Copy
Get the latest cybersecurity, privacy, and surveillance news for information security professionals

IT Security News Blast – 4-8-2021

Join us for LinkedIn Live
Take 15 minutes this morning and join Jake and Mike to go through the week of news and provide interpretation and context. 8:30AM PDT on Mike Hamilton's LinkedIn page and the CI Security YouTube channel.
 
Ziggy Ransomware Gang Offers Victims Ransom Refunds
Mike Hamilton, a former vice-chair of the Department of Homeland Security's State, Local, Tribal, and Territorial Government Coordinating Council, calls the move a publicity stunt. "The 'refunds' are probably being given to recent victims for the sake of optics," says Hamilton, who is now the CISO of CI Security. "It is not likely that this will stave off law enforcement action, but it may delay it."
https://www.govinfosecurity.com/ziggy-ransomware-gang-offers-victims-ransom-refunds-a-16354
 
Kansas Man Faces Federal Charges Over Water Treatment Hack
"I would caution that we don't have all the facts, and it is also possible that this could have been a crime of opportunity much as the Oldsmar [Florida] water event is thought to have been," Hamilton, now the CISO of CI Security, says. "The fact that Travnichek 'allegedly shut down certain processes' does not indicate a knowledge of any effect from the actions and does not indicate malice of intent.
https://www.bankinfosecurity.com/kansas-man-faces-federal-charges-over-water-treatment-hack-a-16328
 
Healthcare Phishing Incidents Lead to Big Breaches
Among the apparent phishing-related incidents most recently reported to federal regulators were breaches experienced by Bethesda, Maryland-based Centers for Advanced Orthopaedics; the Cancer Treatment Centers of America at Midwestern Regional Medical Center in Zion, Illinois; and Addison, Texas-based BW Homecare Holdings, which does business under the name Elara Caring.
https://www.govinfosecurity.com/healthcare-phishing-incidents-lead-to-big-breaches-a-16339
 
How healthcare can fight cyber crime
And yet, tighter access control, better network design, and more layers of security software such as encryption and endpoint security only get organisations so far. A comprehensive approach to security must also take account of take account of human behaviour, using technical controls as baselines backed up with a long-term commitment to user training to resist common attacks.
https://www.information-age.com/how-healthcare-can-fight-cyber-crime-123494611/
 
Data breach disclosures drop in 2020, report says
The report also found that, since 2011, 42 percent of cyber-security incidents disclosed have not specified the type of attack used to penetrate the company’s systems. In 2020, 10 percent of breach disclosures did not specify the type of breach, down from 16 percent in 2019 and 29 percent in 2018.
https://www.complianceweek.com/cyber-security/data-breach-disclosures-drop-in-2020-report-says/30234.article
 
Half a billion LinkedIn users have scraped data sold online
As proof that the information is valid, the seller is offering two million entries for about $2 worth of forum credits. CyberNews analyzed the sample and confirmed that it’s legitimate. However, it remains unsure if this is freshly stolen information, or if it’s just aggregated data from previous breaches.
https://www.techradar.com/news/half-a-billion-linkedin-users-have-scraped-data-sold-online
 
How a VPN vulnerability allowed ransomware to disrupt two manufacturing plants
Ransomware operators shut down two production facilities belonging to a European manufacturer after deploying a relatively new strain that encrypted servers that control manufacturer's industrial processes, a researcher from Kaspersky Lab said on Wednesday.
https://arstechnica.com/information-technology/2021/04/ransomware-shuts-down-production-at-two-manufacturing-plants/
 
HSB Cyber Survey Finds Connected Car Tech Makes Consumers Uneasy
One in ten consumers reported a hacking incident or other cyber-attack had affected their vehicle, up three percent from a similar HSB poll the year before. As connected technology continues to advance, some are concerned not only that their vehicle could be hacked, but also controlled by others remotely.
https://www.oaoa.com/news/business/hsb-cyber-survey-finds-connected-car-tech-makes-consumers-uneasy/article_3dc8dbbe-23b0-5b3a-8910-064c73d33022.html
 
Why Didn't Government Detect SolarWinds Attack?
"Signature-based intrusion detection and intrusion prevention systems are largely limited to detecting previously seen threats - they are ineffective at identifying or blocking sophisticated and novel attacks like the SolarWinds hack[.]" As this committee warned nearly five years ago, 'Current reliance on decades old signature-based detection technology limits the effectiveness of Einstein against advanced persistent threats.'"
https://www.govinfosecurity.com/didnt-government-detect-solarwinds-attack-a-16359
 
Experts Torn on Role of National Cyber Director
“There are some things that structurally the National Security Council is not really well set up to do, and two of them, in particular, are interacting with the private sector and interacting with Congress, which is actually something that you very much need to be doing in cybersecurity policy[.]”
https://www.nextgov.com/cybersecurity/2021/04/cyber-experts-torn-role-national-cyber-director/173202/
 
Should cyberwar be met with physical force? Moral philosophy can help us decide
Given how cyber systems can be weaponised, it seems natural for ethicists to build “cyberwar” into existing just war theory. [...] Radicals, meanwhile, believe cyberwar requires a wholesale rethink, and are building an entirely new theory of “just information war”.
https://theconversation.com/should-cyberwar-be-met-with-physical-force-moral-philosophy-can-help-us-decide-158463
 
India trying to counter China's huge cyber-attack capability
Experts say India needs a full-fledged Cyber Command for full-spectrum warfare, like the US and somem other countries, because China has assiduously developed cyber-weapons to degrade or destroy an adversary's military assets and strategic networks as well as energy, banking, transport, and communication grids.
https://timesofindia.indiatimes.com/india/india-trying-to-counter-chinas-huge-cyber-attack-capability-cds/articleshow/81956851.cms
 
Apple to start enforcing new app privacy notifications in coming weeks
The one-time notices will require an app developer to ask a user's permission before the app tracks activities "across other companies' apps and websites." Digital advertising industry experts have said the warning could cause many users to decline permission.
https://telecom.economictimes.indiatimes.com/news/apple-to-start-enforcing-new-app-privacy-notifications-in-coming-weeks/81953555
 
Bug allows attackers to hijack Windows time sync software used to track security incidents
Adam Nichols, principal of software security at GRIMM, said security pros should take note because any disruption to the time synchronization software could make it virtually impossible to track a security incident – and any sequence of events that are important to the business or regulators.
https://www.scmagazine.com/home/security-news/bug-allows-attackers-to-hijack-windows-time-sync-software-used-to-track-security-incidents/
 
Crime Service Gives Firms Another Reason to Purge Macros
The service, known as EtterSilent, has rapidly become popular among cybercrime groups and allows attackers to create Word files that pose as DocuSign documents but, in reality, can compromise systems using either macros or by exploiting a known vulnerability.
https://www.darkreading.com/threat-intelligence/crime-service-gives-firms-another-reason-to-purge-macros/d/d-id/1340595
 
APT Group Using Voice Changing Software in Spear-Phishing Campaign
“APT-C-23 has been observed impersonating women to engage victims in conversations. As the conversations continue, the group sends video laden with malware to infect the target’s system,” Cado Security said. While analyzing a publicly exposed server pertaining to the hacking group, Cado Security researchers identified an archive containing photos from the Instagram account of a female model, along with the installation for the voice changing application Morph Vox Pro.
https://www.securityweek.com/apt-group-using-voice-changing-software-spear-phishing-campaign
 
Chinese Hackers Selling Intimate Stolen Camera Footage
That’s according to the South China Morning Post, which reported that the cost of each “tape” varies, depending on how salacious the material is — nudity and sex acts can fetch around $8 a piece, while just watching someone in a hotel room might just run around $3, the paper said.
https://threatpost.com/chinese-hackers-intimate-camera-footage/165281/
 

You are receiving this email because you are subscribed to receive the IT Security Daily Blast email from Michael Hamilton, Founder, President, and CISO of CI Security, formerly Critical Informatics.

Archived articles are available at https://ci.security/news/daily-news.

CI Security and the CI Security logo are the trademarks of CI Security, Inc. All other brand names, trademarks, service marks, and copyrights are the property of their respective owners.

© 2020 CI Security. All rights reserved.


 

CI Security

245 4th St, Suite 405  Bremerton, WA   98337

About Us   |   CI Security News   |   Contact Us 


We host NEVER BORING free security awareness training every other Friday.
Register and/or send your colleagues and friends. Let's educate users together! 

Add this Email to Your Address Book





unsubscribe