FireSale HackBoy

Knowledge Shared By FireSale HackBoy...

Hacking

The Art Of Exploitation...

Ethical Hacking

Security Experts...Same Techniques To Make Hacker's Stuff Useless.

Black Hat Hacking

Dark Side Of Hacking... In Short Destruction Of Cyber Stuff.

Digital Stuff

All The Digital Stuff Is Under The Influence Of Cyber Attacks... Be Safe

Tuesday, October 15, 2024

Cisco Data Breach and UK Government’s Free Cybersecurity Initiative for Schools

Cisco Data Breach by IntelBroker

A prominent threat actor known as IntelBroker has claimed responsibility for breaching Cisco’s computer network and is preparing to release stolen data on a well-known hacker forum.

Reports indicate that a cyberattack occurred on Cisco’s servers in June, and following what appears to be a lack of response from the company, the attackers—who formed a trio including Zjj, Energy Weapon Users, and IntelBroker—are now looking to sell the compromised information on the dark web.

The stolen data is particularly concerning, as it reportedly includes sensitive research and development information. The hackers are attempting to sell this data at a high price, labeling it with tags that denote its sensitivity. Sources from Cybersecurity Insiders reveal that the compromised information encompasses Jira tickets, API tokens, AWS cloud data stored in private buckets, Cisco Tech SRCs, Docker builds, Azure storage metadata, private and public keys, SSL certificates, SonarQube project data, and login credentials for GitLab and GitHub.

Cisco has acknowledged the situation, stating it is actively investigating IntelBroker’s claims and is aware of sample data being circulated on the dark web.

UK Government Offering Free Cybersecurity to Schools

In light of increasing cyber threats, particularly against educational institutions, the UK government is launching a free cybersecurity initiative aimed at safeguarding school websites and IT infrastructure.

Cybercriminals are increasingly targeting schools, as student data is highly lucrative on the dark web. Ransom demands can put educational institutions in difficult positions, leading to a rise in cyberattacks.

To combat this trend, the National Cyber Security Center (NCSC), in collaboration with the UK government, has announced a new initiative under the Protective Domain Name System (PDNS) program, which will provide free cybersecurity services to schools and educational institutions.

This program, announced on October 15, will soon extend to a variety of educational establishments, including academies, private schools, and internet service providers serving these institutions. The initiative aims to enhance defenses against spyware, malware, and ransomware attacks.

The urgency of this program follows a report from the Office of Qualifications and Examinations Regulation (Ofqual), which revealed that over a quarter of schools and colleges in England were targeted by cyberattacks in 2023, with threats expected to escalate further this year.

We hope the PDNS achieves its intended goals effectively!

The post Cisco Data Breach and UK Government’s Free Cybersecurity Initiative for Schools appeared first on Cybersecurity Insiders.


October 15, 2024 at 08:37PM

How to Protect Yourself from Deceitful Identity Theft Trends

Identity theft is a growing concern in our digital age, with scammers constantly evolving their tactics to deceive unsuspecting victims. Protecting yourself from these deceitful identity theft trends requires vigilance and proactive measures. Here’s how you can safeguard your personal information and reduce your risk of falling victim to identity theft.

1. Stay Informed About Common Tactics

Understanding the latest trends in identity theft is your first line of defense. Scammers often use methods such as phishing emails, social engineering, and data breaches to obtain personal information. Familiarize yourself with these tactics and be cautious about unsolicited communications that ask for sensitive data.

2. Use Strong, Unique Passwords

Creating strong passwords is essential for protecting your online accounts. Use a combination of upper and lowercase letters, numbers, and symbols. Avoid using easily guessable information like birthdays or common words. Additionally, use a unique password for each account to prevent a single breach from compromising multiple accounts.

3. Enable Two-Factor Authentication (2FA)

Two-factor authentication adds an extra layer of security to your accounts. Even if a hacker manages to obtain your password, they will need a second form of verification—such as a code sent to your phone—to access your account. Always enable 2FA where available.

4. Monitor Your Financial Statements

Regularly review your bank and credit card statements for any suspicious transactions. Set up alerts for transactions over a certain amount to catch potential fraud quickly. Additionally, consider using a credit monitoring service to keep an eye on your credit report for any unauthorized accounts.

5. Be Cautious with Personal Information

Limit the personal information you share online, particularly on social media. Scammers often use details like your birthdate, hometown, or pet’s name to guess your passwords or security questions. Adjust privacy settings on social platforms to restrict who can view your information.

6. Shred Personal Documents

Before disposing of documents containing personal information, such as bank statements or tax returns, be sure to shred them. This prevents identity thieves from retrieving sensitive information from your trash.

7. Secure Your Devices

Keep your devices secure by regularly updating your operating system and software. Use reputable antivirus and anti-malware programs to protect against malicious software. Additionally, avoid using public Wi-Fi for sensitive transactions, as these networks can be insecure.

8. Be Wary of Scams and Offers That Seem Too Good to Be True

If you receive unsolicited offers or requests for personal information, be skeptical. Scammers often use enticing offers to lure victims into providing their information. Research the source and confirm its legitimacy before responding.

9. Report Suspicious Activity Immediately

If you suspect that your identity has been compromised, act quickly. Report the incident to your bank, credit card company, and local authorities. You may also want to place a fraud alert on your credit report or freeze your credit to prevent further misuse.

10. Educate Yourself and Others

Knowledge is power. Stay informed about the latest identity theft trends and educate friends and family on how to protect themselves. Sharing information can create a more informed community that is less susceptible to deceitful tactics.

Conclusion

As identity theft continues to evolve, so must our defenses. By staying informed, taking proactive steps, and being cautious with personal information, you can significantly reduce your risk of falling victim to deceitful identity theft trends. Remember, protecting your identity is an ongoing process that requires vigilance and awareness.

The post How to Protect Yourself from Deceitful Identity Theft Trends appeared first on Cybersecurity Insiders.


October 15, 2024 at 11:10AM

Monday, October 14, 2024

Ransomware news headlines trending on Google

Sophos Survey Reveals Alarming Trends in Ransomware Attacks

Recent findings from a Sophos report titled “Turning the Screws: The Pressure Tactics of Ransomware Gangs” highlight a troubling evolution in ransomware tactics. Cybercriminals are no longer merely stealing data and encrypting it until a ransom is paid; they are now employing more aggressive strategies to maximize pressure on victims.

The report reveals that sensitive information stolen from databases is being weaponized against victims who refuse to comply with ransom demands. For instance, hackers are engaging in doxing, targeting the family members of CEOs and company leaders. They threaten to expose personal details, such as mental health struggles, unless the ransom is paid.

Moreover, attackers are analyzing stolen data to identify and contact employees of the affected companies, employing intimidation tactics to coerce these individuals into pressuring their employers to meet the hackers’ demands.

In a more alarming twist, Sophos researchers discovered that some attackers are leveraging professional data auditing services to uncover discrepancies, such as irregularities in tax filings. Victims are threatened with exposure to governmental authorities if they do not comply with ransom demands.

One can only hope that law enforcement can put an end to these heinous tactics.

Live Nation Faces Lawsuit Following Ransomware Attack

In another significant case, Live Nation is set to face legal action after a cyberattack on its subsidiary, Ticketmaster, by the hacking group Shiny Hunters. This breach exposed the personal details of nearly 560 million customers, including names, addresses, emails, phone numbers, and financial information. The hackers demanded $500,000 to refrain from leaking this sensitive data on the dark web.

Due to Ticketmaster’s failure to detect the breach for two months and the subsequent 14 weeks taken to notify affected customers, Live Nation now faces a lawsuit. A federal court in California has received a petition related to this data breach, and the company could be liable for up to $5 million in penalties for its inadequate protection of user information.

While users are justifiably frustrated with Ticketmaster, it’s crucial to note that the company itself was a victim of a cyberattack that initially targeted a third-party cloud services provider, Snowflake. This raises an important question: who should bear the blame in such complex scenarios?

Vox Pop, invited!

The post Ransomware news headlines trending on Google appeared first on Cybersecurity Insiders.


October 15, 2024 at 11:00AM

Lack of Cyber Talent is creating new opportunities to Cyber Threat Actors

It is evident that in the absence of vigilant oversight and corrective measures, situations can deteriorate rapidly, often leading to negative outcomes. This phenomenon is increasingly pertinent in the realm of cybersecurity, where the stakes are higher than ever.

A recent report by Sophos highlights a significant talent shortage within the cybersecurity sector, which has left many small and medium-sized businesses (SMBs) vulnerable to increasingly sophisticated cyberattacks. The lack of professional security expertise creates a vacuum that malicious actors exploit, providing them with opportunities to orchestrate attacks that can yield substantial financial rewards.

The findings of a comprehensive survey involving over 5,000 IT security professionals across 14 countries—focusing on organizations with a workforce ranging from 150 to 500 employees—reveal that the scarcity of cybersecurity skills has emerged as a pressing challenge. This issue now ranks as a major concern for SMBs, second only to the threats posed by zero-day vulnerabilities.

Titled “Addressing the Cybersecurity Skills Shortage in SMBs,” the Sophos report underscores the urgent need for business leaders to prioritize the fortification of their cybersecurity defenses. It advocates for strategic hiring practices aimed at acquiring talent capable of effectively managing and mitigating the risks associated with cyber threats. Achieving this requires a dedicated budget allocation to cybersecurity initiatives, enabling human resources departments to recruit the necessary expertise.

According to ISC2, organizations are increasingly turning to professionals from related fields—such as data scientists and storage engineers—to fill the cybersecurity talent gap. These individuals possess foundational knowledge and skills that can contribute to securing the infrastructure, despite not being traditional cybersecurity experts.

As we approach the holiday season, the threat landscape is poised to expand dramatically. During this period, many employees, including those in IT, will take time off, compelling organizations to operate with a leaner staff. This reduced workforce may struggle to meet the complex demands of cybersecurity, further exacerbating vulnerabilities.

To navigate this precarious situation effectively, businesses must enhance their defensive measures and allocate adequate resources to information technology. By doing so, they can significantly mitigate the risks associated with cyberattacks and safeguard their operations against the escalating threat landscape.

The post Lack of Cyber Talent is creating new opportunities to Cyber Threat Actors appeared first on Cybersecurity Insiders.


October 14, 2024 at 08:55PM

Gmail Users Targeted by AI-Driven Cyber Attacks and OpenAI-Generated Malware

In recent days, numerous Gmail users around the globe have reported receiving deceptive phone calls from individuals posing as Google Support. These calls, powered by AI technology, aim to trick users into disclosing their account credentials, putting their personal data at risk.

The calls, which mimic legitimate Google Support communications, are part of an AI-driven scam designed to gain control of Gmail accounts. Sam Mitrovic, a Microsoft Solutions consultant, was one of the tech-savvy individuals who encountered this scam. Fortunately, he recognized the phishing attempt in time and did not share his account information, resulting in minimal loss.

Given the scale of this threat, with over 2.5 billion Gmail users worldwide, it’s crucial for all users to remain vigilant against this account recovery scam, which seeks to capture sensitive credentials and potentially lock users out of their accounts permanently.

In related news, concerns have arisen regarding Microsoft’s recent acquisition of ChatGPT, developed by OpenAI. Reports suggest that cybercriminals are increasingly using AI tools to create malware, spread misinformation, and execute spear phishing attacks. Proofpoint reported in April that a threat actor known as TA547 utilized AI-generated PowerShell loaders to deploy malware, including the Rhadamanthys info stealer.

Additionally, security researchers from Cisco Talos revealed in November 2023 that a Chinese advanced persistent threat (APT) group, SweetSpecter, has been targeting Asian government organizations to distribute malware and collect intelligence for the benefit of Beijing.

Recently, a hacker group believed to be based in Israel attempted to leverage AI tools, including those developed by ChatGPT, to identify vulnerabilities in Programmable Logic Controllers used in nuclear facilities. This information was allegedly used to infiltrate Iranian nuclear sites.

It’s important for readers of Cybersecurity Insiders to understand that these attacks are not being launched directly through the OpenAI platform. Instead, the software is being exploited by criminals to achieve their malicious goals. The focus should be on the individuals misusing these technologies, as any innovation can be weaponized if it falls into the wrong hands.

The post Gmail Users Targeted by AI-Driven Cyber Attacks and OpenAI-Generated Malware appeared first on Cybersecurity Insiders.


October 14, 2024 at 11:55AM

Thursday, October 10, 2024

Protecting Privacy in a Data-Driven World: What should you look for in a DLP Solution?

The latest data loss involving MC2 Data, a background check company, saw sensitive information of more than 100 million people in the US leaked which has put the lives of millions on the line for computer-related crimes such as identity theft amongst others. A popular cybersecurity news website has recently established an unprotected 2.2TB database that contains personal information like employment history, criminal records, phone numbers, or addresses. This incident has raised many questions about data management and issues in big corporates. 

Having a measure in place for Data Loss Prevention (DLP), is not just a choice anymore but a need for enterprises. 

Understanding of Data Loss Prevention (DLP)

Data Loss Prevention solutions offer solutions to threats involving communication, storage, or modification of sensitive data. Due to highly strict rules, requirements and constant rise in numbers and effectiveness of cyber threats, DLP tools have become critical for any organization, no matter how large it is. This blog explains why DLP is crucial given today’s environment. 

Due to the large quantities of data being produced in due time, the exposure has hence widened allowing hackers to easily access a company’s most vital data. An effective DLP solution avoids this by identifying important data assets within an organization and protecting them before any breach occurs. 

What Should You look for in a DLP Solution? 

1. Automated Response to Threats 

Preventive or proactive cybersecurity offers constant monitoring, immediate threat detection, and a fast reaction. Having this proactive approach helps organizations to avoid threats from entering a network and therefore minimize the occurrence of breaches. 

2. PPC integration with Other Channels 

A Strong DLP solution ought to protect data at each touch point including messaging, network, cloud, and endpoints.   

3. Response of Policy with Respect to Flexibility and Customization 

Since regulations concerning data protection differ across industries and geographic locations it’s important for the DLP solution to be able to provide policies that can be customized. This allows organizations to integrate with the current multiple protection standards to set up specific permissions to further secure data. 

4. The numbering and planning of data access and management also influences data classification. 

A good DLP solution must work with information as per the risk associated with it and the permission options made available for the handling and sharing of this information. Look for platforms that use machine learning and response analysis built in, offering complete visibility. 

5. Easy-to-Use GUI, and Live Information Processing 

Easy-to-use GUI improves business performance, and therefore, using real-time data enables fast and correct decisions during the operation. Opt for a solution with decision automation tool which works with some kind of analytics dashboard to provide an intelligent perspective of active threats making it easier to respond to alerts timely. 

6. Scalability and Adaptability 

As organizations evolve, the DLP solutions they employ have to incorporate scalability as a key feature.  

7. Incident Reporting, and Forensics 

The primary incident reporting feature of a good DLP solution addresses the source and consequences of an information breach. It should allow organizations to capture and identify every aspect of an attack and provide remediation. 

8. Companies Manage Advanced Encryption and Data Masking 

Encryption and data masking play an important role in securing information when it is stored or transmitted. DLP solutions should therefore ensure that it uses high levels of encryption to avoid being breached.  

9. Anomaly detection using Behavioral Analytics 

In order, DLP solutions today should incorporate behavioral analysis features since users who behave anomalously may be up to no good. 

10. Being a part of the Regulatory Compliance and Audit Capability Team. 

It is crucial to remain compliant with data privacy laws; The DLP solution should help to achieve that. 

Conclusion 

When selecting the DLP solution, one should strive to find an excellent all-inclusive, customizable, and easy to operate platform. Fidelis Network ® comes with all the features which define today’s cybersecurity protection, making it an industry leader. Fidelis Security’s Patented Deep Session Inspection® technology gives you the ability to investigate threats and stop sessions that violate policies with details about who is sending and receiving data and what type of data is being sent.  Don’t wait anymore, it’s time for you to protect your organization data from cyber attackers.

The post Protecting Privacy in a Data-Driven World: What should you look for in a DLP Solution? appeared first on Cybersecurity Insiders.


October 11, 2024 at 10:33AM

One Year Later: The Israeli Tradition of Resilience

One year after Hamas attacked Israel on October 7, geopolitical tensions continue to undoubtedly impact various aspects of life in Israel. Yet, as they have so many times before, the people of Israel continue to show their resilience. In a very similar way, the Israeli technology has proven that it too has a level of resilience unmatched in the world, and that challenges are opportunities for success, rather than barriers. Israel is known for breeding world-class cybersecurity technology and startups, and while some might expect Israeli innovation to diminish amidst adversity, the Israeli tech-sector is unwavering, and the seeds are being planted for the next big wave of innovation coming out of Israel in 2025. 

Turning Conflict into Opportunity 

Since its inception over 70 years ago, Israel has faced constant threats, and despite this has remained innovative and adaptable. A large reason Israel generates so many cutting-edge cybersecurity startups is in fact because of these threats and the hands-on experience defending against them that Israelis in military units like Unit 8200 experience. This unit, part of the Israel Defense Forces, is charged with Israel’s cyber defense, and is among the best in the world at it. Having battled against some of the most advanced cyber threat actors in the world while serving in Unit 8200 and wanting to create commercial solutions to defend against them, many alumni often transition into the private sector to found successful startups. An early security pioneer, Check Point Software Technologies, which created the game-changing Firewall-1 software, was born out of technologies developed for national defense. This has been followed by many other success stories, including Palo Alto Networks, Wiz and SentinelOne. Born out of conflict, Israeli tech thrives because of its ability to adapt and find success through adversity. 

Driving Innovation and Investment Amidst Challenges 

Historically, Israeli companies founded in times of threat and turmoil have proven to dominate and outperform those companies that were founded during less challenging times. Research from Startup Nation Central shows that the success rate (as measured by their ability to go public, be acquired, or reach valuations of over $1B) of companies that raised funds during previous conflicts in 2006 and 2014 were higher than those of companies raising funds in conflict-free periods. Today, despite the challenges the nation is enduring, Israel has had an unceasing flow of investments and acquisitions. Since October 7, 2023, the Israeli tech ecosystem has seen 577 private investment rounds and raised a total of $7.8 billion in funding, with 18 companies each raising over $100m. These achievements indicate investor confidence in the long-term potential of Israel’s innovation landscape. 

For example, Dig and Talon were both acquired by Palo Alto Networks for a combined value of $1 Billion just days after October 7. Both Israeli companies were founded less than four years before their acquisition. Google, meanwhile, recently attempted to acquire Wiz, the Israeli cybersecurity startup focused on protecting organizations from cloud threats, for a whopping $23 billion. Dig, Talon, and Wiz prove that the Israeli cybersecurity market continues to earn the confidence of technology powerhouses around the world, and thus we can expect the exits and investments to continue uninterrupted. 

Israeli Collaboration

Israel’s reputation as a leading cyber nation is bolstered by strong collaboration within its cybersecurity ecosystem. Partnerships between startups, established companies, and government entities illustrate the strength and cohesiveness of the Israeli cyber community. Israeli cybersecurity innovations have a significant global impact, protecting critical infrastructure and enterprises worldwide.

Government support has played a crucial role in nurturing the growth of the Israeli tech ecosystem The Israeli government invests heavily in cybersecurity through research and development grants, startup acceleration programs, and public-private partnerships. In fact, the Israel tech sector accounts for 20% of the country’s economy, with 400,000 Israelis in the tech workforce. These partnerships have been crucial in maintaining the Israeli tech sector’s momentum throughout times of hardship, and enabling it to maintain its role as Israel’s main growth driver.

Forging Ahead 

The country’s ability to innovate in response to challenges is the cornerstone of Israel’s success. Real-world experiences like the current war, while challenging, has managed to strengthen the resolve of Israeli entrepreneurs and Israel continues to produce the most revolutionary cybersecurity technology in the world. The resilience and strength demonstrated over the past year since October 7, 2023 is telling, and will inspire future generations, ensuring that Israel remains at the vanguard of technological advancement. The next wave of innovation is being molded by the lessons learned during these hard times, leading to even more robust and effective cybersecurity solutions.

 

The post One Year Later: The Israeli Tradition of Resilience appeared first on Cybersecurity Insiders.


October 11, 2024 at 08:17AM

Marriott agrees to pay $50 million to its users of 50 states for data breach

Marriott n Starwood have reached an agreement to pay a substantial penalty of $51 million following their failure to adequately protect user information during a significant data breach. This penalty will be allocated to approximately 341 million individuals affected across all 50 states in the U.S., as part of a settlement related to three separate data breaches that occurred between 2013 and 2020.

In addition to the financial settlement, the hospitality giant has committed to enhancing its cybersecurity measures. Marriott will produce a comprehensive report on its cybersecurity practices, detailing the implementation of its Information Security program. Furthermore, for the next two decades, Marriott will provide a certificate of compliance to the Federal Trade Commission (FTC), supplemented by an annual third-party audit report from an independent firm.

Following a legal review of the data breaches, the FTC has mandated that Marriott offer a “delete” button for customers, enabling them to remove their personal information from the Marriott Bonvoy Loyalty Rewards accounts.

Interestingly, Marriott has also recently faced another cybersecurity incident. Reports surfaced claiming that hackers had infiltrated the hotel chain’s database, allegedly obtaining around 20GB of sensitive data, including guests’ credit card information from bookings. Although Marriott denied being compromised by this attack in June 2022, it was reported that an employee at the BWI Airport Marriott in Baltimore fell victim to a social engineering scheme that potentially led to this new breach.

This ongoing saga underscores the critical importance of robust cybersecurity measures in the hospitality industry, particularly as data breaches become increasingly common.

The post Marriott agrees to pay $50 million to its users of 50 states for data breach appeared first on Cybersecurity Insiders.


October 10, 2024 at 08:44PM

SpyCloud Embeds Identity Analytics in Cybercrime Investigations Solution to Accelerate Insider and Supply Chain Risk Analysis & Threat Actor Attribution

Austin, TX, USA, October 10th, 2024, CyberNewsWire

IDLink, SpyCloud’s new automated digital identity correlation capability, is now core to its industry-leading Investigations solution used by CTI teams, security operations, fraud and risk prevention analysts, and law enforcement globally

SpyCloud, the leader in Identity Threat Protection, announced that its SaaS Investigations solution has been enhanced with identity analytics that illuminate the scope of digital identities and accelerate successful outcomes of complex investigations from days or hours to minutes. SpyCloud Investigations is a powerful cybercrime and identity threat investigation solution used by analysts and investigators to discover and act on threats by navigating the world’s largest repository of recaptured breach, malware, and phishing data. It powers rapid analysis of identity exposures across organizations, VIPs and supply chains, pattern of life analysis, threat actor attribution, insider risk analysis, financial crimes research, and more.

SpyCloud Investigations now includes IDLink, the company’s advanced analytics technology that automatically delivers expanded digital identity results from a simple search query. Where a traditional threat intelligence or investigations tool may provide a small number of records directly correlated to the search input, IDLink expands the pool of results to include identity data correlated across shared usernames, emails, passwords, and PII – with flexible options around pivoting depth, confidence levels, and visualization.

Based on more than a decade’s worth of techniques and expertise developed by renowned investigators at SpyCloud, including former intelligence agency personnel, IDLink uniquely provides a more comprehensive picture of identity compromise to give analysts more avenues for investigation while reducing errors and missed data points. Organizations with fewer in-house CTI, security operations, or fraud/e-crime prevention resources now have an easy-to-use solution to expand their investigative capabilities without adding additional expertise or headcount.

“SpyCloud Investigations is the ultimate force multiplier for security teams,” said Jason Lancaster, SpyCloud’s senior vice president of investigations. “SpyCloud’s team of investigators have decades of experience investigating cybercrimes day and night, across all manner of use cases, with public and private sector partners. We’ve spent the last year infusing this knowledge into our solution so analysts at all skill levels can reap the benefits.”

With IDLink advanced analytics now foundational to its industry-leading solution, SpyCloud Investigations offers users the ability to visualize holistic identities of exposed employees, consumers, vendors, and cybercriminal actors themselves to more quickly and comprehensively identify and act on risks – helping them achieve:

  • Up-leveled Analyst Output: Investigative workflows automate the process of identifying hidden identity exposures, up-leveling analysts and investigators of all skill levels, increasing team productivity, discovery, and resolution.
  • Hidden Connections: IDLink automatically connects the dots and rapidly pieces together a holistic view of a digital identity, in minutes instead of hours of advanced analysis previously.
  • Attribution: Automated analytics deliver linked exposed identity assets and records, reducing dead ends in investigations and delivering critical details about criminal actors and threats.

This announcement comes at a time when adversaries are increasingly using stolen identity data to bypass security measures and exploit exposed access. This is evidenced by large-scale infostealer malware campaigns and headline-grabbing breaches, such as the National Public Data breach, which leaked 2.7 billion identity records – including hundreds of millions of Americans’ Social Security numbers.

“There is a vast amount of personal information in criminals’ hands,” said Jason. “SpyCloud Investigations gets that same data into the right hands, faster, to protect businesses and their users. By illuminating connections, opening up new threads to investigate, and offering unlimited queries to SpyCloud’s enriched database of breached, phished, and malware-exfiltrated data, analysts can visualize threats and act decisively, enhancing organizational resilience against cybercrime and identity threats.”

For more information about SpyCloud Investigations or to schedule a complimentary demo to explore your data, users can contact us here.

About SpyCloud

SpyCloud transforms recaptured darknet data to disrupt cybercrime. Its automated identity threat protection solutions leverage advanced analytics to proactively prevent ransomware and account takeover, safeguard employee and consumer accounts, and accelerate cybercrime investigations. SpyCloud’s data from breaches, malware-infected devices, and successful phishes also powers many popular dark web monitoring and identity theft protection offerings. Customers include more than half of the Fortune 10, along with hundreds of global enterprises, mid-sized companies, and government agencies worldwide. Headquartered in Austin, TX, SpyCloud is home to more than 200 cybersecurity experts whose mission is to protect businesses and consumers from the stolen identity data criminals are using to target them now.

To learn more and see insights on your company’s exposed data, users can visit spycloud.com.

Contact

Emily Brown
REQ on behalf of SpyCloud
ebrown@req.co

The post SpyCloud Embeds Identity Analytics in Cybercrime Investigations Solution to Accelerate Insider and Supply Chain Risk Analysis & Threat Actor Attribution appeared first on Cybersecurity Insiders.


October 10, 2024 at 06:00PM

Wednesday, October 9, 2024

Cyber Attack on Internet Archives: A Major Breach and DDoS Assault

In recent weeks, the Internet Archives, a prominent American non-profit digital library, has been under siege from persistent Distributed Denial of Service (DDoS) attacks. On October 9, 2024, the situation escalated dramatically when the organization experienced a significant cyber attack that resulted in the breach of approximately 31 million user accounts, leading to a troubling website defacement.

Visitors to the Internet Archives began encountering alarming messages on Wednesday afternoon, indicating that the site was the target of a cyber assault. Users were informed that their account details, including sensitive information, had been compromised and could be verified on the “Have I Been Pwned” portal—a service that alerts individuals if their data has been involved in a security breach.

This cyber attack was notably sophisticated; hackers employed a pop-up notification system that displayed alerts to anyone attempting to access the website during the chaotic hours following the breach. Brewster Kahle, the founder of the Internet Archives, acknowledged the severity of the incident, assuring the public that more information would be shared with the media upon completion of an ongoing investigation.

Initial reports suggest that the attackers were able to extract a vast amount of data from the compromised accounts. This information included email addresses, usernames, timestamps indicating when passwords were last changed, and Bcrypt hashed passwords—a cryptographic technique often used to secure password storage. The scale of the breach has raised serious concerns about the safety and privacy of user information stored within the Internet Archives.

A DDoS attack is characterized by an overwhelming influx of fake internet traffic directed at a server, often originating from a network of compromised devices known as botnets. Such attacks are designed to disrupt normal operations, rendering websites inaccessible to legitimate users.

Interestingly, this cyber incident occurred shortly after the Internet Archives faced a significant legal setback regarding copyright issues. In a contentious legal battle, the organization was forced to remove over 500,000 books from its digital collection, significantly limiting its capacity for digital lending. This decision came in response to lawsuits from several publishers who challenged the Archives’ approach to copyright and ownership of historical works. As a result, the substantial investment made in their scanning technology, dubbed ‘Scribe,’ now appears largely undermined. The San Francisco-based National Emergency Library, launched in 2020 during the COVID-19 pandemic to provide access to digital resources, found itself embroiled in these legal disputes, questioning the very foundation of its mission to preserve and disseminate knowledge.

As the Internet Archives navigates the fallout from this breach, the implications for digital preservation and access to information remain profound. The organization’s commitment to archiving the internet and its myriad resources is now challenged by the dual threats of cyber attacks and legal restrictions, raising important questions about the future of digital libraries in an increasingly contentious landscape.

The post Cyber Attack on Internet Archives: A Major Breach and DDoS Assault appeared first on Cybersecurity Insiders.


October 10, 2024 at 10:57AM

Top Strategies for Using Vendor Risk Questionnaires to Strengthen Cybersecurity

For businesses, managing the various risks that come with third-party relationships has become a critical function of the organization and a matter of complying with the law. However, organizations are still determining the most essential aspects of an effective third-party risk management (TPRM) program.

One pillar of any successful program is the vendor risk assessment questionnaire, a document created to evaluate the risks associated with vendors and business partners – and the partners they do business with. 

In gauging third-party risk, organizations should learn as much about their partners and vendors as possible. The questionnaire is a way to find potential weaknesses in their security, privacy, and compliance practices by evaluating policies, controls and supporting evidence of those controls. 

Risk assessment and mitigation begins with information gathering. The questionnaire is the key to getting an inside-out, trust-based view of a vendor’s security posture. They help an organization answer critical questions, such as:

  • Does this vendor have acceptable risk controls?
  • Are there risks with this vendor that require remediation?
  • Are there compensating controls in place for identified risks?

Questionnaires may just be one piece of the TPRM puzzle, but they are an extremely useful mechanism for getting a detailed internal perspective of third-party risk.

Choosing the right questionnaire

Creating TPRM assessment questionnaires from scratch is something only some organizations have the time, resources, or expertise to accomplish. That’s why many choose an industry-standard template, for example the Standard Information Gathering (SIG) questionnaire or the H-ISAC questionnaire (if it is a healthcare organization). These templates offer a good starting point, based on established frameworks and address critical areas like data security, operational resilience and compliance with the law.

While these questionnaires vary, many include these standard building blocks:

  • Vendor policies on data protection.
  • Compliance with standards, laws and regulations.
  • Access management, information privacy, incident response and other security controls.
  • Security measures related to both digital and physical infrastructure.

Another advantage of industry-standard questionnaires is that vendors—those who will be answering the questions–are likely already familiar with such questions and will be ready to give detailed responses. Instead of settling for a cookie-cutter approach that often comes with using templates, organizations should adapt these templates to meet the specific needs of their business, adjusting as needed for risk tolerance, industry, and regulatory requirements. This ensures the questionnaire will collect relevant, accurate, and timely information.

However, like most things that are important in business, the questionnaires that help an organization gauge risk come with their own set of challenges.

Questionnaires and their challenges

Organizations must surmount a series of challenges to get risk-assessment questionnaires to reach their full potential. Questionnaires, for example, can be:

Work-intensive: Completing a questionnaire can be time-consuming, especially if an organization has numerous vendors. Creating, distributing, and analyzing risk assessment questionnaires takes dedicated resources and expertise.

A snapshot, not a movie: Security questionnaires offer a limited glimpse of a vendor’s security profile at a certain point in time. However, the nature of risk changes constantly, and new vulnerabilities can arise after a questionnaire has been completed and filed away.

Supply chain complexity: Interconnected supply chains mean organizations must assess the risks associated with third-party and fourth-party vendors. This means additional complexity to the risk management process.

Vendor fatigue: Vendors may delay or deprioritize completing such questionnaires, as they may be suffering from fatigue from filling out so many. This can slow down the timeline of assessing their risks.

To combat this fatigue, organizations can streamline questionnaires with AI programs that automatically populate a new questionnaire by pulling from an older one or extracting details from sources like SOC2 reports or ISO Statements of Applicability. Tailoring questionnaires to the vendor’s specific role can also lessen the burden and boost engagement. And using automated workflow for follow-ups can relieve more of the burden. 

How to get the best use of questionnaires

Once an organization has pushed through the challenges and created a robust questionnaire for risk management, it’s time to put it to use. Below are tips on how to get the best use of it:

Refrain from settling for a fixed and rigid questionnaire. Don’t fall prey to “analysis paralysis,” in trying to create a perfect questionnaire. The one-and-done approach doesn’t suffice when it comes to the dynamic nature of risk. Information starts getting stale the moment a questionnaire is completed, so be aware that maintaining real-time risk knowledge and awareness takes continuous evaluation. 

Be ready to customize. An organization should be able to import or create items for review as the assessment process moves along, along with customization options for adding questions as more unique needs are identified.

Regularly reassess third parties. Assessment of risk should be repeated regularly, especially if any vendors bring extra risks. How often you reassess depends on how critical the vendor is to your operations and also the sensitivity of the data they handle. Organizations may need to reassess their vendors annually or more often in highly regulated industries, depending on compliance requirements.

Risk evolves rapidly in our digital and connected world, so a vendor’s security posture can easily change as new vulnerabilities, incidents, or changes in business processes come to light. That’s why automation and continuous monitoring are essential to stay ahead of such changes. 

Next steps in the process

A robust third-party risk management program begins with a risk assessment questionnaire. These documents can be paired with real-time security monitoring, automated risk management products, and continuous vendor monitoring to manage and mitigate third-party risk most effectively.

Tools and strategies in the right combination will help any organization mitigate the risks that come with a large ecosystem of vendors, ensuring the business stays secure.

TPRM best practices should always include using real-time monitoring to assess vendor performance continuously and validate the effectiveness of controls “in the wild”, reassessing vendors regularly to ensure their security measures are still effective and customizing your questionnaire to mirror the unique risks each vendor brings. 

However, every successful TPRM program begins with something simpler: the risk-assessment questionnaire.

 

The post Top Strategies for Using Vendor Risk Questionnaires to Strengthen Cybersecurity appeared first on Cybersecurity Insiders.


October 09, 2024 at 01:22PM

Financial impact of cybercrime

The financial strain on businesses is growing at an alarming rate, largely as a result of escalating cybercrimes. The financial implications of cyberattacks are becoming impossible to ignore.

The increasing frequency and sophistication of these threats demand a more strategic approach to cybersecurity investment, yet many organisations continue to underestimate the financial consequences of a breach.

The financial toll of cybercrime can be divided into direct and indirect impacts. Direct costs include the immediate loss of revenue due to downtime. A business can grind to a halt in the aftermath of an attack, often requiring weeks to restore operations.

The high costs

The cost of recovery, including professional support to restore systems, investigate the breach, and work with regulators, is another major direct hit to the bottom line.

The indirect costs, however, can be just as devastating, if not more so. Many people do not understand how severe the indirect effects of a successful cyber compromise will have on the business.

The most immediate indirect impact is the erosion of trust among customers, partners, and the public. A loss of trust often leads to a significant loss of business, as customers may turn away permanently.

Further indirect costs arise from regulatory reporting requirements and the protective measures necessary to safeguard individuals affected by the breach. These additional expenses can accumulate rapidly.

The true cost of a cyberattack extends far beyond ransom payments, regulatory fines, and recovery costs; it reaches into the personal lives of employees, affecting mental health and well-being. A cyber-attack is extremely stressful to the business and those responsible for recovery, which can lead to burnout and prolonged stress-related absences from work.

The cybersecurity investment gap

Despite the mounting risk, many organisations continue to under-invest in cybersecurity. I see a disproportionate under-investment in relation to the risk of cybercrime. This mismatch between risk and investment is a critical issue for CFOs.

While some boards may approve increased spending on cybersecurity, this spending is often ineffective, with a focus on isolated solutions rather than a comprehensive strategy.

The problem is that many business leaders still view cybersecurity as a technology issue. Cybersecurity has nothing to do with technology, it is about managing digital risk through a structured, resilience-based approach.

Technology is only an enabler; true resilience comes from understanding the broader risks and implementing a strategic framework that covers all aspects of digital risk.

Minimising financial damage

Prevention, as the saying goes, is better than cure. For businesses, this means building a robust cyber resilience framework. There is no way we will stop attackers trying to attack, but an effective framework can help businesses detect and respond to threats before they cause significant damage.

Security comes from visibility – resilience provides visibility, visibility gives us the capability to respond.

By ensuring total visibility across all parts of a cyber resilience framework, organisations can detect potential attacks early, limiting the financial damage. The sooner a threat is identified, the easier it is to contain, reducing the potential for widespread disruption.

Aligning cybersecurity with financial strategy

One of the key challenges for CFOs is aligning cybersecurity investments with their overall financial strategy. The focus needs to shift from the cost of individual cybersecurity tools to the value of preventing cyber incidents in the first place.

Let’s rather focus on what your business does to make money. By understanding how cyberattacks can disrupt revenue streams and harm customer relationships, business leaders can better justify the necessary investment in cybersecurity.

The financial impact of a cyberattack is not limited to the cost of recovery. Most businesses will face at least two weeks of downtime, followed by months of ongoing disruption. During this time, businesses lose not only revenue but also market share, as competitors swoop in to capture dissatisfied customers.

In many cases, 30% of customers will no longer want to do business with a company that has been breached. By calculating these potential losses, businesses can gain a clearer picture of the true cost of cyber risk.

Incident response planning

A comprehensive incident response plan is essential for reducing the financial impact of cybercrime. Being prepared is crucial. Regularly reviewing and testing incident response plans can help organisations respond more effectively when an attack occurs, reducing both the direct and indirect costs of a breach.

Building cyber resilience into the business also includes regular awareness training and cybersecurity drills. These exercises help employees understand their role in protecting the business, creating a culture of vigilance that strengthens the organisation’s overall defences.

The rising cost of cybercrime is placing significant financial pressure on CFOs. While many organisations still under-invest in cybersecurity, the true cost of a breach – from lost revenue and reputational damage to regulatory fines and personal stress – far outweighs the expense of building a robust, resilience-based cybersecurity framework.

By shifting focus from technology solutions to strategic risk management, businesses can reduce their exposure to cyber threats and protect their bottom line.

The post Financial impact of cybercrime appeared first on Cybersecurity Insiders.


October 09, 2024 at 12:06PM

Cyber Threats Involved in Edge Computing

As organizations increasingly adopt edge computing to enhance performance and reduce latency, they also expose themselves to a unique set of cybersecurity threats. Edge computing involves processing data closer to the source of generation—such as IoT devices or local servers—rather than relying on centralized data centers. While this model offers numerous advantages, it also presents significant challenges in terms of security. Below, we explore the key cyber threats associated with edge computing and discuss strategies for mitigating these risks.

1. Increased Attack Surface- One of the primary concerns with edge computing is the expanded attack surface. With data being processed at multiple edge nodes rather than a single, centralized location, attackers have more potential entry points. Each edge device, whether it’s a sensor, camera, or local server, can become a target. This diversity in devices and locations complicates security measures and increases the chances of vulnerabilities being exploited.

2. Insecure Devices- Many edge computing environments utilize IoT devices that may lack robust security features. These devices often come with default passwords, limited processing power, and insufficient security protocols, making them easy targets for attackers. Once compromised, these devices can be used to infiltrate the network, leading to data breaches or disruption of services.

3. Data Interception- As data is transmitted between edge devices and central data centers, there is a risk of interception. Attackers can exploit vulnerabilities in the communication protocols to capture sensitive data in transit. Without proper encryption and secure transmission methods, this data can be accessed and manipulated, leading to severe privacy and compliance issues.

4. Insider Threats- Insider threats pose a significant risk in edge computing environments. Employees or contractors with access to edge devices and networks can inadvertently or maliciously cause harm. This risk is amplified in decentralized architectures, where monitoring and control may be less stringent than in traditional data center environments.

5. Distributed Denial of Service (DDoS) Attacks- DDoS attacks can severely impact edge computing by overwhelming edge nodes with traffic. By targeting multiple edge devices simultaneously, attackers can disrupt services and degrade performance. This not only affects the immediate services but can also impact the overall network and centralized data processing capabilities.

6. Lack of Security Standards- The rapid adoption of edge computing has outpaced the establishment of comprehensive security standards and best practices. Organizations often implement disparate security measures across different edge devices, leading to inconsistencies and gaps in protection. This lack of uniformity makes it challenging to defend against threats effectively.

7. Physical Security Risks- Edge devices are often deployed in less secure environments compared to centralized data centers. For instance, devices may be installed in public locations or remote areas, making them susceptible to tampering, theft, or physical attacks. Ensuring physical security for these devices is crucial but often overlooked.

Mitigation Strategies
To address these cyber threats, organizations should consider the following strategies:

 • Robust Device Management: Implement strict policies for device management, including regular updates, password management, and monitoring for vulnerabilities.

• Network Segmentation: Use network segmentation to isolate edge devices from critical systems, minimizing the impact of a potential breach.

  • Data Encryption: Ensure that all data in transit and at rest is encrypted to protect against interception and unauthorized access.

 • Comprehensive Security Policies: Develop and enforce comprehensive security policies that cover all aspects of edge computing, including access controls, incident response plans, and employee training.

• Regular Security Audits: Conduct regular security assessments and audits to identify and address vulnerabilities in the edge computing environment.

• Physical Security Measures: Implement physical security measures, such as surveillance, secure enclosures, and access controls, to protect edge devices.

Conclusion
As edge computing continues to revolutionize how data is processed and analyzed, it is essential for organizations to recognize and address the associated cybersecurity threats. By adopting proactive security measures and fostering a culture of cybersecurity awareness, organizations can harness the benefits of edge computing while safeguarding their systems and data from potential threats. As this technology evolves, staying vigilant and adaptable will be key to maintaining security in an increasingly decentralized landscape.

The post Cyber Threats Involved in Edge Computing appeared first on Cybersecurity Insiders.


October 09, 2024 at 11:24AM

Cyber Attacks news headlines trending on Google

Cyber Attack on Casio Computer Co. Ltd. Servers

Casio, the esteemed Japanese watchmaker, has confirmed that several of its servers were targeted in a cyber attack on October 5, 2024. The breach resulted in the exposure of sensitive information, including customer names, email addresses, country of residence, complete order details, service usage information, and payment details. Notably, this incident affected data related to over 1,100 educational institutions and contained confidential information from its watch segment’s R&D division. This attack mirrors a similar incident from the previous year, where hackers accessed comparable volumes of data from Casio at same time last year.

Universal Music Group Data Breach

Universal Music Group has reported to the Maine Attorney General’s Office that a cyber attack on its servers may have compromised limited data concerning more than 68 residents in the state. According to the state’s announcement, the breach occurred in July and may have resulted in the exposure of some social security numbers. In response, the company is offering impacted individuals a complimentary 24-month subscription to credit monitoring and identity theft protection services through Experian. Universal Music Group also clarified that no known ransomware group has claimed responsibility for this incident.

Malware Attacks on Embassies and Government Organizations by Golden Jackal

The advanced threat group known as Golden Jackal has been targeting embassies and government entities worldwide by exploiting vulnerabilities in computer networks. Recent reports from ESET indicate that the South Asian Embassy in Belarus and Europol’s government websites have been among their targets. Golden Jackal has been active since 2019, launching malware-based attacks and has recently been tasked with targeting diplomatic offices across Europe, South Asia, and the Middle East.

Rise of Ransomware Gangs

In the past year, despite extensive law enforcement efforts, approximately 31 new ransomware gangs have emerged, marking a 31% increase in active groups. Secureworks’ annual State of Threat Report estimates that the total number of ransomware organizations could reach between 50 and 60 by the end of this year.

As the holiday season approaches, the frequency and severity of attacks are expected to escalate. Hackers are likely to exploit the seasonal reduction in IT staffing across various industries, leading to an uptick in high-severity malware attacks.

The post Cyber Attacks news headlines trending on Google appeared first on Cybersecurity Insiders.


October 09, 2024 at 11:19AM

Tuesday, October 8, 2024

Comcast Ransomware attack and American Water Cyber Attack shutdown

Comcast Ransomware Attack 2024: Overview and Implications

In a significant cybersecurity breach, telecom giant Comcast has reported that a ransomware attack has compromised the personal information of approximately 230,000 customers. This alarming revelation emerged from a recent filing with the Securities and Exchange Commission (SEC), highlighting the growing threat of cybercrime in the telecommunications sector.

The attack, which occurred in February 2024, was executed against a third-party debt collection agency, Financial Business and Consumer Solutions (FBCS), with which Comcast has had longstanding associations. Initial investigations suggest that the attackers infiltrated FBCS’s network first, subsequently gaining access to sensitive data linked to Comcast. This data breach reportedly involves information collected over the course of 2020 and 2021, raising serious concerns about the duration of the vulnerability.

The data compromised in this breach is particularly sensitive and includes customers’ names, addresses, Social Security numbers, dates of birth, and Comcast account numbers. The potential for identity theft and fraud is substantial, given the nature of the information that has been exposed. In response to the incident, Comcast has severed its ties with FBCS and is currently enlisting the expertise of cybersecurity professionals to navigate the fallout and bolster its defenses against future attacks.

American Water Cyber Attack: A Broader Threat to Infrastructure

In a related development, American Water, the largest water and wastewater utility company in the United States, has confirmed that it has fallen victim to a cyber attack. This incident has resulted in the suspension of its billing operations and certain application services, raising alarms about the security of critical infrastructure in the nation.

Headquartered in New Jersey, American Water has stated that it is actively investigating the nature of the attack. However, the company has refrained from labeling the incident specifically as ransomware, leaving open the possibility that it could involve a different form of cyber threat.

Given that American Water services over 13 million people across 14 states and supplies water to more than 18 military bases, the implications of this attack could be far-reaching. While initial reports indicate that the attack was detected in its early stages and contained before significant damage could occur, the potential for disruption to essential services remains a pressing concern.

The timing of this cyber incident is particularly noteworthy, as it coincided with preparations for the 2024 U.S. elections. Some analysts speculate that the attack may have been strategically aimed at creating public panic and undermining confidence in critical infrastructure during a politically sensitive period. The threat posed by such cyber attacks to the integrity of essential services is a stark reminder of the vulnerabilities that exist within the nation’s infrastructure.

Conclusion

Both the Comcast and American Water incidents underscore the increasing frequency and severity of cyber attacks on major companies and critical infrastructure in the United States. As cybercriminals continue to evolve their tactics, organizations must prioritize robust cybersecurity measures to protect sensitive customer information and ensure the uninterrupted delivery of essential services. The implications of these attacks extend beyond individual companies, posing a broader threat to national security and public trust in essential services.

The post Comcast Ransomware attack and American Water Cyber Attack shutdown appeared first on Cybersecurity Insiders.


October 08, 2024 at 08:31PM

Monday, October 7, 2024

What to Do If Your Google Account Is Hacked or Compromised

In our digital age, a Google account serves as a gateway to a plethora of services—from email and cloud storage to productivity tools and more. Therefore, if you suspect that your Google account has been hacked or compromised, it is crucial to act swiftly and decisively. Here’s a comprehensive guide on what to do if you find yourself in this predicament.

1. Recognize the Signs of Compromise

Before taking action, you need to confirm that your account is indeed compromised. Look out for these signs:

Unrecognized Login Activity: Check your account activity for logins from unfamiliar locations or devices.

Changes to Account Settings: If you notice changes to your profile information, such as an altered recovery email or phone number, your account may be compromised.

Sent Emails You Didn’t Send: If friends or colleagues report receiving strange emails from you, your account may have been hijacked.

Unauthorized Purchases or Services: If you see charges for services or products you did not authorize, your account could be at risk.

2. Secure Your Account Immediately

a. Change Your Password- Go to the Google Account Recovery page and select “Forgot password?” Follow the prompts to reset your password. Ensure that your new password is strong—use a mix of letters, numbers, and special characters.

b. Enable Two-Step Verification- Once you regain access, enable Two-Step Verification for added security. This requires not only your password but also a verification code sent to your phone or another device.

c. Review Account Recovery Options– Verify that your recovery email address and phone number are correct. These will help you recover your account if you ever lose access again.

3. Check Account Activity

a. Review Security Events- Visit the Google Account Security page and check the “Recent Security Events” section. This will show you any suspicious activity, such as unauthorized access attempts.

b. Sign Out of Other Devices- If you suspect your account has been accessed from another device, you can sign out of all other devices by going to the “Your Devices” section under your Google Account settings.

4. Scan for Malware

If your account was compromised, it’s possible that malware on your device is responsible. Run a full scan using reputable antivirus software to detect and remove any threats.

5. Check Third-Party App Access

Review the list of third-party apps connected to your Google account. Remove any apps you do not recognize or no longer use:

Go to Security Checkup and examine “Third-party apps with account access.” Remove access for suspicious apps.

6. Monitor Your Other Accounts

If your Google account is compromised, other accounts linked to it may also be at risk. Change passwords and enable two-factor authentication for those accounts as well, especially for financial services.

7. Inform Your Contacts

Let your contacts know that your account was compromised. Warn them not to click on any suspicious links they may have received from your account. This helps mitigate the risk of further spread of the compromise.

8. Consider Professional Help

If you find it challenging to regain control of your account or if sensitive information has been leaked, consider seeking professional help. Cybersecurity experts can assist in securing your accounts and mitigating any damage.

9. Stay Informed

Finally, keep yourself updated on security practices. Follow tech news outlets and Google’s official blog to stay informed about potential threats and ways to safeguard your digital presence.

Conclusion

Having your Google account hacked can be a distressing experience, but prompt and effective action can help you regain control and secure your information. By following the steps outlined above, you can minimize the damage and bolster your account’s defenses against future attacks. Remember, the key to online security lies in vigilance and proactive measures.

 

The post What to Do If Your Google Account Is Hacked or Compromised appeared first on Cybersecurity Insiders.


October 08, 2024 at 10:59AM

Ukraine Celebrates Vladimir Putin’s Birthday with Cyber Attack

In a striking and symbolic gesture, Ukraine has officially announced a cyber attack on VGTRK, Russia’s state-owned television and radio broadcasting company. This move, described by Ukrainian officials as a fitting birthday gift to President Vladimir Putin, comes as a direct response to the suffering inflicted on the Ukrainian populace amid ongoing hostilities.

VGTRK, also known as BITPK, operates over 17 television and radio channels in approximately 53 languages across Russia. The cyber attack has reportedly caused significant disruptions to its services for around 20 hours, affecting various regions throughout the country. Kyiv claims the attack was executed with a high level of sophistication, successfully disrupting online broadcasts and internal communications intended for employees. Alarmingly, many of the servers were compromised, with data—including critical backups—being wiped.

While it remains uncertain whether this incident is connected to a ransomware attack that targeted the state broadcaster weeks earlier, sources indicate that the previous threat was successfully contained before it could escalate.

In addition to VGTRK, the 24-hour news channel Rossiya-24 is also experiencing the fallout from the cyber attack. However, reports suggest that recovery efforts are underway, with hopes for service restoration in the near future.

Vladimir Putin, who celebrated his 72nd birthday on October 7, 2024, has found his milestone marked by this audacious act. Some affected servers displayed messages congratulating the Russian leader, framing the cyber assault as a large-scale malware attack that effectively obliterated information and applications from numerous systems.

Ukrainian officials, including President Volodymyr Zelenskyy, have characterized the attack as a necessary retaliation against VGTRK for its role in disseminating misinformation and inciting hatred towards Ukrainians.

Amidst the turmoil, it is essential to acknowledge the longevity of Putin’s leadership—he has been in power for over two decades, a tenure reminiscent of historical figures such as Joseph Stalin. As the geopolitical landscape continues to evolve, this cyber confrontation serves as a stark reminder of the ongoing tensions and the lengths to which nations will go in the digital age.

The post Ukraine Celebrates Vladimir Putin’s Birthday with Cyber Attack appeared first on Cybersecurity Insiders.


October 08, 2024 at 10:51AM

Insurance Companies May Halt Ransomware Payment Coverage Amid White House Push

In the coming days, insurance companies might reconsider their approach to funding ransomware payments, as a White House official has called for a mandatory directive on the matter.

This topic was raised at the 4th Annual International Counter Ransomware Initiative summit in the U.S., which brought together representatives from over 68 member nations to explore strategies for combating the growing ransomware threat.

Anne Neuberger, the National Security Advisor for Cyber and Emerging Technologies, advocated for insurance companies to stop covering ransomware payments. She argued that such coverage encourages victims to pay ransoms with the expectation of reimbursement, ultimately perpetuating the cycle of crime. This could lead to the same victims being targeted multiple times.

This potential shift could significantly impact cyber insurance providers. If insurance policies no longer cover ransom payments, many customers may reconsider purchasing new policies or renewing existing ones, especially if they’re paying high premiums without adequate protection.

However, Neuberger acknowledged that in scenarios where data or application recovery is impossible, paying the ransom might be the only viable option. Delaying such payments could result in irreparable damage to a business.

Back in November 2019, authorities issued warnings to Western businesses about the risks of paying ransoms, noting that it could incentivize criminal activity and did not guarantee access to a decryption key.

Despite this, law enforcement later clarified that payment should be considered only as a last resort when recovery options have been exhausted and a business is on the brink of collapse.

What are your thoughts on cyber insurance coverage for ransomware payments?

Vox Pop, Welcome!

The post Insurance Companies May Halt Ransomware Payment Coverage Amid White House Push appeared first on Cybersecurity Insiders.


October 07, 2024 at 08:31PM

Hybrid Analysis Utilizes Criminal IP’s Robust Domain Data for Better Malware Detection

Torrance, United States / California, October 7th, 2024, CyberNewsWire

Criminal IP, a renowned Cyber Threat Intelligence (CTI) search engine developed by AI SPERA, has partnered with Hybrid Analysis, a platform that provides advanced malware analysis and threat intelligence, to enhance threat research.

This collaboration integrates Criminal IP’s advanced domain scanning capabilities into the Hybrid Analysis platform, providing security professionals with deeper insights and more effective threat mitigation strategies.

Comprehensive Malware and Domain Analysis

Hybrid Analysis employs dynamic and static techniques for thorough malware analysis. Real-time execution environments and memory dumps generate annotated disassembly listings and critical Indicators of Compromise (IOCs).

Criminal IP specializes in real-time domain scanning, scrutinizing domains for phishing, malware, and illicit activities. Integration enriches threat profiles, improving threat detection accuracy.

Key Benefits of the Collaboration:

  • Enhanced Threat Profiling: Security professionals can gain deeper insights into the origins and behaviors of threats identified through Hybrid Analysis, enriched with Criminal IP’s data.
  • Real-Time Domain Analysis: Integration with Criminal IP enables users to conduct real-time scans on domains of interest, which is crucial for accurately identifying emerging threats promptly.
  • Comprehensive Security Insights: Users gain access to detailed domain attributes such as phishing records, abuse incidents, and detection of embedded malicious code, enhancing their ability to analyze for signs of Domain Generation Algorithms (DGA) and phishing probabilities.
  • Interactive Score Card: Users can quickly assess domain status, accessing additional details directly from Criminal IP database to make informed decisions based on the latest threat intelligence.

Criminal IP’s Advanced Real-Time Threat Detection

In addition to this comprehensive maliciousness result, uses seeking information about each component and false positives can visit Criminal IP.

<Example of Criminal IP Domain Search for malicious URL>

The URL scan feature allows users to extract a wealth of data, including network logs, associated IP addresses, malicious links, and website vulnerabilities.

Users of Criminal IP Domain Search can access valuable insights such as technology usage specifics, abuse records, and identified CVE vulnerabilities, all conveniently consolidated on a single page.

This robust search engine offers three customizable subscription plans—Lite, Medium, and Pro—including a Free membership option.

To determine the most suitable plan based on user’s volume of IP Lookup and URL Scan/Lookup requirements, users can explore the Free membership, monitor their credit usage through a user-friendly dashboard, and take advantage of key features for gaining valuable insights.

About AI SPERA

AI SPERA, a leader in Cyber Threat Intelligence (CTI) solutions, significantly expanded its reach by launching its flagship solution, Criminal IP, in 2023.

Since then, the company has formed technical and business collaborations with over 40 renowned global security firms, including Hybrid Analysis, VirusTotal, Cisco, Tenable, Sumo Logic, and Quad9.

Besides the CTI search engine, the company offers Criminal IP ASM, a SaaS-based Attack Surface Management Solution on AWS Marketplace and Azure Marketplace, and Criminal IP FDS, an AI-based Anomaly Detection Solution for credential stuffing prevention and fraud detection.

Available in five languages (English, French, Arabic, Korean, and Japanese), the search engine provides a powerful service for users worldwide.

Contact

Michael Sena
AI SPERA
support@aispera.com

The post Hybrid Analysis Utilizes Criminal IP’s Robust Domain Data for Better Malware Detection appeared first on Cybersecurity Insiders.


October 07, 2024 at 07:00PM

Sunday, October 6, 2024

DHS tracks down $ 4.3 billion ransomware payments

An official report from Homeland Security Investigations (HSI) released on October 4, 2024, reveals that department officials have tracked and recovered nearly $4.3 billion in cryptocurrency payments related to ransomware crimes over the past three years.

The Department of Homeland Security (DHS) has also successfully blocked more than 537 ransomware attacks since its establishment in 2021, according to insights from Mike Prado, the Deputy Assistant Director of Homeland Security.

Tracking blockchain transactions involving cryptocurrencies like Bitcoin and Monero has traditionally been challenging. However, as ransomware activities have increased, law enforcement agencies, in collaboration with technology firms, have developed advanced methods for tracing these digital payments. This progress has allowed HSI to recover billions in payments, offering hope to victims that their stolen funds can be reclaimed if they provide the necessary information to the cyber divisions of law enforcement.

Chainalysis, which monitors cryptocurrency flows linked to cybercrime, reports that nearly $1 billion in ransomware payments were made in crypto in 2023, with a projected 2% increase for 2024.

While cybercriminals are continually innovating their tactics, such as employing double or triple extortion strategies, they are facing greater difficulties as security and tech agencies implement proactive measures. These include establishing monitoring nodes in various countries to oversee payments linked to blacklisted states and criminal networks, ensuring that any significant transactions undergo further scrutiny.

With web traffic under constant surveillance, it has become increasingly difficult for criminals to profit from their schemes. As a result, they have begun demanding larger ransoms and targeting the same victims multiple times within a year if vulnerabilities are not addressed after an initial attack.

In related news, the Australian Department of Foreign Affairs and Trade, the UK’s Foreign, Commonwealth and Development Office, and the US Treasury have sanctioned Evil Corp, a notorious cybercrime group responsible for stealing over $100 million from banks and financial institutions in just one year through the BitPaymer ransomware. Evil Corp is believed to be a Russian-speaking gang linked to LockBit ransomware, with several of its operators arrested in the recent Operation Cronos campaign led by Europol.

The post DHS tracks down $ 4.3 billion ransomware payments appeared first on Cybersecurity Insiders.


October 07, 2024 at 10:54AM

Saturday, October 5, 2024

The Dark Side of GenAI: Cybersecurity Concerns for the Enterprise

The rapid adoption of Generative AI (GenAI) tools in both personal and enterprise settings has outpaced the development of robust security measures. The immense pressure on practitioners to quickly deploy GenAI solutions often leaves security as an afterthought. Cybersecurity experts, who prioritize the protection of data confidentiality, integrity, and availability, are increasingly raising alarms about the potential vulnerabilities of GenAI.

GenAI’s Achilles’ Heel: Where Vulnerabilities Lie

GenAI systems are susceptible to several security risks, including:

  • False Information Generation: GenAI models can be manipulated to produce misleading or inaccurate information, potentially damaging reputations or leading to poor decision-making.
  • Data Exfiltration: Malicious actors can exploit vulnerabilities in GenAI systems to extract sensitive data, posing significant risks to privacy and confidentiality.
  • Privacy Violations: The use of personal data in training GenAI models raises concerns about privacy and the potential for misuse or unauthorized access to this information.

A major challenge is the lack of transparency surrounding the maintenance, monitoring, and governance of many GenAI applications. Enterprise organizations that integrate with SaaS platforms utilizing GenAI services must thoroughly vet these providers to ensure adequate technical and security due diligence, particularly focusing on data flow monitoring.

Additionally, because GenAI has greatly reduced the difficulty in digital replication, it is much easier for threat actors to exploit voice, video and image replication. Considering the amount of digital content that exists, for both individuals and enterprises, the potential for damage to personal or business brands through manipulated digital content is a growing concern.

Both enterprise and personal users of these tools should be very concerned about the various threats posed by GenAI. In my experience, many SaaS providers are unprepared for the additional exposure these systems can create.

Traditional Defenses Fall Short

Traditional antivirus and cybersecurity products are ill-equipped to address the unique challenges posed by GenAI. These tools rely on identifying known threats through signatures, hashes, or other identifiers, which are ineffective against the constantly evolving nature of GenAI models.

The immense size and complexity of these models also make them difficult to scan for vulnerabilities unlike traditional software. Thus, new and more sophisticated security tools are required like User and Entity Behavior Analytics (UBEA) and automated model red teaming are necessary to preemptively address GenAI security risks. UBEA can help identify when a user or model is acting anomalously, and flag admins to potentially malicious activity, while automated red-teaming tools can stress test various components of GenAI services before deployment to ensure they generate appropriate content.

Navigating the GenAI Security Landscape

While leading GenAI providers like OpenAI, Google, and Microsoft are investing heavily in security, smaller vendors may not have the resources or expertise to adequately protect their systems. Therefore, it is crucial for organizations to conduct thorough security audits of their vendors and their controls.

Key areas to focus on include:

  • Data Monitoring: Ensure vendors have robust mechanisms in place to monitor and control data flow in and out of GenAI systems, including comprehensive audit records of GenAI transactions.
  • Transparency: Demand clear documentation and explanations of how GenAI models are trained, the data sets used, and any inherent biases or limitations.
  • Employee Training: Upskill employees to identify and report potential security issues related to GenAI use and misuse.

Proactive Measures for Enterprise Security

To effectively address GenAI security concerns, enterprise organizations should take a proactive approach:

1. Establish a GenAI Security Framework: Develop comprehensive policies and procedures for the secure use and management of GenAI tools.

2. Conduct Regular Security Audits: Regularly assess the security posture of GenAI vendors and their solutions.

3. Implement Continuous Monitoring: Monitor GenAI systems for anomalies and potential security breaches.

4. Invest in Advanced Security Tools: Explore and adopt innovative security tools specifically designed to address GenAI risks.

5. Foster a Culture of Security Awareness: Educate employees about GenAI security risks and promote best practices for safe usage.

By taking these steps, enterprise organizations can harness the power of GenAI while mitigating its potential risks, ensuring a secure and successful integration of this transformative technology.

 

The post The Dark Side of GenAI: Cybersecurity Concerns for the Enterprise appeared first on Cybersecurity Insiders.


October 05, 2024 at 01:04PM

Cyber Nightmare: The Haunting Reality of an Unprotected Database

Gather ’round and let us reveal a tale that will send shivers down your spine. 

Picture this: In the dark cyber realm, a shadowy figure stumbles upon a treasure trove of secrets, unguarded and exposed. A 2.2TB database left wide open, filled with the personal information of over 100 million Americans. This was not just any ordinary find; it was a Pandora’s box of digital horrors. 

This vast database, belonging to the background check company MC2 Data, held the essence of individuals’ lives—names, addresses, phone numbers, legal records, and employment histories. The leak impacted nearly one-third of the U.S. population due to a simple error: the database was unprotected without a password. 

Cybercriminals rejoiced, finding a goldmine of information ready for exploitation. Imagine the social engineering attacks possible with such details. Social engineering attacks are manipulative tactics used by cybercriminals to deceive individuals into divulging confidential information or performing actions that compromise security. The data of PrivateRecords subscribers and the individuals they had compiled information on were laid bare for such malicious actors. 

Remember the lessons this tale imparts. In the age of digital wonders, even the smallest oversight can unleash nightmares upon millions. Stay vigilant, guard your secrets well, and let this story serve as a cautionary tale for all. 

For a deeper dive into this chilling narrative and its far-reaching implications,  Clyde Williamson, Senior Product Security Architect at Protegrity, discusses the importance of data protection and privacy: 

“Looking into their background, MC2 Data owns and operates several websites like PrivateRecords.net that have access to 12 billion public records from thousands of scraped online sources. This information, taken and compiled without any knowledge or consent of those involved, is then used to create background reports. Even more concerning, MC2 Data didn’t even put data security or bare-minimum password protection to this information. So not only are there millions of Americans whose data was scraped and put together without their permission, but now it’s all out there waiting to be picked up by anyone who wants it.  

Companies like MC2 Data operate this way so they don’t have to receive personal data directly from individuals. While these types of services are often used by potential employers or loan departments, that’s not the case 100% of the time. Anyone could be using these types of services for any purpose imaginable. Unfortunately, this breach likely impacts both those who subscribed to this service and the people whose data was compiled without their consent.   

These background checks don’t just include contact information or address history, either. Instead, we’re looking at deeply personal information such as an individual’s social media profiles, family members, marital and divorce status, and much more. This breach goes beyond business checks and lands squarely as prime social engineering attack fodder for cybercriminals. 

In their hands, this type of information can easily be used to scam unsuspecting parents, siblings, friends and other people close to you into sending threat actors their whole life savings on your behalf. MC2 Data did the hard part for such criminals by amassing, storing, and then failing to protect this horde of public information – In fact, they left the door wide open for them to waltz in and take it freely and neatly.  

Regardless of whether this was an accidental move on MC2 Data’s part, or at worst a deliberate act of negligence, this incident highlights how poorly organizations understand data security despite having the means to access such vast amount of sensitive data. This failure to secure even basic authorized access is frankly alarming and highlights the inadequacy of U.S. laws in handling citizens’ data, which are not equipped for the challenges of the 21st century.   

The focus must shift from merely complying with outdated regulations to embracing the true spirit of data security, because no organization is a data Fort Knox. Our regulations need to value transparency and data de-identification with true data protection strategies like encryption and tokenization, which ensure even when data is stolen it’s useless to threat actors looking to abuse it.”

 

 

The post Cyber Nightmare: The Haunting Reality of an Unprotected Database appeared first on Cybersecurity Insiders.


October 05, 2024 at 12:19PM