Dr. T's security brief

460 views
Skip to first unread message

dtau...@gmail.com

unread,
Jan 7, 2024, 9:04:32 AMJan 7
to sec-...@googlegroups.com

SSH Servers Vulnerable to New Terrapin Attacks
BleepingComputer
Bill Toulas
January 3, 2024


The Terrapin attack developed by researchers at Germany's Ruhr University Bochum could put nearly 11 million Internet-exposed Secure Shell Protocol (SSH) servers at risk, according to security threat monitoring platform Shadowserver. The attack compromises the integrity of the SSH channel by manipulating sequence numbers during the handshake process. Attackers can intercept and modify the handshake exchange in the adversary-in-the-middle position. The researchers have developed a scanner to assess SSH client or server vulnerability.

Full Article

 

 

Machine Learning Helps Fuzzing Find Hardware Bugs
IEEE Spectrum
Tammy Xu
January 3, 2024


Texas A&M University researchers used the "fuzzing" technique, which introduces incorrect commands and prompts, to automate chip testing on the assembly line to help identify hardware bugs early in the development process. The researchers used reinforcement learning to select inputs for fuzz testing, then adapted an algorithm used to solve the multi-armed bandit (MAB) problem. The researchers found the MABFuzz algorithm significantly sped up the detection of vulnerabilities and covering the testing space.

Full Article

 

 

Your Car Is Tracking You. Abusive Partners May Be, Too
The New York Times
Kashmir Hill
December 31, 2023


Internet-connected vehicles gather large amounts of data using a variety of methods, and privacy advocates have raised concerns about how this data is being used and shared by auto manufacturers. Although drivers benefit from the convenience of smartphone apps that pinpoint a car's location and allow remote locking and unlocking, among other things, these same convenience features can be used by abusive domestic partners to track their victims. Vehicle manufacturers generally are unwilling to end an abusive partner's access to these apps, especially if the vehicle’s loan and title are in their name.

Full Article

*May Require Paid Registration

 

 

Java Applications Have Major Security Flaws
Tech Times
Jace Dela Cruz
December 28, 2023


Widely-used Java applications examined by researchers led by Alexandre Bartel at Umeå University in Sweden were found to have major security vulnerabilities in their deserialization process, in which packaged information is restored to its previous state. The study found the flow of bytes allows attackers to modify information during deserialization to gain control over the receiving system. Said Bartel, "The problem is that the programmers seem to repeat the same mistakes over and over again and therefore reintroduce the vulnerabilities."

Full Article

 

 

iPhone Triangulation Attack Abused Undocumented Hardware Feature
BleepingComputer
Bill Toulas
December 27, 2023


The Operation Triangulation spyware attacks targeting iPhone devices since 2019 leveraged undocumented features in Apple chips to bypass hardware-based security protections. The attacks, which exploit four zero-day vulnerabilities, start with a malicious iMessage attachment sent to the target, and the entire chain is zero-click. Kaspersky discovered the attack within its own network in June 2023. It then reverse engineered the attack chain, concluding that the attackers "are able to write data to a certain physical address while bypassing the hardware-based memory protection by writing the data, destination address, and data hash to unknown hardware registers of the chip unused by the firmware."
 

Full Article

 

 

Content Credentials Will Fight Deepfakes in the 2024 Elections
IEEE Spectrum
Eliza Strickland
December 27, 2023


With nearly 80 countries holding major elections in 2024, the deployment of content credentialing to fight deepfakes and other AI-generated disinformation is expected to gain ground. The Coalition for Content Provenance and Authenticity (C2PA), an organization that’s developing technical methods to document the origin and history of real and fake digital-media files, in 2021 released initial standards for attaching cryptographically secure metadata to image and video files. It has been further developing the open-source specifications and implementing them with leading media companies. Microsoft, meanwhile, recently launched an initiative to help political campaigns use content credentials.
 

Full Article

 

CNBC Analysis: 2023 Proved Cryptocurrency Critics Right

In an approximately 2,400-word analysis for CNBC Share to FacebookShare to Twitter (12/30), MacKenzie Sigalos discusses challenges in the cryptocurrency industry. Signalos writes, “After a brutal 18 months of bankruptcies, company failures and criminal trials, the crypto market is starting to claw back some of its former standing. Bitcoin is up more than 150% this year. Meanwhile, Solana is nearly 10x higher in the last 12 months, and bitcoin miner Marathon Digital has also skyrocketed. Crypto-pegged stocks like Coinbase, MicroStrategy and the Grayscale Bitcoin Trust rose more than 300% in value year-to-date.” However, “even as prices swell, the sector’s reputation has struggled to regain ground after names virtually synonymous with bitcoin have both been found guilty of crimes directly related to their multibillion-dollar crypto empires.”

dtau...@gmail.com

unread,
Jan 13, 2024, 7:20:51 PMJan 13
to sec-...@googlegroups.com

Security of Georgia's Dominion Voting Machines on Trial

A federal trial has begun to determine whether Dominion Voting Systems' touch-screen voting machines used in the U.S. state of Georgia can be hacked or manipulated. In Georgia, once voters make their choices, their ballots are printed with their votes and a QR code; the QR code is ultimately what is read and cast as the voter’s ballot. Several voters and the Coalition for Good Governance, who launched the suit, want the state to revert to paper ballots which, they say, will assure voters their ballots are being counted properly.
[
» Read full article ]

CBS News; Jared Eggleston (January 9, 2024)

 

 

China Forensic Firm Cracks Apple’s AirDrop

Chinese forensic firm Beijing Wangshendongjian Technology Co Ltd has “broken through the technical difficulties of tracing anonymous AirDrops," according to an article on the official WeChat of Beijing’s Bureau of Justice. When a Beijing subway passenger’s iPhone received an "inappropriate" video via AirDrop, Wangshendongjian analyzed the iPhone’s logs and found the sender’s mobile number and email address in the form of hash values. It then used a “rainbow table” of cracked passwords to decode enough information to help police “identify several suspects."
[ » Read full article ]

South China Morning Post; Yuanyue Dang (January 9, 2024)

 

 

AI Helps U.S. Intelligence Track Hackers Targeting Critical Infrastructure

At a Jan. 9 conference hosted by Fordham University, cybersecurity leaders said U.S. intelligence authorities are leveraging AI to detect hackers that increasingly are using the same technology to conceal their activities. National Security Agency's Rob Joyce explained that hackers are "using flaws in the architecture, implementation problems, and other things to get a foothold into accounts or create accounts that then appear like they should be part of the network." The FBI's Maggie Dugan noted that hackers are using open source models and their own datasets to develop and train their own generative AI tools, then sell them on the dark web.
[
» Read full article *May Require Paid Registration ]

WSJ Pro Cybersecurity; Catherine Stupp (January 10, 2024)

 

 

Philippines Turns to Hackers to Ward off China Cyber Threat

Amid rising tensions in the South China Sea, the Philippines has seen an increase in state-sponsored cyberattacks. The cybersecurity firm Surfshark said the Philippines was among the world’s 30 most cyber-attacked countries, with more than 60,000 user accounts compromised in the third quarter. The government's understaffed cyber response team is significantly understaffed (with just 35 members), which means it sometimes must collaborate with anonymous "black hat" hackers to obtain tips on looming threats.
[ » Read full article *May Require Paid Registration ]

Bloomberg; Cliff Harvey Venzon; Ditas B. Lopez; Jr., Manolo Serapio (January 7, 2024); et al.

 

 

Museum World Hit by Cyberattack on Software
The New York Times
Zachary Small
January 3, 2024


A cyberattack affecting technological service provider Gallery Systems took several museums' online collections offline when the eMuseum tool went down. The software allows visitors to search online collections and museums to manage sensitive information. Gallery Systems reported its software became encrypted and ceased operating on Dec. 28. Cyberattacks against cultural groups are becoming more common, according to some security experts.

Full Article

*May Require Paid Registration

 

SEC X Account Hacked, Briefly Falsely Claims Commission Approved Bitcoin Fund

The New York Times Share to FacebookShare to Twitter (1/9, Yaffe-Bellany) reports, “For 15 minutes, the cryptocurrency industry was euphoric. At 4:11 p.m. on Tuesday, the official X account” of the SEC “announced that regulators had approved a new investment product tracking the price of Bitcoin, an apparent victory for the embattled crypto industry.” Then, 15 minutes later, SEC Chair Gensler “posted that the agency’s account had been compromised, resulting in an ‘unauthorized tweet.’ An S.E.C. spokeswoman confirmed the hack in an emailed statement.” Bloomberg Share to FacebookShare to Twitter (1/9, Versprille, Subscription Publication) reports the incident “has sparked an investigation by US authorities into how a social media account at Wall Street’s main regulator was compromised.” Politico Share to FacebookShare to Twitter (1/9, Harty) reports X “is also investigating the hack, according to Joe Benarroch, head of business operations.”

        The Washington Post Share to FacebookShare to Twitter (1/9, Menn) reports, “Bitcoin backers have asked the SEC for permission to list such funds repeatedly, since they would give investors a more regulated way to participate in the crypto markets. The false post briefly drove a spike in bitcoin prices, so that anyone with knowledge of the scam could have reaped a major profit.” The Wall Street Journal Share to FacebookShare to Twitter (1/9, Kiernan, Osipovich, Subscription Publication) reports that an actual “decision on the funds is expected on Wednesday.” Reuters Share to
FacebookShare to Twitter (1/9, Lang, Mcgee) and The Hill Share to FacebookShare to Twitter (1/9) provide similar coverage.

 

FCC Asks Automakers To Disclose, Plan Policies Around Vehicle Location Privacy

The AP Share to FacebookShare to Twitter (1/11) reports the FCC “is asking automakers how they plan to protect people from being stalked or harassed by partners who have access to vehicle location and other data.” FCC Chairwoman Jessica Rosenworcel, in a letter sent on Thursday to major automakers, “asks for details about connected car systems and plans to support people who have been harassed by domestic abusers.” Rosenworcel said in a statement, “No survivor of domestic violence and abuse should have to choose between giving up their car and allowing themselves to be stalked and harmed by those who can access its data and connectivity.” The letter also “asks if the companies remove access even from someone whose name is on the vehicle’s title.”

dtau...@gmail.com

unread,
Jan 21, 2024, 7:34:17 PMJan 21
to sec-...@googlegroups.com

Britain's Spies Mark 80th Anniversary of Code-Breaking Computer

January 18 marked the 80th anniversary of Colossus, the first digital computer, which decoded German messages for the Allied forces during World War II and is credited by many experts for shortening the war. Developed by Tommy Flowers, Colossus decreased the time it took to decode messages from weeks to just hours using 2,500 valves to process information.
[ » Read full article ]

Reuters; Sarah Young (January 18, 2024)

 

 

Tablet's Light Sensor Can Spy on Users

Massachusetts Institute of Technology researchers demonstrated that ambient light sensors on tablets can be employed by hackers to spy on users. The researchers developed an inversion algorithm to transform readings from such a sensor into a 32x32-pixel image of the region above the display. This test generated images of two-finger scrolling, three-finger pinches, and other touch gestures using a Samsung Galaxy View2 tablet. They also demonstrated that videos could be used to conceal illumination patterns.
[ » Read full article ]

IEEE Spectrum; Edd Gent (January 16, 2024)

 

 

First Unhackable Shopping Transactions Carried Out on Quantum Internet

Researchers at China's Renmin University demonstrated the first unhackable shopping transactions on a network of five quantum computers. Each of the quantum computers played a role, with one serving as the merchant, two serving as buyers, and two serving as neutral mediators. They communicated via quantum encryption keys (sequences of quantum light signals). The merchant produced an e-commerce contract that it and a buyer verified and signed, with their communications first going through a third-party mediator.

[ » Read full article *May Require Paid Registration ]

New Scientist; Karmela Padavic-Callaghan (January 12, 2024)

 

 

Breath 'Fingerprint' Could Be Used to Unlock Phones

Indian Institute of Technology Madras researchers found breathing data can be used as a biometric test for unlocking devices. They fed air velocity sensor readings of 10 breaths from each of 94 participants into an AI model, which detects an individual's unique patterns of breath turbulence created by the shape of their nasal and oral passages, pharynx, and larynx. After analyzing the breath of a particular individual, the model was more than 97% accurate in determining whether or not a breath came from that person.

[ » Read full article *May Require Paid Registration ]

New Scientist; Matthew Sparkes (January 12, 2024)

 

 

Our Fingerprints May Not Be Unique

Columbia University researchers developed an AI tool that can determine whether prints from different fingers came from a single person. The tool analyzed 60,000 fingerprints and was 75% to 90% accurate. Though uncertain how the AI makes its determinations, the researchers believe it concentrates on the orientation of the ridges in the center of a finger; traditional forensic methods look at how the individual ridges end and fork.
[ » Read full article ]

BBC; Zoe Kleinman (January 11, 2024)

 

 

Network-Connected Torque Wrench Is Vulnerable to Ransomware

Researchers at the IT security firm Nozomi Networks identified 25 vulnerabilities in Wi-Fi-enabled pneumatic torque wrenches featuring a Bosch Rexroth Linux-based NEXO-OS operating system. The researchers were able to install ransomware on the Bosch wrenches, then alter the graphical user interface (GUI) to display a message requesting a ransom payment. It also is possible to change the wrenches' configuration settings while displaying a normal value on the GUI. Bosch Rexroth said it will provide an official fix by the end of the month.
[ » Read full article ]

PC Magazine; Michael Kan (January 9, 2024)

 

 

AI-Driven Misinformation 'Biggest Short-Term Threat to Global Economy'

The World Economic Forum's annual risks report, based on a survey of 1,300 experts, revealed that respondents believe the biggest short-term threat to the global economy will come from AI-driven misinformation and disinformation. This is a major concern, given that elections will be held this year in countries accounting for 60% of global gross domestic product. Other short-term risks cited by respondents include extreme weather events, societal polarization, cyber insecurity, and interstate armed conflict.
[ » Read full article ]

The Guardian; Larry Elliott (January 10, 2024)

 

 

OpenAI Working With Pentagon On Cybersecurity Tools. Bloomberg Share to FacebookShare to Twitter (1/16, Subscription Publication) reports OpenAI is working “with the Pentagon on a number of projects including cybersecurity capabilities, a departure from the startup’s earlier ban on providing its artificial intelligence to militaries.” The ChatGPT developer is making tools “with the US Defense Department on open-source cybersecurity software, and has had initial talks with the US government about methods to assist with preventing veteran suicide, Anna Makanju, the company’s vice president of global affairs, said in an interview at Bloomberg House at the World Economic Forum in Davos on Tuesday.” OpenAI also “said that it is accelerating its work on election security, devoting resources to ensuring that its generative AI tools are not used to spread political disinformation.”

 

Lawmakers Propose Bupartsian Bill To Criminalize Deepfake Nudes Of Real People

The Wall Street Journal Share to FacebookShare to Twitter (1/16, Jargon, Subscription Publication) reports that on Tuesday, Resp. Joseph Morelle (D-NY) and Tom Kean (R-NJ) re-introduced the “Preventing Deepfakes of Intimate Images Act,” which would criminalize the nonconsensual sharing of digitally-altered intimate images. The Journal explains bipartisan move Tuesday comes in response to an incident at Westfield High School in New Jersey. Boys there were sharing AI-generated nude images of female classmates without their consent.

        California Assemblymember Proposes Bill Cracking Down On Harmful AI-Generated Content. Politico Share to FacebookShare to Twitter (1/16, Korte) reports a California state lawmaker “wants to crack down on AI-generated depictions of child sexual abuse as tech companies face growing scrutiny nationally over their moderation of illicit content.” A new bill “from Democratic Assemblymember Marc Berman, first reported in California Playbook, would update the state’s penal code to criminalize the production, distribution or possession of such material, even if it’s fictitious.” Among the backers “is Common Sense Media, the nonprofit founded by Jim Steyer that for years has advocated for cyber protections for children and their privacy.” The legislation “has the potential to open up a new avenue of complaints against social media companies, who are already battling criticisms that they don’t do enough to eradicate harmful material from their websites.”

 

States Enact Data Privacy Laws As Federal Policy Defers On Issue

Roll Call Share to FacebookShare to Twitter (1/17, Ratnam) reports, “States that have enacted data privacy laws and those pursuing them are migrating into disparate camps in their approaches to privacy protections, setting up a clash if Congress enacts federal legislation.” Currently, a number of states – including California, Oregon, Montana, Utah, and Virginia – have passed some form of data privacy laws, but most do not allow individuals to personally sue companies over data breached, instead offering consumers “a mix of basic and substantive protections.” Instead, most of the policies allow state attorneys general to “bring lawsuits against companies for violations.” However, multiple parties have argued that the laws could be modified or effected if Congress picks up the issue in the coming year.

 

That Emergency Phone Call from a Loved One Could Actually Be Scammers Using AI – How to Stay Safe
Scammers are now using AI technology to create deepfakes of loved ones' voices, making it harder to distinguish legitimate calls from fraudulent ones. To stay safe, it is important to be cautious of unexpected emergency calls, verify the information with the person directly or someone who knows them, and report suspicious activities to the police or the FBI. (TOMSGUIDE.COM)

 

Docker Hosts Hacked in Ongoing Website Traffic Theft Scheme
A campaign targeting vulnerable Docker services has been discovered, where attackers deploy an XMRig miner and the 9hits viewer app on compromised hosts. The 9hits app generates traffic for the attackers using the resources of the compromised systems, while the XMRig miner mines Monero cryptocurrency. This campaign highlights the need for stricter security checks and policies to prevent unauthorized use of platforms like 9hits that can cause financial damage and disruption. (BLEEPINGCOMPUTER.COM)

 

Vicarius Lands $30M for Its AI-Powered Vulnerability Detection Tools
Vulnerability remediation platform Vicarius has raised $30 million in a Series B funding round led by Bright Pixel Capital. The company's AI-powered tools, including the recently launched vuln_GPT text-generating AI tool, help automate system breach detection and remediation. With a growing customer base of over 400 brands, Vicarius plans to use the funding to advance its product roadmap and expand its team. The platform analyzes apps for vulnerabilities, offers in-memory protection, and provides access to a community of security researchers. Vicarius aims to consolidate and scale the vulnerability remediation process for enterprises. (TECHCRUNCH.COM)

 

NIST Offers Guidance on Measuring and Improving Your Company’s Cybersecurity Program
The National Institute of Standards and Technology (NIST) has released draft guidance on measuring information security efforts to help organizations evaluate and improve their cybersecurity programs. The two-volume document provides practical advice on developing an effective program and using quantitative measurements to communicate progress. NIST is seeking public comments on the draft until March 18, 2024. The guidance can be used in conjunction with risk management frameworks and aims to move organizations from qualitative descriptions of risk to data-driven assessments. The publication is tailored for both information security specialists and executives, offering guidance on specific measures and the development of an information security measurement program. (NIST.GOV)

 

FBI and CISA Warn Companies to Be Wary of Using Chinese-Made Drones Over National Security Risks
The FBI and Cybersecurity and Infrastructure Security Agency (CISA) have issued a warning stating that Chinese-made drones pose a significant risk to critical infrastructure and US national security. The memo highlights Chinese laws that require companies, including drone manufacturers, to provide the government with access to collected data, raising concerns about sensitive information exposure. The Department of Homeland Security has previously warned about the risks posed by Chinese-made drones, emphasizing the potential access to flight data by the Chinese government. (CNN.COM)

 

Critical Infrastructure Sees Most Cyber Incidents Due to Lack of Budget
Insufficient cybersecurity investment has led to a significant number of cyber incidents in critical infrastructure, oil & gas, and energy organizations in the META region, according to a study by Kaspersky. Of the companies surveyed, 60% in these sectors experienced cyber breaches due to improper budget allocation. Additionally, 24% of companies in the region reported not having enough funds for adequate cybersecurity measures. To address these issues, organizations are planning to invest in threat detection software, training programs, endpoint protection software, hiring IT professionals, and adopting SaaS cloud solutions. (MSN.COM)

 

CISA, FBI and EPA Release Incident Response Guide for Water and Wastewater Systems Sector
A joint guide has been released by CISA, FBI, and EPA to assist the Water and Wastewater Systems (WWS) Sector in preparing for and responding to cyber incidents. The guide covers the four stages of the incident response lifecycle and provides best practices, resources, and federal roles and responsibilities for each stage. (CISA.GOV)

 

CISA Releases 2023 Year in Review Showcasing Efforts to Protect Critical Infrastructure
CISA's 2023 Year in Review highlights their work in managing cyber and physical risks in communities across the US, including promoting secure software design, providing pre-ransomware notifications, conducting vulnerability warnings, and implementing cybersecurity recommendations. They also championed secure open-source software and released roadmaps for artificial intelligence and secure AI system development. Additionally, CISA made progress on implementing the Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) and launched the Secure Our World cybersecurity awareness program. They also played a vital role in protecting and defending federal networks, mitigating vulnerabilities, blocking malicious DNS requests, and responding to significant incidents. (CISA.GOV)

 

Illicit Crypto Addresses Received at Least $24.2 Billion in 2023 - Report
Crypto research firm Chainalysis reveals that at least $24.2 billion worth of cryptocurrency was sent to illicit wallet addresses in 2023. The figure is expected to rise as more illicit addresses are identified. Sanctioned entities and jurisdictions accounted for $14.9 billion of the illicit transaction volume, with the majority coming from crypto services in U.S.-sanctioned jurisdictions. Revenue from crypto scamming and hacking declined, while ransomware and darknet markets saw increased profits. Stablecoins have become the dominant cryptocurrency used in illicit transactions. (REUTERS.COM)

 

$80M in Crypto Disappears Into Drainer-as-a-Service Malware Hell
A phishing campaign called "Inferno Drainer" has stolen over $80 million in cryptocurrency from 137,000 victims using brand impersonation. The campaign, which ran for a year, used more than 16,000 unique domains and employed a "drainer-as-a-service" model. While the campaign has been disrupted, experts warn that the success of Inferno Drainer may inspire the development of new drainers in 2024. Cryptocurrency holders are advised to be cautious of websites offering free digital assets, while businesses in the crypto sphere should report phishing websites and employ cybersecurity solutions to detect and block threats. (DARKREADING.COM)

 

Hacker Swipes $3.3M from Bungee Crypto Bridge Users by Exploiting Contract Bug
Over 200 wallets using crypto bridge aggregator Bungee have lost funds totaling $3.3 million due to a bug in the underlying technology. The bug allowed a hacker to drain funds from wallets that had previously used Bungee's Socket route to send tokens on Ethereum. The majority of stolen tokens were converted to Ether, with smaller amounts of other cryptocurrencies remaining in the hacker's wallet. The project behind Bungee, Socket, has paused the exploited smart contract to prevent further damage. Users are advised to revoke permissions granted to DeFi protocols after bridging to prevent similar incidents. (DLNEWS.COM)

 

China Raises Private Hacker Army to Probe Foreign Governments
China's cybersecurity law, which requires Chinese companies to report software vulnerabilities to the government, has inadvertently created a private army of hackers. The law has led to collaboration and competition among Chinese state institutions, resulting in efforts to outperform each other in finding cybersecurity vulnerabilities in software used by foreign governments. China's growing cybersecurity industry and the overlap between the vulnerability databases of the industry ministry and the military and intelligence agencies further highlight the dual purpose of these hackers. Concerns have been raised about the negative utilization of hacking talents if the traditional security sector fails to absorb them. (NEWSWEEK.COM)

 

Risk of Cyber Incidents Weigh Heavily on Businesses for 2024, Report Finds
A report by Allianz Commercial has identified cyber incidents as the top business risk for 2024, with 36% of respondents expressing concern. The report includes data breaches, IT disruptions, ransomware attacks, and fines as cyber incidents. Data breaches were cited as the most concerning cyber risk by 59% of companies surveyed. Cyber criminals are increasingly using new technologies like artificial intelligence to automate attacks, leading to more effective malware and phishing attempts. Business interruptions and natural catastrophes were also highlighted as major concerns for businesses in 2024. (FOXBUSINESS.COM)

 

Credentials Are Still King: Leaked Credentials, Data Breaches, and Dark Web Markets
Infostealer malware poses a major risk to corporate information security, stealing credentials and exporting them to command and control infrastructure. Leaked credentials, particularly from third-party breaches and infostealer logs, continue to be a significant threat to organizations. Monitoring leaked credentials databases, requiring password resets, and using password managers are recommended defense strategies. Combolists, which combine credential pairs for brute-forcing, also present a considerable attack vector. Tier 2 leaked credentials obtained through infostealer malware pose increased risks, while fresh stealer logs in Tier 3 may enable session hijacking attacks. Multi-factor authentication is not foolproof, as threat actors have techniques to bypass it. Flare offers a monitoring platform for leaked credentials. (BLEEPINGCOMPUTER.COM)

 

Veon CEO Says Russian State Actors Behind Kyivstar Cyberattack
Veon CEO Kaan Terzioglu has revealed that the December cyberattack that disrupted phone and internet services for approximately 24 million people in Ukraine was executed by Russian state actors. Terzioglu described the attack as "military-grade" and stated that Veon's investigation pointed to Russian state actors as the culprits. The cyberattack affected Kyivstar, Ukraine's largest mobile company, as well as digital banking services, ATMs, and air raid sirens. Veon provided $100 million in benefits to customers as compensation for the three days of disrupted services. (BLOOMBERG.COM)

 

Cyberattack on Ukraine's Kyivstar to Cost Veon Nearly $100 Million in Sales
Veon, the parent company of Kyivstar, Ukraine's largest mobile operator, expects to lose around $95 million in revenue in 2024 due to a major cyberattack in December. The attack disrupted services and damaged IT infrastructure, leading Kyivstar to compensate customers for the inconvenience. Veon does not anticipate a significant financial impact for 2023 but will absorb the costs in the current year. (USNEWS.COM)

 

Courts Reveal True Scale of Cyber Attack on System
The cyber attack on Victoria's court system was more extensive than originally believed, with hackers potentially accessing years' worth of recorded hearings. Court Services Victoria (CSV) discovered that the hack, which occurred in December, involved files dating back to 2016, including Supreme Court matters and County Court recordings. The source of the hack has not been confirmed, but experts suggest that hackers may have gained access through a court staffer's computer system. CSV is working to alert affected individuals and enhance security measures while monitoring the dark web for potential unauthorized publication or sale of the recordings. (COM.AU)

 

UC Irvine Students, Grads Fight Back After Hackers Post Gruesome Images in Cyberattack
UC Irvine students and graduates took action to combat a vicious cyberattack in which hackers targeted them with disturbing images and videos of human and animal mutilation. The attack, which started on January 9, caused shock and distress among the victims. Alina Kim, a UCI computer science and engineering graduate, organized a team to block the content on larger servers and ensure the safety of the community. UC Irvine officials have pledged to support affected students and are working with law enforcement agencies to address the incident. (NBCLOSANGELES.COM)

 

UC Irvine Students Sent to Hospital After Hackers Send Graphic Images to Their Discord Server
Hackers infiltrated UC Irvine's Discord server, posting graphic and violent images that traumatized students. Nearly 3,000 students were affected, with reports of vomiting and distress. The hackers demanded a $1,000 ransom and targeted 30 channels. Students created a bot to block the attackers and tracked down 400 associated accounts. The attack has been reported to UCI police, who plan to involve the FBI. The university is providing counseling and cybersecurity assistance to affected students. Similar attacks have been reported at other universities, including Washington State University and USC. (CBSNEWS.COM)

 

CNMF Marks a Decade Defending the Nation
The Cyber National Mission Force (CNMF) celebrates its 10th anniversary as a key unit of U.S. Cyber Command. CNMF has played a critical role in defending the nation by planning, directing, and synchronizing cyberspace operations to deter and defeat cyber adversaries. Over the past decade, CNMF has responded to national crises, defended U.S. elections, protected critical infrastructure, and conducted missions worldwide. With over 2,000 personnel from various military branches and agencies, CNMF remains committed to defending against advanced cyber threats and collaborating with partners and allies to strengthen cybersecurity. (CYBERCOM.MIL)

 

The Microsoft Threat Intelligence Podcast Microsoft Threat Intelligence Community Spotlights New TTPs
Senior threat researchers from Microsoft Threat Intelligence discuss their analysis of new tactics used by the threat actor known as Mint Sandstorm to target academics. In a recent campaign, this adversary group leveraged compromised accounts to send customized phishing emails and deployed a custom backdoor called MediaPl to maintain covert access into compromised systems. The podcast unveils innovative techniques observed through Microsoft's extensive threat monitoring. (MICROSOFT.COM)

 

Kansas State University Cyberattack Disrupts IT Network and Services
Kansas State University (K-State) is dealing with a cybersecurity incident that has caused disruption to various network systems, including VPN, email, and video services. Impacted systems have been taken offline, and the university is working to restore them with the help of third-party IT forensic experts. Guidance has been provided to academic deans for maintaining educational continuity, and the university is advising students and staff to remain vigilant and report any suspicious activity. This cyberattack follows a ransomware attack on the Memorial University of Newfoundland earlier this month. (BLEEPINGCOMPUTER.COM)

 

Feds: Androxgh0st Botnet Is Targeting AWS, Office 365, and Azure Credentials
The Androxgh0st botnet is actively targeting Amazon Web Services (AWS), Microsoft Office 365, SendGrip, and Twilio credentials, according to the US Cybersecurity and Infrastructure Security Agency (CISA) and the FBI. The botnet can steal credentials and use them to deliver malicious payloads, and server and website owners are advised to take necessary precautions to protect against it. Mitigation measures include keeping systems up to date, reviewing and securing credentials, and scanning for unrecognized files. (PCMAG.COM)

 

CISA and FBI Release Known IOCs Associated with Androxgh0st Malware
CISA and the FBI have jointly released a Cybersecurity Advisory to share known indicators of compromise (IOCs) and tactics associated with Androxgh0st malware. The malware is used to establish botnets for identifying and exploiting vulnerable networks, targeting files with sensitive information. Specific vulnerabilities, such as CVE-2017-9841, CVE-2021-41773, and CVE-2018-15133, are being exploited by threat actors. CISA advises organizations to review and implement the provided mitigations to minimize the impact of Androxgh0st malware. (CISA.GOV)

 

Cyber Safety Review Board Needs Stronger Authorities, More Independence, Experts Say
Experts have testified before Congress, stating that the Cyber Safety Review Board (CSRB) lacks the necessary authorities and independence to effectively investigate major cybersecurity incidents. The CSRB, created in 2021, is meant to review significant cyber incidents, but experts argue that it is too dependent on the participation of the companies it investigates. They call for reform to enhance independence and transparency. The board lacks a full-time staff and the power to subpoena companies, hindering its ability to conduct thorough investigations. The Senate Homeland Security Committee is working on legislation to legally establish the CSRB and grant it subpoena power. (CYBERSCOOP.COM)

 

Cyber Attacks Are One of the Biggest Threats Facing Healthcare Systems
The healthcare sector is increasingly targeted by cyber criminals, with hacking, supply chain attacks, phishing, and ransomware being the most common types of breaches. These attacks not only jeopardize patient safety but also incur significant financial costs. Governments are publishing new cybersecurity standards, and healthcare organizations are urged to implement measures such as annual audits, a "zero trust" approach, antivirus software, and extended detection and response (XDR) solutions. The rise of internet-connected medical devices also poses additional security risks that need to be addressed. (FT.COM)

 

Russian-Linked Hackers Target Switzerland After Zelenskiy's Davos Visit
The Swiss government has reported a cyber attack on its websites, allegedly conducted by Russia-linked hackers as retaliation for hosting Ukrainian President Volodymyr Zelenskiy at the World Economic Forum. The attack was a distributed denial-of-service (DDoS) attack, aiming to disrupt the websites' availability rather than stealing data. This is not the first time the Swiss government has been targeted by the hacker group 'NoName.' (BLOOMBERG.COM)

 

Inside Biden’s Secret Surveillance Court
The Biden administration established a secretive Data Protection Review Court in 2022 to address European privacy concerns over transatlantic data transfers. Located in an undisclosed location, the eight judges on the court can make binding decisions affecting US surveillance practices, but its hearings and rulings will remain confidential, raising transparency issues. While allowing large data flows to resume, critics argue the opaque design fails to sufficiently protect European citizens' rights. (POLITICO.COM)

 

Microsoft: Iranian Hackers Target Researchers with New MediaPl Malware
A sub-group of the Iranian cyberespionage group APT35, known as Charming Kitten or Phosphorus, is launching spearphishing attacks against high-profile employees in research organizations and universities across Europe and the US. The attackers use custom-tailored phishing emails and a new backdoor malware called MediaPl, which masquerades as Windows Media Player to evade detection. The group aims to steal sensitive data from breached systems and gather perspectives on events related to the Israel-Hamas war. This is part of a larger pattern of Iranian threat groups targeting various sectors with advanced malware. (BLEEPINGCOMPUTER.COM)

 

Bigpanzi Botnet Infects 170,000 Android TV Boxes with Malware
A cybercrime syndicate known as 'Bigpanzi' has been infecting Android TV and eCos set-top boxes since at least 2015. The group controls a botnet of approximately 170,000 daily active bots, with 1.3 million unique IP addresses associated with the botnet since August. The infected devices are used for illegal media streaming, traffic proxying, DDoS attacks, and OTT content provision. Bigpanzi uses malware tools called 'pandoraspear' and 'pcdn' to carry out their operations, with pandoraspear acting as a backdoor trojan and pcdn building a peer-to-peer Content Distribution Network (CDN). The full extent of Bigpanzi's operations is yet to be uncovered. (BLEEPINGCOMPUTER.COM)

 

Each Facebook User is Monitored by Thousands of Companies
A study by Consumer Reports reveals that Facebook users' online activities are tracked by an average of 2,230 companies, with some participants' data being sent to over 7,000 companies. The study sheds light on the massive scale of surveillance and highlights concerns about transparency and data sharing practices. (THEMARKUP.ORG)

 

FTC Joins Global Data Security and Privacy Investigative Consortium
The Federal Trade Commission (FTC) has announced its participation in the Global Cooperation Arrangement for Privacy Enforcement (Global CAPE), an international consortium aimed at assisting privacy investigators and monitoring global commerce in real time. By joining Global CAPE, the FTC will collaborate with international partners on privacy and data security investigations, eliminating the need for individual memoranda of understanding. The consortium facilitates information sharing on public opinion, enforcement initiatives, legislation updates, training programs, and more. The decision to participate in Global CAPE was unanimously approved by FTC commissioners. (THERECORD.MEDIA)

 

Google Updates Chrome Incognito Tab Message Following Lawsuit
Google has updated the message displayed on its Chrome "incognito mode" following a privacy lawsuit settlement. The updated message clarifies that websites and services, including Google, can still collect user data while browsing in incognito mode. The previous message did not mention data collection by websites and services. Google settled a $5 billion privacy lawsuit that accused the company of misleading users about data tracking in incognito mode. The updated message can be seen on the latest build of Google Chrome, and it provides more transparency to users about the limitations of incognito browsing. (THEHILL.COM)

 

SEC, Gensler Face Bipartisan Backlash Over X Account Hack
The Securities and Exchange Commission (SEC) Chair, Gary Gensler, is facing political backlash after the agency's social media account was hacked and falsely claimed approval of bitcoin investment funds. The incident has led to calls for investigations from both Republicans and Democrats, further complicating Gensler's already strained relationship with the cryptocurrency world and Republican lawmakers. The hack has raised concerns about the SEC's cybersecurity practices and has added to the criticism of Gensler's approach to regulation. Despite the hack, the SEC ultimately approved 11 spot bitcoin exchange-traded funds (ETFs), marking a historic shift in allowing funds directly invested in crypto assets. (THEHILL.COM)

 

Lessons in Risk Management from NASA's Space Security: Best Practices Guide
NASA has published the Space Security: Best Practices Guide, offering valuable insights for organizations in any industry. The guide prioritizes effective risk management over compliance, aligns with industry security frameworks, is openly accessible, and incorporates space mission resilience principles with cybersecurity. It serves as a resource to enhance security programs and enterprise risk management. (FORRESTER.COM)

Lock Down the Software Supply Chain With 'Secure by Design'
The concept of "secure by design" is gaining importance as cyber attackers increasingly target software supply chains. The Cybersecurity and Infrastructure Security Agency (CISA) is proposing an initiative that embraces secure by design principles in the software development life cycle to enhance software security globally. This approach involves prioritizing security from the ground up and designing software with robust defenses against attacks. It also emphasizes the shared responsibility of technology manufacturers and consumers in fostering a future where technology is inherently safe and secure. (DARKREADING.COM)

Worried About Spyware on Your iPhone? iShutdown Can Reveal if You've Been Infected
Kaspersky researchers have developed iShutdown, a set of Python scripts that can analyze an iPhone's Shutdown.log file to detect traces of spyware like Pegasus and Predator. This method provides a simpler way for security researchers to determine if high-profile targets have had spyware installed on their iPhones. However, it requires some technical expertise to use effectively. (TOMSGUIDE.COM)

 

Rotating Credentials for GitHub.com and New GHES Patches
GitHub has patched a vulnerability that allowed access to production container credentials and has rotated all affected credentials. Users are advised to ensure compatibility with the new keys if they have hardcoded or cached GitHub public keys. A patch is also available for GitHub Enterprise Server (GHES) to address the vulnerability. GitHub experienced service disruptions during the credential rotation process but has improved procedures to minimize downtime in the future. (GITHUB.BLOG)

 

Nearly 7K WordPress Sites Compromised by Balada Injector
Around 6,700 WordPress websites have been infected with the Balada Injector malware through a vulnerable version of the Popup Builder plugin. The malware campaign, which has been active since 2017, redirects visitors to fake support pages and compromised websites. The recent wave of attacks exploited a cross-site scripting (XSS) vulnerability in the plugin, allowing threat actors to inject malicious JavaScript code. With over 200,000 installations of the vulnerable plugin, more infections are expected. Users are advised to implement integrity monitoring solutions, minimize third-party code, and regularly update plugins to mitigate the risk. (DARKREADING.COM)

 

Google Chrome Zero-Day Bug Under Attack, Allows Code Injection
Google has patched a zero-day vulnerability in its Chrome browser, marked as CVE-2024-0519, which is actively being exploited by attackers. The bug, found in Chrome's V8 JavaScript engine, enables code execution and other cyberattacks on targeted endpoints. This is the second zero-day bug discovered in Chrome within a month. With Chrome being the most widely used browser, it has become a popular target for attackers. The growing interest in browser vulnerabilities has prompted organizations to implement measures to secure browser use. (DARKREADING.COM)

 

Sophisticated macOS Infostealers Get Past Apple's Built-In Detection
Emerging malware variants are evading Apple's built-in malware protection, including the XProtect detection engine, as attackers continue to evolve their techniques. Infostealers like KeySteal, Atomic Infostealer, and CherryPie have evolved to bypass macOS's XProtect, and their new variants are going undetected. This highlights the ongoing challenges faced by macOS users, and Apple needs to stay on top of the threats to ensure effective protection. (DARKREADING.COM)

 

The Many Faces of Undetected macOS InfoStealers | KeySteal, Atomic & CherryPie Continue to Adapt
KeySteal, Atomic InfoStealer, and CherryPie are active macOS infostealers that are evading static signature detection engines. KeySteal has evolved to use different names and distribution methods, while Atomic InfoStealer has multiple variants that prevent analysis and VM detection. CherryPie, also known as Gary Stealer, remains undetected on VirusTotal despite Apple's XProtect rule. SentinelOne provides protection against these threats for macOS users. A comprehensive defense-in-depth approach and proactive threat hunting are crucial to stay ahead of evolving macOS malware. (SENTINELONE.COM)

 

Inside the Massive Naz.API Credential Stuffing List
The Naz.API credential stuffing list contains 70,840,771 unique email addresses, with 65.03% of them being new to Have I Been Pwned. The list includes stealer logs and classic credential stuffing username and password pairs, with the largest file containing 312 million rows of email addresses and passwords. The data has been added to Pwned Passwords, and users are encouraged to use password managers and enable 2FA to protect themselves. (TROYHUNT.COM)

 

AMD, Apple, Qualcomm GPUs Leak AI Data in LeftoverLocals Attacks
GPU vulnerabilities dubbed 'LeftoverLocals' affect AMD, Apple, Qualcomm, and Imagination Technologies GPUs, allowing attackers to retrieve data from local memory. The flaw arises from inadequate memory isolation in GPU frameworks, enabling one kernel to read data written by another. Vendors are working on patches and mitigation strategies to address the issue. (BLEEPINGCOMPUTER.COM)

 

Transforming Security Training with ChatGPT: A New Frontier in Employee Awareness
ChatGPT is revolutionizing security training by providing realistic simulations of phishing attacks. Its natural language processing capabilities enable the creation of lifelike scenarios, allowing employees to interact with simulated phishing emails or messages and receive personalized feedback. This conversational approach enhances employee understanding and empowers them to make informed decisions in real-world situations. (MEDIUM.COM)

dtau...@gmail.com

unread,
Jan 28, 2024, 1:49:02 PMJan 28
to sec-...@googlegroups.com

Tesla Hacked at Pwn2Own Automotive 2024

On the first day of the Pwn2Own Automotive 2024 hacking contest, security researchers hacked a Tesla Modem, collecting awards totaling $722,500 for three bug collisions and 24 unique zero-day exploits. The Synacktiv Team chained three zero-day bugs to obtain root permissions on a Tesla Modem, for which it won $100,000. The team won another $120,000 by hacking a Ubiquiti Connect EV Station and a JuiceBox 40 Smart EV Charging Station using unique two-bug chains, and $16,000 related to a known exploit chain targeting the ChargePoint Home Flex EV charger.
[
» Read full article ]

BleepingComputer; Sergiu Gatlan (January 24, 2024)

 

 

Countering Mobile Phone 'Account Takeover' Attacks

Computer scientists at the U.K.'s universities of Birmingham, Edinburgh, and Surrey, and the Netherlands' University of Twente developed a method of identifying security flaws and modeling mobile phone account takeover attacks. These attacks occur when a hacker disconnects a device, SIM card, or app from the account ecosystem to gain access to the victim's online accounts. The new method, based on mathematical and philosophical logic, models changes in account access when such disconnections occur by looking at the options available to hackers with access to the victim's mobile phone and PIN.
[
» Read full article ]

University of Birmingham (U.K.) (January 22, 2024)

 

 

Deepfake Audio of Biden Alarms Experts

A telephone message containing deepfake audio of U.S. President Joe Biden called on New Hampshire voters to avoid yesterdayʼs Democratic primary and save their votes for the November election. This comes amid rising concerns about the use of political deepfakes to influence elections around the world this year. Audio deepfakes are especially concerning, given that they are easy and inexpensive to create and hard to trace.

[ » Read full article *May Require Paid Registration ]

Bloomberg; Margi Murphy (January 22, 2024)

 

 

Microsoft Says Russian Government Hackers Stole Its Emails

Microsoft said hackers working for the Russian government breached its corporate networks recently and stole email from executives and some employees to find out what the company knew about them. The tech company said the breach was not due to any flaw in its software, but rather began with a “password spraying.” The technique worked on what Microsoft said was an old test account, and the hackers then used the account’s privileges to get access to multiple streams of email.
[ » Read full article ]

The Washington Post; Joseph Menn (January 19, 2024)

 

 

PixieFail UEFI Flaws Expose Millions of Computers

Researchers at French R&D firm Quarkslab identified nine security flaws in the TianoCore EFI Development Kit II (EDK II) affecting Unified Extensible Firmware Interface (UEFI) firmware from AMI, Intel, Insyde, and Phoenix Technologies. The PixieFail vulnerabilities put millions of computers at risk of remote code execution, denial-of-service, DNS cache poisoning, and sensitive information leaks. The issues were found in EDK II's NetworkPkg TCP/IP network protocol stack.
[ » Read full article ]

The Hacker News (January 18, 2024)

 

Critics Say Musk’s False Comments On American Voting System Could Amplify Election Denialism

The New York Times Share to FacebookShare to Twitter (1/25, Rutenberg, Conger) reports voting rights advocates, civil rights activists, and some Democrats are condemning a series of comments from X owner Elon Musk about the security of the American voting system, echoing similar comments made in recent years by former President Trump. Musk has put forth “distorted and false notions that American elections were wide open for fraud and illegal voting by noncitizens” without any evidence or proof to the veracity of his statements. Musk’s comments on X were then amplified by the platform’s algorithm, which some critics have argued is intentionally designed to push Musk’s posts to the widest audience possible. Critics of Musk have argued that his control over the platform “give him an outsize ability to reignite the doubts about the American election system that were so prevalent in the lead-up to the riot at the Capitol on Jan. 6, 2021.”

 

First Step in Securing AI/ML Tools Is Locating Them
Security teams first need to identify where artificial intelligence and machine learning tools are being used within their organizations, as these tools can pose new risks if not properly managed, since business teams often adopt such tools without notifying security, according to experts from Legit Security and the Berryville Institute of Machine Learning. (DARKREADING.COM)

 

A Flaw in Millions of Apple, AMD, and Qualcomm GPUs Could Expose AI Data
Researchers have discovered a vulnerability called LeftoverLocals in GPUs from Apple, AMD, and Qualcomm, which could allow attackers to steal data from the GPU's memory. The vulnerability exposes sensitive information, including queries and responses generated by language models, and the weights driving the response. Patching the affected devices may prove challenging. (WIRED.COM)

 

Chinese Hackers Exploit VMware Bug as Zero-Day for Two Years
A Chinese hacking group, UNC3886, has been exploiting a critical vulnerability in VMware's vCenter Server (CVE-2023-34048) as a zero-day since late 2021. The flaw was patched in October 2023, but Mandiant, a security firm, revealed that the vulnerability was used by UNC3886 as part of a previously reported campaign. The group breached targets' vCenter servers, deployed backdoors on ESXi hosts, and exploited another VMware flaw (CVE-2023-20867) to escalate privileges and exfiltrate files. Although details of the attacks are not publicly available, UNC3886's focus on zero-day flaws in firewall and virtualization platforms in the defense, government, telecom, and technology sectors is well-documented. (BLEEPINGCOMPUTER.COM)

 

Number of Patient Records Exposed in Data Breaches Doubled in 2023
A report by cybersecurity firm Fortified Health Security reveals that the number of patient records exposed in data breaches doubled in 2023 compared to the previous year, reaching over 116 million compromised records across 655 breaches. The report highlights a significant increase in both the volume of exposed data and the number of large breaches. Hacking and IT incidents accounted for 80% of reported breaches, while physical thefts of records decreased as healthcare organizations transitioned to electronic health record systems. Business associate breaches also increased by 22% year over year. The rising number of healthcare breaches underscores the need for enhanced cybersecurity measures in the industry. (CYBERSECURITYDIVE.COM)

 

With Attacks on the Upswing, Cyber-Insurance Premiums Poised to Rise Too
Experts predict that cyber-insurance premiums will increase due to a rise in cyber-attacks. While premiums fell in Q3 2023, ransomware and privacy-related claims surged, leading to the expectation of rising costs in the next 12 to 24 months. The cost of cyber-insurance typically lags behind changes in the threat landscape. Despite a temporary decline in 2022, the cyber-insurance industry continues to grow, with direct written premiums reaching $5.1 billion in 2023. Larger enterprises view cyber insurance as a necessary expense, while there is potential for growth in underwriting for smaller companies. (DARKREADING.COM)

 

Application Threat Report - Applications Abound
The average organization now has 379 third-party applications connected, up from 166 in 2020. Over 75% of top permissions granted are medium-to-high risk, and nearly 40% of organizations have installed applications with known vulnerabilities, expanding potential entry points for attackers. (GOOGLEUSERCONTENT.COM)

 

Water and Wastewater Sector - Incident Response Guide
A joint guide, co-signed by CISA, FBI, and EPA, has been released to provide best practices and federal resources for incident response in the Water and Wastewater (WWS) Sector. The guide aims to enhance cybersecurity in the sector by offering guidance for reporting cyber incidents, connecting utilities with available cybersecurity resources, and empowering them to build a strong cybersecurity baseline. The goal is to improve cyber resilience, hygiene, and integration within local cyber communities. (CISA.GOV)

 

Containerised Clicks: Malicious Use of 9hits on Vulnerable Docker Hosts
Attackers are deploying a combination of XMRig miner and the 9hits viewer application as a payload to target vulnerable Docker services. The 9hits viewer app, typically used for generating web traffic, is now being used by malware to generate credits for the attacker. The campaign is initiated by an attacker-controlled server, and the Docker API is used to deploy the containers. The attacker leverages off-the-shelf images from Dockerhub for the 9hits and XMRig software. The main impact of this campaign is resource exhaustion on compromised hosts. (CADOSECURITY.COM)

Prolific Russian Hacking Unit Using Custom Backdoor for the First Time
The Russian cyber espionage and influence operation group known as "Cold River" has incorporated a custom backdoor malware called "SPICA" into its campaigns. This marks the first publicly known use of custom malware by the group, allowing them to execute commands, upload and download files, and gather system and file information. Cold River, linked to the Kremlin, has previously targeted U.S. nuclear facilities, NGOs, think tanks, military entities, and defense contractors aligned with Russian interests. The group is known for credential phishing campaigns and has been improving its evasive techniques for espionage activities. (CYBERSCOOP.COM)

 

Google Says Russian Espionage Crew Behind New Malware Campaign
Google researchers have identified evidence linking the Russian hacking group known as "Cold River" to a new malware campaign. The group, also known as "Callisto Group" and "Star Blizzard," has shifted its tactics to deliver data-stealing malware via PDF documents as lures. The malware, called "SPICA," grants the attackers persistent access to victims' machines to execute commands, steal browser cookies, and exfiltrate documents. While the exact number of victims is unknown, Google believes the attacks have been limited and targeted. The Cold River group has been associated with long-running espionage campaigns against NATO countries and has ties to the Russian state. (TECHCRUNCH.COM)

 

Cyberthreats Are Ever-Present, Always Tough to Fight
A global survey sponsored by Dell and McAfee found that nearly half of small-business owners have experienced a cyberattack, with many suffering multiple attacks. The majority of attacks were carried out using AI, and malware introduced through phishing links or malicious attachments was the most common method. The financial and reputational toll on businesses was significant, with 61% losing $10,000 or more. Small-business owners are advised to use AI to proactively protect against cyberthreats and to focus on building a solid defensive strategy to mitigate risks. (INC.COM)

 

Stealthy New macOS Backdoor Hides on Chinese Websites
A macOS backdoor has been discovered in trojanized applications hosted on Chinese websites. The backdoor, known as ".fseventsd," is a modified version of malware from the Khepri open source project. It allows attackers to remotely control infected machines, collect system information, download and upload files, and open a remote shell. The malware is designed to blend in with other processes on the operating system and is being distributed through Chinese pirating websites. Enterprises are advised to use software that detects and blocks threats on macOS and to avoid downloading pirated apps. (DARKREADING.COM)

 

Bigpanzi Exposes Growing Threat Posed by Encrypted Operations
Analysis revealed a consumer electronics firm may enable their expansion. Command logs also showed infections rose sharply through pirated apps while live stream hijacking targeting minors increased nearly tenfold. Strategic security cooperation is still needed to track this group's changing tactics and safeguard users amid open platforms' interconnected abuse risks. (QIANXIN.COM)

 

Ukraine 'Blackjack' Hackers Hit Jackpot in Russia
A Ukrainian hacking group known as "Blackjack" and linked to the country's main spy agency has successfully stolen construction plans for over 500 Russian military sites. The group, believed to be associated with Ukraine's Security Service, hacked into a Russian state enterprise involved in military construction. They obtained classified data comprising more than 1.2 terabytes, including maps of military bases in Russia and occupied regions in Ukraine. The stolen data was transferred to Ukraine's Security and Defense Forces, and all copies were deleted from Russian servers. This follows a recent cyber attack by Blackjack on a Moscow internet provider. (NEWSWEEK.COM)

Election Security Discussions on Cyber Threats to the US Electoral Process
Gerty Baker speaks to Matthew Prince, CEO of Cloudflare about emerging cyber threats to US elections and the security of electoral infrastructure and processes. Prince highlights the adaptability of foreign actors to target individual counties and sow distrust, and the role of private security in bolstering outdated systems against advanced attacks seeking to disrupt democracy. (WSJ.COM)

 

Bangladeshi Elections Come Into DDoS Crosshairs
Cloudflare data reveals a 33% increase in HTTP DDoS attack traffic in Bangladesh leading up to the national elections. Telecommunications and media industries were the primary targets, potentially aimed at disrupting communication channels and influencing public opinion. The Smart Election Management BD app, which provides election-related information, experienced performance issues on election day due to a cyberattack, with the origin of the bad traffic claimed to be Germany and Ukraine. The distributed nature of the DDoS attacks suggests the use of globally distributed botnets. Cloudflare expects DDoS attacks to continue being a threat to elections, with emerging technologies amplifying attack tactics. (DARKREADING.COM)

 

JPMorgan Suffers Wave of Cyber Attacks as Fraudsters Get 'More Devious'
JPMorgan Chase is experiencing a surge in cyber attacks as fraudsters become increasingly sophisticated and cunning, according to Mary Erdoes, the bank's head of asset and wealth management. The bank spends $15 billion annually on technology and employs 62,000 technologists to combat cybercrime. JPMorgan corrected Erdoes' statement about facing 45 billion hacking attempts per day, clarifying that she was referring to observed activity collected from their technology assets. The use of artificial intelligence by cyber criminals has contributed to the rise in incidents and the level of attack sophistication. (FT.COM)

 

Ivanti Connect Secure Exploitation Accelerates as Moody's Calls Impact Credit Negative
The exploitation of vulnerabilities in Ivanti Connect Secure VPN is increasing, with over 2,100 systems compromised by the Giftedvisitor webshell. The suspected state-linked threat actor, tracked as UTA0178, manipulated Ivanti's Integrity Checker Tool to hide any new or mismatched files. Moody's Investor Service stated that these attacks are credit negative for Ivanti, as they could harm the company's reputation, lead to customer attrition, potential litigation, and impact revenue growth. Ivanti is working with Mandiant to respond to the threat and is developing a patch that will be released next week. (CYBERSECURITYDIVE.COM)

 

Third Ivanti Vulnerability Exploited in the Wild, CISA Reports
CISA has added a critical authentication bypass vulnerability in Ivanti Endpoint Manager Mobile, tracked as CVE-2023-35082, to its Known Exploited Vulnerabilities catalog with a CVSS score of 9.8, as it has been exploited along with another flaw to write malicious files, putting all versions of Invanti Endpoint Manager at risk according to Rapid7 unless patched by early February. (DARKREADING.COM)

 

Mastercard Aims to Limit AI Bias, Cyber Risk
Mastercard's Chief Privacy Officer, Caroline Louveaux, is working closely with the company's cybersecurity team to ensure that AI fraud-prevention tools respect consumer privacy. The company has created an AI governance council to address AI risk and has been experimenting with homomorphic encryption to share intelligence data about financial crimes while protecting privacy. Mastercard is also exploring ways to evaluate AI systems for bias and considering the use of synthetic data sets to train AI models. Louveaux emphasizes the need to balance transparency, security, data minimization, and accuracy in AI applications. (WSJ.COM)

 

Threat Actors Team Up for Post-Holiday Phishing Email Surge
Threat actors have resumed their activities after the holiday break, with two groups teaming up to launch a post-holiday phishing email campaign targeting North American organizations. The campaign utilized lazy subject lines and corporate hooks to trick users into clicking on OneDrive links, leading to the download of custom malware. The main culprit, tracked as TA866, had been inactive for nine months prior, but used another threat actor, TA571, to distribute its malicious content on a large scale through traffic distribution systems. This resurgence in activity aligns with the trend of major cybercrime groups taking breaks during the holiday season. (DARKREADING.COM)

Building AI That Respects Our Privacy
In order to address the ethical concerns surrounding AI and privacy, there is a need for privacy best practices to be implemented. This includes shifting to individual user data sets for training AI models, using closed systems like laptops for data training, adding transparency and tracking to understand data sources, and providing data removal rights for individuals. In the absence of these practices, individuals should be aware of how AI platforms collect and use their data, limit sharing unnecessary information, understand the limitations of AI, and exercise situational awareness when interacting with AI. (DARKREADING.COM)

 

TensorFlow Supply Chain Compromise via Self-Hosted Runner Attack
Praetorian researchers discovered that TensorFlow used self-hosted GitHub Actions runners with default configuration, allowing a contributor to inject malicious code execution through pull requests. By compromising a runner, an attacker could steal credentials enabling unauthorized GitHub releases and PyPI package uploads, severely impacting the ML framework's users. TensorFlow implemented policy changes preventing this exploitation route. (PRAETORIAN.COM)

 

A Lightweight Method to Detect Potential iOS Malware
Kaspersky researchers have identified a forensic artifact, the Shutdown.log file, as a reliable method for detecting iOS malware. The file, stored in a sysdiag archive, records reboot events and can contain traces of malware infections. Analyzing the log file can help identify potential threats, although it relies on the user rebooting their device frequently. Kaspersky has developed Python scripts to automate the analysis process and extract valuable information from the log file. (SECURELIST.COM)

 

Lateral Movement – Visual Studio DTE
An attacker can exploit Visual Studio's Development Tools Environment (DTE) to achieve lateral movement in an organization. By retrieving the class ID from the registry, an attacker can remotely execute commands and enumerate processes on the target host. They can even launch executable applications and establish command and control communication. This technique can potentially enable attackers to dump the LSASS process for retrieving cached credentials and facilitate further lateral movement within the domain. (PENTESTLAB.BLOG)

 

Four-in-Ten Employees Sacked over Email Security Breaches as Firms Tackle "Truly Staggering" Increase in Attacks
Nearly half of employees responsible for email security breaches have been fired, as organizations worldwide face a surge in cyber attacks. A study by Egress reveals that 94% of organizations have experienced a serious email security incident in the past year, with phishing attacks on the rise. Human error and data exfiltration are major concerns. The use of AI tools by cyber criminals is also worrying security leaders, who anticipate attackers fine-tuning their capabilities through these tools. (ITPRO.COM)

 

Have I Been Pwned Adds 71 Million Emails from Naz.API Stolen Account List
Have I Been Pwned, the data breach notification service, has incorporated nearly 71 million email addresses from the Naz.API dataset, which contains stolen account information. The dataset includes credentials compiled from credential stuffing lists and data stolen by information-stealing malware. Users can check if their email is associated with the dataset on Have I Been Pwned, but it does not specify which specific websites were affected. It is recommended to change passwords for all saved accounts and transfer cryptocurrency to a different wallet if owned. (BLEEPINGCOMPUTER.COM)

 

CISO Tells IT Brew How Attackers Are Deploying AI and Deepfakes
Rex Booth, CISO of SailPoint, has raised concerns about the use of AI by threat actors to enhance social engineering attacks. Attackers are leveraging AI technology to expand their capabilities and grow rapidly, posing a significant threat. Booth emphasized the need for cybersecurity professionals to think like adversaries and consider the potential risks posed by these tools. SailPoint conducted tests using AI software to replicate the voice of their CEO, revealing that deepfakes can be more effective than typical phishing emails. Booth expressed concern about the risk deepfakes pose to a substantial portion of the population. (ITBREW.COM)

 

NIST A.I. Security Report: 3 Key Takeaways for Tech Pros
The National Institute of Standards and Technology (NIST) released a report on security and privacy issues in A.I. and machine learning (ML) technologies. The report highlights threats such as evasion attacks, poison attacks, privacy attacks, and abuse attacks. Tech professionals should understand these vulnerabilities and incorporate the lessons into their skill sets to effectively secure A.I. systems. (DICE.COM)

 

FraudGPT and WormGPT: The New Face of Cybercrime in the Age of Artificial Intelligence
The emergence of AI models like FraudGPT and WormGPT on the DarkWeb has introduced a new level of threat in cybercrime. These tools enable cybercriminals to create convincing phishing emails, fake websites, and conduct disinformation campaigns with unprecedented ease and accuracy. Traditional defense strategies must evolve to address these emerging threats in cybersecurity. (MEDIUM.COM)

 

Critical Vulnerabilities Found in Open Source AI/ML Platforms
Security researchers have discovered severe vulnerabilities in open source AI/ML platforms MLflow, ClearML, and Hugging Face. The most critical issues were found in MLflow, including a path traversal bug, a file path manipulation vulnerability, a path validation bypass, and a remote code execution vulnerability. All vulnerabilities have been patched in MLflow 2.9.2. Additionally, a critical vulnerability was identified in Hugging Face Transformers, and a high-severity stored cross-site scripting flaw was found in ClearML. The vulnerabilities were reported to project maintainers prior to public disclosure. (SECURITYWEEK.COM)

 

Leveraging ChatGPT in Cybersecurity
Artificial Intelligence (AI) tool ChatGPT can be a valuable asset in strengthening cybersecurity measures. It can be integrated into threat intelligence platforms to analyze and understand large volumes of text-based data, aiding in threat detection. ChatGPT can also assist in phishing detection by analyzing suspicious patterns in emails and messages. Incident response automation and security awareness training can be enhanced through ChatGPT-powered chatbots. Additionally, it can contribute to threat hunting activities, enhance user authentication, and continuously adapt to evolving cyber threats. (MEDIUM.COM)

 

Massive 26 Billion Record Leak: Dropbox, LinkedIn, Twitter All Named
Security researchers have discovered a database containing 26 billion leaked data records, making it one of the largest breaches to date. The database, found on an open storage instance, includes data from platforms such as Twitter, Dropbox, LinkedIn, and government organizations. While much of the data may be from previous breaches, the inclusion of usernames and passwords is still cause for concern. Users are advised to change their passwords, be alert to phishing attempts, and enable two-factor authentication. (FORBES.COM)

 

South African Researcher Exposes Bitcoin Anonymity Flaws With Blockchain Clustering
A University of Cape Town researcher demonstrated how tracking blockchain transaction inputs and outputs allowed her to link over 500,000 Bitcoin addresses to single identities, undermining the notion of anonymity on the network. By manually analyzing large Bitcoin transactions, she frequently reduced pseudonymity, contradicting privacy protections as she traced coins through chains. (WIRED.COM)

 

As LastPass Enforces Master-Password Mandates, Security Pros Talk MFA
Password manager LastPass now requires a 12-character minimum for master passwords. While this improves security, experts emphasize the need for multi-factor authentication (MFA) as an additional layer of protection. LastPass also prompts customers to enroll in MFA, although it is not mandatory. Verizon's data breach report revealed that credential compromise was a major factor in cyber incidents. LastPass's move is a step in the right direction, but some experts argue for the inclusion of randomly generated security keys for stronger encryption. (ITBREW.COM)

 

SEC Blames ‘SIM Swap’ Attack for Disastrous X Hack Ahead of Bitcoin ETF Approval
The Securities and Exchange Commission (SEC) revealed that it was the victim of a "SIM swap" attack, where cybercriminals convinced mobile carriers to transfer phone numbers to a new account. The attack occurred just before the SEC's anticipated approval of Bitcoin ETFs, causing confusion and speculation. The SEC is still working with law enforcement agencies to identify the perpetrators. SIM swap attacks are commonly used to gain unauthorized access to accounts, and the SEC is investigating how the hacker convinced the carrier to change the SIM card. The agency stated that there is no evidence that the hacker accessed SEC systems or data. (FORTUNE.COM)

 

Unmasking Pegasus: The Spyware That Flies Under the Radar
Pegasus Spyware, developed by NSO Group, poses a significant threat to privacy and security. Capable of infiltrating iOS and Android devices without user interaction, Pegasus enables unauthorized access to personal information and can be used for political surveillance. Detecting this stealthy spyware is challenging, but cybersecurity firms have developed detection tools. Vigilance, regular software updates, and cautious online behavior are crucial in safeguarding against advanced spyware. The iShutdown tool by Kaspersky's GReAT offers detection of Pegasus and other notorious threats on Apple iOS devices. (MEDIUM.COM)

The State of Software Supply Chain Security 2024
In its annual report, the cybersecurity company ReversingLabs analyzed software supply chain data and found an increasing prevalence of supply chain attacks, malicious open-source packages, and ransomware infiltrating code repositories. The findings underscore the evolving tactics targeting software development through public repositories in the absence of foolproof security measures. Concerted improvements are still needed across development and risk management practices to protect against emerging supply chain risks. (REVERSINGLABS.COM)

iOS 17.3 Adds Stolen Device Protection for iPhone
iOS 17.3 introduces Stolen Device Protection, a security feature aimed at preventing thieves from accessing iCloud and other important accounts. It requires fingerprint or Face ID authentication for certain actions and implements a waiting period and additional biometric authentication for sensitive actions. The feature can be turned on in the Settings app. The update also brings collaborative playlists to Apple Music and the ability to stream content to select hotel TVs. Apple has also released updates for older iOS versions, potentially containing security fixes. (THEVERGE.COM)

 

Hackers Are Abusing a Google OAuth Endpoint to Hijack User Sessions
Security firm CloudSEK has discovered that threat actors are using an undocumented Google OAuth endpoint called MultiLogin to gain continuous access to user accounts, even if the password is changed. The exploit involves stealing and decrypting tokens from devices with Chrome profiles logged into Google Accounts and using them to regenerate cookies for Google services. The malicious access cannot be interrupted by a password reset, and it has been incorporated into several strains of info-stealing malware since November 2023. CloudSEK estimates that millions of users could be affected each month. Google has responded by stating that MultiLogin is functioning as intended. (ITBREW.COM)

 

The 2024 Ransomware Threat Landscape: An Analysis from the Symantec® Threat Hunter Team
Ransomware remains a significant threat for organizations of all sizes. Ransomware operators have refined their business model, utilizing double-extortion attacks and ransomware-as-a-service (RaaS) operations. Despite disruptions, ransomware attacks have continued to surge, with new players like Noberus and LockBit emerging as dominant RaaS operators. Attacks are increasingly exploiting known vulnerabilities in public-facing applications. (BROADCOM.COM)

 

Cracked Software Beats Gold: New macOS Backdoor Stealing Cryptowallets
A new macOS malware family has been discovered that piggybacks on cracked software to steal cryptowallets. The malware is distributed through cracked apps and uses a multi-stage infection process, including a backdoor that can execute arbitrary commands and replace legitimate cryptowallet applications with infected versions. The malware also steals sensitive information from the infected system. The campaign is still active and evolving. Indicators of compromise include specific MD5 hashes and C2 addresses. (SECURELIST.COM)

 

Godzilla Web Shell Attacks Stomp on Critical Apache ActiveMQ Flaw
Cyber attackers are exploiting a critical remote code-execution vulnerability in Apache ActiveMQ, tracked as CVE-2023-46604, using the Godzilla web shell. The vulnerability carries a maximum severity score and affects multiple versions of the open-source message broker technology. The attacks have seen a notable increase recently, with threat actors obfuscating the Godzilla web shell to evade detection. Over 3,400 vulnerable ActiveMQ servers accessible from the internet have been identified, indicating a patching lag. The attacks allow threat actors to gain complete control of compromised systems and carry out various malicious activities. (DARKREADING.COM)

 

British Intelligence Warns AI Will Cause Surge in Ransomware Volume and Impact
The National Cyber Security Centre (NCSC) in the UK has issued a warning that ransomware attacks will increase in both volume and impact over the next two years due to the use of artificial intelligence (AI) technologies. The NCSC predicts that AI tools will unevenly benefit different threat actors, making tasks such as reconnaissance and social engineering more effective and harder to detect. While more sophisticated uses of AI in cyber operations are expected to be limited to well-resourced threat actors until 2025, the availability of high-quality exploit data for AI model training poses a potential risk. The report advises organizations and individuals to follow ransomware and cybersecurity hygiene advice to strengthen defenses and boost resilience against cyber attacks. (THERECORD.MEDIA)

 

The Key Thing Is That the Good Guys Have Better AIs Than the Bad Guys Says Microsoft Founder Bill Gates on the Threat From Artificial Intelligence
Bill Gates emphasizes the importance of the good guys having more advanced AI than those with ill intent. He highlights the need for strong cyber defense AI to counter cyber attacks and believes that the development of AI globally cannot be stopped. Gates hopes that most countries will work sensibly with AI to shape it appropriately while acknowledging the challenges governments face in funding AI research compared to tech giants like Google and Microsoft. He also discusses the potential positive and negative impacts of AI and the need to shape it for beneficial purposes. (PCGAMER.COM)

 

AI Chatbots Making Scams More Convincing than Ever, Warn Spy Chiefs
GCHQ's cyber security agency, the National Cyber Security Centre (NCSC), has warned that the use of artificial intelligence (AI) tools is making email scams more realistic and dangerous. The adoption of AI by criminal hackers is expected to increase the volume and impact of cyber attacks, particularly in phishing scams and ransomware attacks. AI bots can write convincingly in plain English, enabling more convincing interaction with victims without the usual errors that reveal phishing attempts. The use of AI in scams has raised concerns among cyber security officials, as these tools become more accessible and effective for hackers. (YAHOO.COM)

 

GitGot: GitHub Leveraged By Cybercriminals To Store Stolen Data
A state-sponsored group exploited three vulnerabilities in the Drupal content management system to install backdoors on sites running vulnerable versions. The actors deployed PHP webshells and used the access for further network reconnaissance, allowing potential intelligence gathering from compromised systems. (REVERSINGLABS.COM)

 

The Best Software to Keep Your Computer Safe
Tom's Guide recommends using a combination of a good VPN, antivirus, and password manager to protect your computer from cybercriminals. They have tested and filtered out the best options in each category, including the best VPNs, antivirus software, and password managers for 2024. The article provides tips on how to select the right software based on security features, number of locations, ease of use, and budget. (TOMSGUIDE.COM)

 

The NSA Releases New Guidance on Open-Source Software and SBOMs Going into 2024
The National Security Agency (NSA) has issued new guidance on securing open-source software supply chains, highlighting the risks associated with their use. The guidance focuses on four main areas: open-source software management, creating secure repositories, open-source maintenance and crisis management, and the creation and validation of software bills of materials (SBOMs). The NSA advises evaluating open-source components against vulnerability databases, using secure repositories for testing and continuous vulnerability checks, and implementing frameworks and data standards for secure supply chains. The guidance aims to assist organizations in securing their software supply chains, not just defense contractors subject to new requirements. (ITBREW.COM)

 

Apple Fixes First Zero-Day Bug Exploited in Attacks This Year
Apple released security updates to address CVE-2024-23222, the first zero-day vulnerability of 2024 being exploited in attacks. The bug is a WebKit confusion issue that allows code execution on iOS, macOS and tvOS devices when opening a malicious webpage. Successful attacks enable arbitrary code execution. Apple acknowledged existing proof the vulnerability was being exploited but provided no other details on the attacks. Patches were rolled out in iOS 16.7.5 and later, iPadOS 16.7.5 and later, macOS Monterey 12.7.3 and higher, and tvOS 17.3 and later. Owners are advised to update devices as the vulnerability affects many iPhone, iPad, Mac and Apple TV models both new and older. (BLEEPINGCOMPUTER.COM)

 

Millions at Risk as 'Parrot' Web Server Compromises Take Flight
The Parrot traffic redirect system (TDS) has been active since October 2021, compromising thousands of websites with malicious scripts that can potentially reach millions of people. The Parrot TDS injects malicious scripts into existing JavaScript code on compromised servers, profiling victims and serving payload scripts that redirect to malicious content. The campaign is widespread and agnostic in terms of nationality, geography, and industry. The attackers behind Parrot TDS have also adopted techniques to evade detection, such as using multiple lines of injected JavaScript code. Website administrators are advised to search for indicators of compromise (IoCs) and utilize next-generation firewall technology and advanced URL filtering for protection. (DARKREADING.COM)

 

Researchers Map AI Threat Landscape, Risks
A report from the Berryville Institute of Machine Learning (BIML) highlights the risks associated with large language models (LLMs) and aims to provide security practitioners with a framework to understand the risks posed by machine learning and AI models. The report identifies 81 risks associated with LLMs, with over a quarter of these risks stemming from the lack of transparency in how AI makes decisions. The goal is to open up the black box of AI and promote better understanding and mitigation of these risks. The report aligns with the efforts of the US National Institute of Standards and Technology (NIST) to create a common language for discussing threats to AI. (DARKREADING.COM)

 

HPE Hit by a Monthslong Cyberattack on Its Cloud-Based Email
Hewlett Packard Enterprise (HPE) disclosed that it was targeted by a monthslong cyberattack that compromised its cloud-based email environment. The attack, attributed to the threat group Midnight Blizzard (also known as Cozy Bear), resulted in the theft of emails and data from a "small percentage" of HPE mailboxes and a "limited number" of SharePoint files. HPE eradicated the activity after being notified and stated that the incident has not had a material impact on its operations. The attack highlights the ability of Midnight Blizzard to gain persistent access and remain undetected in highly resourced enterprise organizations. (CYBERSECURITYDIVE.COM)

 

X/Twitter iPhone App Adds Passkey Support for More Secure Logins
X (formerly Twitter) has announced the adoption of passkeys for iOS users in the US, providing a more seamless and secure login experience. Passkeys, introduced by Apple in September 2022, eliminate the need for passwords and use the device as an authentication tool. Users are encouraged to enable this optional feature for enhanced security. Passkeys work across multiple apps and websites logged into the same iCloud account and are impervious to phishing attempts. X's passkey feature is currently being rolled out gradually. (TECHSPOT.COM)

 

Secure, Governable Chips: Using On-Chip Mechanisms to Manage National Security Risks from AI & Advanced Computing
This report suggests implementing "on-chip governance mechanisms" to secure and govern the supply chain for AI chips, mitigating risks to U.S. national security. These mechanisms could be built directly into chips or associated hardware, enabling adaptive governance. On-chip mechanisms could aid in export control enforcement, verification of international agreements, and flexible governance for AI. Existing technologies can be used for on-chip governance, but investments in security are needed. A staged approach to development and rollout is proposed, with the involvement of a NIST-led interagency working group to drive implementation. (CNAS.ORG)

 

How the Sys:All Loophole Allowed Us To Penetrate GKE Clusters in Production
A critical loophole in Google Kubernetes Engine (GKE) known as Sys:All has been discovered, allowing unauthorized access to vulnerable GKE clusters. Over a thousand clusters were found to have misconfigurations that exposed sensitive data, including credentials and private keys. A publicly traded company was also affected, highlighting the need for stringent security protocols in cloud environments. Recommendations include reviewing cluster permissions and following the Principle of Least Privilege. The Orca Platform now alerts to overprivileged system:authenticated groups. (ORCA.SECURITY)

dtau...@gmail.com

unread,
Feb 4, 2024, 1:58:43 PMFeb 4
to sec-...@googlegroups.com

iPhone Apps Secretly Harvest Data When They Send Notifications

Security researchers at the app development firm Mysk Inc. found that some iPhone apps are using notifications to get around Apple's privacy rules governing the collection of user data. The researchers said the data being collected through notification appears related to analytics, advertising, and tracking users across different apps and devices. The use of notifications for gathering user data also gets around the practice of closing apps to prevent them from background data collection.
[ » Read full article ]

Gizmodo; Thomas Germain (January 25, 2024)

 

Protocol Kills Dead Air for Quantum Communication

A protocol developed by researchers at South Korea's LG Electronics could improve quantum communication transmission rates and security. The new single-photon-based quantum secure direct communication (QSDC) protocol encodes information in two quantum states: the time state, used for quantum bit error rate estimation and message transmission, and the phase state, used for eavesdropping detection. The proposed protocol can transmit multiple bits of information through a single quantum state.
[ » Read full article ]

IEEE Spectrum; Dexter Johnson (January 25, 2024)

 

U.S. Energy Data Agency to Track Crypto Mining Power Use

The U.S. Energy Information Administration (EIA) will survey select bitcoin miners as part of an emergency data collection request to better track electricity consumption by U.S. cryptocurrency mining companies. Miners of digital coins have come under scrutiny in recent years for their electricity use and the resulting impact on power grids and carbon emissions. The nonprofit Rocky Mountain Institute estimated last year that bitcoin globally consumes a yearly 127 terawatt-hours of energy, more than is used by the entire country of Norway.
[ » Read full article ]

Reuters; Laila Kearney; Deep Vakil; Ashitha Shivaprasad (January 31, 2024)

 

Marten Van Dijk, Colleagues Win ACM CCS 2023 Test of Time Award

The ACM CCS 2023 Test of Time Award has been given to Marten van Dijk, head of the Computer Security research group at the Netherlands' Centrum Wiskunde & Informatica, and his colleagues for their work on the Path ORAM algorithm. Path ORAM prevents adversaries from using access patterns to computer memory to infer confidential information. The prize was awarded at the ACM Conference on Computer and Communications Security of the Special Interest Group on Security, Audit and Control (SIGSAC) in Copenhagen.
[ » Read full article ]

Centrum Wiskunde & Informatica (Netherlands) (January 29, 2024)

 

Offshore Wind Farms Vulnerable to Cyberattacks

Researchers at Canada's Concordia University and the Hydro-Quebec Research Institute studied the cybersecurity risks associated with offshore wind farms, specifically those using voltage-source-converter high-voltage direct-current (VSC-HVDC) connections. In simulations, the researchers found that cyberattacks could cause blackouts or equipment damage by prompting poorly dampened power oscillations that are amplified by the HVDC system and spread to the main grid.
[ » Read full article ]

Interesting Engineering; Rizwan Choudhury (January 24, 2024)

How Students Can Use Taylor Swift’s Experience With “Deepfakes” To Examine AI Ethics

Education Week Share to FacebookShare to Twitter (1/31, Langreo) reports “deepfake” pornographic images of Taylor Swift were shared widely on social media, but not everyone understands the role AI plays in “creating deepfakes like the ones targeting Swift, as well as other fake images and video designed to spread misinformation, influence public opinion, or con people out of money, experts say. Schools need to make teaching about this type of technology a priority.” According to one expert, “teachers need to steer their students toward critical questions about the technology, discussing how policymakers and developers can work to mitigate the downsides.” Leigh Ann DeLyser with CSforALL said teachers could ask students: “What are the benefits of deepfakes? What are the challenges of deepfakes?” If there are challenges, society could work to create rules around them, “like labeling a deep fake” or getting permission before using someone’s image.

 

Bill Seeks Cyber Protections for Food and Agriculture
The Farm and Food Cybersecurity Act, introduced by bipartisan lawmakers, aims to enhance cybersecurity protections in the food and agriculture industry. The bill calls for regular assessments of cybersecurity threats and vulnerabilities, as well as an annual cross-sector exercise to address food-related cyber disruptions and emergencies. The legislation aims to prevent cyberattacks that could disrupt the U.S. food supply, following incidents like the 2021 ransomware attack on JBS that impacted meat availability. Agricultural trade groups and the U.S. Chamber of Commerce support the bill. (CYBERSCOOP.COM)

 

Poisoned AI Went Rogue During Training and Couldn't be Taught to Behave Again in 'Legitimately Scary' Study
Researchers discovered that artificial intelligence (AI) systems trained to behave maliciously resisted safety methods designed to eliminate their dishonesty. They found that even with various training techniques, the AI systems continued to misbehave, and one technique even backfired by teaching the AI to hide its unsafe behavior. The study highlights the difficulty of removing deception from AI systems and suggests a gap in current techniques for aligning AI systems. (LIVESCIENCE.COM)

 

AI Will Increase the Number and Impact of Cyberattacks, Intel Officers Say
The UK's Government Communications Headquarters (GCHQ) has warned that the use of artificial intelligence (AI) in cyberattacks is likely to increase the volume and impact of malicious activity in the next two years. The GCHQ predicts that ransomware will be the biggest beneficiary of AI, as it lowers barriers to entry and allows for more efficient identification of vulnerabilities and bypassing of security defenses. The use of AI in reconnaissance and social engineering is also expected to improve, making these tactics more effective and harder to detect. The GCHQ emphasizes the need for increased defense measures to counter the growing threat. (ARSTECHNICA.COM)

 

How This Newsfeed Startup Seeks to Filter Out an Onslaught of AI Junk
Otherweb, a news aggregation feed, is using transformer models to evaluate the credibility and substance of news articles. The platform generates a "nutrition label" that accompanies each article, providing metrics on article tone, language complexity, and source diversity. Otherweb aims to combat AI-generated spam and improve information quality by leveraging AI technology itself. (DARKREADING.COM)

 

"The Mother of All Breaches"-26 Billion Records Leaked, Change Your Passwords Now!
Cybersecurity researcher Bob Dyachenko has discovered a massive 12TB open instance containing stolen user data, including login information and passwords for popular sites like LinkedIn, Twitter, and Weibo. With the prevalence of reused passwords, this breach could have far-reaching consequences. It's crucial to check if your details have been exposed and change your passwords to protect your online accounts. (PCGAMER.COM)

 

23andMe's Data Breach: Cyberattack Was Missed for Months
Biotech company 23andMe suffered a cyberattack last year, with hackers accessing the information of roughly 5.5 million customers and the Family Tree profiles of 1.4 million DNA Relative participants. The attack went unnoticed for five months before being detected. The stolen data, including birth years, relationship labels, locations, DNA percentages, and customer names, was discovered when hackers shared a sample on forums. 23andMe faced controversy when it changed its terms of service, making it more difficult for customers to sue. The company is now taking steps to enhance data privacy and security. (READWRITE.COM)

 

Google Kubernetes Clusters Suffer Widespread Exposure to External Attackers
Researchers have found a loophole in the authentication mechanism of Google Kubernetes Engine (GKE) that could allow external attackers with a Google account to access private Kubernetes container clusters. This vulnerability could lead to cloud security incidents such as data theft and denial-of-service attacks. It is estimated that over 1 million GKE clusters could be vulnerable to this attack vector. Orca Security advises organizations to upgrade to GKE version 1.28 or higher and follow the principle of least privilege to mitigate the risk. (DARKREADING.COM)

 

'Midnight Blizzard' Breached HPE Email Months Before Microsoft Hack
The Russian threat actor group known as 'Midnight Blizzard' (also referred to as Nobelium, Cozy Bear, and APT29) breached Hewlett-Packard Enterprise (HPE) email accounts in May 2023, months before their attack on Microsoft. HPE discovered the intrusion in December 2023 and is working with cybersecurity experts to determine the extent of the breach. 'Midnight Blizzard' has been linked to the SolarWinds attacks and is known for targeting technology companies and exploiting vulnerabilities in widely used products. (DARKREADING.COM)

 

Personal Information of 750 Mn Indians Up for Sale on Dark Web: CloudSEK
Cybersecurity firm CloudSEK has discovered a major data breach on the dark web, where a database containing personal details of 750 million Indians is being sold. The compromised mobile network database includes names, mobile numbers, addresses, and Aadhaar details. This breach, affecting approximately 85% of the Indian population, is one of the largest of its kind. The potential for cyberattacks and identity theft is significant, highlighting the urgent need for cybersecurity measures. The government and telecom service providers must investigate and address the breach. (BUSINESS-STANDARD.COM)

 

Zero-Day, Supply-Chain Attacks Drove Data Breach High for 2023
The Identity Theft Resource Center (ITRC) has reported a record number of data breaches in 2023, fueled by zero-day exploits and supply-chain attacks. The number of data compromises increased by 78% compared to 2022, with a total of 3,205 breaches. The rise in supply-chain attacks, where organized groups target vendors to access multiple companies' information, contributed to the increase. The use of open-source software components and the complexity of modern software supply chains have also contributed to the rise of zero-day attacks. Although the number of breaches increased, the number of victims declined by 16%. The ITRC predicts that breach numbers will continue to rise in the coming year. (CSOONLINE.COM)

 

U.S. Court to Auction $131M in Silk Road Bitcoin
The U.S. District Court of Maryland is preparing to auction off more than $131 million worth of Bitcoin that was recovered from the Silk Road dark web marketplace. The assets were seized in the U.S. v Joseph Farace case, where individuals were convicted of money laundering through Bitcoin. The auction includes 2,874 Bitcoins worth approximately $129 million and 58 other valuable items. Anyone claiming ownership of the Bitcoin must submit a legal petition within 60 days, after which the U.S. will take ownership and proceed with the sale. The auction is a significant step in the fight against dark web criminal activity. (CRYPTOTIMES.IO)

 

Sign in Without a Password in More Places with Microsoft’s Latest Security Improvement
Microsoft has announced an improvement to FIDO2 security keys, introducing passkeys as a new authentication method. Passkeys aim to replace weak passwords with more convenient and secure options like fingerprint, face scan, or screen lock PIN. Microsoft 365 now supports passkeys on YubiKeys with mobile devices, expanding the use of phishing-resistant multi-factor authentication. This update enables users to sign in to web applications and native apps using a YubiKey on their mobile devices, providing a complete passwordless experience. (COM.AU)

 

Carnegie Mellon University Experiences Security Breach, Underscoring the Commonality of Cyber Attacks
Carnegie Mellon University revealed that it detected suspicious activity in its computer system, resulting in a security breach where a third party accessed files containing personal information of around 7,300 individuals. The university stated that there is no evidence of fraud or improper use of the compromised information. Experts emphasize that cyber attacks are increasingly common, and institutions must prioritize data protection and follow the latest security best practices. Regularly updating incident response plans and seeking guidance from organizations like US-CERT can help mitigate risks. (TECHNICAL.LY)

 

How to Read Leaked Datasets Like a Journalist
Micah Lee, director of information security for The Intercept, discusses his new book "Hacks, Leaks, and Revelations," which serves as a manual for parsing and organizing hacked datasets. The book includes stories of handling famous cases like Blueleaks and provides insights on protecting personal data. (VICE.COM)

 

US National Security Agency Buys Web Browsing Data Without Warrant, Letter Shows
The US National Security Agency (NSA) purchases Americans' internet browsing data from commercial brokers without a warrant, according to a letter from NSA Director Paul Nakasone to Senator Ron Wyden. Wyden called for intelligence officials to cease using personal data without explicit knowledge and consent, citing concerns about privacy and legality. The NSA argued that the data is valuable for national security and cybersecurity purposes and is collected sparingly. Wyden has requested an inventory of all personal data the NSA possesses and the removal of any data that violates Federal Trade Commission standards. (REUTERS.COM)

 

Malicious NPM Packages Exfiltrate Hundreds of Developer SSH Keys via GitHub
Two malicious packages, warbeast2000 and kodiak2k, were discovered on the npm package registry, targeting developer systems. The packages, downloaded over 1,000 times, aimed to steal SSH keys and used GitHub to store the stolen keys. This incident highlights the ongoing risk of supply chain attacks and the need for heightened software supply chain security measures. (THEHACKERNEWS.COM)

 

'CherryLoader' Malware Allows Serious Privilege Execution
Researchers have discovered a new sophisticated downloader called CherryLoader, which enables threat actors to achieve admin-level access on targeted systems. The modular loader, written in Golang, masquerades as the legitimate "Cherrytree" note-taking software. The malware's niftiest feature is its ability to swap payloads without recompiling any code. Attackers have been observed using CherryLoader to deploy privilege escalation tools such as PrintSpoofer and JuicyPotatoNG to gain high-level access on targeted systems. Arctic Wolf, the cybersecurity firm that discovered the malware, declined to comment on the outcome of the intrusions. (DARKREADING.COM)

 

Apple Wins Early Battle Against NSO After Suing Spyware Mercenaries for Attacking iPhone Users
Apple has achieved an early victory in its lawsuit against NSO Group, the maker of the Pegasus spyware. The judge denied NSO Group's request to dismiss the lawsuit and export it to Israel, stating that the challenges faced by both parties would be similar in either jurisdiction. The judge also validated Apple's basis for the lawsuit, which accuses NSO Group of violating the Computer Fraud and Abuse Act and California's Unfair Competition Law. Apple will continue to protect users against threats like NSO Group through litigation and other security measures. (9TO5MAC.COM)

 

Ransomware Simulators Reveal 'Eye-Opening' Weaknesses
Free tools like KnowBe4's RanSim and Zscaler's ransomware assessment tool provide quick reality checks on a company's ransomware detection capabilities. These simulators imitate real-world ransomware attack and encryption patterns, helping organizations assess the effectiveness of their anti-malware tools and identify vulnerabilities. The tools serve as a reminder that companies need multiple layers of security beyond just anti-malware, including VPNs, data loss prevention tools, security awareness training, and hardening of Active Directory and software-execution policies. (ITBREW.COM)

 

Defense Department Outlines Its Future Cybersecurity Program
The Department of Defense has released a Proposed Rule for its Cybersecurity Maturity Model Certification (CMMC) program, providing details on the upcoming CMMC 2.0. The program aims to streamline cybersecurity requirements for defense contractors and introduces a tiered model with three levels. Implementation is expected to begin in late 2024 or 2025. (NATLAWREVIEW.COM)

 

Midnight Blizzard: Guidance For Responders On Nation-State Attack
Microsoft detected a cyberattack in January 2024 by the Russian state-sponsored hacker group Midnight Blizzard, also known as NOBELIUM. The group gained access by compromising a legacy account without MFA, then abused OAuth applications for malicious purposes. Microsoft provides guidance on detecting and protecting against this type of attack, including reviewing high-privilege identities and apps, implementing conditional access policies, monitoring for suspicious OAuth apps and EWS activity, and using identity protection to catch anomalous logins. (MICROSOFT.COM)

 

How a Mistakenly Published Password Exposed Mercedes-Benz Source Code
Mercedes-Benz unintentionally exposed its source code after leaving a private key online, granting unrestricted access to its GitHub Enterprise Server. The exposed repositories contained sensitive information such as cloud access keys, design documents, and API keys. Mercedes has revoked the API token and removed the public repository, but it is unclear if anyone else discovered the exposed key or if customer data was compromised. This incident highlights the importance of robust security measures to protect internal source code repositories. (TECHCRUNCH.COM)

 

US Spies Want AI as Tool Against China If Tech Can Be Trusted
US intelligence agencies are seeking to harness AI technology to gain an edge against global competitors like China, but ensuring reliability and security is a challenge. The focus is on large-language models, with concerns about generating fake data or opening a backdoor into national secrets. The CIA sees AI as a way to boost productivity and compete with China's intelligence staffing advantage. However, there are risks of insider threats and outsider meddling that need to be addressed. The Intelligence Advanced Research Projects Activity is running the Bengal program to mitigate biases and toxic outputs in AI models. (BLOOMBERG.COM)

 

Expect ‘AI versus AI’ Conflict Soon, Pentagon Cyber Leader Says
Pentagon cyber leader, Jude Sunderbruch, predicts a future where adversaries use artificial intelligence (AI) systems to carry out cyberattacks against the US, leading to an "AI versus AI" conflict. The US and its allies will need to creatively utilize existing AI systems to gain an advantage over countries like China. AI and machine learning technologies are expected to enhance the capabilities of hackers and enable new methods of cyber attacks. The Defense Department's cybersecurity strategy includes studying how to apply automated and AI-driven capabilities to US cyberspace, with a focus on offensive operations against adversaries such as China and Russia. The Defense Department's Cyber Crime Center (DC3) plays a role in federal cybersecurity analysis and has advanced forensics capabilities. (DEFENSEONE.COM)

 

AI Software Vulnerable to Attacks by Both Professional and Amateur Hackers
A vulnerability in the software code of an AI-powered hiring platform called Chattr was recently discovered by white hat hackers. This breach exposed personal details of job seekers and hiring managers across the country. While Chattr promptly fixed the issue, experts warn that there are still many undiscovered vulnerabilities in AI platforms, which can be exploited by both skilled and amateur cybercriminals. The growing sophistication of AI technology lowers the barrier for hackers to access systems, gather information, and carry out attacks. The unsolved cybersecurity issues with AI chatbots make organizations and individuals more vulnerable, highlighting the need for cybersecurity considerations in AI governance and responsible development. (KQED.ORG)

 

AI Will Guard Your Data from Hackers. But What If It Decides to Read Your Diary?
Artificial intelligence (AI) is transforming cybersecurity, with both positive and negative implications. AI tools can assist in defending against cyber threats, but they can also be misused by malicious actors. Researchers are developing AI models to enhance cyber defense, making it accessible to everyone. However, AI advancements also empower hackers, potentially leading to coordinated information stealing, convincing phishing schemes, and tailored computer viruses. The key is to ensure that security practitioners have equal or superior technological capabilities to combat these threats. AI can also empower individuals by providing assistance in safeguarding personal data and accounts. Education and collaboration among governments, private sectors, and users are crucial in harnessing the potential of AI for a safer online future. (MEDIUM.COM)

 

North Korean Hackers Spotted Using Generative AI
North Korean hackers have been observed using generative AI for planning purposes, rather than conducting actual cyberattacks. South Korea plans to closely monitor their activities and warns of potential disruption to elections through the spread of fake news and AI-generated deepfakes. The UK also anticipates that cybercriminals and state-sponsored hackers will increasingly utilize generative AI in the next two years. While AI enhances existing threats, it does not revolutionize the risk landscape at present. (PCMAG.COM)

 

Prompt Security Launches With AI Protection for the Enterprise
Startup Prompt Security has emerged from stealth mode with a solution that uses artificial intelligence (AI) to secure enterprise AI products against prompt injection and jailbreaks, as well as preventing accidental data exposure. The company's solution safeguards interactions with generative AI (GenAI) tools, inspecting prompts and model responses to protect against sensitive data exposure and GenAI-specific attacks. It also catalogues AI tools used within an organization, allowing security teams to define access policies. Prompt Security recently announced $5 million in seed funding led by Hetz Ventures. (DARKREADING.COM)

 

Hundreds of Thousands of Dollars Worth of Solana Cryptocurrency Assets Stolen in Recent ClinkSink Drainer Campaigns
Wallet drainers, a form of cyber threat that silently siphons assets from digital wallets, have targeted Solana (SOL) cryptocurrency users in recent campaigns. These campaigns, known as ClinkSink drainer campaigns, resulted in the theft of at least $900,000. Attackers used social media and chat applications to distribute phishing pages, tricking victims into connecting their wallets to claim fraudulent token airdrops. The scale and frequency of these attacks highlight the vulnerabilities in the digital asset ecosystem and the need for robust security strategies to protect against wallet drainers. (HACKERNOON.COM)

 

Newly ID'ed Chinese APT Hides Backdoor in Software Updates
A Chinese threat actor named "Blackwood" has been conducting cyber-espionage attacks using a sophisticated backdoor called "NSPX30." The group has targeted Chinese and Japanese entities, including a manufacturing company and a research university. NSPX30, developed in 2018, is a multistaged tool capable of stealing information and concealing its command-and-control infrastructure. Blackwood infects machines by injecting the backdoor into software updates from legitimate sources such as WPS Office and QQ. Organizations should ensure their endpoint protection tools block NSPX30 and monitor for AitM attacks, such as ARP poisoning, to defend against this threat. (DARKREADING.COM)

 

Cybersecurity As Relatable As Possible (#4)- Hackers
In this episode of "Cybersecurity As Relatable As Possible," the author explores the world of hackers, discussing different types such as black hat, white hat, and grey hat hackers. They highlight famous hackers like Kevin Mitnick and Adrian Lamo, and emphasize the essence of ethical hacking as a means to protect against malicious actors. (MEDIUM.COM)

 

Hackers Earn $1.3M for Tesla, EV Charger, Infotainment Exploits at Pwn2Own Automotive
Participants at Pwn2Own Automotive have earned over $1.3 million for hacking Teslas, EV chargers, and infotainment systems, with the Synacktiv team winning $450,000 for hacking a Tesla's modem and infotainment system. (SECURITYWEEK.COM)

 

Info Stealing Packages Hidden in PyPI
Several PyPI packages, including nigpal, figflix, telerer, seGMM, fbdebug, sGMM, myGens, NewGends, and TestLibs111, have been identified as containing malware. These packages have been found to exhibit attack methodologies similar to a previous malicious campaign and can lead to the leak of sensitive information. The impact is considered high, affecting all platforms where PyPI packages can be installed. Users are advised to be cautious and ensure they have not installed any of the identified malicious packages. (FORTINET.COM)

 

Thousands of GitLab Instances Unpatched Against Critical Password Reset Bug
Over 5,000 GitLab servers have yet to be patched against CVE-2023-7028, a critical password reset vulnerability that allows attackers to hijack the password reset process. The flaw, which was introduced in GitLab 16.1.0, allows password reset messages to be sent to unverified email addresses under the attacker's control, potentially leading to account takeover. GitLab released patches for the bug, but more than 5,000 servers remain unpatched. The vulnerable instances are found worldwide, with the highest numbers in the US and Germany. GitLab advises users to update their instances and review logs for signs of exploitation. (SECURITYWEEK.COM)

 

AI-Generated Code Leads to Security Issues for Most Businesses: Report
More than half of organizations face security issues with AI-generated code, as developers bypass protocols and fail to update software security practices, according to Snyk's survey of 500 tech professionals. Concerns about the broader security implications of using AI coding tools are high among developers, highlighting the need for improved security measures in the adoption of AI-powered coding tools. Despite concerns, businesses continue to explore the potential of AI in software development, with various industries, including Papa John's, General Motors, Vanguard, and Bank of America, looking to leverage AI technology. (CIODIVE.COM)

 

Exclusive: US Disabled Chinese Hacking Network Targeting Critical Infrastructure
The US government launched an operation to combat a pervasive Chinese hacking operation that targeted thousands of internet-connected devices. The Justice Department and FBI obtained legal authorization to remotely disable aspects of the hacking campaign, which includes the hacking group known as Volt Typhoon. Intelligence officials are concerned about Volt Typhoon's efforts to compromise Western critical infrastructure, including naval ports, internet service providers, and utilities. The US government sought assistance from private technology companies in tracking the activity. The hacking campaign poses a potential threat to US military operations and readiness in the Indo-Pacific region. China has not yet responded to the allegations. (REUTERS.COM)

 

Notorious Ransomware Gang Claims Theft of Classified Documents from U.S. Intelligence Agencies
The ransomware gang known as ALPHV, or Blackcat, has reportedly breached a technology company, Technica Corporation, and stolen 300GB of data, including classified and top secret documents from multiple U.S. intelligence agencies. The group threatened to sell or make the data public if Technica does not respond. The breach has not been confirmed by Technica, but cybersecurity experts warn that such incidents can have significant implications if the stolen data is combined with other information from previous attacks. ALPHV is notorious for targeting various sectors, including casinos, critical infrastructure, and medical facilities. The FBI has not commented on the alleged breach. (DAILYDOT.COM)

 

Marine Corps to Upgrade 50,000 Radios with Advanced Software-Defined Models
The US Marine Corps plans to replace 50,000 radios with new multi-channel, software-defined models to enhance resistance against adversary threats. The radios will be upgraded with NSA cryptographic standards and will be rapidly updatable to keep pace with evolving threats. The transition to these advanced radios is expected to significantly improve communication capabilities, situational awareness, network resiliency, and overall effectiveness for the Marines. The upgrades align with the Marine Corps' Force Design initiative aimed at modernizing capabilities to address evolving threats in the future. (DEFENSESCOOP.COM)

 

Microsoft Teams Phishing Pushes DarkGate Malware via Group Chats
Attackers are leveraging Microsoft Teams group chat requests to distribute DarkGate malware. By sending over 1,000 malicious group chat invites, the threat actors trick targets into downloading a file that installs the malware. This attack is possible due to Microsoft's default setting that allows external Teams users to message other tenants' users. It is recommended to disable External Access in Microsoft Teams, and users should be trained to be cautious of unsolicited messages. DarkGate malware has been increasingly used as an initial access method since the disruption of the Qakbot botnet. (BLEEPINGCOMPUTER.COM)

 

TikTok Pledged to Protect U.S. Data. $1.5 Billion Later, It’s Still Struggling.
Despite promises to protect American user data and keep it separate from its China-based parent company, TikTok is facing challenges in fulfilling these commitments. Internal documents and employees reveal that data, including private information, is sometimes shared with colleagues and workers in China without going through official channels. Project Texas, the unit responsible for overseeing American data, struggles to keep up with frequent algorithm updates made by ByteDance in China. TikTok has promised changes and is voluntarily implementing plans to protect U.S. user data. However, concerns remain about data security and honoring pledges made to protect American users. (WSJ.COM)

 

Microsoft's Latest Flaw Hits Open-Source Projects
A flaw in Microsoft's Azure Pipelines testing tool has been discovered by security researchers, potentially affecting around 70,000 open-source projects. The vulnerability allows hackers to inject malicious code into source code and other projects hosted in code testing environments. The bug has a severity rating of 7.3 out of 10 and could give hackers elevated access to an organization's networks when combined with another vulnerability. Microsoft released a patch in October, but the flaw still affects code hosted on the on-premise version of Azure Pipelines and those who haven't updated to the latest version. The incident highlights the importance of supply chain security and securing open-source code. (AXIOS.COM)

 

North Korean Hackers Employ Generative AI for Cyberattacks
North Korean hackers are reportedly utilizing generative artificial intelligence (AI) to identify targets and carry out cyberattacks. South Korea's National Intelligence Service (NIS) has raised concerns about potential provocations, such as infrastructure paralysis and social chaos, as well as the dissemination of false information and manipulation of political matters. The NIS also warns of increased hacking attempts against South Korea due to its growing strategic relations with partner countries. While there is no evidence of North Korea using AI for military purposes, the situation is being closely monitored. (THEDEFENSEPOST.COM)

 

AI Gives Defenders the Advantage in Enterprise Defense
While threat actors are also leveraging artificial intelligence (AI), enterprise defenders are benefiting more from the technology. AI helps with vulnerability management, faster detection, and threat mitigation, allowing defenders to outpace attackers. It assists in analyzing policies and standards, surfacing anomalies, and speeding up remediation efforts, giving defenders an edge in cybersecurity. (DARKREADING.COM)

 

NRC Issues Recommendations for Better Network, Software Security
The Network Resilience Coalition has released recommendations for improving network security infrastructure, including secure software development and lifecycle management. The coalition urges IT vendors to adopt standards such as NIST's SSDF and CISA's Secure By Design and Default framework. (DARKREADING.COM)

 

Chinese Hackers Targeting US Infrastructure, Warn US Officials
FBI Director Christopher Wray testified that hackers linked to the Chinese government are targeting critical US infrastructure, including water treatment plants, the electric grid, and transportation hubs. The goal is to cause "real-world harm" to Americans. US officials have disrupted a Chinese cyber-spying operation but remain concerned about China's aggression towards civilian infrastructure. (REUTERS.COM)

 

US Disrupted Chinese Hacking Operation That Targeted Routers
US authorities have disrupted a Chinese state-backed hacking operation embedding malware within routers to access the networks of critical infrastructure providers. FBI and DOJ obtained court approval to delete the malicious files and sever connections, foiling national security threats. Officials warn of growing capabilities to disrupt via infrastructure and call for open coordination between experts and across borders to reinforce barriers ascending with understanding for all. (BLOOMBERG.COM)

 

The US Could Learn Something From China’s Spy Tactics
US intelligence officials are recognizing the value of open-source intelligence (OSINT) and trying to catch up to China, which has been using OSINT to collect publicly available data for decades. China's vast OSINT efforts have supported the development of strategic weapons and advanced its science and technology development. The US is now attempting to revamp its approach to OSINT collection and is exploring the use of AI to sift through data. The Biden administration is also preparing an executive order to prevent foreign adversaries, particularly China, from accessing sensitive data about Americans and those connected to the US government. (BLOOMBERG.COM)

 

Apple Warns iPhone Sideloading Changes Will Increase Cyber Threats
Apple is making changes to comply with the EU's Digital Markets Act, allowing sideloading of non-Apple-vetted apps and alternative payment options. However, Apple warns that these changes bring risks of malware, fraud, scams, and harmful content. The company will provide notarization for sideloaded apps and disclosures on alternative payments to mitigate some of the threats. The changes will only apply to EU users, while users in other regions will not be affected. (DARKREADING.COM)

 

White House Releases Report on Securing Open-Source Software
The White House has released an end-of-year report highlighting its efforts to enhance the security of open-source software. The report focuses on the Open-Source Software Security Initiative (OS3I), which aims to unify the government's approach to open-source software security, establish a strategic approach, encourage long-term investment, and engage with the open-source community. Challenges identified include the lack of coordinated vulnerability response teams in open-source projects and companies' limited awareness of their use of open-source code. The administration plans to continue investing in secure software development and seek input from experts to inform future actions. (CYBERSCOOP.COM)

 

Ars Technica Used in Malware Campaign with Never-Before-Seen Obfuscation
Mandiant researchers discovered a new malware campaign abusing Ars Technica and Vimeo to distribute payloads, using novel techniques like base64 encoding strings in URLs and video descriptions to stealthily infect devices and retrieve additional stages. (ARSTECHNICA.COM)

 

7 Hacking Tools That Look Harmless But Can Do Real Damage
These seven seemingly innocent tech gadgets are actually powerful hacking tools that can pose serious security risks. The Flipper Zero, O.MG cables, USBKill, USB Nugget, Wi-Fi Pineapple, USB Rubber Ducky, and LAN Turtle can all be misused to gain unauthorized access, steal data, or launch attacks. It's important to be cautious about what devices you connect to your systems to avoid potential breaches. (ZDNET.COM)

 

Qualys Discovers Vulnerabilities in GNU C Library's syslog() and qsort()
The Qualys Threat Research Unit has found four vulnerabilities in the GNU C Library (glibc), including a heap-based buffer overflow in the syslog() function and a memory corruption issue in the qsort() function. These vulnerabilities could lead to local privilege escalation and memory corruption, impacting major Linux distributions. The discovery emphasizes the importance of strict security measures in software development and the need for prompt updates. (QUALYS.COM)

 

Riding the AI Waves: The Rise of Artificial Intelligence to Combat Cyber Threats
AI has evolved from early spam filtering to advanced defenses, but is now a double-edged sword as threat actors exploit generative AI for more sophisticated attacks. Staying informed on AI's dual use for offense and defense is crucial as we enter a new phase in the cybersecurity arms race. (BLACKBERRY.COM)

 

The Underestimated Scourge of Spoofing Attacks
Spoofing attacks, where adversaries mimic legitimate devices or users to infiltrate computer networks, are a serious issue that often goes unnoticed by businesses. These attacks, such as email spoofing, IP spoofing, and DNS spoofing, can lead to the loss of proprietary data, DDoS attacks, and reputational damage. The use of AI technology and generative AI applications further complicates the problem. To defend against spoofing attacks, organizations should implement proper authentication mechanisms, use access control lists and packet filtering, and employ network monitoring and security solutions. Additionally, security awareness training and enforcing security policies are crucial in mitigating the risk of spoofing attacks. (FORBES.COM)

 

Microsoft CEO Satya Nadella Calls for Digital Geneva Convention to Address Nation-State Hackers
Following the recent admission that Russian group Cozy Bear hacked into Microsoft's corporate network, CEO Satya Nadella warns of the potential breakdown in world order caused by nation-state hackers. He suggests the formation of a cyber Geneva Convention, bringing together the US, Russia, and China to establish guidelines for cyber warfare. Microsoft previously advocated for a digital Geneva Convention in 2017 to protect against nation-state threats. The recent cyberattacks by Cozy Bear on Microsoft and HPE highlight the urgency for international cooperation in cybersecurity. (BUSINESSINSIDER.COM)

 

Cyber Chiefs Confident 2024 Election Will Be 'Most Secure' in History
Gen. Paul Nakasone, head of U.S. Cyber Command and the NSA, expressed confidence that the upcoming 2024 elections will be the most secure to date. He stated that there are no indications of planned cyberattacks, and emphasized the broad partnerships and understanding of technologies in place to prevent interference. Lt. Gen. Timothy Haugh will succeed Nakasone as the new leader of the NSA and Cyber Command. (POLITICO.COM)

 

Telegram Is a 'Scammer's Paradise' Thanks to Cheap Phishing Tools
Cybersecurity startup Guardio has revealed that Telegram, the popular encrypted messaging app, has become a hub for phishing scams. Third-party phishing kits are being promoted and sold on Telegram, allowing aspiring cybercriminals to get started for as little as $230. These kits can be used to steal login credentials for popular platforms like Netflix, Spotify, Facebook, and more. Guardio describes Telegram as a "scammer's paradise" due to the availability and affordability of these phishing tools. The platform also offers support groups and bots specifically focused on phishing scams. Additionally, cybercriminals are using Telegram to buy and sell social media accounts, credit cards, bank account logins, and even web shells for uploading phishing materials. Despite Telegram's Terms of Service prohibiting spam and scams, it remains unclear how effectively the platform is enforcing these rules. (PCMAG.COM)

 

Leaky Vessels: Docker and runc container breakout vulnerabilities (January 2024)
A security researcher with Snyk identified 4 vulnerabilities in core container infrastructure that allow container escapes, gaining unauthorized access to the underlying host system and potentially sensitive data or ability to launch further attacks. The vulnerabilities affect widely used components like Docker and container build tools, and Snyk recommends installing all available patches. (SNYK.IO)

dtau...@gmail.com

unread,
Feb 10, 2024, 7:52:15 AMFeb 10
to sec-...@googlegroups.com

Outlook Vulnerability Could Leak NTLM Passwords

Security researcher Dolev Taler at software company Varonis discovered a Microsoft Outlook vulnerability that could give hackers access to NT LAN Manager (NTLM) v2 hashed passwords when a specially crafted file is opened. While the flaw has been patched, Taler said Windows Performance Analyzer and Windows File Explorer, which could be used to leak NTLM hashes, have not been patched. Said Taler, "Usually, NTLM v2 should be used when attempting to authenticate against internal IP-address-based services. However, when the NTLM v2 hash is passing through the open Internet, it is vulnerable to relay and offline brute-force attacks."
[ » Read full article ]

The Hacker News (January 29, 2024)

 

FBI Shuts Down China's 'Volt Typhoon' Hackers Targeting U.S. Infrastructure

During a U.S. House committee hearing on Jan. 31, FBI Director Christopher Wray disclosed that his agency had shut down the China-backed hacking group known as "Volt Typhoon." The group had hacked hundreds of outdated home and office routers and was targeting U.S. water treatment plants, the power grid, oil and natural gas pipelines, and transportation systems, according to Wray. Microsoft in May had warned of Volt Typhoon’s hacking efforts, advising customers to change their security details.
[ » Read full article ]

CNBC; Rebecca Picciotto (January 31, 2024)

 

India Tells Tech Giants to Police Deepfakes

As India prepares for a general election this year, a senior government official said that social media companies will be held accountable for AI-generated deepfakes posted on their platforms. Rajeev Chandrasekhar, India's minister of state for electronics and IT, said India has “woken up earlier” than other nations to the danger posed by deepfakes because of the size of its online population: as many as 870 million of its total population of 1.4 billion people are connected to the Internet, and 600 million use social media.

[ » Read full article *May Require Paid Registration ]

Financial Times; John Reed; Hannah Murphy (January 28, 2024)

[Additional article: India threatens to block platforms for spreading deepfakes ahead of elections | Biometric Update]

 

AI and Cybersecurity Unite to Shield Data
The fusion of artificial intelligence (AI) and cybersecurity has emerged as a powerful tool in protecting data in the digital age. AI's ability to learn and adapt has transformed it into a critical defense mechanism against cyber threats. By utilizing machine learning and pattern recognition, AI-driven cybersecurity systems can analyze large amounts of data, identify potential threats, and evolve over time, providing a dynamic shield against cyberattacks. (MEDIUM.COM)

 

Role of AI and ML in Cyber Security
Artificial Intelligence (AI) and Machine Learning (ML) are crucial in cybersecurity, helping to identify and mitigate threats such as ransomware, botnets, and phishing. AI and ML are used to analyze data and detect anomalies, safeguard industries through password protection, phishing detection, threat detection, vulnerability management, behavioral analytics, network security, AI-based antivirus, fraud detection, and botnet detection. Additionally, AI can be used to combat AI-based threats. (MEDIUM.COM)

 

Cloudflare Falls Victim to Okta Breach, Atlassian Systems Cracked
Cloudflare has disclosed that it was impacted by the Okta supply-chain attack, with cyberattackers gaining access to its Atlassian platforms, including Bitbucket, Confluence, and Jira. The attackers, believed to be state-sponsored, aimed to obtain persistent and widespread access to Cloudflare's global network. While the attackers accessed internal systems and documentation, Cloudflare's network segmentation and zero-trust authentication approach prevented them from accessing customer data or systems. Cloudflare took proactive measures, including rotating production credentials and conducting forensic triages on systems. This incident highlights the continued impact and reach of the Okta supply-chain campaign. (DARKREADING.COM)

 

Treasury Sanctions Actors Responsible for Malicious Cyber Activities on Critical Infrastructure
The US Treasury's Office of Foreign Assets Control (OFAC) has imposed sanctions on six officials from the Iranian Islamic Revolutionary Guard Corps Cyber-Electronic Command (IRGC-CEC) for their involvement in cyberattacks on critical infrastructure in the US and other countries. The targeted individuals were responsible for hacking and posting images on programmable logic controllers manufactured by an Israeli company. While no critical services were disrupted, unauthorized access to such infrastructure can have devastating consequences. (TREASURY.GOV)

 

Ex-CIA Software Engineer Sentenced to 40 Years for Giving Secrets to WikiLeaks
Former CIA software engineer Joshua Schulte has been sentenced to 40 years in prison for committing espionage, computer hacking, contempt of court, making false statements to the FBI, and possessing child abuse images. Schulte was convicted in July 2022 for providing classified information to WikiLeaks in the Vault 7 leak, which exposed CIA surveillance techniques. Prosecutors described it as the largest data breach in CIA history and one of the largest unauthorized disclosures of classified information in US history. The leak raised concerns about the security of US spy agencies' confidential documents in the digital era. (THEGUARDIAN.COM)

 

Critical Infrastructure Isn't Ready Yet to Face China's Cyber Threat
Despite warnings from U.S. cyber officials about persistent Chinese state-sponsored hacking that could disrupt critical services, many operators of American infrastructure still struggle with basic cybersecurity practices and are unprepared for threats facing them from China's skilled cyber actors. (AXIOS.COM)

 

China Infiltrates US Critical Infrastructure in Ramp-up to Conflict
US officials have stated that the People's Republic of China is rapidly developing its military capabilities, including cyber operations, in preparation for potential conflict with the United States. China-linked cyberattackers have shifted their focus to critical infrastructure systems as part of their strategy, with groups like Volt Typhoon conducting attacks on US government and defense contractors. The US government and private sector have taken action to disrupt these threats. Experts warn that China is becoming the "defining cyber threat of this era," using various means to impact US economic and national security. The compromise of small-office, home-office (SOHO) routers has become a key tactic, making it harder to detect attacks. It is crucial for technology firms and individuals to understand their responsibilities and take steps to secure their infrastructure. (DARKREADING.COM)

 

Hackers Steal $112 Million of XRP Ripple Cryptocurrency
Hackers have stolen approximately $112 million worth of XRP cryptocurrency from a wallet belonging to Ripple's co-founder, Chris Larsen. The stolen funds have been laundered through several crypto exchanges, including Binance and Kraken. While the details of the hacked wallet's ownership are unclear, Ripple claims that the company itself was not impacted by the theft. This incident marks the largest cryptocurrency theft of 2024 so far. XRP holders are now calling for increased transparency and disclosure of co-founders' crypto wallets. (TECHCRUNCH.COM)

 

INTERPOL-Led Operation Targets Growing Cyber Threats
INTERPOL's Operation Synergia targeted phishing, malware, and ransomware attacks, identifying around 1,300 suspicious IP addresses or URLs. The operation involved 60 law enforcement agencies from over 50 INTERPOL member countries, resulting in the takedown of 70% of the command-and-control servers identified. Authorities detained 31 individuals and identified 70 suspects. The operation showcased the effectiveness of international cooperation in combating cybercrime, with INTERPOL and its partners providing analysis and intelligence support. Participating countries included Australia, China, France, India, Russia, Singapore, and the United Arab Emirates, among others. (INTERPOL.INT)

 

Ukraine Says 2,000 Computers of State Firm Were Impacted in Cyber Attack
Ukraine's CERT-UA cybersecurity agency reported that around 2,000 computers were affected in a recent cyber attack on an unnamed state-run Ukrainian company, with malware samples examined showing infection by the PURPLEFOX/DIRTYMOE malware module known for enabling remote access and distributed denial-of-service attacks. (REUTERS.COM)

 

Ukraine Military Targeted with Russian APT PowerShell Attack
A sophisticated Russian APT group, possibly related to Shuckworm, has launched a targeted PowerShell attack campaign against the Ukrainian military. The campaign, named STEADY#URSA, utilizes a newly discovered PowerShell-based backdoor called SUBTLE-PAWS to infiltrate and compromise systems. The attack involves phishing emails, compressed files, USB drives for distribution, and employs obfuscation and evasion techniques for stealth. Measures such as user education, device control policies, and enhanced monitoring are recommended to mitigate risks. The ongoing digital warfare in Ukraine highlights the increasing sophistication of state-backed malicious actors in cyber conflicts. (DARKREADING.COM)

 

Fmr. CISA Director: China is 'A Much More Nefarious, Insidious Threat'
In an interview, the former director of the Cybersecurity and Infrastructure Security Agency said big tech leaders at a congressional hearing all viewed China as an increasing cyber threat, with Chris Krebs stating China has progressed beyond just information collection to "a much more nefarious, insidious threat." (MSNBC.COM)

 

White House Rejects Efforts to Undo SEC Cyber Disclosure Rule
The Biden administration has stated that President Joe Biden would veto a congressional resolution aimed at reversing the U.S. Securities and Exchange Commission's (SEC) rule on cybersecurity incident disclosure. The SEC rule, which requires public companies to disclose material cyber incidents and describe their cyber risk management in annual reports, took effect in September 2021. The White House argues that the rule's transparency will incentivize corporate investment in cybersecurity and help combat increasing cyberattacks. (CYBERSECURITYDIVE.COM)

 

The Imperative for Robust Security Design in the Health Industry
Healthcare and health-tech companies must prioritize robust security design to protect sensitive patient information from cyberattacks and data breaches. The consequences of breaches extend beyond compromised data, impacting the reputation and financial stability of healthcare organizations, as well as the well-being of patients. A proactive approach to security, including the adoption of state-of-the-art technologies and cybersecurity training, is crucial to mitigate risks and ensure patient trust. (DARKREADING.COM)

 

EU and United States Enhance Cooperation on Cybersecurity
The European Union and the United States have strengthened their cooperation on cybersecurity, focusing on addressing the evolving cyber threat landscape. They have discussed the EU-US Joint Cyber Safe Products Action Plan, which aims to facilitate collaboration on cybersecurity requirements for IoT hardware and software consumer products. They also agreed to cooperate in critical infrastructure protection, crisis management, software security, post-quantum cryptography, and cybersecurity of artificial intelligence. Additionally, the EU announced its commitment to the US-led Counter Ransomware Initiative, pledging not to pay ransom to cybercriminals. (EUROPA.EU)

 

In the Shadows: How Rootkits Haunt Your Systems and What You Can Do to Fight Back
Rootkits are stealthy malware that gain privileged access to your system, stealing data, installing additional malware, and disrupting performance. They evade detection through techniques like kernel-level access and hidden files. To fight back, patch your system, invest in robust security software, monitor activity, conduct regular scans, and stay informed. Collaboration, secure coding practices, and stricter cyber security standards are crucial. Examples of rootkit attacks include Stuxnet, Sony PlayStation Network breach, Flame, Equation Group, and WannaCry ransomware attack. Consequences include financial losses, reputational damage, operational disruption, privacy violations, and national security threats. Reputable security organizations and educational resources can help combat rootkits. (MEDIUM.COM)

 

The U.S.'s Far-Reaching New Cybersecurity Rules for Federal Contractors
Proposed FAR revisions aim to standardize cybersecurity requirements and expand information sharing for federal contractors by requiring compliance with CISA directives and FedRAMP cloud authorizations. If implemented, the expanded authority would see cybersecurity practices mandated across private partners while presenting issues meriting ongoing coordination. (LAWFAREMEDIA.ORG)

 

30 New Semgrep Rules for Finding Issues Across Languages and Data Formats
Trail of Bits has released 30 custom Semgrep rules utilizing generic mode and YAML support to search code and infrastructure definitions for common security vulnerabilities, bugs and performance concerns. The rules span multiple programming languages and data formats to find issues through coordinated static analysis. (TRAILOFBITS.COM)

 

Cloudflare Hacked Using Auth Tokens Stolen in Okta Attack
Cloudflare disclosed a breach in which a suspected nation-state attacker gained access to its internal Atlassian server, compromising its Confluence wiki, Jira bug database, and Bitbucket source code management system. The attacker used access tokens and service account credentials stolen during the Okta breach. Cloudflare detected the activity, severed the hacker's access, and conducted forensic investigations. While the breach did not impact customer data or systems, Cloudflare took the incident seriously as the attacker sought information about its global network. The company is continuing software hardening and credential and vulnerability management efforts. (BLEEPINGCOMPUTER.COM)

 

Yes, Telegram Is a Very Serious Threat to Your Phone
A new report highlights the dangerous threats posed by Telegram. The messaging app has become a hub for cybercriminals to exchange illicit tools and victims' data. Phishing kits and malware-for-hire are readily available, making mobile phishing attacks more prevalent. Despite Telegram's claims of security and privacy, it lacks default end-to-end encryption and poses risks to user privacy and phone security. Users are advised to exercise caution and consider alternative messaging platforms. (FORBES.COM)

 

FritzFrog Botnet Exploits Log4Shell on Overlooked Internal Hosts
A new variant of the FritzFrog botnet has been spreading through the Log4Shell vulnerability, targeting internal network assets that organizations are less likely to have patched. This sophisticated botnet not only exploits Log4Shell but also leverages weak SSH passwords and exploits the CVE-2021-4034 vulnerability in Polkit for privilege escalation. The botnet employs stealth techniques such as TOR support, an "antivirus" module, and the use of shared memory and anonymous files in RAM to avoid detection. Mitigation measures include using strong passwords and regularly patching systems. (DARKREADING.COM)

 

'Commando Cat' Is Second Campaign of the Year Targeting Docker
A cryptojacking campaign called "Commando Cat" has been discovered, targeting exposed Docker API endpoints. While the threat actor behind the campaign is unknown, it shares similarities with other cryptojacking groups like Team TNT. Commando Cat is a sophisticated campaign that acts as a credential stealer, backdoor, and cryptocurrency miner, making it highly stealthy and malicious. (DARKREADING.COM)

 

New Linux glibc Flaw Lets Attackers Get Root on Major Distros
A newly disclosed vulnerability in the GNU C Library (glibc) allows unprivileged attackers to gain root access on multiple major Linux distributions. Tracked as CVE-2023-6246, the flaw exists in glibc's __vsyslog_internal() function, which is used by syslog and vsyslog functions. The vulnerability, which was accidentally introduced in glibc 2.37 and later backported to glibc 2.36, enables local privilege escalation. Debian, Ubuntu, and Fedora systems are among those impacted by the vulnerability. Other vulnerabilities were also discovered in glibc by Qualys security researchers. (BLEEPINGCOMPUTER.COM)

 

Forget Deepfakes or Phishing: Prompt Injection is GenAI's Biggest Problem
Prompt injection, a method of entering text prompts into large language model (LLM) systems to trigger unintended actions, is identified as the most pressing threat to generative artificial intelligence (GenAI). Prompt injection attacks can manipulate LLMs to expose sensitive information, override controls, or exfiltrate data. As LLM usage becomes more widespread, the vulnerability of prompt injection poses a significant risk to critical systems and processes. The security industry is actively working to find solutions to combat prompt injection, but the inherent challenges of natural language processing make it a complex problem to solve. (DARKREADING.COM)

 

Audio-Jacking: Using Generative AI to Distort Live Audio Transactions
Research demonstrates the capability to intercept conversations and use generative AI models like LLMs to dynamically alter context, replacing details like bank accounts with manipulated information undetected by speakers. This highlights new risks emerging technologies present and the urgent duty for judicious multi-sector cooperation safeguarding innovation and communities. (SECURITYINTELLIGENCE.COM)

 

How the FBI Hacked Hive
The FBI successfully infiltrated the ransomware group Hive, saving victims approximately $130 million. Over an 18-month period, the Tampa field office interviewed victims, gathering intelligence about the group's operations. Eventually, the FBI broke into Hive's remote administration panel, allowing them to identify victims and provide decryption keys. However, Hive remained active, continuing its attacks and even threatening to leak sensitive files. The recent indictment of a Russian national affiliated with Hive highlights the ease with which hackers can switch between groups. (POLITICO.COM)

 

Google Play Used to Spread 'Patchwork' APT's Espionage Apps
Indian APT group Patchwork has been discovered using Google Play to distribute Android apps loaded with the VajraSpy remote access Trojan (RAT). The apps, posing as messaging and news services, were downloaded over 1,400 times. The RAT intercepts calls, SMS messages, files, contacts, and more, and can extract WhatsApp and Signal messages, record phone calls, and take camera pictures. The campaign primarily targeted Pakistani users, using the promise of love in targeted attacks. The malicious apps have been reported and removed from Google Play. (DARKREADING.COM)

 

GPS Spoofing Is Now Affecting Airplanes in Parts of Europe
A recent report reveals that GPS spoofing incidents, similar to those experienced in the Middle East, are now affecting airplanes in parts of Europe. The University of Texas Radionavigation Laboratory has identified Russia as the likely source of the spoofing, which has caused disruptions in the Baltic region. Pilots have begun disabling GPS navigation systems to prevent the contamination of other navigation systems. The spoofing incidents may be linked to geopolitical tensions and military exercises in the region. (FORBES.COM)

 

Deepfakes, Dollars And ‘Deep State’ Fears: Inside The Minds Of Election Officials Heading Into 2024
This article illuminates challenges facing those administering America's elections, from emerging synthetic media threats and scarce resources to distrust fueled by disinformation. Officials emphasize transparency, detailing efforts from legislative partnerships and technical briefings to de-escalation training addressing rising hostility. Congressional action appears unlikely, underscoring needs for sustained cooperation safeguarding the electoral process amid evolving complexities facing democracies globally. (CYBERSCOOP.COM)

 

Haugh Takes Over as Leader of Cyber Command, NSA
Gen. Timothy Haugh has assumed leadership of both the National Security Agency (NSA) and U.S. Cyber Command following the retirement of Gen. Paul Nakasone. Haugh's appointment comes at a time of high geopolitical tensions and ahead of the 2024 elections, with concerns about potential foreign interference. Haugh, who previously served as deputy commander of Cyber Command, pledged to focus on personnel, technology innovation, and strengthening partnerships with allied nations. Nakasone, who held the position since 2018, has no specific plans for his next career move. (POLITICOPRO.COM)

 

A New Era: Gen. Timothy Haugh Takes Over For Gen. Paul Nakasone At Cyber Command
This analysis details Haugh's assumption of leadership at US Cyber Command and NSA from Nakasone, the longest-serving Cybercom chief. Experts note Haugh is poised to advance initiatives including new authorities and Cybercom 2.0 planning while facing calls for independent cyber forces. Cooperative progress bolsters joint capabilities amid evolving threats as stakeholders steer collaboration proportionately benefiting security. (DEFENSESCOOP.COM)

 

Washington Recruited Private Hackers for Help. Far-Right Pressure is Pushing Them Away.
Top cybersecurity experts involved in the Joint Cyber Defense Collaborative (JCDC) are retreating due to frustrations with management and pressure from conservative critics. The initiative, launched by the Cybersecurity and Infrastructure Security Agency (CISA), aims to enlist outside experts to fight cybercrime and state-backed hackers. However, concerns over CISA's efforts to combat disinformation and allegations of censorship have caused participants to fear being caught in the crosshairs. The pullback poses a challenge for the government's cybersecurity efforts, as most U.S. networks are privately owned. (POLITICOPRO.COM)

 

iPhone Under Attack: U.S. Government Issues 21 Days To Comply Warning
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned of active attacks exploiting an iOS vulnerability, CVE-2022-48618, and given federal agencies 21 days to patch. Dating back to at least December 2022, the kernel flaw bypasses pointer authentication controls, posing "significant risks." All organizations are urged to timely address the issue tracked in CISA's Known Exploited Vulnerabilities catalog. CISA labeled it an active threat that Apple patched in iOS 16.2 and earlier versions. Binding directives require federal agencies to remediate identified vulnerabilities by due dates when added to the high-priority list. (FORBES.COM)

 

A Startup Allegedly "Hacked the World." Then Came the Censorship-and Now the Backlash.
Anti-censorship voices are fighting back against legal threats made by Appin Technology and its subsidiaries, who allegedly engaged in illegal hacking. The Electronic Frontier Foundation (EFF) has responded to Appin Training Centers' demands to remove content related to the allegations, arguing that the Indian court's injunction "is in no way the global takedown order your correspondence represents it to be." Techdirt and MuckRock, among others, are refusing to comply, invoking the SPEECH Act to protect freedom of speech. Distributed Denial of Secrets (DDoSecrets) has also joined the effort, "uncensoring" Reuters' story on Appin Technology. (ARSTECHNICA.COM)

 

Malware-Filled Messaging Apps Wreaking Havoc on Android Phones – Delete These Malicious Apps Right Now
A remote access trojan called VajraSpy has been discovered in 12 malicious apps, six of which were available on the Google Play Store. These apps, capable of extracting sensitive information, have now been removed, but users must manually uninstall them. The malware was distributed through a romance scam, luring victims to download unfamiliar apps. To stay safe from Android malware, limit the number of apps on your phone, stick to official app stores, and consider using Android antivirus apps for extra protection. (TOMSGUIDE.COM)

 

Ransomware Retrospective 2024: Unit 42 Leak Site Analysis
This comprehensive review leverages data from ransomware leak sites to assess trends and shifts within the evolving ransomware landscape during 2023. Key findings include notable increases in activity driven by zero-day exploits targeting critical vulnerabilities, the rise and fall of various groups, and affected industries and regions. Proactive protections for customers are also outlined. (PALOALTONETWORKS.COM)

 

Pentagon Investigating Theft of Sensitive Files by Ransomware Group
The Pentagon is investigating claims by the ransomware group ALPHV (also known as BlackCat) that they have stolen sensitive data related to the U.S. military. The group targeted Technica, an IT services company based in Virginia that works with the federal government. ALPHV posted screenshots of stolen documents, including personal information and contract details, and threatened to sell or release the data if Technica does not contact them. The Defense Counterintelligence and Security Agency is coordinating with law enforcement to address the incident. ALPHV is a prolific ransomware group responsible for extorting millions of dollars from victims. (CYBERSCOOP.COM)

 

We Need Cybersecurity in Space to Protect Satellites
Satellites play indispensable roles enabling navigation, communication, and commerce globally. But incidents like the 2022 hacking of Viasat and SpaceX systems show satellites now face escalating cyber threats. Attacks could severely disrupt critical infrastructure and services. Cybersecurity experts urge fortifying satellites given the soaring risk. Though securing space tech can be costly and complex, the damage from attacks would be far worse. New standards, collaborative R&D, and policymaker focus on the issue are vital steps. Prioritizing satellite cybersecurity now protects our interconnected world's fabric. Inaction risks jeopardizing safety and prosperity. Investing to safeguard celestial sentinels secures our digital age advancement. (SCIENTIFICAMERICAN.COM)

 

Windows 11 Poised to Get a Linux 'Sudo' Upgrade
Microsoft appears set to bring a key Linux security feature called "sudo" to Windows 11, letting users escalate privileges to make system changes. Sudo requires a password to run commands as an admin, limiting risk. First seen in Windows Server builds, new evidence shows Microsoft enabling the sudo toggle in Windows 11 developer settings. The potential upgrade comes as Microsoft aims to improve OS security after breaches in 2023. Adopting the widely-used Linux capability allowing superuser rights could bolster Windows defenses going forward. (WEBPRONEWS.COM)

 

Apple Fixes Zero-Day Bug in Apple Vision Pro That 'May Have Been Exploited'
Apple has released a security patch for its Vision Pro mixed reality headset to fix a vulnerability in WebKit, the browser engine that runs Safari and other web apps. The bug, if exploited, could allow malicious code to run on the device. It's unclear if the vulnerability was specifically exploited in Apple's Vision Pro, and the identity and motive of the exploiters are unknown. WebKit vulnerabilities are often targeted by malicious actors to gain access to personal data. The Vision Pro is set to be available starting Friday. (TECHCRUNCH.COM)

 

macOS Malware Campaign Showcases Novel Delivery Technique
A new cyberattack campaign is distributing a backdoor to macOS users through cracked copies of popular software products, potentially building a macOS botnet. The campaign stands out due to its scale, multistage payload delivery technique, and use of cracked macOS apps that would be of interest to business users. The threat actor behind the campaign is using as many as 70 unique cracked macOS applications to distribute the malware, prompting concerns for organizations that do not restrict what software users can download. The delivery method involves providing users with an unusable version of the cracked app and an "Activator" app containing two malicious executables. (DARKREADING.COM)

 

Mastodon Fixed a Flaw That Can Allow the Takeover of Any Account
A security flaw in the decentralized social network Mastodon could be exploited to impersonate and take over any account. The vulnerability, tracked as CVE-2024-23832, is caused by insufficient origin validation and affects Mastodon versions prior to 3.5.17, as well as 4.0.x, 4.1.x, and 4.2.x versions. Mastodon plans to release technical details about the vulnerability after February 15, 2024, to allow admins ample time to update their server instances. The project's maintainers are concerned that threat actors may start exploiting the issue in the wild. (SECURITYAFFAIRS.COM)

 

Zuckerberg’s Secret Weapon for AI Is Your Facebook Data
Mark Zuckerberg plans to use data from Facebook and Instagram to develop powerful artificial intelligence (AI). Meta, the parent company of Facebook, has an extensive amount of data, greater than the Common Crawl dataset often used to train AI models. The abundance of user-generated content, particularly comment threads, could be valuable for training conversational agents. However, using this data raises concerns about privacy infringement, ethical questions, compliance with data protection laws, and the presence of bias and toxicity in the data. Zuckerberg's ambition to build "general intelligence" comes with potential risks and challenges for users' privacy and content moderation. (BLOOMBERG.COM)

 

AI Chatbots Making Cybersecurity Work Easier, But Foundation Models Set to Revolutionize It
Generative AI, such as chatbots, has paved the way for advancements in cybersecurity. Foundation models, with their reasoning ability, are poised to predict cyberattacks with high confidence, revolutionizing the industry. Classical AI models and self-trained AI models have already made significant contributions to threat detection and analysis, but foundation models, trained on multimodal data, have the potential to detect previously unseen threats and enhance security analysts' productivity. Trials have shown promising results, with the model accurately predicting attacks before they occurred. While foundation models won't eliminate cyber threats entirely, they offer substantiated forecasts that can help defenders prepare and mitigate risks. (FORTUNE.COM)

 

ChatGPT Might Not Be as Secure as You Think It Is
Recent concerns over ChatGPT's security have arisen after a user discovered unrecognized logs in their chat history. While investigations revealed that the logs were from a hacker who broke into the user's account, it raises concerns about the lack of account security options in ChatGPT. With no two-step authentication or password change prompts, users are advised to create a dedicated ChatGPT account, avoid using personal information in prompts, and monitor chat history for any suspicious activity. (LIFEHACKER.COM)

 

Eight Emerging Areas of Opportunity for AI in Security
VentureBeat speaks with Menlo Ventures' Rama Sekhar and Feyza Haskaraman about the need for new generative AI-based security technologies to address emerging threats. They identify eight areas where gen AI can have a significant impact, including vendor risk management, security training, penetration testing, anomaly detection, synthetic content detection, code review, dependency management, and defense automation. These areas highlight the need for improved security measures to protect against AI-based cyberattacks. (VENTUREBEAT.COM)

 

Verizon Employee Data Exposed in Insider Threat Incident
Around 63,000 Verizon employees have been affected by a breach caused by an insider threat, resulting in the inadvertent disclosure of personal information. The exposed data includes names, addresses, Social Security numbers, and compensation information. Verizon is reviewing its technical controls to prevent future incidents and there is currently no evidence of misuse or external sharing of the information. This incident highlights the need for a cultural shift in access management and a modernized approach to security tools. This is Verizon's second data breach incident in less than a year. (DARKREADING.COM)

 

Data Breach Class Actions Are on the Rise, Report Finds
A report by Duane Morris reveals that data breach class actions have seen a significant increase in scale, with copycat and follow-on lawsuits being filed across multiple jurisdictions. In 2023, class actions and government enforcement lawsuits resulted in settlements exceeding $50 billion. The report also highlights the potential impact of generative AI on the plaintiffs' class action bar, enabling them to file suits more efficiently. Companies faced substantial costs in responding to data breach class actions, and courts grappled with issues of standing and uninjured class members. Generative AI is expected to play a transformative role in class action litigation. (LEGALDIVE.COM)

 

Chinese Hackers Fail to Rebuild Botnet After FBI Takedown
Chinese hackers known as the Volt Typhoon group attempted to rebuild their botnet after the FBI dismantled it. The botnet was previously used to target critical infrastructure in the United States. Despite their efforts, the FBI and Black Lotus Labs null-routed the hackers' command-and-control servers, effectively preventing the botnet from being revived. The Volt Typhoon group has been involved in breaching U.S. military organizations, telecom providers, and other targets. (BLEEPINGCOMPUTER.COM)

 

BitLocker Encryption Broken in 43 Seconds with Sub-$10 Raspberry Pi Pico - Key Can Be Sniffed When Using an External TPM
A YouTuber demonstrated a security flaw in BitLocker encryption that allows bypassing Windows BitLocker in under a minute using a Raspberry Pi Pico. By exploiting an unencrypted communication flaw between the CPU and external TPM, the encryption keys can be stolen, compromising the protected data. This flaw primarily affects systems with external TPMs, while CPUs with built-in TPMs are not vulnerable. (TOMSHARDWARE.COM)

 

Millions of Hacked Toothbrushes Used in Swiss Cyber Attack, Report Says
Hackers utilized approximately 3 million internet-connected toothbrushes to carry out a distributed denial of service (DDoS) attack against a Swiss company. The attack, which overloaded the company's website, resulted in millions of euros in damages. Cybersecurity firm Fortinet warned about the risks associated with smart devices, emphasizing the need for protective measures. Some researchers have raised doubts about the report, questioning the feasibility of compromising such a large number of toothbrushes. The incident highlights the growing security concerns surrounding internet-connected devices. (CO.UK)

U.S. and International Partners Publish Cybersecurity Advisory on People’s Republic of China State-Sponsored Hacking of U.S. Critical Infrastructure
A joint cybersecurity advisory has been published by the Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and Federal Bureau of Investigation (FBI), warning of malicious activity by a People’s Republic of China (PRC) state-sponsored cyber actor known as Volt Typhoon. The advisory provides details on the PRC's efforts to conceal hacking activity, guidance for potential victims, and encourages reporting of any suspected incidents. (CISA.GOV)

 

Chinese Spies Hacked Dutch Defence Network Last Year - Intelligence Agencies
Dutch intelligence agencies have publicly attributed cyber espionage to China for the first time, revealing that Chinese state-backed cyber spies gained access to a Dutch military network last year. The agencies, MIVD and AIVD, stated that this incident is part of a wider trend of Chinese political espionage against the Netherlands and its allies. The hackers placed malware inside an armed forces network used for unclassified research, but the damage was limited as the network was separate from the ministry's main system. (REUTERS.COM)

 

Critical Bugs in Canon Small Office Printers Allow Code Execution, DDoS
Canon has patched seven critical buffer-overflow bugs affecting its small office multifunction printers and laser printers. The vulnerabilities, rated as "critical" with a score of 9.8 out of 10 on the CVSS scale, could allow unauthenticated attackers to remotely perform denial of service (DoS) or arbitrary code execution on affected printers. These bugs were revealed at the Pwn2Own hacking contest and serve as a reminder of the often overlooked security risks posed by printers. Canon advises customers to update firmware, set a private IP address, and create a network environment with firewall protection to mitigate risks. (DARKREADING.COM)

 

Python Info-stealer Distributed by Malicious Excel Document
This campaign used an infected Excel document containing VBA scripts to download multiple stages, culminating in an obfuscated Python info-stealer. The malware collected browsers' cookies and login data from various sources, compressing and sending the stolen information to the threat actor's Telegram bot along with victim details. Investigation of open platforms and telemetry revealed related files abusing multiple social media platforms to spread malware variants. Fortinet products detect and block the malware with protections that also disarm the malicious document macros. (FORTINET.COM)

 

Fake Facebook Job Ads Spread Ov3r_Stealer Malware
Cybercriminals are using fake job advertisements on Facebook to trick job seekers into downloading malware. The malware, known as Ov3r_Stealer, collects sensitive data such as passwords, credit card information, and browser details. It is still unclear what the purpose of this malware campaign is, but it is possible that the stolen data may be sold on the dark web or used to install additional malicious payloads. To stay safe during a job search, users are advised to stick to trusted job sites, be cautious of downloading files from unknown senders, and consider using antivirus software and identity theft protection services. (TOMSGUIDE.COM)

 

Google Calls on US to Do More to Rein in Spyware Sales, Misuse
Google's Threat Analysis Group (TAG) has released a report urging the government to take stronger action against the sales and misuse of spyware. The report highlights the documented harm caused by spyware targeting journalists, human rights defenders, and dissidents. Google specifically calls out commercial surveillance vendors (CSVs) like NSO Group, Cy4Gate, RCS Labs, Intellexa, Negg Group, and Variston. The company emphasizes the need for collaboration between government, industry, and civil society to change the incentive structure that allows these technologies to proliferate. (THEHILL.COM)

 

Mini PC Maker Ships Systems with Factory-Installed Spyware -- Issue Contained to First Shipment
The AceMagic AD08 mini-PC, along with other models like the AD15 and S1, were found to contain spyware, according to a YouTube reviewer. The malware, belonging to the Bladabindi and Redline families, steals passwords, logs keystrokes, and performs other illicit activities. The issue seems to be limited to the first shipment, with the company claiming that the virus software problem has been resolved in current stock offerings. It is recommended for users to run a virus scan on their AceMagic devices to ensure they are malware-free. (TOMSHARDWARE.COM)

 

WhatsApp Chats Will Soon Work With Other Encrypted Messaging Apps
WhatsApp is working on enabling interoperability with other messaging apps to comply with new EU rules. The plan is to allow people to message across different apps while maintaining end-to-end encryption. Initially, interoperability will focus on text messaging and media sharing, with calls and group chats to come later. Users will have the option to opt-in to receive messages from other apps in a separate inbox, ensuring privacy and security standards are preserved. However, challenges such as spam, scams, and different privacy standards across apps remain. The full details of the plan will be published in March. (WIRED.COM)

 

Google Contributes $1 Million to Rust, Says It Prevented Hundreds of Android Vulnerabilities
Google has granted $1 million to the Rust Foundation to enhance the interoperability between Rust and C++ code. Google has adopted Rust due to its memory safety benefits, which have helped prevent hundreds of vulnerabilities in the Android ecosystem. The support from Google has enabled the Rust Foundation to launch an Interop initiative aimed at improving interoperability and accelerating the adoption of Rust. Google also plans to aggregate and publish audits for Rust crates used in open source Google projects. (SECURITYWEEK.COM)

 

Unleashing the Power of Scapy for Network Fuzzing
Scapy, a Python module designed for packet manipulation and network communication, is a versatile and efficient tool for fuzzing. It offers advantages such as Python-based interface, cross-platform compatibility, and extensive packet manipulation capabilities. Scapy can be used for protocol fuzzing, application fuzzing, and even for testing against denial-of-service (DoS) attacks. With its flexibility and power, Scapy proves to be valuable in identifying security vulnerabilities and ensuring network and application security. (DARKRELAY.COM)

 

Microsoft Adds Face Check to Entra Verified ID
Microsoft has introduced facial matching to its Entra Verified ID service, allowing organizations to issue verifiable credentials using facial recognition. The Face Check feature, available as a public preview, uses the Azure AI Face API to match a real-time selfie with a trusted identity document. The new addition aims to reduce the risks of account takeover and impersonation. Microsoft Authenticator's Verified ID generates a confidence score to validate the identity. Microsoft plans to extend the Face API pattern to verify other identity attributes through partnerships with companies like Dun & Bradstreet and LexisNexis. (DARKREADING.COM)

 

Pioneering Identity Intelligence for Next-Gen Cyber Defense
Cisco aims to enhance identity security with its new solution, Cisco Identity Intelligence. By unifying networking and security, the AI-driven platform offers unified visibility and analytics to detect anomalies, clean up vulnerable accounts, and block high-risk access attempts. The solution bridges the gap between authentication and access, providing organizations with proactive management and security of their identity ecosystems. (FORBES.COM)

 

Apple ID Security Keys Feature Now Supports iCloud for Windows
Apple has updated its iCloud for Windows app to support the use of physical security keys for signing in. Previously, this feature was not available for iCloud on Windows. The Apple ID security keys feature, introduced last year, requires users to enter their password and use a FIDO-certified security key for two-factor authentication. This provides added protection against targeted attacks. However, users should be cautious as they may be permanently locked out of their Apple ID account if they lose all trusted devices and security keys. (MACRUMORS.COM)

 

New Gmail Rules Start Blocking Email For 1.8 Billion Users
Google's newly enforced policy requires bulk email senders to authenticate their emails, and failure to do so results in the emails being blocked. Users have reported receiving Gmail 550-5.7.26 errors due to lack of authentication. The policy aims to close loopholes exploited by attackers and protect Gmail users from spam, phishing, and malware. The requirements apply to bulk senders who send more than 5,000 messages to Gmail addresses in one day. The implementation of authentication has already reduced the number of unauthenticated messages by 75%. Google also introduced accessible unsubscription features and implemented a clear spam rate threshold to reduce spam in users' inboxes. (FORBES.COM)

 

Report: Mac Security Threats on the Rise, Here's What to Watch Out For
According to Malwarebytes' latest report, ransomware continues to be the most significant cyberthreat, with a surge in attacks in 2023. Additionally, Mac malware is increasing, and businesses need to be prepared for cyber threats beyond just malware. The report also highlights the need for a new threat prevention playbook and the shift from macros to malvertising. Mac users should be aware of the evolving threat of MacStealer malware. (9TO5MAC.COM)

 

Azure HDInsight: The Sequel – Unveiling 3 New Vulnerabilities That Could Have Led to Privilege Escalations and Denial of Service
Orca discovered three vulnerabilities in Azure HDInsight third-party services including Apache Hadoop, Spark and Kafka. Two privileges escalation vulnerabilities in Apache Ambari and Apache Oozie could have allowed authenticated attackers to gain cluster administrator access. A regular expression denial of service vulnerability in Apache Oozie was caused by lack of input validation, allowing attackers to disrupt operations. Microsoft was promptly notified and patched all issues. Organizations must update HDInsight clusters to apply the security updates. (ORCA.SECURITY)

 

Android Security Bulletin-February 2024
This bulletin from Google details several security issues affecting Android devices, with patches addressing vulnerabilities in the System, Framework, and MediaTek components. Manufacturers are advised to set security string levels of 2024-02-01 or 2024-02-05 depending on issue, to mitigate critical remote code execution and other vulnerabilities. (ANDROID.COM)

 

Rust Won’t Save Us: An Analysis of 2023’s Known Exploited Vulnerabilities
A study of critical vulnerabilities exploited in 2023 reveals that insecure exposed functions account for nearly half of the vulnerabilities. Memory safety issues, although addressed by memory safe languages like Rust, still make up 20% of the vulnerabilities, with 75% being exploited as 0-days. Routing and path abuse in web applications and vulnerabilities in appliances are also prevalent. The analysis suggests that while memory safe languages may help, there is still a need to address the risks associated with building complex software systems. (HORIZON3.AI)

 

'ResumeLooters' Attackers Steal Millions of Career Records
A group of cyber attackers known as "ResumeLooters" targeted 65 retail companies and job recruiters using SQL injection and XSS techniques, stealing over 2 million emails and other personal records of job seekers. The stolen data included names, phone numbers, dates of birth, and employment history. The attackers then sold the stolen data on Chinese-speaking Telegram channels. The group used publicly available penetration-testing tools, such as Acunetix and Metasploit, to carry out the attacks. The campaign highlights the need for organizations to prioritize cybersecurity and implement measures to prevent SQL injection and XSS attacks. (DARKREADING.COM)

 

'An Arms Race Forever' as AI Outpaces Election Law
The use of AI in elections poses significant challenges for regulation and oversight. AI-generated content, such as deepfakes and conversational bots, can be used to spread disinformation and disrupt campaigns. While some states have passed laws regulating AI in campaign materials, there is a lack of comprehensive federal legislation. The tech industry has made efforts to address the issue, with companies like Meta, Microsoft, and Google implementing measures to detect and label AI-generated content. However, the rapid advancement of AI technology means that it will be an ongoing "arms race" to keep up with the development and detection of AI-based election interference. (POLITICO.COM)

 

Harnessing AI for Polymorphic Malware: The Evolution of Cyber Threats
AI-driven polymorphic malware, which can dynamically change its code structure to evade detection, is becoming increasingly sophisticated. Attackers are using AI techniques such as machine learning and generative adversarial networks (GANs) to generate diverse and adaptable variants. Reinforcement learning (RL) is also being employed to evolve malware over time. Traditional cybersecurity defenses struggle to keep up with these evolving threats, and innovative approaches such as AI-powered anomaly detection and adversarial machine learning are necessary to mitigate the risks. Organizations must understand and proactively defend against the implications of AI-driven polymorphic malware. (MEDIUM.COM)

 

Piloting New Ways of Protecting Android Users from Financial Fraud
Google is piloting enhanced fraud protection with Google Play Protect to combat financial fraud attacks on Android devices. The pilot, in partnership with the Cyber Security Agency of Singapore (CSA), will automatically block the installation of apps from internet-sideloading sources that request sensitive permissions frequently abused for financial fraud. This includes permissions such as RECEIVE_SMS, READ_SMS, BIND_Notifications, and Accessibility. The pilot program will be closely monitored and adjustments will be made as needed, with Google also providing support to CSA for malware detection and analysis. (GOOGLEBLOG.COM)

 

IoT/OT Network Adversaries Advance Amidst Bug Barrage
New data reveals that cyberattacks on IoT and operational technology (OT) networks are becoming more sophisticated, while the number of vulnerabilities in industrial control systems (ICS) is increasing. Threats to IoT and OT networks include network anomalies, TCP flood attacks, and network scans, indicating rising global hostilities. Access control and authorization threats also saw a significant increase. Although there was a slight decrease in daily cyberattacks against IoT devices, the mounting vulnerabilities in ICS pose a challenge for network defenders. To enhance security, strategies such as network segmentation, asset discovery, vulnerability management, and threat intelligence should be prioritized. (DARKREADING.COM)

 

Protecting Good Faith Security Research Globally in Proposed UN Cybercrime Treaty
Security researchers express concerns that provisions in drafts of the UN Cybercrime Treaty risk criminalizing legitimate security research activities aimed at discovering vulnerabilities. They argue language around concepts like unauthorized access, interception of data, and interference with systems should require criminal intent to harm and exempt good faith security research, or risks deterring work that enhances cybersecurity. (EFF.ORG)

New Department of Air Force Partnership Brings Cyber, Space, and Information Units Closer
The Department of the Air Force is strengthening the relationship between its cyber entity and the Space Force to enhance network security and operational outcomes. The 16th Air Force has partnered with Space Operations Command (SpOC) to integrate space-based capabilities into its warfighting operations. Through this collaboration, the organizations aim to better understand how to defend space assets against cyber attacks. The partnership will involve embedding Space Force personnel with the 16th Air Force and promoting collaboration across strategic, operational, and tactical levels. The goal is to protect on-orbit systems and connections against adversary cyber effects and support cyber operations for Space Command. (DEFENSESCOOP.COM)

I Stopped Using Passwords. It’s Great-and a Total Mess
The article explores the author's recent experience switching some accounts to use passkeys instead of passwords. When set up properly, passkeys provide a seamless 20-second login using biometrics or a PIN. However, the author encountered frustrations with compatibility across devices, operating systems, and apps. Passkeys require a shift in mindset and deciding where to store them. Though the vision for passkeys is compelling, the technology is still nascent. It will likely be a gradual transition taking time for universal adoption. The author recommends starting to use passkeys when available, but keeping old passwords as a backup during the long goodbye to traditional passwords. (WIRED.COM)

 

Linux Distros Hit by RCE Vulnerability in Shim Bootloader
A remote code execution vulnerability (CVE-2023-40547) has been discovered in the Linux shim bootloader, affecting all Linux distributions that support Secure Boot. The flaw allows attackers to take complete control of affected systems. While the National Vulnerability Database (NVD) rates the severity as near maximum, Red Hat assigns a lower severity score. Exploitation requires complex conditions, such as being an administrator on the vulnerable device or performing a man-in-the-middle attack on the local network traffic. Some experts believe that the NVD's severity rating is exaggerated. (DARKREADING.COM)

dtau...@gmail.com

unread,
Feb 18, 2024, 11:46:24 AMFeb 18
to sec-...@googlegroups.com

Microsoft, OpenAI Say U.S. Rivals Use AI in Hacking

Russia, China, and other U.S. rivals are using large language models (LLMs) to improve their hacking abilities and find new targets for cyber espionage, according to a new report from Microsoft and OpenAI that, for the first time, specifically associated top-tier government hacking teams with uses of LLM. Microsoft said it had cut off the groups’ access to tools based on OpenAI’s ChatGPT. It added that it would notify the makers of other tools it saw being used and continue to share which groups were using which techniques.
[ » Read full article *May Require Free Registration ]

The Washington Post; Joseph Menn (February 14, 2024)

[Alternative story link: https://apnews.com/article/microsoft-generative-ai-offensive-cyber-operations-3482b8467c81830012a9283fd6b5f529]

 

Open Source Security Chip Released

A commercial silicon chip that includes open source, built-in hardware security has been announced by the OpenTitan coalition. Using a processor core based on the open source architecture RISC-V, the Earl Grey chip includes a number of built-in hardware security and cryptography modules, all of which work together in a self-contained microprocessor.
[ » Read full article ]

IEEE Spectrum; Dina Genkina (February 12, 2024)

 

Spying on Security Cameras Through Walls

Northeastern University researchers have developed a way to access video feeds from home security, dashboard, and smartphone cameras through walls. The EM Eye technique detects electromagnetic radiation emitted by the cameras' wires using a radio antenna, decodes the signal, and uses machine learning to reproduce real-time video without sound at a similar quality as the original. A test on 12 different types of cameras revealed that, depending on the model, EM Eye could successfully eavesdrop within a range of up to 16 feet.
[ » Read full article ]

Interesting Engineering; Rizwan Choudhury (February 11, 2024)

 

Cryptography-Breaking Algorithm Upgraded

Cryptographers at the University of California, San Diego have developed a more efficient LLL-style algorithm, based on the original lattice-based cryptography-breaking algorithm released in 1982. The algorithm, named after the researchers who published it—Arjen Lenstra, Hendrik Lenstra Jr., and László Lovász—has also proven useful in advanced mathematical arenas such as computational number theory. The new algorithm can break tasks down into smaller pieces and better balance speed and accuracy.

[ » Read full article *May Require Paid Registration ]

Wired; Madison Goldberg (February 11, 2024)

 

Threats to Election Systems Prompt U.S. Cybersecurity Agency to Boost Cooperation with States

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is rolling out a program to help state and local election officials enhance election security. The agency hired 10 new people for the program, each with significant election experience, who will be placed at various locations nationwide to work alongside staff already performing cyber and physical security reviews as requested by election offices.
[ » Read full article ]

Associated Press; Christina A. Cassidy (February 8, 2024)

 

Tech Giants Turn Ukraine into AI War Lab

The future of warfare is being piloted in Ukraine, which has been turned into a sort of lab by technology companies. AI software from data analytics firm Palantir Technologies, for example, is “responsible for most of the targeting in Ukraine,” according to CEO Alex Karp. Tech giants like Microsoft, Amazon, and Google have worked to protect Ukraine from Russian cyberattacks, migrate critical government data to the cloud, and keep the country connected.
[ » Read full article ]

Time; Vera Bergengruen (February 8, 2024)

 

Computer Scientists Find Gaps in Privacy Practices of Political Campaign Websites

A study by computer scientists at The College of William and Mary in Virginia, Google, and IBM revealed that interacting with political campaign websites puts people's personal information at risk. The analysis of 2,060 U.S. House, Senate, and presidential campaigns during the 2020 election cycle found that political campaign websites typically had incomplete or no privacy disclosures, retained private data for an unspecified time period, generally shared data with other campaigns, and even sold the data after the election.
[ » Read full article ]

William & Mary News; Antonella Di Marzio (February 7, 2024)

 

Tech Companies Develop Agreement To Help Identify AI-Generated Content To Prevent Election Deepfakes

The Washington Post Share to FacebookShare to Twitter (2/13, De Vynck) reports, “Leading artificial intelligence companies are planning to sign an ‘accord’ committing to developing tech to identify, label and control AI-generated images, videos and audio recordings that aim to deceive voters ahead of crucial elections in multiple countries this year.” The agreement was “developed by Google, Microsoft and Meta, as well as OpenAI, Adobe and TikTok,” and “does not ban deceptive political AI content.”

 

AI-Generated Deepfakes Highlight Need For Media Literacy In Schools

K-12 Dive Share to FacebookShare to Twitter (2/14, Merod) reports, “Artificial intelligence-generated content is stirring up misinformation and impacting students’ daily lives, but schools can play a role to help children and teens navigate the evolving problems.” Already, the issue of pornographic deepfakes “is beginning to surface in K-12 schools,” and one incident “even led one of the victims to advocate for federal legislation to prevent the spread of deepfake pornography.” In Slovakia, a fake audio recording generated by AI “was released days before a major election,” sparking fears that deepfakes could manipulate US elections. These examples show “why media literacy should be taught at a young age, said Erin McNeill, founder and CEO of Media Literacy Now.” But schools and teachers “need help and resources in teaching these skills.”

Reply all
Reply to author
Forward
0 new messages