News Items

  • news

    Visible to the public "An Emerging Threat: Attacking 5G Via Network Slices"

    Deloitte & Touche researchers have discovered a potential attack vector that targets network slices, a critical component of 5G architecture. Next-generation 5G networks are expected to be the communications backbone for various mission-critical environments, including public safety, military services, critical infrastructure, and the Industrial Internet of Things (IIoT). They also play a role in future latency-sensitive applications such as self-driving vehicles and telesurgery. Therefore, a cyberattack against that infrastructure might have serious consequences for public health and national security, as well as a variety of commercial services for individual businesses. A flexible IP-based core network is at the heart of any 5G network, which enables resources and attributes to be constructed into individual slices. Each network slice is tailored to meet the requirements of a certain application. A network slice supporting an IIoT network of sensors in a smart-factory installation, for example, might provide significantly low latency, long device battery life, and constricted bandwidth speed. An adjacent slice with high bandwidth and near-zero latency could enable driverless cars. A single 5G network can serve numerous adjacent network slices, all of which share a common physical infrastructure (i.e., the Radio Access Network (RAN)). Deloitte and Virginia Tech worked together on a 5G research project, discovering that it is possible to exploit 5G by compromising one slice and then escaping it to compromise a second. This article continues to discuss findings from the research regarding possible lateral movement via network slicing and defending against 5G network slicing attacks.

    Dark Reading reports "An Emerging Threat: Attacking 5G Via Network Slices"

  • news

    Visible to the public "Paying Ransomware Paints Bigger Bullseye on Target’s Back"

    Security researchers at Cybereason surveyed 1,456 cybersecurity professionals during their new study. Participants represented a global mix of cybersecurity professionals in the United States (24 percent), U.K. (17 percent), U.A.E., Japan, Singapore, and others. A broad mix of industries were represented in the data and ranged from manufacturing (14 percent), finance (10 percent), and others. The researchers found that ransomware attackers often strike targets twice, regardless of whether the ransom was paid. Eighty percent of ransomware victims that paid their attackers were hit a second time by the same ransomware group. More than half (68%) said they were hit a second time within the very same month as their first attack. After being breached a second time by the same attackers, the threat actors usually demand even a higher ransom amount the second time around. Of the participants that paid the second time, 9% were targeted a third time. The researchers suggest that organizations should never pay the ransom demanded.

    Threatpost reports: "Paying Ransomware Paints Bigger Bullseye on Target's Back"

  • news

    Visible to the public "QBot Now Distributes Black Basta Ransomware During Bot-Powered Attacks"

    The Black Basta ransomware group is working with the QBot malware operation to spread laterally through compromised business systems. QBot, also known as QuakBot, is a Windows malware capable of stealing bank and domain passwords and distributing other malware payloads to infected systems. The most prevalent way for victims to become infected with QBot is through phishing attempts using malicious attachments. Despite its origins as a banking Trojan, it has worked with a number of other ransomware gangs, including MegaCortex, ProLock, DoppelPaymer, and Egregor. Black Basta is a relatively new ransomware operation that has made a solid start by compromising many businesses in a short amount of time while demanding large ransom payments. During the most recent incident response, analysts from the NCC Group discovered the new alliance between QBot and Black Basta and were able to determine the threat actor's actions. While most ransomware gangs utilize QBot to get initial access, the Black Basta gang exploited it to spread laterally throughout the network. The malware installs a temporary service on the target host and configures it to run its DLL using regsvr32.exe. When activated, QBot can infect network shares and disks, brute-force AD accounts, or spread via default admin shares using current user credentials through the SMB (Server Message Block) file-sharing protocol. This article continues to discuss findings surrounding the Black Basta ransomware gang's partnership with the QBot malware operation.

    CyberIntelMag reports "QBot Now Distributes Black Basta Ransomware During Bot-Powered Attacks"

  • news

    Visible to the public "Attacker Dwell Time Surges 36% in 2021"

    Security researchers at Sophos have found that threat actors spent a median of 15 days inside victim networks last year, an increase of over a third from the previous year. The researchers stated that the increase in dwell time is down mainly to the exploitation of ProxyLogon and ProxyShell vulnerabilities last year and the emergence of initial access brokers (IABs) as an integral part of the cybercrime underground. The researchers noted that dwell time was longer for smaller organizations, 51 days in SMEs with up to 250 employees versus 20 days in organizations with 3,000 to 5,000 employees. The researchers stated that advanced detection and response appear to be lacking in many organizations. Although the researchers saw a decline in the exploitation of RDP for initial access, from 32% in 2020 to 13% last year, its use in lateral movement increased from 69% to 82% over the period. Other commonly detected tools and techniques were: PowerShell and malicious non-PowerShell scripts, combined in 64% of cases, PowerShell and Cobalt Strike (56%), and PowerShell and PsExec (51%). The researchers stated that detecting the presence of such correlations could help firms spot the early warning signs of a breach.

    Infosecurity reports: "Attacker Dwell Time Surges 36% in 2021"

  • news

    Visible to the public "IT Security: When the Hardware Traps Criminals"

    Paul Staat and Johannes Tobisch, Ph.D. students at RUB, are developing methods for protecting hardware against manipulation. Technical systems must be safeguarded not only from remote cyberattacks, but also from hardware modification. They are working on a technology capable of monitoring entire systems for manipulation inexpensively. Radio waves are used for this purpose. In the monitored system, they install two antennas (i.e., a transmitter and a receiver). The transmitter emits a special radio signal that spreads throughout the system and is reflected by the walls and computer components. All of these reflections result in a signal to the receiver that is as unique to the system as a fingerprint. This article continues to discuss the concept, development, testing, and potential application of the researchers' new technology aimed at monitoring entire systems for manipulation using radio waves.

    RUB reports "IT Security: When the Hardware Traps Criminals"

  • news

    Visible to the public "New Android Malware Called SMSFactory Is Increasing Users' Phone Bill By Subscribing To Premium Services"

    Newly detected Android malware called SMSFactory is increasing phone bills by adding premium service subscriptions unbeknownst to victims. According to researchers at Avast, the malware has various distribution channels, including those associated with push alerts, promotional marketing strategies on websites, and malvertising. The SMSFactory malware is suspected of having targeted nearly 165,000 customers with Android devices in the past year. Nations most commonly affected by the malware include Turkey, Russia, Ukraine, and Brazil. One researcher noted that SMSFactory is being hosted across different app stores that have failed to obtain statuses that prove they are legitimate or official. APKMods and PaidAPKFree are examples of these app repositories seen on Android. This article continues to discuss findings regarding the capabilities and distribution of the new SMSFactory Android malware.

    Digital Information World reports "New Android Malware Called SMSFactory Is Increasing Users' Phone Bill By Subscribing To Premium Services"

  • news

    Visible to the public "Researchers Warn of Spam Campaign Targeting Victims with SVCReady Malware"

    There is a new wave of phishing campaigns attempting to spread SVCReady malware. This malware is known for the unusual way in which it is delivered to target PCs as it uses shellcode hidden in the properties of Microsoft Office documents. SVCReady is suspected to be in its early stage of development, with the malware being iteratively updated numerous times last month. The first signs of its activity appeared on April 22, 2022. SVCReady's infection chain entails delivering Microsoft Word document attachments with VBA macros to targets through email in order to activate the deployment of malicious payloads. The campaign stands apart because the macro runs shellcode stored in the document properties instead of employing PowerShell or MSHTA to retrieve next-stage executables from a remote server. In addition to maintaining persistence on the infected host via a scheduled process, the SVCReady can gather system information, capture screenshots, conduct shell commands, and download and execute arbitrary files. This article continues to discuss findings surrounding new phishing campaigns delivering SVCReady malware.

    THN reports "Researchers Warn of Spam Campaign Targeting Victims with SVCReady Malware"

  • news

    Visible to the public "Data Breach at Shields Health Care Group Impacts 2 Million Patients"

    Shields Health Care Group has recently informed roughly two million individuals of a cybersecurity incident that potentially impacted their personal data. Shields Health Care Group is located in Massachusetts and provides management and imaging services to more than 50 healthcare partners and facilities throughout New England. The company noted that the incident was identified on March 28, 2022, but the intrusion actually happened between March 7 and March 21. The company stated that although a security alert was triggered on March 18, they did not find evidence of an intrusion at that time. However, the current investigation showed that a third-party had unauthorized access to certain types of data. Potentially impacted information includes full names, addresses, birth dates, Social Security numbers, diagnosis, billing information, provider details, insurance number and information, patient ID, medical record number, and other medical data. The company stated that it secured the impacted systems immediately after learning of the incident and launched an investigation to determine the full scope of the breach. In late May, the company informed the US Department of Health and Human Services (HHS) that the breach affected two million patients.

    SecurityWeek reports: "Data Breach at Shields Health Care Group Impacts 2 Million Patients"

  • news

    Visible to the public "Protecting Our Physical and Digital Safety in Hospitals and Connected Cars"

    Guillaume Dupont, a Ph.D. student at the Eindhoven University of Technology (TU/e), investigated the 'safeness' risks in hospitals and modern automobiles, two critical cyber-physical domains. He developed three key requirements to provide efficient security monitoring of these areas. Digitalization continues to transform the economy and technology landscape, resulting in an unprecedented reliance on networked systems such as computers, smartphones, and Internet of Things (IoT) devices. Some of these environments can conduct physical activities, and in order to do so, they gather, process, and store vast amounts of personal data from users. Although these technologies and operations provide several benefits, they also pose new threats that might have a significant impact on the 'safeness' of users (i.e., their physical safety and digital privacy). Attacks on cyber-physical systems can impact machine behavior, leading to physical harm to users. Furthermore, cybercriminals who steal and abuse personal data can affect individuals by using their data to commit fraud or extortion. Dupont's work has made a number of contributions, including a device classification method that aids in identifying network devices, the discovery of vulnerabilities in hospital communication protocols, a classification of intrusion detection systems for automotive networks, and a framework for the evaluation of these systems. These results enabled the identification of three main requirements for applying network security monitoring in safeness-critical environments. First, technical information on the network-connected devices is required, such as their type and function. Second, there must be information about device communication, including transmission patterns and data types exchanged. Third, one must be able to examine and assess the performance of network security monitoring tools such as intrusion detection systems. This article continues to discuss Dupont's study on network security monitoring in environments where digital and physical safety is critical.

    TU/e reports "Protecting Our Physical and Digital Safety in Hospitals and Connected Cars"

  • news

    Visible to the public "Follina Exploited by State-Sponsored Hackers"

    State-sponsored hackers have been added to the list of adversaries seeking to exploit Microsoft's now-patched Follina vulnerability. According to Proofpoint researchers, state-sponsored hackers attempted to exploit the Follina vulnerability in Microsoft Office by phishing US and EU government targets. Proofpoint researchers suspect that the attackers are linked to a government that has not been identified. Their attacks involve malicious emails containing fake recruitment information that promise a 20 percent raise in salaries. According to Sherrod DeGrippo, vice president of threat research at Proofpoint, about 10 Proofpoint customers had received more than 1,000 of these messages. The malicious attachment targets the Remote Code Execution (RCE) bug called Follina, which exploits the Microsoft Support Diagnostic Tool (MSDT). Microsoft explained that the bug exists when MSDT is called through the URL protocol from a calling application such as Word. If successfully exploited, the Follina flaw can be used to install programs, view, change or delete data, or create new accounts in the context enabled by the user's rights. This article continues to discuss the exploitation of the Follina vulnerability by a government-aligned attacker to attack US and EU government targets.

    Threatpost reports "Follina Exploited by State-Sponsored Hackers"

  • news

    Visible to the public "6G Component Provides Speed, Efficiency Needed for Next-Gen Network"

    Even though consumers won't see it for years, researchers worldwide are already laying the foundation for the next generation of wireless communications, 6G. Security researchers at the University of Texas at Austin have developed components that will allow future devices to achieve increased speeds necessary for such a technological jump. The researchers demonstrated new radio frequency switches that are responsible for keeping devices connected by jumping between networks and frequencies while receiving data. The researchers stated that, in contrast with the switches present in most electronics today, these new devices are made of two-dimensional materials that take significantly less energy to operate, which means more speed and better battery life for the device. The researchers noted that because of the increased demand for speed and power, 6G devices will probably have hundreds of switches in them, many more than the electronics currently on the market. To reach increased speeds, 6G devices will have to access higher frequency spectrum bands than today's electronics, and these switches are key to achieving that. Each wireless generation lasts about a decade, and the 5G rollout began in 2020. The researchers estimate that 6G deployment isn't likely to happen until around 2030. The researchers argue that the time is now to put all the necessary building blocks in place. The next step in this project is to integrate the switches with silicon chips and circuits. The researchers are looking at improving how well the switches can jump between frequencies, which would give devices better connections on the go. The researchers are pursuing collaborations with industry partners on developing the switches for commercial adoption.

    UT News reports: "6G Component Provides Speed, Efficiency Needed for Next-Gen Network"

  • news

    Visible to the public "Phishing Attacks Will Use Powerful Text Generation, Say Machine-Learning Engineers"

    Would-be phishing victims have a significant edge in a phishing attack, with cybercriminals having to perform everything by hand. However, OpenAI's GPT showed that powerful Machine Learning (ML) text generation can also be designed to be simple for lay programmers to implement, thus easing the process of setting up phishing attacks. In addition, its Dall-E recently demonstrated the creation of a realistic-looking fake image, involving calling a function with a brief natural language description of what is wanted. Prashanth Arun, head of data science, and his colleague Ben Murdoch, an ML engineer for Armorblox, argue that the most basic phishing attacks in the future will come from personas with detailed web presences. A thousand new lures will be generated through the click of a button, and creating hundreds of fake identities supported by old Twitter accounts will be as easy as sitting back for years while an ML system does the posting. This article continues to discuss how ML will be used in phishing attacks, the advancement of generative ML, and how it will create security problems.

    SC Magazine reports "Phishing Attacks Will Use Powerful Text Generation, Say Machine-Learning Engineers"

  • news

    Visible to the public "CISA Challenges Partners and Public to Push for 'More Than a Password' in New Social Media Campaign"

    The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) has announced a collaborative effort with the industry to increase the adoption of Multi-Factor Authentication (MFA) as well as ensure widespread understanding of why MFA is one of the strongest tools to use in cyber intrusion prevention. CISA wants to raise widespread awareness and understanding of the benefits of MFA to ensure that every American is aware of the simple steps they can take to stay safe online. The cyber defense agency also wants to encourage technology companies to make MFA available as a default option. Throughout the month of June, CISA's "More Than a Password" campaign will include a newly created webpage with tools, how-to guides, and social media material. This article continues to discuss CISA's new social media campaign to get partners and the public to adopt and enable MFA.

    CISA reports "CISA Challenges Partners and Public to Push for 'More Than a Password' in New Social Media Campaign"

  • news

    Visible to the public "Thousands of Unprotected Elasticsearch Databases Are Being Ransomed"

    Researchers with Secureworks reported a new cybercrime campaign in which many unsecured Internet-facing Elasticsearch instances are being used to steal databases and display a ransom note requesting a ransom to be paid to get the database back. The Secureworks Counter Threat Unit (CTU) identified four email addresses responsible for the compromise of more than 1,200 different databases. As the ransom text is always the same, all the databases were likely compromised by the same threat actor. The precise number of impacted organizations remains unclear because most of the databases were hosted on cloud provider networks and some databases most likely belong to the same organization. Although the campaign is large, the threat actor does not appear to have met much success. Secureworks found that the attackers use two Bitcoin wallets, with one of them showing only two transactions totaling roughly $600 at the time of reporting. This article continues to discuss the targeting of Elasticsearch databases in ransom attacks, the threat posed by unsecured databases, and recommendations for bolstering database security.

    TechRepublic reports "Thousands of Unprotected Elasticsearch Databases Are Being Ransomed"

  • news

    Visible to the public "CISA Issues Vulnerability Advisory For Select Dominion Voting Equipment, Urges Updates"

    The Cybersecurity and Infrastructure Security Agency (CISA) recently put out an advisory stating that vulnerabilities within some Dominion voting machines used in roughly a dozen states should be mitigated "as soon as possible." The technical flaws were found within the Dominion Voting Systems Democracy Suite ImageCast X, an in-person voting system that allows voters to mark their ballots. CISA has no evidence that these vulnerabilities have been exploited in any elections. CISA noted that adversaries looking to exploit the identified vulnerabilities would require physical access to individual ImageCast X devices, access to the Election Management System (EMS), or the ability to modify files before they are uploaded to the devices. CISA recommended a few mitigations such as ensuring software and firmware updates are made, physical protection of machines at all times, and ensuring that the machines are not connected to any external internet networks. A spokesperson from Dominion stated that its machines "are accurate and secure" and that "the issues raised in the advisory are limited to ballot marking devices, not vote tabulators."

    CyberScoop reports: "CISA Issues Vulnerability Advisory For Select Dominion Voting Equipment, Urges Updates"

  • news

    Visible to the public "Ransomware's ROI Retreat Will Drive More BEC Attacks"

    Law enforcement crackdowns, tougher cryptocurrency laws, and the shutdown of Ransomware-as-a-Service (RaaS) operators are lowering the return on investment (ROI) for ransomware operations worldwide. Crane Hassold, a threat researcher at Abnormal Security, presented his latest analysis of the ransomware threat landscape at the RSA Conference, predicting that in the next 6 to 12 months, there will be a shift away from ransomware and toward renewed interest in basic Business Email Compromise (BEC) attacks. Ransomware attacks make headlines and have been boosted by a few prolific RaaS operators. However, focusing on taking down only one group might have a significant impact. Hassold pointed out that ransomware is a centralized ecosystem containing small numbers of operators responsible for most attacks. He cited Pysa's sudden absence, which left only two gangs, Conti and Lockbit, with more than half of the overall ransomware attacks in the first half of 2022. BEC organizations, on the other hand, are diffused and dispersed, making them considerably more difficult to destroy, according to Hassold. According to the FBI, BEC attacks have cost businesses more than $43 billion since 2016, accounting for $1 out of every $3 lost to cyberattacks, greatly exceeding ransomware losses. This article continues to discuss how RaaS operator crackdowns will drive more BEC attacks.

    Dark Reading reports "Ransomware's ROI Retreat Will Drive More BEC Attacks"

  • news

    Visible to the public "LockBit 2.0 Gang Claims Mandiant as Latest Victim; Mandiant Sees no Evidence of it"

    Recently, a prominent ransomware group claimed it had successfully attacked cybersecurity giant Mandiant and would release company files. The ransomware group posted a note slamming Mandiant's recent research linking it to a separate, sanctioned cybercrime group. LockBit 2.0 originally claimed on its dark web portal that it would release Mandiant files late Monday. A Mandiant spokesperson stated that the company was aware of the claims but saw no evidence to support them. The spokesperson noted that it appears that the ransomware group is trying to disprove Mandiant's June 2, 2022, research blog on UNC2165 and LockBit. On June 2, Mandiant published an analysis suggesting that affiliates of Evil Corp., a long-running cybercrime group that the U.S. government sanctioned in 2019, had turned to using LockBit 2.0 off-the-shelf ransomware to evade sanctions. A note posted to LockBit 2.0's website late Monday called Mandiant "not professional" and denied any connection with Evil Corp. Brett Callow, a threat analyst with cybersecurity firm Emsisoft who follows the ransomware ecosystem closely, said the group has "made a number of false claims in the past."

    CyberScoop reports: "LockBit 2.0 Gang Claims Mandiant as Latest Victim; Mandiant Sees no Evidence of it"

  • news

    Visible to the public "Secure Communication With Light Particles"

    Although quantum computers offer a number of novel possibilities, they pose a threat to Internet security because they are expected to render current encryption methods obsolete. Therefore, researchers at TU Darmstadt have created a new tap-proof communication network based on quantum key distribution. The new system allows parties to exchange symmetric keys in order to encrypt messages so that third parties cannot read them. The researchers were successful in operating a quantum network that is both scalable in terms of user count and robust in the absence of trusted nodes. Such systems could protect critical infrastructure from the growing threat of cyberattacks in the future. Tap-proof connections could also be installed between various government sites in larger cities. The Darmstadt researchers' system enables quantum key exchange, which provides a common random number to multiple parties in a star-shaped network. Individual light quanta, known as photons, are distributed to the users in the communication network to compute the random number and thus the digital key. These keys are especially secure because of quantum physical effects. Communication is well-protected in this manner, and existing eavesdropping attacks can be detected. This article continues to discuss the new tap-proof communication developed by Darmstadt researchers based on quantum key distribution.

    TU Darmstadt reports "Secure Communication With Light Particles"

  • news

    Visible to the public "Peekaboo! Here's a System to Guarantee Smart Home Privacy"

    A team of researchers at Carnegie Mellon University's CyLab developed a new privacy-sensitive architecture for developers building smart home apps. The architecture, which the team refers to as "Peekaboo," takes requests from developers to share certain pieces of data and ensures only the essential data pieces are shared with them to fulfill their request. Developers use the Peekaboo architecture to declare all of the data they intend to collect and under what conditions, where that data is being sent, and the granularity of the data itself. Then, an in-home hub acts as a bridge between all of the devices in the home and the outside Internet. The hub enforces sharing data only declared by the developer. The Peekaboo protocol will enable users to manage privacy preferences for all of their devices in a centralized way via the hub. This article continues to discuss the concept and goals of CyLab's new privacy-sensitive Peekaboo architecture.

    CyLab reports "Peekaboo! Here's a System to Guarantee Smart Home Privacy"

  • news

    Visible to the public "Smishing and Vishing Attempts Surged in 2021"

    Security researchers at Proofpoint found that SMS phishing (smishing) attacks more than doubled year-on-year in 2021 as cybercriminals looked to exploit human error to compromise devices. The researchers conducted a study analyzing over 2.6 billion email messages, 49 billion URLs, 1.9 billion attachments, 28 million cloud accounts, 1.7 billion mobile messages, and many other data points. The researchers stated that the increase in smishing could be down to changing personal habits: as most consumers now use their personal devices for work, cybercriminals have spotted a "two-for-one" opportunity. The researchers also saw a surge in telephone-based threats, such as tech support scams and vishing attempts to distribute malware to users' computers or devices. The researchers noted that there is a continued threat to organizations from their supply chains. Over 80% of businesses are attacked by a compromised supplier account each month, the researchers warned, adding that organizations should improve security awareness training around these specific threats. The researchers also warned of the risk to organizations from attacks targeting privileged users. The researchers found that although they comprise just 10% of users, managers and executives account for nearly half of attacks or "severe risk." Similarly, departments that deal with sensitive information like human resources (HR) or finance are more likely to be targeted.

    Infosecurity reports: "Smishing and Vishing Attempts Surged in 2021"

  • news

    Visible to the public "Cyberattack Surface 'Spiralling Out of Control'"

    In a new study, security researchers at Trend Micro polled over 6200 IT and business decision makers. They found that global organizations are still beset with cyber visibility and control challenges, with two-fifths (43%) admitting their digital attack surface is out of control as a result. The researchers also found that nearly three-quarters (73%) of respondents are concerned about the increasing size of their attack surface. Over a third (37%) said it is "constantly evolving and messy," and just half (51%) thought they were able to fully define its extent. The researchers stated that these visibility challenges are greatest in cloud environments, although problems persist across the board. The researchers highlighted complex supply chains, tool bloat, and home working-driven shadow IT as additional contributory factors. On average, respondents estimated having just 62% visibility of their attack surface. The researchers stated that the continued practice of manual (24%) and regional (29%) attack surface mapping is also hampering efforts. Over half (54%) of responding organizations said they don't believe their method of assessing risk exposure is sophisticated enough. The researchers noted that almost two-fifths (35%) of participants only review or update their risk exposure monthly or less frequently.

    Infosecurity reports: "Cyberattack Surface 'Spiralling Out of Control'"

  • news

    Visible to the public "Zhang Lab Takes on Cyber-Physical System Hackers"

    Ning Zhang, assistant computer science and engineering professor at the McKelvey School of Engineering at Washington University in St. Louis, wants to develop a new security capability to ensure safety against cyberattacks on pacemakers, autonomous vehicles, and more. Zhang's student presented research at the 43rd IEEE Symposium on Security and Privacy in San Francisco, outlining a new framework for system availability in cyber-physical systems such as self-driving cars. It ensures that the user has availability assurance to some of the mission controls, so the system remains safe if a cyberattack occurs. The method relies on isolation between critical and non-critical components and complete mediation over critical system resources. To keep critical components away from a hacker, they must be isolated from the rest of the complex system. To keep the trusted computing base small, the trusted execution environment maintains a minimal amount of functionality for the cyber-physical system, such as the ability to brake, disengage the gas, or turn the wheel slightly. Even if the vehicle's operating system is under attack, the driver can still use these features. Maintaining availability is not an easy task as the operating system controls everything in the vehicle. If a hacker is controlling the system, it will not give you control. This is where attack surface reduction comes in, to limit the points at which an attacker can have an impact on the trusted environment through its influence over the operating system. In order to accomplish this, the trusted environment will only respond to a subset of commands, and access is denied if a request falls outside of those commands. This article continues to discuss the new framework for system availability in cyber-physical systems.

    WUSTL reports "Zhang Lab Takes on Cyber-Physical System Hackers"

  • news

    Visible to the public "Perfect Privacy Technology and Chasing Rainbows"

    Data-driven innovation, whether in the form of tailored medicine, public services, or efficient industrial production, promises to significantly benefit people and the environment, and provide widespread access to data. However, aggressive data collection and analysis practices raise concerns about societal values and fundamental rights. Therefore, one of the most pressing challenges in unlocking the potential of data-driven technologies is ensuring the confidentiality of sensitive personal data while widening access to the data. A new paper from EPFL's Security and Privacy Engineering Lab (SPRING) in the School of Computer and Communication Sciences contends that the promise that any data use can be solved while maintaining both utility and privacy is akin to chasing rainbows. Assistant Professor Carmela Troncoso, head of the SPRING Lab and co-author of the paper, says there are two traditional approaches to preserving privacy. There is a path that involves using privacy-preserving cryptography, processing data in a decrypted domain, and obtaining a result. The limitation, however, is the need to design highly targeted algorithms rather than simply performing generic computations. The problem with this type of privacy-preserving technology, according to the paper, is that it does not address one of the most pressing issues for practitioners: how to share high-quality individual-level data in a way that preserves privacy while allowing analysts to extract the full value of a dataset in a highly flexible manner. The anonymization of data is the second avenue that attempts to solve this challenge, which involves removing names, locations, and postcodes but the paper argues that the problem is often the data itself. This article continues to discuss new research on why the search for a privacy-preserving data sharing mechanism is failing.

    EPFL reports "Perfect Privacy Technology and Chasing Rainbows"

  • news

    Visible to the public "Critical Vulnerability Found in Motorola's Unisoc Chips"

    Security researchers at Checkpoint Research have recently spotted a critical vulnerability in the Unisoc Tiger T700 chips that power the Motorola Moto G20, E30, and E40 smartphones. The researchers noted that due to the flaw, the smartphones were seen omitting the check to make sure that the modem's connection handler was reading a valid IMSI or similar subscriber ID when connecting to an LTE network. Because of this, the handler read a zero-digit field and created stack overflow conditions that could block the user from using the LTE network and be exploited for a denial of service (DoS) attack or for remote code execution. In the new study, the researchers did a quick analysis of the Unisoc baseband to find a way to remotely attack Unisoc devices. The researchers were able to reverse-engineer the implementation of the LTE protocol stack and discovered a vulnerability that could be used to deny modem services and block communications. The vulnerability was given a critical score of 9.4 out of 10 but was reportedly patched by Unisoc in May 2022. The researchers stated that while there haven't been reports of the vulnerability being exploited, the flaw represents a pressing issue, particularly because Unisoc processors are often used in budget smartphones, which do not always receive frequent updates.

    Infosecurity reports: "Critical Vulnerability Found in Motorola's Unisoc Chips"

  • news

    Visible to the public "Millions of MySQL Servers are Publicly Exposed"

    Security researchers at Shadow Server Foundation have discovered that more than 3.6 million MySQL servers are publicly exposed on the internet. During their research, the researchers simply issued a MySQL connection request on default port 3306 to see if a server responded with a MySQL Server Greeting, rather than intrusive requests that pentesters use to break into databases. The researchers found that 67% of all MySQL services are accessible from the internet. Out of 3,947,457 servers, 2,279,908 servers responded with a greeting on IPV4. Out of 1,421,010 servers, 1,343,993 servers responded with a greeting on IPV6. The countries with the most accessible servers on IPV4 are the United States (740,100), China (296,300), Poland (207,800), and Germany (174,900). The countries with the most accessible servers on IPV6 are the United States (460,800), the Netherlands (296,300), Singapore (218,200), and Germany (173,700). The researchers stated that most MySQL servers use default configurations and are thus prone to attacks, which can lead to serious incidents such as massive data breaches and thefts, stolen credentials, or lateral movement across networks. The researchers noted that the big problem is that default configurations use port 3306 and will likely expose more of the server than necessary. The researchers said that it is not a big deal if you install it on your local machine to make some tests, but on live production websites, it extends the attack surface with vulnerabilities. The researchers suggest that individuals change that port number, for example, to 3333, and disallow external connections from the internet if they don't need this feature, which represents most cases.

    eSecurity Planet reports: "Millions of MySQL Servers are Publicly Exposed"

  • news

    Visible to the public "YourCyanide Ransomware Propagates With PasteBin, Discord, Microsoft Links"

    A new CMD-based ransomware variant is still under development, but researchers at Trend Micro warn that its poisonous combination of multiple layers of obfuscation and the sneaky integration of legitimate service links into its attack make it a potentially formidable threat. YourCyanide traces its roots back to the GonnaCope ransomware family first discovered in April. The researchers noted that it doesn't actually encrypt anything yet (researchers say that's likely coming soon), but it does rename all targeted files, steal information, and pilfer access tokens from popular applications like Chrome, Discord, and Microsoft Edge. It also self-propagates. The researchers stated that YourCyanide includes a few new tactics, including using PasteBin, Discord, and Microsoft links to download its payload in stages, and it now hides behind Enable Delayed Expansion functionality. The researchers noted that while YourCyanide and its other variants are currently not as impactful as other families, it represents an interesting update to ransomware kits by bundling a worm, a ransomware, and an information stealer into a single mid-tier ransomware framework. The researchers stated that it is also likely that these ransomware variants are in their development stages, making it a priority to detect and block them before they can evolve further and do even more damage.

    Dark Reading reports: "YourCyanide Ransomware Propagates With PasteBin, Discord, Microsoft Links"

  • news

    Visible to the public "Gathering Momentum: 3 Steps Forward to Expand SBoM Use"

    According to a recent ReversingLabs study conducted by Dimensional Research, less than a third of companies today use Software Bills of Materials (SBoMs). Half of those said the process of creating and reviewing SBoMs involves manual steps, which is a time-consuming task when there could be thousands of lines of code in the mix. SBoMs, according to security experts, are foundational in understanding and managing software supply chain risks. Most software engineering teams have been pushed by modern development practices to avoid reinventing the wheel when building common functions into their software and instead use open source libraries and packages that the community has already developed. This speeds up their work and improves predictability, but if there is no governance or visibility into which components they use, the risk from vulnerabilities can quickly become unmanageable. SBoMs assist development teams in understanding what code is running under the hood of their applications and in determining when underlying components are vulnerable. Given the low prevalence of SBoMs reported by ReversingLabs survey participants, it is not surprising that almost half of them admitted to being unprepared to protect their software against supply chain attacks. This article continues to discuss the lack in the adoption of SBoMs as well as three different initiatives aimed at increasing the rate at which SBoMs are generated and improving the effectiveness in how organizations use them to protect their software.

    Dark Reading reports "Gathering Momentum: 3 Steps Forward to Expand SBoM Use"

  • news

    Visible to the public "Government Agencies Seize Domains Used to Sell Credentials"

    The Federal Bureau of Investigation (FBI) and the US Department of Justice (DOJ) announced the seizure of three domains following an international investigation that discovered these domains selling stolen personal information and providing access to perform Distributed Denial-of-Service (DDoS) attacks on victim networks. The three Internet domain names include weleakinfo.to and two related domain names, ipstress.in and ovh-booter.com. According to the DOJ, the weleakinfo.to site operated as a database and search engine. The stolen data was indexed so users could search the files and information illegally obtained in more than 10,000 data breaches containing seven billion indexed records, including names, email addresses, usernames, phone numbers, and passwords for online accounts. How long the WeLeakInfo domain was in operation remains unclear, but the DOJ said that the site developed a reputation for selling names, email addresses, usernames, passwords, and more, to cybercriminals who would buy a subscription for a period of one day, one week, one month, three months, or a lifetime. This article continues to discuss the takedown of three domains found selling stolen information.

    InfoRiskToday reports "Government Agencies Seize Domains Used to Sell Credentials"

  • news

    Visible to the public "Apple Blocked 1.6 Million Risky, Vulnerable Apps in 2021"

    Last year, Apple says its App Store fraud prevention mechanisms stopped potentially fraudulent transactions totaling roughly $1.5 billion. Apple noted that throughout 2021, they prevented more than 3.3 million stolen credit cards from making purchases in the App Store and banned nearly 600,000 accounts from ever transacting again. The company also noted that in 2021 it rejected more than 1.6 million risky and vulnerable applications and app updates from the store, either for containing vulnerabilities that impeded functionality or for requiring various improvements. Of over 835,000 problematic new apps, 34,000 were apps containing hidden or undocumented features, 157,000 were spam, copycat, or otherwise misleading apps, and over 340,000 were privacy-violating apps. Furthermore, an additional 805,000 app updates were rejected or removed from the App Store as part of Apple's App Review process. In 2021 Apple helped more than 107,000 new developers publish applications in the App Store, terminated more than 802,000 fraudulent developer accounts, and prevented 153,000 developer enrollments over fraud concerns. Customer accounts were also deactivated for engaging in fraudulent and abusive activity: a total of 170 million of them. An additional 118 million account creation attempts were rejected due to suspicion of potential fraudulent and abusive activity.

    SecurityWeek reports: "Apple Blocked 1.6 Million Risky, Vulnerable Apps in 2021"

  • news

    Visible to the public "The Costs and Damages of DNS Attacks"

    EfficientIP has shared findings from its eighth annual 2022 Global DNS Threat Report, conducted by IDC, revealing the significant impact of Domain Name System (DNS) attacks on global organizations' operations over the past year. The report highlights that cybercriminals are still infiltrating networks and causing business disruptions, resulting in the shutdown of cloud and on-premise applications and data theft, despite 73 percent of organizations knowing that DNS security is crucial. As enterprises strive to strike a balance between supporting remote workers and mitigating network security risks posed by the increase in hybrid work models and reliance on cloud applications, the findings reveal that 88 percent of organizations have experienced one or more DNS attacks on their business. A successful attack costs a company $942,000, on average. This article continues to discuss key findings from EfficientIP's 2022 Global DNS Threat Report regarding the costs and damages of DNS attacks.

    Help Net Security reports "The Costs and Damages of DNS Attacks"

  • news

    Visible to the public "Critical U-Boot Vulnerability Allows Rooting of Embedded Systems"

    Security researchers at NCC Group have discovered a critical vulnerability in the U-Boot boot loader. An open-source boot loader, U-Boot is used in various types of embedded systems, including ChromeOS and Android. It supports multiple architectures, including 68k, ARM, x86, MIPS, Nios, PPC, and more. The researchers stated that the IP defragmentation algorithm implemented in U-Boot is plagued by two vulnerabilities that can be exploited from the local network by crafting malformed packets. The first vulnerability, CVE-2022-30790 (CVSS score of 9.6), exposes the defragmentation algorithm to a hole descriptor overwrite attack, NCC's researchers say. The researchers stated that because of this security bug, the metadata and fragment can be forged to point to the same location, which leads to the metadata being overwritten with fragmented data. An adversary can trigger an arbitrary write by sending a second fragment, "whose offset and length only need to fit within the hole pointed to by the previously controlled metadata." The researchers noted that this bug is only exploitable from the local network as it requires crafting a malformed packet which would most likely be dropped during routing. However, the researchers say this can be effectively leveraged to root Linux-based embedded devices locally. The second vulnerability, CVE-2022-30552 (CVSS score of 7.1), is a buffer overflow that could lead to a denial of service (DoS). The second vulnerability can be exploited by crafting a malformed packet that has a specific value lower than the minimum accepted total length, which would result in the called function attempting to make a copy of a greater size than the buffer can withhold. The researchers informed the U-Boot maintainers of the vulnerabilities on May 18, and fixes are in the works.

    SecurityWeek reports: "Critical U-Boot Vulnerability Allows Rooting of Embedded Systems"

  • news

    Visible to the public "Evasive Phishing Mixes Reverse Tunnels and URL Shortening Services"

    Security researchers have observed an increase in the use of reverse tunnel services, as well as URL shorteners, for large-scale phishing campaigns, making it more difficult to detect and stop the malicious activity. This practice differs from the more common practice of registering domains with hosting providers, who are more likely to respond to complaints and remove phishing sites. Threat actors can use reverse tunnels to host phishing pages locally on their own computers and route connections via the external service. Using a URL shortening service, they can generate new links as often as they want and evade detection. Many of the phishing links are refreshed in less than 24 hours, thus making tracking and taking down the domains more challenging. Researchers at the digital risk protection company CloudSEK have seen an increase in phishing campaigns that combine services for reverse tunneling and URL shortening. According to a report shared by the company, over 500 sites were discovered being hosted and distributed this way. CloudSEK found that the most widely abused reverse tunnel services are Ngrok, LocalhostRun, and Cloudflare's Argo. They also noticed an increase in the use of URL shortening services such as Bit.ly, is.gd, and cutt.ly. This article continues to discuss the increased use of reverse tunnel services and URL shorteners in phishing campaigns.

    Bleeping Computer reports "Evasive Phishing Mixes Reverse Tunnels and URL Shortening Services"

  • news

    Visible to the public "New Tool Aims to Stop 'Solver Service' Bots"

    Researchers at the anti-bot specialist firm Kasada have discovered the use of 'Solver Service' bots, an Application Programming Interface (API)-as-a-service tool designed to bypass most bot management systems. Solving a bot detection system's defense allows enterprising cybercriminals to now commercialize the Solver Service they deciphered and sell it for a profit. Buyers can successfully perform automated bot attacks without any technical skills and without worrying about what bot defenses are implemented into a site. Over the last year, there has been a more than 750 percent increase in the use of solver bots for login abuse/account takeover attacks in the eCommerce sector. This is especially appealing to fraudsters because it allows them to obtain hard-to-come-by items to resell for a profit, as well as scrape content, take over accounts, hoard inventory, and engage in other forms of automated fraud. In response to the discovery, Kasada is launching an enhanced platform that disrupts this growing supply chain of Solver Services and other innovative ways attackers circumvent detection. The company's approach to defeating bots adapts as fast as the attackers working against it, in contrast to older reactive bot management systems that rely on static and poorly obfuscated defense methods. This article continues to discuss Solver Service bots and the new tool developed to stop them.

    BetaNews reports "New Tool Aims to Stop 'Solver Service' Bots"

  • news

    Visible to the public "Bored Ape Yacht Club and Otherside NFTs Taken in Compromised Discord Server"

    Hackers stole over $257,000 in Ethereum and 32 NFTs following the hacking of the Yuga Labs' Bored Ape Yacht Club and Otherside Metaverse Discord services to execute a phishing scheme. A Yuga Labs community manager's Discord account was hacked and used to perform a phishing scheme on the company's Discord servers. This phishing scam involved posing as an exclusive limited offer for current BAYC, Mutant Ape Yacht Club (MAYC), and Otherside NFT holders. A link is provided to a webpage where visitors can mint the free NFT. To increase urgency, the phishing campaign claimed that only a limited number of NFTs could be minted, thus prompting visitors to be less cautious. The webpage stole all Ethereum and NFTs held in the associated wallet after a user visited it and attempted to mint the giveaway. This article continues to discuss the Bored Ape Yacht Club and Otherside Metaverse Discord compromise in an NFT phishing attack.

    CyberIntelMag reports "Bored Ape Yacht Club and Otherside NFTs Taken in Compromised Discord Server"

  • news

    Visible to the public "Personal Information of Over 30,000 Students Exposed in Unprotected Database"

    Security researchers at SafetyDetectives discovered the personal information of more than 30,000 students on an improperly secured Elasticsearch server. The server was left connected to the internet and did not require a password to allow access to the data within. Thus, the researchers estimate that it exposed more than one million records representing the personally identifiable information (PII) of 30,000 to 40,000 students. The researchers noted that the exposed information included full names, email addresses, phone numbers, credit card information, transaction and purchased meals details, and login information stored in plain text. The researchers stated that the improperly secured server was being updated when it was discovered and found evidence of server logs showing student data being exposed. The researchers noted that the 5GB database appeared to contain the details of students who are Transact Campus account holders. The researchers stated that Transact Campus works with higher education institutions in the United States, which means the majority of impacted students are US individuals. Transact Campus provides an application that students can use with a unique personal account (called Campus ID) to make payments and purchases, and which can also be used for activities such as event access, class attendance monitoring, and more. The researchers could not determine whether malicious actors accessed the unprotected database before it was secured. The researchers contacted Transact Campus about the unprotected server in December 2021 but did not receive a reply until January 2022, after they had contacted US-CERT as well. The database had already been secured at that time, but Transact Campus denied being responsible for the breach. Transact Campus told the researchers that the server was set up by a third party for a demo and was never taken down. Transact Campus also stated that the dataset was filled with a fake data set and did not use any production data. However, when the researchers checked a sample of the data, the data seemed to belong to real people.

    SecurityWeek reports: "Personal Information of Over 30,000 Students Exposed in Unprotected Database"

  • news

    Visible to the public "Losses to Cryptocurrency Scams Top $1B, FTC Reports"

    According to data, the Federal Trade Commission (FTC) released Friday, losses from cryptocurrency fraud climbed to over $1 billion between January 2021 through March 2022. The number is a big jump from the $80 million in losses the FTC reported last year for a six-month period between October 2020 and March 2021. The FTC estimates that one out of every four dollars U.S. victims lose to fraud is now paid in cryptocurrency. The FTC noted that a little over half of the reported losses could be traced back to investment scams that promise investors unrealistic returns or nonexistent products. Private research firm Chainalysis observed a similar jump in investment-related fraud in 2021. The FTC stated that nearly half of cryptocurrency scams reported by victims originate from social media, a reflection of the overall growth of fraud originating there. "Giveaway" scams in which fraudsters tell investors to send currency to a wallet address with the promise of getting twice as much or more in return are easily found on platforms including YouTube.

    CyberScoop reports: "Losses to Cryptocurrency Scams Top $1B, FTC Reports"

  • news

    Visible to the public "Bad News: The Cybersecurity Skills Crisis is About to Get Even Worse"

    Security researchers at Trellix have surveyed 1,000 cybersecurity professionals globally and found that nearly a third of the cybersecurity workforce plans to leave the industry in the near future. Organizations are already facing cybersecurity skills shortages, with not enough people having the skills and qualifications required to keep IT systems secure from breaches and other security threats. Adding more fuel to the fire, organizations face a growing threat from cybercriminals and nation-state hackers, whose attacks are growing "in volume and sophistication." Most organizations (85%) report that a workforce shortage is impacting their ability to secure their IT systems and networks. The researchers stated that as for cybersecurity workers themselves, those who plan on leaving the profession are doing so because they feel underappreciated and unable to grow in their roles. A lack of a clear career path (35%), a lack of social recognition (31%), and limited support to develop their skills (25%) were cited as the top three frustrations pushing security workers to quit. Other reasons spurring a move away from cybersecurity were: professionals feeling they had accomplished all they had wanted from their roles, burnout, and not being satisfied with their salaries.

    ZDNet reports: "Bad News: The Cybersecurity Skills Crisis is About to Get Even Worse"

  • news

    Visible to the public "For Ransomware, Speed Matters"

    The LockBit group touts its speed over competing ransomware families to attract potential buyers for its ransomware-as-a-service. Earlier this year, the LockBit group posted a table listing encryption speeds for more than 30 ransomware families, highlighting that LockBit 2.0 was the fastest. Security researchers on Splunk's SURGe research team conducted a new study to see if LockBit's claim that it was the quickest ransomware is true. The researchers found that LockBit was faster than other ransomware families, but there were some notable differences. For example, the "latest and greatest" version, LockBit 2.0, was actually slower at encrypting files than the original LockBit 1.0. And the researchers found that PwndLocker was the second fastest. The LockBit group had ranked it 15th out of 30. The 10 fastest ransomware families include some very well-known names. The researchers stated that Conti was the fourth fastest in Splunk's tests, while LockBit placed it 19th. The researchers noted that there is no way to tell whether the LockBit group fudged the numbers a bit to make certain groups look worse in the analysis than they actually performed, but the researchers acknowledge that there are rivalries between crews as they go "head-to-head" competing for victims. The researchers noted that the difference in results is most likely because of differences in testing methodologies. Security teams should note just how quickly ransomware performs its job. LockBit 1.0 takes 2.33 minutes to encrypt 98553 files. Conti takes a little over a minute longer, at 3.6 minutes. The security research stated that the pace that ransomware encrypts files is faster than any network defender can handle. While the slowest ransomware, Avos, takes 132 minutes to encrypt 98553 files, the median time it takes ransomware to encrypt 98553 files is about 23 minutes. The researchers noted that that is still much faster than many organizations can act. The researchers noted that enterprise defense cannot "win" during the encryption phase, so their best chance for foiling a ransomware attack is to detect the intrusion before the encryption process kicks off. Researchers at Mandiant recently reported that ransomware families tend to spend three to five days in the victim environment collecting information before kicking off the encryption process. The researchers stated that security teams need to be acting during those three to five days.

    Dark Reading reports: "For Ransomware, Speed Matters"

  • news

    Visible to the public "CISA Warns of Critical Vulnerabilities in Illumina Genetic Analysis Devices"

    The US Cybersecurity and Infrastructure Security Agency (CISA) has issued an advisory to warn of critical vulnerabilities in Illumina genetic analysis devices that could allow a remote, unauthenticated attacker to take over an impacted product. The flaws affect Illumina Local Run Manager (LRM), which is used by sequencing instruments designed for clinical diagnostic use in the sequencing of a person's DNA, testing for various genetic conditions, as well as research. CISA is warning about four "critical severity" vulnerabilities and one " high severity" vulnerability that can be exploited to execute arbitrary code, to achieve directory traversal, upload arbitrary files, connect without authentication, and perform man-in-the-middle attacks. Tracked as CVE-2022-1517, CVE-2022-1518, and CVE-2022-1519, the most severe of these vulnerabilities feature a CVSS score of 10. These three vulnerabilities allow for remote code execution at operating system level (LRM runs with elevated privileges), the upload of data outside the intended directory structure, and the upload of arbitrary files. The fourth critical issue, CVE-2022-1521 (CVSS score of 9.1), exists because, by default, LRM does not feature authentication or authorization, which may allow an attacker to inject, intercept, or tamper with sensitive data. The fifth vulnerability is tracked as CVE-2022-1524 (CVSS score of 7.4), and it exists because TLS encryption is missing in LRM version 2.4 and lower, thus allowing a malicious actor to perform a man-in-the-middle attack and access in-transit sensitive data. CISA stated that the issues impact Illumina In Vitro Diagnostic (IVD) devices (NextSeq 550Dx and MiSeq Dx) and Researcher Use Only (ROU) instruments (NextSeq 500, NextSeq 550, MiSeq Instrument, iSeq 100, and MiniSeq Instrument) running different versions of LRM. Illumina issued updates to prevent the remote exploitation of these bugs and is working on delivering full patches for them.

    SecurityWeek reports: "CISA Warns of Critical Vulnerabilities in Illumina Genetic Analysis Devices"

  • news

    Visible to the public "Iranian Hackers Planned Attack on Boston Children's Hospital Last Summer, FBI Director Says"

    The FBI recently released that it managed to detect and mitigate an attack by Iranian state-sponsored hackers against Boston's Children's Hospital last summer. The FBI Director Christopher Wray stated that the quick actions by everyone involved, especially at the hospital, protected both the network and the sick kids that were dependent on it. Wray called the incident one of the "most despicable cyberattacks" he's seen, but he noted that the threat was hardly an isolated one. The FBI in 2021 saw ransomware attacks against 14 of 16 services deemed critical infrastructure by the U.S. government, including hospitals. The FBI issued a warning last November that Iranian hackers were seeking data that could be used to hack U.S. companies. Wray stated that the agency has been "laser-focused" on potential threats to critical infrastructure resulting from the United States' support of Ukraine during Russia's ongoing invasion of the nation. Wray noted that the United States has observed Russia "taking specific preparatory steps towards potential destructive attacks, both here and abroad." And the fallout of those attacks could get worse. Wray stated that the FBI is watching for their cyber activities to become more destructive as the war keeps going poorly for them. Wray noted that China is studying the Ukraine conflict very closely and is trying to figure out how to improve its own capabilities to deter or hurt the U.S. in connection with an assault on Taiwan. Wray stated that the U.S. has to hold the line on multiple fronts all at once and warned that the U.S. cannot let up on China, Iran, or criminal syndicates while being focused on Russia.

    CyberScoop reports: "Iranian Hackers Planned Attack on Boston Children's Hospital Last Summer, FBI Director Says"

  • news

    Visible to the public "UCI Researchers: Autonomous Vehicles Can be Tricked Into Dangerous Driving Behavior"

    Researchers at the University of California, Irvine have discovered that autonomous vehicles can be tricked into an abrupt halt or other undesired driving behavior by placing an ordinary object on the side of the road. The researchers stated that a box, bicycle, or traffic cone might be all that is necessary to scare a driverless vehicle into coming to a dangerous stop in the middle of the street or on a freeway off-ramp, creating a hazard for other motorists and pedestrians. Autonomous vehicles cannot distinguish between objects present on the road by pure accident or those left intentionally as part of a physical denial-of-service attack. Both can cause erratic driving behavior. The researchers focused their investigation on security vulnerabilities specific to the planning module, a part of the software code that controls autonomous driving systems. This component oversees the vehicle's decision-making processes governing when to cruise, change lanes, slow down, and stop, among other functions. The researchers stated that the vehicle's planning module is designed with an abundance of caution, logically, because you don't want driverless vehicles rolling around out of control. However, their testing has found that the software can err on the side of being overly conservative, leading to a car becoming a traffic obstruction or worse.

    UCI News reports: "UCI Researchers: Autonomous Vehicles Can be Tricked Into Dangerous Driving Behavior"

  • news

    Visible to the public "Millions of Budget Smartphones With UNISOC Chips Vulnerable to Remote DoS Attacks"

    Security researchers at Check Point have discovered that millions of budget smartphones that use UNISOC chipsets could have their communications remotely disrupted by hackers due to a critical vulnerability. Chipsets made by UNISOC, one of China's largest mobile phone chip designers, are widely used in budget smartphones, particularly ones sold in Asia and Africa. The company was called Spreadtrum until 2018 when it rebranded as UNISOC. The researchers noted that at the end of 2021, UNISOC had an 11% share of the smartphone application processor market, being ranked fourth after Mediatek, Qualcomm, and Apple. The researchers analyzed UNISOC modem firmware and discovered that it is affected by a serious vulnerability that can allow an attacker to launch a remote denial-of-service (DoS) attack against a device by using a specially crafted packet. Check Point has made available the technical details of the vulnerability, which is tracked as CVE-2022-20210. Several of Google's Android updates released in the past year included patches for UNISOC vulnerabilities. The researchers noted that Google plans on addressing this latest flaw with an upcoming Android update. The vendor, which gave the vulnerability a CVSS score of 9.4 (critical severity), patched it in May, the same month it learned of its existence.

    SecurityWeek reports: "Millions of Budget Smartphones With UNISOC Chips Vulnerable to Remote DoS Attacks"

  • news

    Visible to the public "Quantum Radio Receiver Being Trialled by BT to Boost 5G And IoT"

    BT researchers are trialing a hyper-sensitive quantum Atomic Radio Frequency (RF) receiver to boost next-generation 5G & IoT networks in the UK. According to BT, the quantum antenna technology uses "excited atoms" and is predicted to deliver over 100x greater sensitivity than traditional receivers, with the potential to close the rural connectivity gap across the UK. the researchers noted that a quantum effect called "electromagnetically induced transparency" is utilized to form a highly sensitive electric field detector, which could boost the capability of next-gen 5G and IoT. If successful, the researchers noted that mobile network energy consumption might be reduced, enabling IoT devices to become more cost-efficient and longer lasting. It could also support lower-cost smart cities and smart agriculture. Theoretically, over 100x more sensitive than traditional receivers, the atomic RF Receiver can be positioned in traditionally hard-to-reach locations, potentially bringing mobile networks closer to achieving 100% coverage nationally. BT's trial represents the first time a digitally-encoded message has been received on a 3.6GHz (5G) carrier frequency. Previously, simple audio has been received using much higher frequencies, but this initiative provides an industrial demonstration using digital modulation within one of partner EE's main commercial 5G frequency ranges. In the future, BT researchers want the emerging infrastructure to form the basis of ultra-sensitive 5G receivers for use in very low-power passive mobile networks.

    Information Age reports: "Quantum Radio Receiver Being Trialled by BT to Boost 5G And IoT"

  • news

    Visible to the public "US Warns Organizations of 'Karakurt' Cyber Extortion Group"

    Several government agencies in the United States have issued a joint cybersecurity alert to warn organizations about a data extortion group named "Karakurt." Karakurt is also known as the Karakurt Team and Karakurt Liar. The agencies stated that the group does not rely on malware to encrypt victims' files. Instead, the group relies on exfiltrating data and threatening to sell it or release it publicly if a ransom is not paid within a specific timeframe. The agencies noted that typically, the Karakurt hackers give their victims one week to make the payment, with ransom demands ranging between $25,000 and $13 million in Bitcoin. When contacting the victim, the Karakurt actors provide screenshots or copies of stolen files to prove the intrusion. The agencies noted that once the ransom has been paid, the attackers also provide some sort of proof that files have been deleted and may also share details on how the initial intrusion occurred. The group has also been observed harassing victims' employees, business partners, and clients in an attempt to pressure the company into making the payment. The agencies noted that the attackers often would share samples of stolen data, mainly personally identifiable information (PII), such as Social Security numbers, employment records, health records, private emails, payment accounts, and sensitive business files. Some victims, however, reported that the attackers "did not maintain the confidentiality of victim information" even if the ransom was paid. Before January 2022, the Karakurt group operated a leaks and auction website, but the domain went offline in spring 2022 after reportedly being relocated to the dark web. The agencies stated that as of May 2022, the website contained several terabytes of data purported to belong to victims across North America and Europe, along with several 'press releases' naming victims who had not paid or cooperated and instructions for participating in victim data auctions.

    SecurityWeek reports: "US Warns Organizations of 'Karakurt' Cyber Extortion Group"

  • news

    Visible to the public "Leaks Show Conti Ransomware Group Working on Firmware Exploits"

    In late February, after Conti expressed support for Russia following its invasion of Ukraine, a Ukrainian hacker started leaking information stolen from the cybercrime group, including chat logs, credentials, email addresses, C&C server details, and malware source code. Researchers from Eclypsium analyzed the leaked information and stated that the information showed that the cybercrime gang operated just like a regular company, with contractors, employees, and HR problems. The researchers also found that the Conti group has been looking into firmware-based attacks, specifically ones targeting Intel ME. Intel ME provides various features for computers powered by Intel processors, including out-of-band management and anti-theft protection. According to the researchers, Conti developers have been fuzzing the ME interface in an attempt to find undocumented commands and flaws, and they were trying to generically bypass protections. The hackers were also looking into creating a System Management Mode (SMM) implant that would allow them to stealthily modify the kernel. The researchers also noted that the cybercriminals' conversations revealed that they were also analyzing research made public by major Russian cybersecurity companies. The researchers stated that no new or unmitigated vulnerabilities appear to have been discovered in Intel chipsets but warned that the main problem is related to organizations failing to update chipset firmware regularly. The researchers stated that once the attacker has gained access to the firmware, they could permanently brick the system. They could also use this access for persistence and evading security products and device protections, which can be highly valuable to a group like Conti. Obtaining firmware-based persistence can also be monetized by the cybercriminals by reselling access to other threat actors or by dropping more ransomware payloads at a later date.

    SecurityWeek reports: "Leaks Show Conti Ransomware Group Working on Firmware Exploits"

  • news

    Visible to the public "Connecticut Becomes Fifth US State to Enact Consumer Privacy Law"

    Connecticut Governor Ned Lamont officially signed into law the Public Act titled "An Act Concerning Personal Data Privacy and Online Monitoring" on May 10. Commonly referred to as the Connecticut Privacy Act (CTPA), the new legislation provides consumers with enhanced privacy rights, including the right of access, rectification, and deletion of data. CTPA also provides the right of data portability, which empowers consumers to ask for a copy of their personal data and the right to opt out in cases in which their data is to be used for purposes of targeted advertising, sold, or profiled by automated systems that can produce "legal or similarly significant effects concerning the consumer." Additionally, the CTPA establishes obligations on data controllers and assigns enforcement powers to the Attorney General (AG). The CTPA's scope applies to entities that conduct business in Connecticut or that target Connecticut residents and those who processed the personal data of at least 100,000 consumers in the preceding calendar year. The CTPA also targets businesses that in the prior calendar year processed the personal data of at least 25,000 consumers and derived more than 25% of their gross revenue from the sale of personal data. Businesses falling in one of these categories will have to "provide consumers with a reasonably accessible, clear, and meaningful privacy notice" and to "implement the data minimization principle by restricting the collection of personal data to what is adequate, relevant, and reasonably necessary."

    Infosecurity reports: "Connecticut Becomes Fifth US State to Enact Consumer Privacy Law"

  • news

    Visible to the public "Europol Announces Takedown of FluBot Mobile Spyware"

    Europol recently announced the takedown of FluBot, a piece of mobile malware targeting both Android and iOS devices that has been fast-spreading via SMS messages. FluBot is also referred to as Fedex Banker and Cabassous. The spyware has been around since late 2020, mainly focused on users in Europe, but with attacks also registered in the United States, Australia, Japan, New Zealand, and elsewhere. Europol noted that the threat spreads using a technique known as smishing, which involves SMS phishing messages that attempt to lure victims into clicking a link to download the malicious payload. Initially, FluBot only targeted Android devices, but recent campaigns were seen targeting iOS devices as well. Security researchers have reported seeing tens of thousands of SMS messages being sent hourly as part of these widespread attacks. Europol stated that the smishing messages masquerade as voicemails and messages from the mobile operator. It may also contain more traditional phishing lures, such as delivery notifications or claims that someone is sharing a photo album with the intended victim. Once FluBot has been installed on a device, the malware starts spamming text messages to the victim's contacts to infect their devices too. Furthermore, FluBot would steal user passwords, online banking information, and other sensitive data from the infected devices. Dutch Police were recently able to successfully disrupt the FluBot infrastructure as part of an operation involving law enforcement authorities in 11 countries. Europol stated that the FluBot infrastructure is now under the control of law enforcement, putting a stop to the destructive spiral. To hide its malicious intent, FluBot disguises itself as a legitimate application, but it won't let the user open the app or uninstall it. Resetting the device to factory settings should eliminate the threat. Europol noted that in March last year, members of the FluBot gang were arrested in Spain, but the malware continued to operate and expand.

    SecurityWeek reports: "Europol Announces Takedown of FluBot Mobile Spyware"

  • news

    Visible to the public "Unpatched Vulnerability Exposes Horde Webmail Servers to Attacks"

    Security researchers at Sonar have discovered that the Horde webmail software is affected by a serious vulnerability that can be exploited to gain complete access to an organization's emails. The flaw is tracked as CVE-2022-30287, and it can be exploited by getting a user to open a specially crafted email. The researchers stated that the Shodan search shows more than 3,000 internet-exposed instances worldwide, and there are likely many more internal instances that can still be exploited if an organization's email server is exposed. The researchers stated that this vulnerability allows an attacker to compromise an entire organization's email service. The only condition is that a single member of this organization views a maliciously crafted email. While exploiting the vulnerability requires authentication, the flaw can also be exploited remotely by an unauthenticated attacker using cross-site request forgery (CSRF). The researchers noted that an adversary can create an email that includes an external image, which exploits the vulnerability when it is rendered. Successfully exploiting the flaw allows the attacker to execute arbitrary code on the underlying server. The researchers noted that Horde should block the image by default, but they showed how an attacker can bypass this restriction. The attack works against default Horde configurations, and it does not require any knowledge of the targeted instance. The researchers also found that the exploit also results in the clear text credentials of the user triggering the exploit getting leaked to the attacker. Horde is no longer being actively maintained.

    SecurityWeek reports: "Unpatched Vulnerability Exposes Horde Webmail Servers to Attacks"

  • news

    Visible to the public "Vendor Refuses to Remove Backdoor Account That Can Facilitate Attacks on Industrial Firms"

    Security researchers at SEC Consult discovered that Korenix JetPort industrial serial device servers have a backdoor account that malicious hackers could abuse in attacks aimed at industrial organizations. The existence of the backdoor account, tracked as CVE-2020-12501, was discovered in 2020, but it was only made public now after a lengthy disclosure process that ended with the vendor saying that the account will not be removed. The researchers stated that the account in question can be exploited by an attacker on the network to access the device's operating system and gain full control. The researchers noted that the attacker could reconfigure the device and possibly gain access to other systems attached to the server. The issue was identified in the Korenix JetPort 5601V3 product, which is designed for connectivity in industrial environments. The researchers also believe that other products, including Westermo and Comtrol branded industrial devices, may also be impacted. The researchers stated that the backdoor account has the same password on all devices as it is stored in the firmware. The password is not stored in clear text and needs to be cracked, but once an attacker has cracked the password, it can be used to attack all affected devices. Moreover, the password cannot be changed by the user. The vendor told SEC Consult the backdoor account is needed for customer support and argued that the password "can't be cracked in a reasonable amount of time."

    SecurityWeek reports: "Vendor Refuses to Remove Backdoor Account That Can Facilitate Attacks on Industrial Firms"

  • news

    Visible to the public "Chinese State Media Propaganda Found in 88% of Google, Bing News Searches"

    According to new research at Brookings Institution, Chinese state media have proven very effective at influencing search engine results for users seeking information on Xinjiang, a region of China where the Uyghur ethnic minority has been subjected to what the State Department calls genocide. The researchers also studied search engine results for Chinese state propaganda relating to the COVID-19 pandemic, a topic that Beijing has proven eager to control due to widespread condemnation of its botched early response to the crisis. The research team compiled daily data over 120 days on 12 terms related to Xinjiang and COVID-19 from five different sources: Google Search, Google News, Bing Search, Bing News, and YouTube, which Google owns. The researchers found that at least one Chinese state-backed news outlet appeared in the top 10 results in 88% of news searches. State media appeared even more often on YouTube, showing up in 98% of searches. A Bing spokesperson provided a statement that said the company is "always looking for ways to learn and improve and are reviewing the detailed findings in this report." Google also issued a statement that it "actively works to combat coordinated influence and censorship operations while also protecting access to information and free expression online." Disinformation scholars called the Brookings Institution research vital because it focuses on search engines returning propaganda, which has historically been an understudied element of the disinformation landscape compared to more prominent threats such as bots and forged Twitter accounts. According to Justin Sherman, a disinformation scholar at the Atlantic Council's Cyber Statecraft Initiative, the research underscores how vital it is for Google and Microsoft to do more to avoid disseminating propaganda in part by becoming more transparent about how their algorithms work. Sherman noted that the search engines should consider applying the de-ranking policies, which are currently used to limit Russian state content to Chinese content. Sherman stated that it is not surprising that the Chinese government is getting better and better at promoting its narrative through Western search engines. Other disinformation experts said they were surprised by the degree to which Chinese state media is infiltrating Google and Microsoft search engines. Adam Segal, the director of the Digital and Cyberspace Policy program at the Council on Foreign Relations, stated that Chinese state propaganda surfacing so consistently in the top 10 search results for Google and Bing is unexpected in part because of the perception that China and the West rely on "two separate internets."

    CyberScoop reports: "Chinese State Media Propaganda Found in 88% of Google, Bing News Searches"