Cyber Attacks, Threats, and Vulnerabilities
Spying concerns raised over Iran's official COVID-19 detection app (ZDNet) Google removes Iran's official COVID-19 detection app from the Play Store.
Hackers breached administrative IT systems of European power grid organisation (Computing) ENTSO-E's members include 42 electric transmission industry operators across 35 European countries
European power grid organization says its IT network was hacked (CyberScoop) ENTSO-E, which ensures coordination of European electricity markets said Monday that its IT network had been compromised in a “cyber intrusion.”
Secret document says cable leak hurt tracking of foreign hackers (TechCrunch) The previously unseen 'secret' document reveals a rare link between the 2010 leak diplomatic cables and the China hacks against Google.
Leaked Cables Offer Raw Look at U.S. Diplomacy (New York Times) A trove of State Department cables, obtained by WikiLeaks, offers a look at bargaining by embassies, candid views of foreign leaders and assessments of threats.
USCYBERCOM: Cable-Gate Hindered U.S. Tracking of APT Intrusions (National Security Archive) A USCYBERCOM Fusion Cell assigned to evaluate the impact of the 2010 WikiLeaks release of classified Department of State cables determined that information in the cables revealed U.S. intelligence on
Secret-sharing app Whisper left users’ locations, fetishes exposed on the Web (Washington Post) Hundreds of millions of users’ intimate messages, tied to their locations, were publicly viewable until after the company was contacted by The Washington Post.
IQY files and Paradise Ransomware (Lastline) Perhaps one of the less known of the weaponizable Microsoft Office file formats, IQY files, provide attackers with a simple way to infiltrate a network. We have intercepted a campaign that leverages this file type to deliver a new variant of the Paradise ransomware.
A hacker says hackers are hacking hackers in new hacking campaign (TechCrunch) A newly discovered malware campaign suggests that hackers have themselves become the targets of other hackers, who are infecting and repackaging popular hacking tools with malware. Cybereason’s Amit Serper found that the attackers in this years-long campaign are taking existing hacking tools …
Years-long campaign targets hackers through trojanized hacking tools (ZDNet) A group believed to reside in Vietnam has been hacking other hackers for years.
Who's Hacking the Hackers: No Honor Among Thieves (Cybereason) Cybereason Nocturnus is investigating a campaign where attackers are trojanizing multiple hacking tools with njRat, allowing the attackers to completely take over the victim’s machine.
It’s not a breach… it’s just that someone else has your data (Naked Security) If you lose someone’s data because of a configuration blunder that lets crooks in without any actual hacking… is that a “breach” or not?
Russian malware cripples some Durham city and county systems. City is investigating (Raleigh News & Observer) A malware attack hit the IT systems of the city of Durham and Durham County on Friday, the city and county announced Sunday.
Scammers Use Coronavirus Map To Spread Malware (Silicon UK) Scammers are using fear around the coronavirus epidemic to spread malware via malicious email attachments, phishing messages and even a virus map
Bogus HIV test results are the latest lures used by cybercrooks (CyberScoop) It’s open season for hackers who prey on public health fears to try to dupe people into installing malware. As phishing attempts related to the novel coronavirus surged in late January, another health-related scam was kicking off.
()
Cyberattackers are delivering malware by using links from whitelisted sites (TechRepublic) Legitimate-looking links from OneDrive, Google Drive, iCloud, and Dropbox slip by standard security measures.
99% of compromised Microsoft enterprise accounts lack MFA (Naked Security) Cybercriminals compromise over a million Microsoft enterprise accounts each month as too few customers use multi-factor authentication.
()
Surveillance Firm Banjo Used a Secret Company and Fake Apps to Scrape Social Media (Vice) One former employee said the secret company called Pink Unicorn Labs was doing the same thing as Cambridge Analytica, "but more nefariously, arguably."
Vulnerability Summary for the Week of March 2, 2020 (CISA) The CISA Weekly Vulnerability Summary Bulletin is created using information from the NIST NVD. In some cases, the vulnerabilities in the Bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available.
Facebook refuses to ban fake Biden video that makes it look like he's endorsing Trump (CNBC) The video, posted by White House social media director Dan Scavino, was edited to show Biden endorsing Trump for reelection. Facebook has since labeled it as "partly false information."
UK officials fight back after cyber-attack (WKYT) The University planned a network outage early Sunday morning. President Eli Capilouto later sent an email to students and faculty to outline the threat and explain how it was handled.
University of Kentucky's system network reboots after cyber attack (WKYT) Officials say the attack started in early February from outside of the United States.
Bainbridge park district hit by cyber attack (Bainbridge Island Review) Databases that contained the employee and financial records for the Bainbridge Island Metropolitan Park &Recreation District were destroyed by an internet hacker in late February, and the extensive cyber attack has left district officials writing hand-written checks to workers and vendors.
Security Patches, Mitigations, and Software Updates
Microsoft: Turn off Memory Integrity if it’s causing problems (Naked Security) Microsoft has finally clarified how users can fix a Windows security measure that has been causing hardware problems: turn it off.
Cyber Trends
2020 SaaS Trends (Blissfully) Every year at Blissfully we do a deep dive into SaaS spend and adoption trends. In 2020, we analyzed 10 years of data from over 1,000 companies.
RSA 2020 Conference Recap (Bricata) Automation and orchestration, cloud security, AI/ML and the human side of security dominate conversations at RSA 2020.
Combatting Complexity by Focusing on Fundamentals: New Study from Axon (PRWeb) Despite having hundreds of tools at their disposal, IT and security teams are rapidly losing sight of their asset landscape. That’s the finding from a new survey f
2020 Asset Management Trends: As IT Complexity Increases, Visibility Plummets (Axonius) Read this ESG eBook commissioned by Axonius on the increasingly complex IT landscape & lack of visibility across cloud, mobile & IoT environments.
The Cybercrime Pandemic Keeps Spreading (Dark Reading) The World Economic Forum says cyberattacks will be one of the top global business risks over the next 10 years.
Over 75% of US households will be at risk to get hacked via voice assistants by 2025 (Atlas VPN) Recent Atlas VPN findings show that voice assistants can get hacked by using ultrasonic waves to imitate voice commands. Ultrasonic waves do not make a sound, which means that the device can get hacked without alerting the owner. In addition, scientists can imitate voice commands using lasers. Lasers trigger movements in the microphone’s diaphragm, and …
Mimecast Research: 90 Percent of Healthcare Organizations Hit with an Email-Borne Attack in the Past Year (Globe Newswire) Report Highlights Latest U.S. Healthcare Email Security Attacks and Need for More Effective Employee Awareness Training
Ransomware Gangs Hit Larger Targets, Seeking Bigger Paydays (Data Breach Today) Targeted ransomware attacks continue to increase as gangs seek to obtain bigger ransom payoffs by hitting larger targets, aided by a cybercrime services economy
Customer Insults: the Worst Sort of Friction (SIFT) Customers are making online shopping a habit...
6 Cybersecurity Trends Worth Looking at in 2020: Blockchain Is on the List (The Daily Hodl) If 2019 has taught us anything about cybersecurity, it is that cyber-attacks are the reality of our times, hardware
Marketplace
CIA funnels cash to private company aimed at defeating Huawei (The Washington Times) The CIA isn’t waiting while the White House, Congress, the Justice Department and the Pentagon squabble over the best approach to combating Huawei’s domination of the future 5G wireless network.
Surge in Sanctions Lifts Compliance Services (Wall Street Journal) A surge in economic sanctions and a tangled web of international blacklists are overwhelming in-house compliance staffs and lifting the ledgers of third-party compliance services.
Netsurion Teams with Restaurant Technology Network to Advance Cybersecurity and PCI Compliance for Restaurants (Globe Newsire) Netsurion, a leading managed cybersecurity service provider, today announced it has joined the Restaurant Technology Network, a membership community solely dedicated to the restaurant industry.
Ntrepid Named Winner of Prestigious Cybersecurity Excellence Award (Businesswire) Ntrepid LLC announces their acceptance of the Advanced Persistent Threat Protection Silver award from the 2020 Cybersecurity Excellence Awards.
Former EverWatch CFO Diane Nguyen Joins SAIC as Finance VP (GovCon Wire) Diane Nguyen, former chief financial officer of EverWatch, has joined Science Applications Internati
Authoriti Selects Paul Alexandre as its Vice President of Sales (Globe Newswire) 30-year tech veteran brings experience in identity management, security and cloud; Now building Authoriti’s sales organization
Products, Services, and Solutions
OPAQ Achieves SOC 2 Type II Certification (Yahoo) SOC 2 Type II certification demonstrates the OPAQ cloud meets and exceeds the strictest industry standards for security and trust controls.
Verizon expands security portfolio with new solutions to combat cybercrime (IT Brief) Now, more than ever, organisations need to be thinking differently about security, and leveraging cutting edge technology to help mitigate against cybercrime.
AT&T, Palo Alto Networks, Broadcom collaborate to create Disaggregated Scalable Firewall framework (Telecompaper) AT&T, Palo Alto Networks and Broadcom collaborated to create the Disaggregated Scalable Firewall (DSFW) framework. This is an expansion to the Distributed Disaggregated Chassis (DDC) recently contributed to the Open Compute Project (OCP). DSFW will enable network operators to deploy firewalls as software-based platforms rather than hardware appliances.
NEC X and VACO Partner on AI/ML Solution, Enabling Enterprises to Accelerate Most Challenging Data Compliance Behind Own Firewalls at 10x Lower CAPEX (Globe Newswire) Complete Reference Design and Consulting Services Combine NEC’s SX-Aurora TSUBASA™ AI Platform and VACO’s Best in Class Technology Consulting and Cognitive Computing Framework® for PII Redaction
Cipherloc Corporation Introduces New QuantaNova (TM) Division and New QuantaNova.com Website (Benzinga) QuantaNova™ will be the new home of patented, certified encryption technology
The ZEROSPAM solution now includes the Bitdefender world class threat protection technology #39593 (New Kerala) Business World: The ZEROSPAM solution now includes the Bitdefender world class threat protection technology - MONTREAL: ZEROSPAM and Bitdefender are proud to announce a new Technology Licensing partnership that adds the Bitdefender world class threat protection technology to all instances of the ZEROSPAM cloud email security solution as of January 15th, 2020.
Recorded Future Awarded Threat Intelligence Contract for Accelerated Security With U.S. Cyber Command #39283 (New Kerala) United States News: Recorded Future Awarded Threat Intelligence Contract for Accelerated Security With U.S. Cyber Command - BOSTON: Recorded Future, the global leader in security intelligence, today announced it has been awarded a Production-Other Transaction Agreement P-OTA contract facilitated by the Defense Innovation Unit DIU for threat intelligence, paving the way for the company to provide real-time threat analysis
Technologies, Techniques, and Standards
The top-ten tenets of software quality assurance, part three: the formal review (Computing) Formal reviews are often left by the wayside, but without them annoying defects can become crippling bugs, warns Mark Wilson
Why Your Biometrics Are Your Best Password (Forbes) Passwordless authentication ensures that login credentials are unique across every website, never stored on a server, and never leave the user’s device.
Why more companies should follow Microsoft In collaborating on cyber-security (SC Magazine) Last July Microsoft joined the Linux Distribution Security Contacts List. This strategic move is intended to allow it to better address the myriad security challenges of its software products. Should you follow?
Banks engage in self-hacks to keep defenses sharp (Banking Dive) Enlisting teams of hackers to look for vulnerabilities helps banks take their security efforts beyond scanning software.
Design and Innovation
Smart grid security and defensive military architecture of the middle-ages; an interesting comparison (Smart Energy International) Why are our castles now just romantic ruins? Part of the answer is gunpowder and the eventual victory of the iron projectile over stone walls.
Legislation, Policy, and Regulation
()
Huawei's Australian 5G Ambitions Are Dead (Gizmodo Australia) In 2018 the Turnbull government announced Chinese vendors would be banned from supplying technology to 5G networks in Australia. While no companies were specifically named, it was clear Huawei and ZTE were the primary targets. Over the following 18 months Huawei was vocal about its belief this was a mistake. But now...
Top U.S. envoy presses Canada over Huawei role in 5G network: officials (Reuters) A senior U.S. envoy on Monday pressed Canada about Ottawa's forthcoming dec...
()
Huawei: government tries to head off Tory 5G network rebellion (the Guardian) Tory doubters invited to meeting with senior security expert in effort to allay fears
The Head of U.S. Counterintelligence Hoists the Red Flag (Security Info Watch) William Evanina warns the nation’s CSOs and technology vendors that China’s plan of global domination is real and the security threats constant
()
()
Now you need a notarized document to get a .gov domain (Naked Security) The US government is tightening its rules around the registration of government web domains to stop fraudsters impersonating government sites.
()
()
Analysis | The Cybersecurity 202: Intelligence community faces an uphill battle combating leaks after mistrial in Schulte case (Washington Post) Jurors failed to convict the accused CIA leaker on most charges.
Analysis | The Cybersecurity 202: Senate bill sparks open war over encryption (Washington Post) Lawmakers launched the most serious challenge in decades to the digital protection.
()
()
()
Litigation, Investigation, and Law Enforcement
Split Verdict Given for CIA Programmer Charged in Massive Leak (Wall Street Journal) Jury finds Joshua Schulte guilty of false statements and contempt of court but deadlocks on whether he actually gave information to WikiLeaks
Jury in CIA leaks case fails to reach a verdict on most serious charges (Washington Post) Jurors in New York said they were “extremely deadlocked” on whether Joshua Schulte gave classified hacking tools to WikiLeaks.
Trial of Programmer Accused in C.I.A. Leak Ends in Hung Jury (New York Times) The judge declared a mistrial on the most serious charges against Joshua Schulte, who was accused of giving secret documents to WikiLeaks.
Jury in CIA leaks case fails to reach a verdict on most serious charges (BostonGlobe) Officials had called the case the biggest leak of classified information in the intelligence agency’s history.
Minor convictions for ex-CIA coder in hacking tools case (POLITICO) Joshua Schulte was convicted by a jury of contempt of court and making false statements after a four-week trial in Manhattan federal court.
WSJ News Exclusive | AT&T Cooperates With Justice Department in Google Probe (Wall Street Journal) The telecommunications giant has conferred several times with Justice Department officials in their antitrust investigation, two years after the company was at loggerheads with the department over its Time Warner acquisition.
Spyware maker NSO runs scared from Facebook over WhatsApp hacking charges, fails to show up in court (Register) Meanwhile, Broadcom and Symantec have merger woes
NSO Group works to explain no-show in court for WhatsApp suit, plots defense (CyberScoop) Israeli spyware company NSO Group has asked a U.S. District Court for a 120-day extension to reply to WhatsApp’s lawsuit.
FBI arrests Russian behind Deer.io, a Shopify-like platform for cybercrime (ZDNet) Feds say Deer.io has been hosting hundreds of online shops where hackers are selling hacked accounts.
Talkspace threatens to sue a researcher over bug report (TechCrunch) The therapy app sent the security researcher a cease and desist letter for his blog post describing a website bug.
Hacker Stole Teacher’s Identity, Impersonated Kenny Chesney to Break Into Celeb Emails: Feds (The Daily Beast) The suspect even allegedly impersonated Kenny Chesney to wheedle nude photos out of victims.