Cyber Attacks, Threats, and Vulnerabilities
Russia Is Tricking GPS to Protect Putin (Foreign Policy) The Kremlin’s manipulation of global navigation systems is more extensive than previously understood.
Bayer contains cyber attack it says bore Chinese hallmarks (Reuters) German drugmaker Bayer has contained a cyber attack it believes was hatched in C...
Twenty-eight million users affected by backdoor vulnerability in popular web development tool (Computing) Warning over compromised 'bootstrap-sass' development package published on the RubyGems repository
The evolution of phishing kits (Zscaler) Zscaler ThreatLabZ has observed evolution with phishing kits and phishing campaigns which are detected and blocked across the Zscaler cloud. We have covered different phishing kits and evasion tactics used by threat actors.
Threat Group Employs Amazon-Style Fulfillment Model to Distribute Malware (Dark Reading) The operators of the Necurs botnet are using a collection of US-based servers to send out banking Trojans, ransomware, and other malware on behalf of other cybercriminals.
U.S.-Based Malware Hosting Setup Possibly Tied to Necurs Botnet (Decipher) Bromium researchers have been tracking a phishing and malware campaign, possibly linked to the Necurs botnet, that uses infrastructure in the U.S.
Necurs botnet suspected of spreading 10 malware families with US web servers. (IT Security Guru) Researchers have uncovered over a dozen servers, unusually registered in the United States, which are hosting ten different malware families
Researchers unearth 74 Facebook cybercrime groups with 385,000 members (Ars Technica) Already under scrutiny for spreading hate, social network also helps peddle spam and fraud.
Facebook is connecting not only old friends, but also new criminals. (NBC News) The social media platform is connecting not only old friends, but also new criminals.
Hiding in Plain Sight (Cisco Talos) Cisco Talos is continually working to ensure that our threat intelligence not only accounts for the latest threats but also new versions of old threats, such as spam.
The One Cybersecurity Risk You're Probably Not Even Thinking About (Entrepreneur) Printers may be the last thing on your mind, but they're a vulnerable point of entry.
Vulnerability in Xiaomi Pre-Installed Security App (Check Point Research) Smartphones usually come with pre-installed apps, some of which are useful and some that never get used at all. What a user does not expect, however, is for a preinstalled app to be an actual liability to their privacy and security. Check Point Research recently discovered a vulnerability in one...
Kaspersky unlikely to reveal details of American APTs at summit (iTWire) ANALYSIS Predicting the future is generally a game for mugs but it is possible to say with a high degree of certainty that there will be no details of...
Outdated software leaves NHS 'vulnerable to cyber attack' (Digital Health) Internet of Things (IoT) devices were identified as the weakest link in an IT network, according to research from software technologies company Check Point.
Rockwell Automation Stratix 5950 (ICS-CERT) 1. EXECUTIVE SUMMARYCVSS v3 8.6ATTENTION: Exploitable remotely/low skill level to exploitVendor: Rockwell AutomationEquipment: Stratix 5950Vulnerability: Improper Input Validation2. RISK EVALUATIONSuccessful exploitation of this vulnerability could allow a remote attacker to cause an affected device to reload.
Rockwell Automation Stratix 5400/5410/5700/8000/8300 and ArmorStratix 5700 (ICS-CERT) 1. EXECUTIVE SUMMARYCVSS v3 8.6ATTENTION: Exploitable remotely/low skill level to exploitVendor: Rockwell AutomationEquipment: Stratix 5400/5410/5700/8000/8300, ArmorStratix 5700Vulnerabilities: Resource Management Errors, Improper Input Validation2.
Omron CX-Programmer (ICS-CERT) 1. EXECUTIVE SUMMARYCVSS v3 6.6ATTENTION: Low skill level to exploitVendor: OmronEquipment: CX-Programmer within CX-OneVulnerability: Use After Free2. RISK EVALUATIONSuccessful exploitation of this vulnerability could allow an attacker to execute code under the privileges of the application.
IResponse to IEncrypt (Guardicore) A detailed investigation into an IEncrypt ransomware attack, analysis of the decryption process and the decryptor. Also providing a safe to use version of Guardicore’s IEncrypt decryptor
Could a few stickers fool military vehicles of the future? (C4ISRNET) Military planners should watch what adversarial research can discover in commercial autonomous systems.
Could We Blow Up the Internet? (Motherboard) Is it possible to take down the internet by physically attacking its infrastructure?
Security Patches, Mitigations, and Software Updates
Xiaomi quickly patches serious vulnerability found in its security app (SiliconANGLE) Xiaomi quickly patches serious vulnerability found in its security app
Nine out of Ten Critical Infrastructure Security Professionals Say Their Environments Have Been Damaged by a Cyberattack in the Last Two Years (Tenable®) Report by Ponemon Institute for Tenable finds 62% of respondents said their organizations have suffered multiple attacks Tenable®, Inc., the Cyber Exposure company, today released the ‘Cybersecurity in Operational Technology: 7 Insights You Need to Know’ report, an independent study by the Ponemon Institute. The study identifies the true extent of cyberattacks experienced by critical infrastructure operators — professionals in industries using industrial control systems (ICS) and operational technology (OT). It found that 90% of respondents stated their environments had been damaged by at least one cyberattack over the past two years, with 62% experiencing two or more attacks. Key highlights from the study include:
Cybersecurity Pros Face Significant Challenges with OT Security: Ponemon Report (Tenable®) A new report from Ponemon Institute and Tenable reveals that 62% of organizations in industries relying on operational technology experienced two or more business-impacting cyber attacks in the pas
Americans Hate Social Media but Can’t Give It Up, WSJ/NBC News Poll Finds (Wall Street Journal) Americans have a paradoxical attachment to social media, a new Wall Street Journal/NBC News poll finds, saying they regard services like Facebook to be divisive and a privacy threat but continue to use them daily.
Defense Industry Companies Launch Supply Chain Cybersecurity Task Force (AiThority) The DIB Sector Coordinating Council (SCC) announced today the chartering of the Supply Chain Cybersecurity Industry Task Force to identify
5 Cybersecurity Stocks to Watch As the Trend Heats Up (InvestorPlace) Cybersecurity stocks have been big winners in recent years. And investors betting that the trend will continue have no shortage of options.
Huawei May Have Claimed 5G Victory Over The U.S. But Is Now In A Street Fight (Forbes) As Huawei claims victory against the U.S. in its fight to maintain a leading role in 5G networks worldwide, the battle turns from the media to the shadowy world of espionage and counter-espionage. And that might be a much harder war for them to win.
New Intel CEO dishes on 5G, more acquisitions and moving his 50-year-old company forward (Silicon Valley Business Journal) 'Only the paranoid will survive' as Intel looks beyond computer chips
Akamai Inks Deal With Microsoft for an Undisclosed Amount (Nasdaq) Akamai Technologies Inc AKAM is strengthening its product portfolio.
Cyren's Voluntary Delisting from the Tel Aviv Stock Exchange - Reminder (PR Newswire) Cyren (NASDAQ: CYRN), a leader in cloud security, today announced that further to its press release dated January...
Bitcoin fees, security, and adoption have improved since the last bull market (CryptoSlate) Compared to the last bull market, Bitcoin’s transaction fees, network hashrate, and adoption have improved—despite what naysayers might say.
Varo Appoints Philippa Girling as Chief Risk Officer (Varo Money) Mobile banking startup Varo Money, Inc. today announced the hire of Philippa Girling as Chief Risk Officer. Girling will lead Varo’s Credit and Operational Risk, Information Security, Compliance, BSA/AML, and Fraud teams. She is a seasoned bank executive with more than 20 years experience in the global financial … Continued
Raytheon News Release Archive (Raytheon News Release Archive) Operates four businesses. Technology and innovation leader specializing in defense, security and civil markets throughout the world.
Products, Services, and Solutions
New infosec products of the week: April 5, 2019 (Help Net Security) Featured products for this week include releases from Acros Security, Cynet, iovation and KnowBe4.
Protego Labs Joins Amazon Web Services Partner Network (PRWeb) Protego Labs today announced that it has joined the Amazon Web Services (AWS) Partner Network as an Advanced qualified Technology Partner. The AWS Partner Network
DOSarrest Launches New Cloud Based Network Traffic Analyzer Service (Newkerala.com News) VANCOUVER, British Columbia: DOSarrest Internet Security announced today that they have released a new service offering called DOSarrest Traffic Analyzer DTA.
Technologies, Techniques, and Standards
The Promise and Limitations of AI in Cybersecurity (Nextgov.com) In the cybersecurity arena, hype runs deep, and AI is no exception.
How to Reverse Malware on macOS Without Getting Infected | Part 1 (Security Boulevard) Ever wanted to learn how to reverse malware on Apple macOS? This is the place to start! Join us in this 3-part series on macOS reverse engineering skills.
Introducing the Shellcode Signatures Series (Booz Allen Hamilton) A deep-dive series on detecting evasive shellcode techniques
The x86 Countdown Encoder, Explained (Booz Allen Hamilton) An overview of the x86 Countdown Encoder, including several shellcode techniques for security practitioners to reference when defending against cyber threats.
The Zutto Dekiru Encoder, Explained (Booz Allen Hamilton) Get a technical overview of the Zutto Dekiru encoder and build a Yara signature.
The x64 XOR Encoder, Explained (Booz Allen Hamilton) Get a technical overview of the x64 XOR Encoder and learn how it decodes its payloads.
The Shikata Ga Nai Encoder (Booz Allen Hamilton) Our top analysts review the components of the popular Metasploit shellcode encoder, Shikata Ga Nai.
The x86 Jmp Call Additive Encoder, Explained (Booz Allen Hamilton) Get a technical overview of the popular Metasploit encoder: x86_jmp_call_additive.
A Dive Into The OWASP ZSC Project (Booz Allen Hamilton) Learn the inner-workings of the OWASP Security Project and uncover methods useful to understanding how shellcode is written, modified, and obfuscated.
Research and Development
Photons trained for optical fiber obstacle course will deliver stronger cyber security (ScienceDaily) Researchers demonstrate a way to improve quantum key distribution over fiber networks.
Opinion | America’s universities are finally waking up to the China threat (Washington Post) Higher ed is taking a sober look at the Chinese government presence on campus.
Legislation, Policy, and Regulation
NATO approves measures to counter Russia amid internal rifts (Military Times) NATO foreign ministers approved a series of measures Thursday aimed at countering Russia in the Black Sea region, an agreement that comes amid public rifts between the United States and several of the other 28 members on security and trade issues.
Pompeo warns that NATO should confront ‘emerging threats’ from Russia and China (Public Radio International) US Secretary of State Mike Pompeo on Thursday called on NATO allies to adapt to confront emerging threats, including Russia's military interventions in places such as Venezuela, Chinese strategic competition and cyberthreats.
China’s dire clampdown on religious freedom (Asia Times) Persecution of Christians, Uighurs, Tibetans and other religious followers has been ramped up under Xi and the CCP
Newt Gingrich: China is poised to take over the internet—this should terrify anyone who believes in freedom | Opinion (Newsweek) If the U.S. does not get its act together, we should expect to suffer a strategic defeat in the emergence of a Chinese controlled internet which may define the next half century.
Why China’s Intellectual Property Theft Is a Concern for National Security (The Daily Signal) Temp.Periscope has been blamed for cyberattacks that have resulted in the compromise of sensitive material related to military technology.
Federal govt to create AI ethics guidelines (iTnews) Wants feedback on which values to embed in tech.
Cyberspace protection in VN needs closer collaboration (SGGP English Edition) The Vietnam Computer Emergency Response Team (VNCERT) has recently issued a warning on the newest grave attack of ransomware GandCrab 5.2 in Vietnam. This has given a wake-up call to all organizations in the country regarding a necessary cooperation to further strengthen cyber security.
Maduro Says Venezuela Turned Into Testing Ground For Cyber, Electromagnetic Weapons (UrduPoint) Venezuela has become a testing ground for new kinds of cyber and electromagnetic weapons, which target the countrys critical infrastructure, Venezuelan President Nicolas Maduro said
How a merger will expand the Air Force’s cyber edge (Fifth Domain) 24th and 25th Air Force will integrate, creating the service's first information warfare numbered Air Force.
The Air Force Has a New Cyber Security Defense Plan (The National Interest) Adversaries who want to steal American data should beware.
DHS Cyber Chief is Ready to Update Federal Tech Hiring (Nextgov.com) The department is preparing to roll out a new personnel system that will let officials “hire people based on their skill sets, not what’s on a piece of paper,” said Chris Krebs.
See us if you can? GCHQ surveillance agency reveals London base (Reuters) A nondescript red brick building tucked away beside a pub near a park in central...
Analysis | The Cybersecurity 202: States spent just a fraction of $380 million in election security money before midterms (Washington Post) And is Julian Assange about to be expelled from the Ecuadorean embassy in London?
Georgia Gov. Kemp signs new touchscreen voting machines bill (Washington Post) Georgia Gov. Brian Kemp has quietly signed a wide-ranging elections bill authorizing the statewide purchase of touchscreen voting machines that print a paper ballot
Litigation, Investigation, and Law Enforcement
Investigating Foreign Electoral Interference in Cold War Germany (Foreign Affairs) The history of a 1972 Stasi operation suggests Mueller's report won't provide all the answers.
In Ukraine’s Election, Pro-Russian Candidates Can’t Win (Foreign Policy) By occupying the regions of the country that most favor it, Moscow has undermined its own position in Ukrainian politics. Here’s why it still won’t…
Assange expulsion from Ecuador embassy would be 'illegal,' his legal team says (CNN) Ecuador's Foreign Ministry has refused to comment on claims from WikiLeaks that its founder Julian Assange will soon be expelled from the country's embassy in London.
US government claims to have found evidence against Huawei via secret surveillance (Computing) US invoked FISA surveillance powers to help build case against Huawei CFO Meng Wanzhou
DHS tech manager admits stealing data on 150,000 internal investigations, nearly 250,000 workers (Washington Post) A Virginia woman pleaded guilty to conspiring with a former DHS acting inspector general.
Mar-a-Lago's Security Problems Go Way Beyond a Thumb Drive (WIRED) A Chinese woman was arrested for sneaking into Trump's "Winter White House," a reminder of how exposed the president's private club is to physical and cybersecurity risks.
Analysis | The plot just thickened on William Barr and the Mueller report (Washington Post) The previously leakproof Mueller team is suddenly sprouting leaks, which suggests it's truly worried about what Attorney General William Barr is doing.
Alleged Chief of Romanian ATM Skimming Gang Arrested in Mexico (KrebsOnSecurity) An alleged top boss of a Romanian crime syndicate that U.S. authorities say is responsible for deploying card-skimming devices at Automated Teller Machines (ATMs) throughout North America was arrested in Mexico last week on firearms charges.
Who Gets Access? The Flap over White House Security Clearances (Foreign Policy Research Institute) Earlier this week, The New York Times reported that a “whistle-blower” working inside the White House’s Personnel Security Office had met privately with staff from the House Oversight and Reform Committee and revealed that 25 individuals, including two current senior White House officials, had been granted security clearances after their…