations on the chip. The researchers, however, have created a novel hardware attack, which combines memory corruption and speculative execution attacks to sidestep the security feature. The researchers stated that the attack shows that pointer authentication can be defeated without leaving a trace, and as it utilizes a hardware mechanism, no software patch can fix it. The attack, appropriately called "Pacman," works by "guessing" a pointer authentication code (PAC), a cryptographic signature that confirms that an app hasn't been maliciously altered. The researchers noted that this is done using speculative execution, a technique used by modern computer processors to speed up performance by speculatively guessing various lines of computation to leak PAC verification results, while a hardware side-channel reveals whether or not the guess was correct. The researchers also found that since there are only so many possible values for the PAC, it is possible to try them all to find the right one. The researchers stated that if not mitigated, their attack will affect the majority of mobile devices and likely even desktop devices in the coming years. The researchers presented their findings to Apple and noted that the Pacman attack isn't a "magic bypass" for all security on the M1 chip and can only take an existing bug that pointer authentication protects against.

    Tech Crunch reports: "MIT Researchers Uncover 'Unpatchable' Flaw in Apple M1 Chips"

  • news

    Visible to the public "Keeping Web-Browsing Data Safe From Hackers"

    Threat actors can use Machine Learning (ML) to execute strong attacks that steal information in difficult-to-prevent and often-difficult-to-study ways. Data that leaks between software programs running on the same machine can be captured by attackers. They can then decode the signals using ML techniques, thus allowing them to extract passwords or other secret information. These are referred to as "side-channel attacks" since the information is obtained using a channel not meant for communication. Researchers at MIT have shown that side-channel attacks assisted by ML are both highly robust and poorly understood. Using ML algorithms is a challenge because their complexity makes them difficult to fully understand. In a new paper, the researchers studied a documented attack thought to work by capturing signals leaked when a computer accesses memory. They discovered that the mechanisms behind this attack were misidentified, preventing researchers from developing effective defenses. In order to study the attack, they removed all memory accesses and noticed the attack became even more powerful. Then they looked for sources of information leakage and found that the attack monitors events interrupting other programs on a computer. The team demonstrated the possible use of this ML-assisted attack by an adversary to exploit a security hole and determine what website a user is browsing. With this information, they devised two tactics to counter this attack. The first security strategy they developed involves a browser extension that generates frequent interrupts (i.e., pinging random websites to create bursts of activity). The added noise makes signal decoding significantly more difficult for the attacker. This reduced the attack's accuracy from 96 percent to 62 percent but decreased the computer's performance. For their second countermeasure, they altered the timer to return values close to, but not identical to, the actual time, making it more difficult for an attacker to measure the computer's activities over time. This mitigation reduced the attack's accuracy from 96 percent to 1 percent. This article continues to discuss the MIT researchers' analysis of a website-fingerprinting attack and the strategies they developed to reduce the attack's chances of success.

    MIT News reports "Keeping Web-Browsing Data Safe From Hackers"

  • news

    Visible to the public "Akamai Reveals New Research on Top Three Internet Security Threats"

    Akamai revealed three new research reports at the 2022 RSA conference that focus on three of the most critical areas of web security, which include ransomware, web applications and Application Programming Interfaces (APIs), and Domain Name System (DNS) traffic. The Akamai research team made new discoveries regarding threat actor behavior via popular attack traffic and methodologies after analyzing trillions of data points across its platforms. The three reports connect the most notable security trends and map today's attack landscape. An updated analysis of ransomware attack trends highlights risks and recommends mitigation. An examination of web application and API attack trends provides insight into the infection vectors used by ransomware operators and others. A DNS study supplements the reports by providing a view of overall threats examined through one of the Internet's most core technologies. This article continues to discuss key findings from each of Akamai's new research reports on ransomware, web application and API threats, and DNS traffic.

    PR Newswire reports "Akamai Reveals New Research on Top Three Internet Security Threats"

  • news

    Visible to the public "Over Half of CISOs Struggling for Board Investment"

    Researchers at Encore have discovered that 54% of UK and US cybersecurity leaders have complained that their boards aren't providing enough funding for vital initiatives. The researchers polled 100 C-level executives, 100 CISOs, and 500 workers on both sides of the Atlantic to better understand how aligned security teams are with business leaders. The researchers found that although 50% of boards across both regions claim to have cybersecurity at the top of their agenda, over 60% of CISOs feel unsupported. The researchers stated that many boards fail to invest properly until an incident has already happened. The researchers noted that this kind of piecemeal and reactive approach to security is the opposite of the proactive, strategic stance that leading organizations adopt. The researcher found that more than one in 10 C-level executives surveyed still only discuss cybersecurity once a breach has occurred. The researchers also found that 82% of participants said they've felt pressured to downplay the severity of cyber risks to their board, while 90% claimed their business would be willing to compromise on cybersecurity in favor of digital transformation or other goals.

    Infosecurity reports: "Over Half of CISOs Struggling for Board Investment"

  • news

    Visible to the public "New Record: World’s First Successful Transmission of 1 Petabit Per Second"

    Internet speeds worldwide have increased considerably in the last decade, but scientists are still trying to improve them daily. Scientists from the Network Research Institute at the National Institute of Information and Communications Technology conducted a news study that they say proves that the world will soon enter a new era of internet speed. The scientists reported the world's first demonstration of more than 1 petabit per second in a multi-core fiber (MCF) with a standard diameter of 0.125 mm. Using wavelength division multiplexing (WDM) technology, the scientists developed a novel transmission system that supports a record optical bandwidth exceeding 20 THz. The scientists noted that the system consists of commercially adopted optical fiber transmission windows known as C and L-bands and extends the transmission bandwidth to include the recently explored S-band. The results of this experiment were accepted as a postdeadline paper presentation at the International Conference on Laser and Electro-Optics (CLEO) 2022.

    Tech Explorist: "New Record: World's First Successful Transmission of 1 Petabit Per Second"

  • news

    Visible to the public "Threat Actors Start Exploiting Meeting Owl Pro Vulnerability Days After Disclosure"

    The US Cybersecurity and Infrastructure Security Agency (CISA) is warning that threat actors have already started exploiting a severe vulnerability that Owl Labs addressed in its video conferencing devices earlier this week. Tracked as CVE-2022-31460 (CVSS score of 7.4), the security bug can be exploited to turn a vulnerable device into a rogue access point to the Wi-Fi network it is connected to. CISA noted that the vulnerability is impacting Owl Labs' Meeting Owl Pro and Whiteboard Owl devices and that the issue exists because, when in access point (AP) mode, the devices do not disconnect from the Wi-Fi but instead start routing all traffic to the network. The bug was discovered by security researchers with Modzero, who also discovered that the video conferencing devices create their AP with the hardcoded passcode "hoothoot" and that the vulnerability can be exploited by an attacker within Bluetooth range without authentication. Patches that Owl Labs started rolling out this week disable the routing of network traffic when Meeting Owl Pro and Whiteboard Owl devices are in Wi-Fi AP tethering mode, which essentially prevents their use as rogue APs. CISA noted that owners of Meeting Owl Pro and Whiteboard Owl video conferencing devices are advised to update to firmware version 5.4.1.4 as soon as possible. CISA has instructed federal agencies to address the vulnerability by June 22.

    SecurityWeek reports: "Threat Actors Start Exploiting Meeting Owl Pro Vulnerability Days After Disclosure"

  • news

    Visible to the public "Bluetooth Signals Can Be Used to Identify and Track Smartphones"

    A team of engineers at the University of California San Diego presented findings at the IEEE Security & Privacy conference in San Francisco, California, from their demonstration that it is feasible to track individuals using Bluetooth. This is the first time researchers showed that the Bluetooth signals constantly emitted by mobile phones have a unique fingerprint, which can be used to track an individual's movements. Mobile devices, such as phones, smartwatches, and fitness trackers, send out signals called Bluetooth beacons at a rate of about 500 beacons per minute. These beacons make features like Apple's lost device monitoring service, COVID-19 tracing apps, and more possible. Wireless fingerprinting has been discovered in Wi-Fi and other wireless technologies, according to previous studies. The UC San Diego researchers discovered that this type of tracking could also be done with Bluetooth and with high accuracy. Every wireless device has small manufacturing flaws in its hardware that is unique to it. The fingerprints come from these manufacturing imperfections. Flaws in Bluetooth devices cause distinct distortions that can be used as a fingerprint to identify and track a specific device. In the case of Bluetooth, this would allow an attacker to evade anti-tracking measures such as continuously changing the address a mobile device uses to connect to Internet networks. Previous Wi-Fi fingerprinting techniques rely on the fact that Wi-Fi signals contain a long known sequence known as the preamble. Preambles for Bluetooth beacon signals, on the other hand, are significantly short, thus resulting in inaccurate fingerprints and the ineffectiveness of prior techniques for Bluetooth tracking. Therefore, the researchers designed a new method that does not rely on the preamble but looks at the entire Bluetooth signal. Their algorithm estimates two different values discovered in Bluetooth signals, which vary based on the Bluetooth hardware's defects, giving the device's unique fingerprint. This article continues to discuss the demonstration of the team's Bluetooth tracking method.

    UC San Diego News Center reports "Bluetooth Signals Can Be Used to Identify and Track Smartphones"

  • news

    Visible to the public "Emotet Malware Stealing Credit Card Info From Users of Google Chrome" 

    The Emotet botnet is now attempting to infect potential targets with a credit card stealer module that collects credit card information from Google Chrome user profiles. The malware sends the stolen credit card information, including name, expiration month, year, and card number, to command-and-control (C2) servers other than the ones the Emotet card stealer module uses. Emotet is known for dropping the QBot and Trickbot malware Trojan payloads on infected devices, which are then used to install additional malware such as Cobalt Strike beacons and ransomware such as Ryuk and Conti. In early 2021, Emotet's infrastructure was shut down as part of an international law enforcement operation that also led to the arrest of two people. German law enforcement used Emotet's own infrastructure against the botnet on April 25, 2021, supplying a module that eliminated the malware from affected devices. This article continues to discuss observations surrounding the Emotet malware stealing credit card information from Google Chrome users, as well as the history of this malware.

    CyberIntelMag reports "Emotet Malware Stealing Credit Card Info From Users of Google Chrome"

  • news

    Visible to the public "The Most Common Exploit Paths Enterprises Leave Open for Attackers"

    According to Mandiant, the most common exploit paths that medium to large enterprises left open for attackers in Q1 2022 include exposed version control repositories, leaked secrets in public code repositories, a subdomain vulnerable to takeover, exposed Amazon S3 buckets, and Microsoft Exchange Server servers vulnerable to CVE-2021-42321 abuse. Mandiant's list is based on the most common issues found through continuous scanning of its customers' external attack surface from January 1, 2022, to March 31, 2022. Other potential issues that were less frequently encountered include exposed services and ports, misconfigurations, and specific vulnerabilities (e.g., in SAP, Log4j, etc.). Enterprises are encouraged to constantly monitor their ever-changing external attack surface and act fast when exploitable gaps and exploit pathways are discovered. This means closing them and checking whether attackers took advantage of them during the window of opportunity they provided. Mandiant emphasizes that it is essential to establish a complete view of the attack surface in order to enable cyber threat profile creation, prioritizations of updates and configuration changes, context for penetration testing, incident response, and remediation. This article continues to discuss the top issues observed by Mandiant Advantage Attack Surface Management.

    Help Net Security reports "The Most Common Exploit Paths Enterprises Leave Open for Attackers"

  • news

    Visible to the public "Symbiote Is Parasitic Malware That Provides Rootkit-Level Functionality"

    The BlackBerry Threat Research & Intelligence team, in collaboration with Intezer security researcher Joakim Kennedy, detailed a new form of Linux malware dubbed Symbiote, which is said to be almost impossible to detect because of its parasitic nature. According to the team, Symbiote differs from typical Linux malware in that it acts as a Shared Object (SO) library that is loaded on all active processes via LD PRELOAD rather than attempting to compromise running processes. The team says the SO library "parasitically" infects a target machine, and once it is thoroughly implanted in the system, the malware gives rootkit functionality to the attackers. One of the several interesting features of Symbiote is that it employs Berkeley Packet Filter (BPF) hooking, a capability designed to conceal malicious traffic on an infected machine. The first sample dates back to November 2021 and appears to have been created to be used against banking firms in Latin America. However, because the malware is new and evasive, the researchers are unsure whether Symbiote is being used in targeted or broad attacks, if at all. This article continues to discuss the discovery and capabilities of the Symbiote Linux malware.

    ZDNet reports "Symbiote Is Parasitic Malware That Provides Rootkit-Level Functionality"

  • news

    Visible to the public "UK Joins Quantum Arms Race with First Computer"

    The UK government has recently reported that they have acquired its first quantum computer in a landmark moment which should help boost its research capabilities in cyber-defense and other critical areas of national security. The Ministry of Defence (MoD) is set to work with Orca Computing to explore the potential of quantum to enhance the nation's defenses. Spun out of research developed at the University of Oxford, Orca Computing's mission is to develop scalable quantum computers that integrate with real-world technologies. This is a challenge for current prototypes, primarily because they must keep the qubits on which they run at extremely cold temperatures, or they become unstable. Orca Computing claims to have found a way to operate quantum computing that does not require this. David Mahdi, cryptographic expert and chief strategy officer at Sectigo, argued that governments and organizations must begin preparing for the new age of quantum computing now. Mahdi stated that future systems must be designed with "quantum safety" in mind. The MoD will be hoping that its latest move will give it an advantage in this new technology arms race.

    Infosecurity reports: "UK Joins Quantum Arms Race with First Computer"

  • news

    Visible to the public "University of Jyväskylä Project Wants to Replace Passwords with a More Secure Solution"

    The University of Jyvaskyla's "Seamless Authentication for Everyone" (SAFE) Project aims to develop a solution that addresses the security challenges associated with passwords. Password management is critical not only for individual users' security but also for the security of businesses. Passwords are also required by the military, governments, electricity grids, railway networks, and air traffic control to maintain security. However, users often choose convenience over security when creating and managing their passwords, thus leaving them vulnerable to various security issues. According to the researchers behind the project, existing alternative solutions for password and authentication problems have failed to replace passwords because of their own security issues and the fact that users either do not trust them or often find them to be difficult to use. Therefore, the SAFE Project is working on developing an authentication method that can be implemented across all operating systems, services, and devices, and is easy to use. This article continues to discuss the goal and progress of the SAFE Project.

    JYU reports "University of Jyvaskyla Project Wants to Replace Passwords with a More Secure Solution"

  • news

    Visible to the public "World's Largest Darknet Market Shut Down, $25 Million in Bitcoin Seized"

    The Hydra marketplace, the world's largest darknet marketplace selling illicit substances, hacking tools, falsified documents, and stolen data, was shut down in a coordinated effort. The criminal marketplace, which had about 17 million consumer accounts, made billions of dollars in bitcoin before its takedown. The Federal Criminal Police Office (BKA) revealed that it secured and closed Hydra's server infrastructure, and $25 million in bitcoin attributed to the Hydra marketplace was seized. At the same time, Hydra was sanctioned by the US Department of Treasury's Office of Foreign Assets Control (OFAC). This was a collaborative effort between multiple federal agencies in the US and the German Federal Criminal Police. According to the US Department of the Treasury, Hydra was launched in 2015 and became the most well-known Russian darknet market and the largest darknet market globally. Hydra traded in Ransomware-as-a-Service (RaaS), breach services and software, stolen personal information, counterfeit currency, stolen virtual currency, and illegal drugs. This article continues to discuss the history and takedown of the Hydra marketplace.

    Security Intelligence reports "World's Largest Darknet Market Shut Down, $25 Million in Bitcoin Seized"

  • news

    Visible to the public "Massive Facebook Messenger Phishing Operation Generates Millions"

    Researchers discovered a large-scale phishing campaign that exploited Facebook Messenger to trick millions of users into entering their account credentials and viewing adverts on phishing pages. The campaign operators used stolen accounts to send more phishing messages to victims' friends, thus resulting in the generation of significant revenue through online advertising commissions. According to PIXM, a New York-based AI-focused cybersecurity firm, the phishing campaign peaked between April and May 2022, but it has been active since at least September 2021. PIXM traced the threat actor and mapped the campaign because one of the identified phishing pages hosted a link to a traffic monitoring app that was publicly accessible without authentication. Although it is unclear how the campaign initially began, PIXM found that victims were sent to phishing landing pages via a series of redirects from Facebook Messenger. As the threat actors stole more Facebook accounts, they employed automated tools to send additional phishing links to the compromised accounts' friends, resulting in a tremendous increase in the number of stolen accounts. Facebook has security mechanisms in place to prevent the spread of phishing URLs, but the threat actors utilized a method to circumvent these safeguards. Their phishing mails used legitimate URL generating services that are difficult to block because legitimate apps use them. The researchers discovered they could acquire unauthenticated access to the phishing campaign stats pages and discovered that 2.7 million users visited one of the phishing portals in 2021. This number increased to 8.5 million in 2022, indicating the campaign's massive expansion. This article continues to discuss findings surrounding the large-scale Facebook Messenger phishing campaign.

    Bleeping Computer reports "Massive Facebook Messenger Phishing Operation Generates Millions"

  • news

    Visible to the public "Cloud Data Breaches Rise as Adoption and Complexity Increase"

    According to the latest Cloud Security Report from Thales, 45 percent of businesses have faced a cloud-based data breach or failed audit in the past 12 months, a 5 percent increase from the previous year. The report also brings further attention to the acceleration of multi-cloud adoption, revealing that 72 percent of organizations use multiple Infrastructure-as-a-Service (IaaS) providers compared to 52 percent in 2021. In addition, organizations globally used an average of 110 Software-as-a-Service (SaaS) apps in 2021, up from just 8 in 2015. Of the IT professionals surveyed, 51 percent said that managing privacy and data protection in the cloud is more complex. The path to the cloud is also becoming more complex, with the percentage of respondents expecting to 'lift and shift' - the simplest of migration strategies - declining from 55 percent in 2021 to 24 percent now. Furthermore, 66 percent of businesses said that up to 60 percent of their sensitive data is stored in the cloud. Only 25 percent of respondents claim to be able to fully classify all data. A third of respondents said they had to notify a government agency, a client, partners, or workers about a data breach. In regard to securing data in multi-cloud environments, IT professionals consider encryption a critical security control. However, just 11 percent of respondents said that between 81 and 100 percent of their cloud data is encrypted. This article continues to discuss key findings from Thales' new report on cloud security.

    BetaNews reports "Cloud Data Breaches Rise as Adoption and Complexity Increase"

  • news

    Visible to the public "CISA Reveal Chinese Hackers Tactics Targeting US Telecoms and Network Service Providers"

    The Cybersecurity and Infrastructure Security Agency (CISA) published a new advisory warning public and private sector organizations about China-based state-sponsored cyberattacks against US firms. The document describes a series of common vulnerabilities and exposures (CVEs) associated with network devices that would have been regularly exploited by the unnamed cyber-actors since 2020. Such devices included small office/home office (SOHO) routers and Network Attached Storage (NAS) devices, which were exploited to gain extensive and/or persistent access to organizations' networks, and as a command-and-control (C2) tactic to pivot to other targets. After successfully gaining access to organizations' network devices, the actors would have then executed router commands to route, capture, and exfiltrate traffic out of the network to actor-controlled infrastructure. According to the advisory, the threat actors also consistently evolved and have adapted tactics to bypass defenses, modifying their infrastructure and toolsets immediately following the release of information related to their ongoing campaigns. A complete list of the CVEs and network commands used during the China-based state-sponsored cyberattacks is available in the advisory. CISA noted that to mitigate the vulnerabilities listed in the advisory, organizations should apply any available patches to their systems, replace end-of-life infrastructure, and implement a centralized patch management program. The advisory comes days after the Agency issued a joint statement with the Department of Energy (DoE) warning of attacks against internet-connected uninterruptible power supply (UPS) devices.

    Infosecurity reports: "CISA Reveal Chinese Hackers Tactics Targeting US Telecoms and Network Service Providers"

  • news

    Visible to the public "Google Publishes Monthly Android Security Bulletin, Patches Critical Vulnerabilities"

    Google Published its Android Security Bulletin for June on Monday, and it contains details of over 40 security vulnerabilities affecting Android devices and related patches. Google stated that the most severe of these issues was a critical security vulnerability in the system component that could lead to remote code execution [RCE] with no additional execution privileges needed. Tracked as CVE-2022-20127, the vulnerability could affect unpatched systems running Android versions 10, 11, 12, and 12L. Other RCE vulnerabilities are mentioned in the bulletin, which could affect the Framework, Media Framework, and Kernel of certain Android devices. In the document, Google also addressed vulnerabilities deriving from the hardware of certain manufacturers, including MediaTek and Qualcomm components and Motorola's Unisoc chips. The June 1st security patch reportedly fixed the critical vulnerabilities mentioned above, alongside five security bugs in Framework, 13 in the system component, and 18 others across Kernel, MediaTek, Unisoc, and Qualcomm closed-source components.

    Infosecurity reports: "Google Publishes Monthly Android Security Bulletin, Patches Critical Vulnerabilities"