Reading view

There are new articles available, click to refresh the page.

Ransomware Strikes U.S. Non-profit Blood Center ‘OneBlood’

OneBlood, Blood Donation, Ransomware

A ransomware attack is impacting the software system of OneBlood, a blood donation non-profit that serves hundreds of hospitals in the southeastern U.S. "Our team reacted quickly to assess our systems and began an investigation to confirm the full nature and scope of the event. Our comprehensive response efforts are ongoing and we are working diligently to restore full functionality to our systems as expeditiously as possible,” said Susan Forbes, OneBlood senior vice president of corporate communications and public relations.

OneBlood Reverts to Manual Processes

OneBlood said it continues to collect, test and distribute blood, but its operations are at "a significantly reduced capacity." The non-profit has implemented manual processes and procedures as a business continuity plan and to remain operational. But these processes take significantly longer to perform and impacts inventory availability. "In an effort to further manage the blood supply we have asked the more than 250 hospitals we serve to activate their critical blood shortage protocols and to remain in that status for the time being,” said Forbes. The national blood community is assisting OneBlood and the hospitals and patients it serves to manage the flow of supplies. Blood centers across the country are also lending a helping hand by sending sending blood and platelets to OneBlood. The AABB Disaster Task Force is coordinating national resources to assist with additional blood products being sent to OneBlood. OneBlood said that all blood types are needed, but there is a more urgent requirement for O Positive, O Negative and Platelet donations, at the moment, as these are universal donor groups and are medically considered safe for all patients. “The blood supply cannot be taken for granted. The situation we are dealing with is ongoing. If you are eligible to donate, we urge you to please make an appointment to donate as soon as possible,” Forbes said.

Similar to Ransomware Attack on NHS England

A similar ransomware incident impacted two major London hospitals in June, which disrupted its blood sampling operations and reduced testing volume by 96%. The two hospitals are still reeling through the aftermath of the ransomware attack from Russian Qilin ransomware actors nearly two months later, with thousands of surgeries and emergency operations postponed or being shifted to other facilities. As seen in the case of OneBlood, the NHS at the time made a similar O blood group donation request as the attack caused significant disruption on the hospitals’ ability to match patients’ blood types. It is not clear if the two attacks are linked. Editors Note: This is an evolving situation and the article will be updated with any additional information.

Meta Will Pay Record $1.4 Billion to Settle Texas Facial Recognition Lawsuit

Meta facial recognition lawsuit settlement in Texas

Meta Platforms Inc. has reached a record $1.4 billion settlement with the state of Texas to resolve a privacy lawsuit that alleged the tech giant misused facial biometric data without user consent.

The Meta facial recognition lawsuit settlement, the largest secured by a single state, comes after years of scrutiny over Meta’s data practices. In 2021, the company, formerly known as Facebook, agreed to pay $650 million to settle a similar case brought by Illinois residents.

Meta Facial Recognition Lawsuit Settlement Sets Record

“After vigorously pursuing justice for our citizens whose privacy rights were violated by Meta’s use of facial recognition software, I’m proud to announce that we have reached the largest settlement ever obtained from an action brought by a single State,” said state Attorney General Ken Paxton. “This historic settlement demonstrates our commitment to standing up to the world’s biggest technology companies and holding them accountable for breaking the law and violating Texans’ privacy rights. Any abuse of Texans’ sensitive data will be met with the full force of the law.”

Meta said it was pleased to resolve the matter and looks forward to expanding its business in Texas. However, the company's stock price, which opened the day at $467, fell to a low of $457 after the lawsuit deal announcement before rebounding.

The record $1.4 billion settlement is unlikely to weigh a lot on Meta’s business since the California-based tech giant made a profit of $12.37 billion in the first three months of this year on revenue of $36.46 billion, an increase of 27% from a year earlier. Meta is scheduled to report its second-quarter earnings results on Wednesday.

The Texas lawsuit, filed in 2022, accused Meta of violating a state law prohibiting the collection and sale of biometric information, such as facial and fingerprint data, without explicit user permission.

In 2020 - when the company was known as Facebook - Meta settled a similar lawsuit with the state of Illinois for $650 million where the tech giant allegedly used photo face-tagging and other biometric data without the permission of its users. U.S. district judge James Donato approved the deal at the time in a class-action lawsuit that was filed in Illinois in 2015.

Facebook Face Recognition System and Data Deleted in 2021

In response to growing privacy concerns, Meta discontinued its face recognition system in 2021 and deleted billions of facial templates. However, the company faced criticism for previously enabling the feature by default.

Paxton has also filed a similar lawsuit against Google, alleging the company collected biometric data through its products and services. That case is ongoing.

Threat Intelligence Visibility for CEOs: A Roadmap to Strategic Defense

Threat Intelligence visibility for CEOs, Threat Intelligence, Cyber Threat Intelligence,

Threat intelligence visibility for CEOs is a top priority and not just a need, why?

In today’s complex threat landscape, chief executive officers increasingly recognize the pivotal role of threat intelligence in safeguarding their organizations. However, effectively integrating threat intelligence into the broader business strategy remains a challenge for many. This article delves into key approaches CEOs can adopt to enhance threat intelligence visibility and transform it into a strategic asset.

Understanding the Importance of Threat Intelligence Visibility for CEOs

Before diving into specific strategies, it’s crucial to understand why threat intelligence visibility is paramount for CEOs.

  • Risk mitigation: Comprehensive visibility into potential threats empowers CEOs to make informed decisions about risk management strategies.
  • Decision making: Threat intelligence can provide actionable insights that drive strategic business decisions.
  • Competitive advantage: By proactively addressing threats, organizations can gain a competitive edge.
  • Reputation protection: Early detection and response to threats can safeguard an organization’s reputation.

Key Approaches to Integrating Threat Intelligence

1. Establish a Clear Threat Intelligence Framework

  • Define threat landscape: Clearly articulate the organization’s potential threats, including cyber, physical, and reputational risks.
  • Identify key stakeholders: Determine which departments and individuals require threat intelligence to perform their roles effectively.
  • Establish data sharing protocols: Develop a robust system for collecting, analyzing, and sharing threat intelligence across the organization.

2. Foster a Culture of Threat Awareness

  • Executive education: Provide CEOs and senior leadership with regular briefings on the threat landscape and the importance of threat intelligence.
  • Employee training: Implement training programs to enhance threat awareness among employees at all levels.
  • Incident response drills: Conduct simulated attacks to test the organization’s preparedness and identify areas for improvement.

3. Leverage Advanced Analytics and Automation

  • Data-driven insights: Utilize advanced analytics tools to uncover hidden patterns and trends within threat data.
  • Automation: Automate routine threat intelligence tasks to free up analysts for strategic analysis.
  • Real-time monitoring: Implement systems for continuous monitoring of the threat landscape.

4. Build Strong Partnerships

  • Intelligence sharing: Collaborate with industry peers, government agencies, and cybersecurity firms to share threat information.
  • Third-party providers: Leverage commercial threat intelligence services to supplement internal capabilities.
  • Managed security service providers (MSSPs): Consider outsourcing threat intelligence functions to specialized providers.

5. Integrate Threat Intelligence into Business Processes

  • Risk assessment: Incorporate threat intelligence into risk assessment processes to identify vulnerabilities.
  • Decision making: Use threat intelligence to inform strategic decisions, such as market entry, supply chain management, and mergers and acquisitions.
  • Incident response: Leverage threat intelligence to accelerate incident response and minimize damage.

Measuring the Impact of Threat Intelligence

To demonstrate the value of threat intelligence to the board and stakeholders, it’s essential to measure its impact. Key metrics include:

  • Threat detection rate: This metric measures the percentage of threats successfully identified by your threat intelligence system. To calculate this, divide the number of threats detected by the total number of threats that occurred. A high detection rate indicates effective threat intelligence.
  • Time to detection: This metric measures the average time it takes to identify a threat from the moment it appears in the environment. A shorter time to detection allows for quicker response and mitigation efforts. Tracking this metric can help identify areas where threat intelligence processes can be improved.
  • Mean time to respond (MTTR): This metric measures the average time it takes to contain a threat after it has been detected. A lower MTTR indicates a more efficient incident response process. By analyzing MTTR, organizations can identify bottlenecks and areas for improvement in their response capabilities.
  • Cost avoidance: This metric estimates the financial savings achieved by preventing threats through the use of threat intelligence. While it can be challenging to quantify precisely, calculating the potential impact of a successful attack and comparing it to the cost of threat intelligence implementation can provide a rough estimate of cost avoidance. This metric helps demonstrate the return on investment (ROI) of threat intelligence initiatives.

By tracking and analyzing these metrics, organizations can gain insights into the effectiveness of their threat intelligence program, identify areas for improvement, and communicate the value of threat intelligence to stakeholders.

Conclusion

By following these approaches, CEOs can significantly enhance threat intelligence visibility and transform it into a strategic asset. However, to ease their work cyber threat intelligence services from a reputable cybersecurity firm like Cyble, who not only provide CTI but industry specific solutions that includes finance, healthcare and pharmaceuticals, retail, technology and education.

These services typically involve continuous scanning, real-time alerts, and expert analysis of potential threats. Incorporate Cyble’s award-winning AI-Powered cyber threat intelligence platform and leverage threat intelligence feeds to enhance your organization’s cybersecurity posture.

Remember, threat intelligence is an ongoing process that requires continuous adaptation to the evolving threat landscape. By investing in this critical capability, organizations can build a stronger security posture and achieve long-term success.

Discover more by scheduling a demo today!

Ransomware Actors Exploit VMware ESXi Hypervisor Bug: Microsoft

VMware ESXi bug

Microsoft researchers have observed multiple ransomware operators exploiting a recently patched vulnerability in ESXi hypervisors to gain full administrative control over domain-joined ESXi servers. This flaw, tracked as CVE-2024-37085, grants these threat actors the ability to encrypt file systems and disrupt critical virtual machines. ESXi hypervisors, bare-metal hypervisors directly installed onto physical servers, host virtual machines essential to network operations. Gaining administrative permissions on these hypervisors gives ransomware operators the leverage to halt operations and potentially exfiltrate data.

How Ransomware Gangs are Exploiting the VMware ESXi Bug

The vulnerability resides in a domain group named “ESX Admins.” By default, any member of this group receives full administrative access to the ESXi hypervisor, without proper validation. This group doesn’t exist by default in Active Directory, yet ESXi hypervisors treat it as a legitimate admin group if created. Microsoft disclosed this flaw to VMware via Coordinated Vulnerability Disclosure (CVD), leading VMware to release a security update. Microsoft advises ESXi server admins to apply these updates immediately to safeguard their systems. Ransomware operators like Storm-0506, Storm-1175, Octo Tempest, and Manatee Tempest have already leveraged this technique. These operators have deployed ransomware such as Akira and Black Basta in numerous attacks, exploiting this vulnerability to create the “ESX Admins” group and adding themselves to it, thus gaining elevated privileges. [caption id="attachment_84465" align="aligncenter" width="1024"]ESXi Storm-0506 attack chain (Source: Microsoft)[/caption] Further analysis revealed multiple methods to exploit this vulnerability. Threat actors could create the “ESX Admins” group, rename existing groups, or manipulate privilege refreshes to maintain control. Even when admins assign different groups for management, the hypervisor may still recognize the “ESX Admins” group, allowing continued exploitation. In one incident, Storm-0506 used this flaw to deploy Black Basta ransomware against a North American engineering firm. The attackers first gained access via a Qakbot infection, then escalated privileges using another Windows vulnerability (CVE-2023-28252). With tools like Cobalt Strike and Pypykatz, they stole domain admin credentials, moved laterally across the network, and created the “ESX Admins” group to control the ESXi hypervisors. This breach resulted in the encryption of the ESXi file system and disruption of hosted virtual machines. Although the attackers also targeted non-ESXi devices with PsExec, Microsoft Defender Antivirus thwarted these attempts on protected devices.

How to Mitigate these Attacks Against ESXi Servers

Hypervisors have become a preferred choice of target in the past few years for ransomware operators because of the following factors:
  1. Many security products have limited visibility and protection for an ESXi hypervisor.
  2. Encrypting an ESXi hypervisor file system allows one-click mass encryption, as hosted VMs are impacted. This could provide ransomware operators with more time and complexity in lateral movement and credential theft on each device they access.
To mitigate such attacks, Microsoft recommends organizations follow several protective measures. Key steps include:
  1. Install Security Updates: Apply VMware’s latest security updates on all domain-joined ESXi hypervisors. If updates are not feasible, validate and harden the “ESX Admins” group, deny access through ESXi settings, or change the admin group.
  2. Credential Hygiene: Enforce multifactor authentication (MFA), adopt passwordless methods, and separate privileged accounts from regular productivity accounts. This minimizes the risk of privilege escalation by threat actors.
  3. Monitor and Detect: Implement custom detections in extended detection and response (XDR) or security information and event management (SIEM) systems for new group names. Ensure ESXi logs are sent to a SIEM for monitoring suspicious activities.
  4. Protect Critical Assets: Regularly update and monitor critical assets like ESXi hypervisors and vCenters. Ensure robust backup and recovery plans are in place to mitigate potential disruptions.
Microsoft continues to emphasize the importance of collaboration among researchers, vendors, and the security community. Sharing intelligence and advancing defenses is crucial to protect users and organizations from evolving threats.

France Under Siege: Widespread Fiber Optic Cable Sabotage Disrupts Telecom Network

Eiffel Tower Paris

A coordinated attack on fiber optic cables disrupted multiple telecommunication services in France overnight. Major providers, including SFR, Free, and Alphalink, reported network outages and degraded performance, impacting both fixed-line and mobile users.

The fiber optic cable sabotage incident, described as "vandalism" by authorities, occurred in several regions across the country. While the capital, Paris, was spared, the timing of the attack during the Olympic Games has raised concerns about potential security threats.

Fiber Optic Cable Sabotage Causes 'Extensive Damage'

SFR, France's second-largest telecom operator, confirmed extensive damage to its long-distance cables. "Our long-distance fiber optic network was the victim of acts of vandalism last night in several departments. Disruptions may remain in the most impacted areas. All our teams are mobilized to allow you to connect again with those and what are essential to you," the telecom operator said.

Data from NetBlocks, an internet traffic monitoring service, showed disruptions to multiple internet providers in France, including Adista, Alphalink and Free.

[caption id="attachment_84414" align="aligncenter" width="1024"]Fiber Optic Cable Sabotage, France Source: NetBlocks.org[/caption]

Local media reported similar attacks on Bouygues Telecom infrastructure. The perpetrators, believed to be highly organized, targeted remote locations with precision. "This is an unprecedented attack on our digital backbone," declared a spokesperson for the French Ministry of the Interior. "The scale and precision of the operation indicate a high level of sophistication."

French National Security Concerns Grow

While the motive behind the sabotage remains shrouded in mystery, the attack has raised concerns about national security. "Disrupting communications can have a cascading effect on other critical systems," said a spokesperson for the French intelligence agency. "We are working closely with our partners to investigate this matter."

French police told AFP news agency that the incident occurred in six areas of France. Paris, the current host of the Olympic Games, wasn’t affected.

"The cables were located in places that are little known to the general public and that required precise information. They were likely damaged by highly equipped and organized individuals," the reports said.

France's Minister of State for Digital Transition, Marina Ferrari, strongly condemned the act, emphasizing that telecom operators were working diligently to restore services. "I condemn in the strongest terms these cowardly and irresponsible acts," Ferrari said.

The sabotage incident comes on the heels of coordinated attacks on France's high-speed railway, SNCF, last week. Authorities suspect far-left extremist groups may be responsible for both incidents, given their deliberate and targeted nature.

France on High Alert

France has been on high alert due to the Olympic Games, with increased security measures in place. The sabotage of critical infrastructure highlights the vulnerability of essential services to physical attacks.

Meanwhile, a similar incident occurred in Finland, where a cell phone tower was toppled, disrupting mobile services for Elisa customers. While authorities investigate the cause, vandalism is a suspected motive.

The interconnectedness of these attacks raises questions about potential links between the incidents. As investigations unfold, the world watches closely for updates on this developing situation.

4.3 Million Individuals Affected by HealthEquity Data Breach

HealthEquity, HealthEquity Data Breach, Data Breach

Draper, Utah-based HealthEquity, a prominent financial technology and business services company, has confirmed a significant data breach affecting millions of individuals. The breach, discovered in March and confirmed in June 2024, involved unauthorized access to sensitive personal information (PII) of 4.3 million people, including 13,480 Maine residents.

How the HealthEquity Data Breach Occurred

According to an SEC filing, HealthEquity detected anomalous activity on a personal device belonging to a business partner. Subsequent investigation revealed that the partner's user account had been compromised, allowing unauthorized access to information, including personally identifiable information (PII) and protected health information (PHI) for some members.

"The investigation did not find placement of malicious code on any Company systems. There has been no interruption to the Company’s systems, services, or business operations," HealthEquity said at the time in its 8-K filing with the U.S. Securities and Exchange Commission.

The investigation concluded that data was exfiltrated from the partner's systems.

What Information Was Exposed?

The compromised data primarily consisted of account signup information and details related to benefits administered by HealthEquity. While the specific information varied for each individual, it could include:

  • Name
  • Employee ID
  • Employer
  • Address
  • Telephone number
  • Social Security number
  • Dependent contact information

It's crucial to note that payment card numbers and HealthEquity debit card information were not affected by the breach.

HealthEquity Breach Impact on Individuals

The exposure of personal information can have severe consequences for affected individuals. This includes an increased risk of identity theft, financial fraud, and other forms of cybercrime.

HealthEquity has acknowledged the gravity of the situation and has offered two years of complimentary credit identity monitoring, insurance, and restoration services to all impacted individuals.

Protecting Yourself After a Data Breach

While HealthEquity is providing support, it's essential for affected individuals to take proactive steps to protect themselves. These measures include:

  • Closely monitoring credit reports: Check for any unauthorized activity and dispute errors promptly.
  • Being cautious of suspicious emails and calls: Avoid clicking on links or providing personal information in response to unsolicited communications.
  • Consider a credit freeze: This prevents new credit accounts from being opened without your explicit authorization.

Potential Causes of the Breach

While HealthEquity has confirmed that the breach involved a vendor's user accounts with access to a SharePoint data storage location, the exact cause of the compromise remains under investigation. Possible factors contributing to the breach could include:

  • Weak password security: Inadequate password practices by vendor employees could have facilitated unauthorized access.
  • Phishing attacks: Malicious emails designed to trick users into revealing login credentials may have been successful.
  • Insider threats: A disgruntled or compromised employee with access to sensitive information could be responsible.
  • Third-party vulnerabilities: Weaknesses in the vendor's security infrastructure or software could have been exploited.

HealthEquity's Response and Next Steps

HealthEquity has taken steps to strengthen its security environment and has assured investors that the incident is not expected to have a material adverse effect on its business. The company is in the process of notifying affected individuals and partners, and is evaluating potential remediation expenses and liabilities.

Coinbase’s UK Arm Fined £3.5 Million for Lax Anti-Money Laundering Controls

Coinbase, FCA, Fine

In a groundbreaking move that underscores the escalating scrutiny of cryptocurrency exchanges, UK financial regulators have slapped a first of its kind £3.5 million (approximately $4.5 million) fine on Coinbase’s UK arm, CB Payments Ltd., for egregious failures in anti-money laundering controls. The Financial Conduct Authority (FCA) found that CBPL, despite repeated warnings, allowed billions of dollars to flow through its platform with minimal oversight. "CBPL's controls had significant weaknesses and the FCA told it so, which is why the requirements were needed. CPBL, however, repeatedly breached those requirements," FCA said in a statement on Thursday. "This increased the risk that criminals could use CBPL to launder the proceeds of crime. We will not tolerate such laxity, which jeopardises the integrity of our markets."

A Watershed Moment for Cryptocurrency Regulation

The FCA’s action marks a watershed moment in the regulation of cryptocurrencies. It signals a growing determination by regulators worldwide to impose stringent controls on the industry to combat financial crime. CBPL, which acted as a gateway for customers to access Coinbase’s crypto trading platform, was under a strict order to improve its financial crime controls since 2020. Yet the company continued to onboard high-risk customers and failed to effectively monitor for suspicious transactions.

The findings from FCA are damning. Between 2020 and 2023, CBPL processed approximately £19.6 million in deposits from 13,416 high-risk customers, which were then used to execute crypto transactions worth around £178 million. Despite flagging just 62 suspicious transactions, the company allowed millions more in potentially illicit funds to slip through its net. The regulator contends that CBPL’s failures created a significant opportunity for criminals to launder money.

"Combating the laundering of funds through the financial services sector is an issue of international importance, and forms part of the Authority’s operational objective of protecting and enhancing the integrity of the UK financial system," FCA said.

Authorised firms are at risk of being abused by those seeking to launder money and firms that conduct payment services and/or those which facilitate trading in cryptoassets may be at particular risk. As a result, it is imperative that such firms maintain robust systems and controls to identify and mitigate the risk of their businesses being used in this way."

Coinbase clarified that the investigation only focused on unintentional breaches of a voluntary agreement (VREQ) between the FCA and CBPL in late 2020.

"In the VREQ, CBPL agreed to restrictions in the onboarding of certain high-risk customers to CBPL, where we provide e-money and payment services," Coinbase said. However, CBPL unintentionally onboarded some customers (representing 0.34% of customers on-boarded) who were classified as "high-risk" under the terms of the VREQ, which led to the FCA's investigation and subsequent action.

The initial monitoring of compliance by the product, engineering and design team within the Coinbase Group, was "inadequate" and the probable cause of this shortcoming, the FCA noted. "This meant that repeated and material breaches of the CBPL VREQ went undiscovered for almost 2 years," the financial regulator said.

Response from Coinbase

"We take the FCA’s findings and our broader regulatory compliance very seriously and CBPL continues to proactively enhance its controls to ensure compliance with its regulatory obligations," the crypto trading platform said in response. "Coinbase remains committed to high standards of regulatory compliance, and this means partnering with regulators when it comes to compliance and other areas. We are always willing to acknowledge when we fall short, and to make improvements – which is what we have done here."

The firm qualified for a 30% discount on the original £5,003,646 (about $6.4 million) fine, the FCA said. Coinbase has agreed to resolve the matter. This action marks the first-of-its-kind FCA enforcement taken under the UK Electronic Money Regulations 2011.

OpenAI’s SearchGPT: A Game Changer or Pandora’s Box for Cybersecurity Pros?

SearchGPT, OpenAI, Sam Altman

OpenAI is throwing its hat into the AI search ring with SearchGPT, a prototype designed to revolutionize how users find information online. This novel tool promises faster, more relevant results by combining the power of AI models with real-time web data.

But for cybersecurity professionals accustomed to navigating a minefield of misinformation and disinformation, SearchGPT raises intriguing questions about its potential impact on the online threat landscape.

"We think there is room to make search much better than it is today." - Sam Altman, CEO of OpenAI

Boosting Efficiency or Amplifying Disinformation?

As noted by the Russian-American computer scientist and podcaster Lex Fridman, it's been a "crazy week" for all things AI.

First Elon Musk announced a push for Grok 2 and 3, then Meta released Llama 3.1, which was further topped by Mistral AI, whose Mistral Large 2 release yesterday reportedly beats Llama's latest version on code and math. DeepMind AI on Wednesday scored a silver medal standard at solving an International Math Olympiad problem. And just as the AI pundits were gasping for breath from this week's thrill ride, OpenAI on Thursday morning announced its competitor to Google and Perplexity AI search engines, called SearchGPT.

SearchGPT claims the ability to directly answer user queries with up-to-date information and clear source attribution. "We believe that by enhancing the conversational capabilities of our models with real-time information from the web, finding what you’re looking for can be faster and easier," OpenAI said.

This streamlined approach could significantly reduce the time spent sifting through irrelevant search results, a boon particularly for security practitioners who are constantly battling information overload. However, concerns linger about the model's ability to discern trustworthy sources from malicious ones. Disinformation campaigns are a growing scourge in the cyber realm, and AI-powered search engines could inadvertently amplify their reach if not carefully calibrated.

Transparency and Trust: Cornerstones of AI Search Security

To earn the trust of cybersecurity professionals, SearchGPT must prioritize transparency in its source selection and ranking algorithms. Clear explanations of how the model prioritizes information and identifies reliable sources will be crucial. Furthermore, the ability for users to refine searches based on specific criteria like publication date or source credibility will empower security personnel to make informed decisions about the information they consume.

A Symbiotic Relationship with Publishers

Several media and news outlets, including the New York Times, have sued OpenAI in recent months over alleged copyright violations. They argue that OpenAI illegally trained its AI models on their published work without consent or compensation. This led to profits for the company from protected and plagiarized material. OpenAI has dismissed these claims, saying it all falls under “fair use.”

But to avoid similar issues in the future, the company, in training the latest SearchGPT model, has partnered with The Atlantic and News Corp.

"We’ve partnered with publishers to build this experience and continue to seek their feedback. In addition to launching the SearchGPT prototype, we are also launching a way for publishers to manage how they appear in SearchGPT, so publishers have more choices," OpenAI said. "Importantly, SearchGPT is about search and is separate from training OpenAI’s generative AI foundation models. Sites can be surfaced in search results even if they opt out of generative AI training."

Robert Thomson, chief executive at News Corp., said, “Sam and the truly talented team at OpenAI innately understand that for AI-powered search to be effective, it must be founded on the highest-quality, most reliable information furnished by trusted sources. For the heavens to be in equilibrium, the relationship between technology and content must be symbiotic and provenance must be protected.”

“AI search is going to become one of the key ways that people navigate the internet, and it's crucial, in these early days, that the technology is built in a way that values, respects, and protects journalism and publishers. We look forward to partnering with OpenAI in the process, and creating a new way for readers to discover The Atlantic,” said Nicholas Thompson, CEO of The Atlantic.

OpenAI's commitment to partnering with publishers is a positive step. By ensuring that high-quality content from reputable sources is prominently displayed, SearchGPT would be able to contribute to a more secure information ecosystem. Additionally, publisher controls over how their content appears within the tool offer a level of control essential for maintaining trust and data integrity. It remains to be seen how well the search tool filters out misinformation, but for now, it's a start.

The Learning Curve: Feedback and Open Communication

OpenAI's proactive approach in seeking feedback on its SearchGPT model from the community is commendable. By fostering open communication and actively incorporating security expertise into the development process, the potential risks associated with SearchGPT can be mitigated. Utilizing the prototype as a learning platform to understand how malicious actors might exploit the AI search engines will be key to ensuring its long-term viability in the cybersecurity landscape.

The Final Verdict: A Promising Future, But Vigilance is Key

SearchGPT presents a compelling vision for a future where finding accurate and relevant information online is a seamless experience. For cybersecurity professionals, the potential benefits of enhanced efficiency and streamlined research are undeniable.

However, ensuring the tool doesn't become a breeding ground for misinformation requires a focus on transparency, source credibility, and ongoing collaboration with the security community as well. OpenAI's follow-through on these principles will determine whether SearchGPT becomes a valuable asset or a significant new challenge in the cybersecurity's mis- and dis-information landscape.

The SearchGPT prototype is currently available to only a select few and has a waitlist. "We will learn from the prototype, make it better, and then integrate the tech into ChatGPT to make it real-time and maximally helpful," Altman said.

Google Chrome’s New Defenses Against Malicious Downloads

Malicious Downloads, Google Chrome, Chrome

Chrome has quietly bolstered its defenses against malicious downloads, leveraging AI and user behavior insights to thwart a growing array of threats.

Google's browser has introduced a more nuanced warning system, distinguishing between "suspicious" and "dangerous" files, and automating deep scans for enhanced protection of users. The move aims to pre-empt threats like cookie theft malware hidden within encrypted archives.

The latest changes were introduced after Chrome recently updated its user interface. "Taking advantage of the additional space available in the new downloads UI, we have replaced our previous warning messages with more detailed ones that convey more nuance about the nature of the danger and can help users make more informed decisions," Google's security team said.

[caption id="attachment_83625" align="aligncenter" width="500"] Differentiation between "Suspicious" and "Dangerous" warnings (Source: Google Security Blog)[/caption]

Chrome Gets AI, Machine Learning, Deep Scans

By leveraging AI and machine learning, Chrome offers more granular warnings, automatic deep scans, and protections against encrypted archive-based attacks.

The redesigned download experience offers more than just aesthetic improvements. It’s a tactical shift in Google’s defense strategy. By providing detailed warnings, Chrome hopes to empower users to make informed decisions about file downloads. The two-tier warning system, backed by AI-powered malware verdicts from Google Safe Browsing, adds granularity to threat assessments.

The results are tangible: fewer ignored warnings and quicker responses to threats.

Enhanced Protection Against Malicious Downloads

A particularly intriguing development is the expansion of automatic deep scans for Enhanced Protection users. While this might sound like a minor tweak, it's a significant step forward. By proactively scanning suspicious files, Chrome can catch never-before-seen malware and disrupt attack chains early. The claim that files sent for deep scanning are over 50 times more likely to be flagged as malware underscores the efficacy of this approach.

However, attackers are not standing still. A disturbing trend involves packaging malware in encrypted archives, a technique that evades traditional detection methods. Chrome counters this by prompting users to enter passwords for suspicious archives. While this adds a layer of complexity, it's a necessary evil to prevent the spread of concealed threats.

[caption id="attachment_83624" align="aligncenter" width="500"] Prompt to enter a file password to send an encrypted file for a malware scan (Source: Google Security Blog)[/caption]

Chrome Standard Protections

For users on the default Standard Protection mode, Chrome offers a more limited, but still valuable, defense. It prompts password entry for suspicious encrypted archives, but instead of sending the file for deep scanning, it merely checks the archive's metadata against known threats. While this approach is less robust, it provides a baseline of protection for the majority of users.

Chrome’s enhanced download protections represent a significant stride in the ongoing battle against malware. By combining AI-driven analysis, user education, and proactive defense, Google has created a formidable barrier against malicious downloads.

While these enhancements are commendable, the evolving threat landscape demands continuous innovation. As Google's Threat Analysis Group and security researchers worldwide uncover new tactics, Chrome must adapt accordingly. The success of these new defenses will ultimately be determined by their ability to stay ahead of a relentless adversary.

FTC Fires Warning Shot at Surveillance Pricing

Surveillance Pricing, FTC, Federal Trade Commission

In a move that could reshape the digital advertising landscape, the Federal Trade Commission has issued orders to eight major companies involved in surveillance pricing. These firms - which include tech giants and financial institutions leveraging advanced algorithms, AI, and troves of personal data - are accused of creating a shadowy ecosystem where consumers may be charged different prices based on their digital footprints.

The FTC’s action shines a spotlight on a growing concern: that personal data, once thought to be a digital currency, is now being weaponized for profit. By demanding detailed information about these practices, the commission aims to understand how deeply surveillance pricing has penetrated the market and its potential impact on consumers.

Why FTC is Looking into Surveillance Pricing

Surveillance pricing is a practice where companies use personal data to set individualized prices for products and services. FTC's latest move signals a major escalation in the agency’s battle against not just surveillance pricing, but the overall ecosystem of data brokers and digital surveillance.

Eight companies - Mastercard, Revionics, Bloomreach, JPMorgan Chase, Task Software, PROS, Accenture, and McKinsey & Co. - have been served with orders demanding detailed information about their surveillance pricing models. The FTC is seeking to understand how these companies collect, process, and utilize personal data to determine prices, and whether this practice is harming consumers.

“Firms that harvest Americans’ personal data can put people’s privacy at risk. Now firms could be exploiting this vast trove of personal information to charge people higher prices,” said FTC Chair Lina Khan. “Americans deserve to know whether businesses are using detailed consumer data to deploy surveillance pricing, and the FTC’s inquiry will shed light on this shadowy ecosystem of pricing middlemen.”

The FTC’s inquiry focuses on four key areas:

  • Product and Service Offerings: The types of surveillance pricing products and services developed or licensed by each company, including technical details and intended uses.
  • Data Collection: Information on data sources, collection methods, and platforms used to gather personal information.
  • Customer and Sales Information: Details about who the products and services were offered to and their intended use.
  • Consumer Impact: Information on how surveillance pricing affects consumers, including potential price disparities.

FTC Aims to Protect Consumers

The FTC is wielding its 6(b) authority, which allows for broad investigations without a specific law enforcement purpose, to gather the necessary data. The agency believes that by understanding how surveillance pricing operates, it can better protect consumers and ensure fair competition.

While the full extent of surveillance pricing remains unclear, the FTC’s action sends a strong message to the industry: the era of unchecked data exploitation may be drawing to a close.

FTC's orders come a day after Google said it was abandoning its long-standing plan to phase out third-party cookies in Chrome, which privacy advocates think will favor advertisers and data brokers more. Rather than eliminating these digital tracking beacons, Google will now offer users a choice to retain or reject them under its Privacy Sandbox initiative.

Google Says It Will No Longer Block Third-Party Cookies in Chrome

Third-party cookies in Chrome

Google won't let the cookie crumble as it is dropping its long-standing plan to phase out third-party cookies in Chrome. The dramatic U-turn, coming after years of delays and industry turmoil, marks a significant victory for advertisers and a potential setback for privacy advocates.

Rather than eliminating these digital tracking beacons, Google will now offer users a choice to retain or reject them. While this move positions the tech giant as a champion of consumer control, critics argue it's a cynical ploy to maintain its advertising dominance.

Google said, "Instead of deprecating third-party cookies, we would introduce a new experience in Chrome that lets people make an informed choice that applies across their web browsing, and they’d be able to adjust that choice at any time."

Privacy Sandbox Slammed by Apple

The Privacy Sandbox, Google's proposed alternative to cookies, has been a tumultuous journey fraught with regulatory scrutiny and industry backlash. Its Topics API, designed to categorize user interests without revealing personal data, has faced intense criticism from Apple, which labeled it a potential tool for user fingerprinting and re-identification.

"The user doesn’t get told upfront which topics Chrome has tagged them with or which topics it exposes to which parties. It all happens in the background and by default," Apple's Webkit team said earlier this month. "The intent of the API is to help advertisers target users with ads based on each user’s interests even though the current website does not necessarily imply that they have those interests." The iPhone maker also pointed out potential loopholes that could allow data brokers to amass extensive information about users' online behavior. "The data broker has been able to read your shifting interests and store them in their permanent profile of you. Now imagine what advanced machine learning and artificial intelligence can deduce about you based on various combinations of interest signals," Apple said. "What patterns will emerge when data brokers and trackers can compare and contrast across large portions of the population? Remember that they can combine the output of the Topics API with any other data points they have available, and it’s the analysis of all of it together that feeds the algorithms that try to draw conclusions about you."

Third-Party Cookies Decision Criticized by Privacy Advocates

The decision to retain cookies underscores the immense challenges of balancing privacy with the economic engine of targeted advertising. While Google claims to be prioritizing user choice, concerns linger about the company's ability to leverage its market power to shape the future of online tracking.

Regulators, including the UK's Competition and Markets Authority (CMA) and the Information Commissioner's Office (ICO), have expressed disappointment with Google's decision and vowed to scrutinize the company's new approach.

Stephen Bonner, Deputy Commissioner at the ICO said:
"We are disappointed that Google has changed its plans and no longer intends to deprecate third party cookies from the Chrome Browser. “From the start of Google’s Sandbox project in 2019, it has been our view that blocking third party cookies would be a positive step for consumers. “The new plan set out by Google is a significant change and we will reflect on this new course of action when more detail is available. “Our ambition to support the creation of a more privacy friendly internet continues. Despite Google’s decision, we continue to encourage the digital advertising industry to move to more private alternatives to third party cookies - and not to resort to more opaque forms of tracking. “We will monitor how the industry responds and consider regulatory action where systemic non-compliance is identified for all companies including Google.”

The CMA also shared similar views. It said, "The CMA will now work closely with the ICO to carefully consider Google’s new approach to Privacy Sandbox. We welcome views on Google’s revised approach, including possible implications for consumers and market outcomes."

The industry is now bracing for a new era of uncertainty as it grapples with the implications of this far-reaching change.

UK Teen Arrested for Alleged Role in Scattered Spider Gang that Targeted MGM Resorts

Scattered Spider, UK Teen Arrested, MGM Resorts

A 17-year-old from Walsall, England, has been apprehended in connection with the infamous Scattered Spider ransomware syndicate. The teen suspect was taken into custody on charges of blackmail and violation of the Computer Misuse Act.

The teen, whose identity remains undisclosed due to his age, allegedly played a key role in the Scattered Spider cybercrime group that wreaked havoc on numerous high-profile organizations worldwide, including MGM Resorts.

Officers from the West Midlands Regional Organized Crime Unit (ROCUWM), in tandem with the U.K.'s National Crime Agency and the FBI, executed a search warrant at the teen’s residence. Digital devices seized during the operation will undergo forensic analysis. While the suspect has been released on bail, the arrest marks a significant milestone in a global investigation targeting a cybercrime network responsible for extorting millions of dollars from victims worldwide.

Scattered Spider Investigation Spanned Continents

Detective Inspector Hinesh Mehta, who heads the ROCUWM Cyber Crime Unit, underscored the complexity of the investigation, which spanned continents. He warned potential cybercriminals that law enforcement possesses the capabilities to track them down, regardless of their location.

"These cyber groups have targeted well known organisations with ransomware and they have successfully targeted multiple victims around the world taking from them significant amounts of money. We want to send out a clear message that we will find you. It’s simply not worth it.” - DI Hinesh Mehta, Head of WM Cyber Resilience Centre

Echoing Mehta’s sentiments, Bryan Vorndran, Assistant Director of the FBI’s Cyber Division, praised the collaborative efforts between law enforcement agencies and private sector entities. “The FBI, in coordination with its partners, will continue to relentlessly pursue malicious actors who target American companies, no matter where they may be located or how sophisticated their techniques are,” Vorndran said.

Who is Scattered Spider and What was the MGM Resorts Attack?

Scattered Spider, a relatively new player on the ransomware scene, has rapidly ascended in notoriety. This loosely organized criminal collective is known for its audacious attacks on high-profile targets and has inflicted substantial financial losses on businesses worldwide.

Their modus operandi often involves a combination of social engineering, phishing, and exploiting vulnerabilities to infiltrate target networks. The group is suspected of collaborating with other cybercrime syndicates, including the notorious ALPHV ransomware gang, to enhance their capabilities.

The MGM Resorts attack, a high-profile incident attributed to Scattered Spider, caused significant disruption to the casino gaming giant’s operations. The hackers gained initial access through a social engineering attack, posing as a legitimate employee to bypass security measures. Once inside the network, they deployed ransomware, encrypting critical systems and demanding a hefty ransom. MGM Resorts, demonstrating resilience, opted not to pay the ransom and instead focused on restoring its systems with the assistance of law enforcement.

MGM Resorts expressed gratitude for the law enforcement’s efforts after the UK teen's arrest. “We’re proud to have assisted law enforcement in locating and arresting one of the alleged criminals responsible for the cyberattack against MGM Resorts and many others," MGM said.

“We know first-hand the damage these criminals can do and the importance of working with law enforcement to fight back. By voluntarily shutting down our systems, refusing to pay a ransom and working with law enforcement on their investigation and response, the message to criminals was clear: it’s not worth it," it added.

Microsoft, a technology giant often at the forefront of cybersecurity, applauded the arrest, viewing it as a deterrent to other cybercriminals. The company reiterated its dedication to combatting cyber threats through collaboration with both public and private sector partners.

The arrest of the 17-year-old marks a crucial step in dismantling Scattered Spider. However, the group’s decentralized structure and the involvement of potential international collaborators suggest the challenge of completely eradicating this threat is far from over.

CrowdStrike’s ‘BSOD’ Outage: ‘No evidence that this is a Cybersecurity Incident,’ Says Australian Government

BSOD, Blue Screen of Death

With major banks, media companies, big tech and critical infrastructures including airports and airlines being disrupted all over the globe due to a "Blue Screen of Death" - or better know as the BSOD error stemming from a little known about file named “csagent.sys” associated to CrowdStrike’s Falcon Sensor, Australian government on Friday night said was not a "cybersecurity incident" and that "there is no reason to panic." Australian Home Affairs and Cyber Security Minister Clare O'Neil said her government  conducted a National Coordination Mechanism meeting late Friday evening, where representatives of the cybersecurity company under the scanner - CrowdStrike also attended. Post the meeting, O'Neil said, "We can confirm there is no evidence that this is a cyber-security incident." O'Neil explained that it is a technical issue caused by a CrowdStrike update that was shipped to its customers. "They have issued a fix for this, allowing affected companies and organizations to reboot their systems without the problem," she added.
"The company has informed us that most issues should be resolved through the fix they have provided, but given the size and nature of this incident it may take some time to resolve." - Clare O'Neil, Minister of Cyber Security
Australia's National Cyber Security Coordinator Lieutenant General Michelle McGuinness, reiterated O'Neil's words and said, "There is no information to suggest it is a cyber security incident."
"I am aware of a large-scale technical outage affecting a number of companies and services across Australia this afternoon. Our current information is this outage relates to a technical issue with a third-party software platform [from CrowdStrike] employed by affected companies." - Michelle McGuinness, National Cyber Security Coordinator

The Blue Screen of Death Error Widespread But No Need to Panic

Since the early hours of Friday morning, several Australian entities across sectors reported outages. A screenshot shared by a platform X (formerly known as Twitter) user gave a gist of the number of entities that were impacted by the Blue Screen of Death or BSOD error. [caption id="attachment_82757" align="aligncenter" width="366"]Blue Screen of Death, BSOD Source: Platform X user @RMXD[/caption] Owing to the widespread impact and a general panic observed around the nation, Australian Prime Minister Anthony Albanese stepped in to address the issue at hand. He said, "I understand Australians are concerned about the outage that is unfolding globally and affecting a wide range of services. My Government is working closely with the National Cyber Security Coordinator." Albanese assured that, "There is no impact to critical infrastructure, government services or Triple-0 services at this stage." He added that the National Coordination Mechanism was activated and the response to the incident is currently an all of government approach. After the conclusion of the National Coordination Mechanism meeting, Australian Deputy Secretary of Home Affairs Ministry, Hamish Hansford reassured the Australian people that "there is no reason to panic. CrowdStrike are on it. It is not a cybersecurity incident and we are working as fast as possible to resolve the situation."

Response from CrowdStrike

CrowdStrike said it is actively working with customers impacted by a defect found in a single content update for Windows hosts. "Mac and Linux hosts are not impacted. This is not a security incident or cyberattack," CrowdStrike said. CrowdStrikes engineers have identified, isolated and fixed the issue, according to their blogpost. "We refer customers to the support portal for the latest updates and will continue to provide complete and continuous updates on our website. We further recommend organizations ensure they’re communicating with CrowdStrike representatives through official channels. Our team is fully mobilized to ensure the security and stability of CrowdStrike customers."

Proactive Cyber Defense: The Role of Dark Web Monitoring for CEOs in Banking

Dark Web Monitoring for CEOs in Banking, Dark Web Monitoring, Banking CEOs, dark web threat to banks, cybersecurity for banking CEOs, banking data security, financial institution cybersecurity, Third-party risk management, third party risk management

Dark web monitoring is essential for CEOs in the banking industry to combat the escalating threat of cybercrime.

In 2023, an estimated $3.1 trillion in illicit funds flowed through the global financial system. Of these, fraud scams and bank fraud schemes totaled $485.6 billion in projected losses globally, emphasizing the critical need for proactive cybersecurity measures. The dark web has become a breeding ground for cybercriminals targeting banks, making dark web monitoring an indispensable tool for protecting sensitive financial data.

Why the Banking and Finance Sector?

If there is one sector that has remained under the close watch of cyber crooks since the early days of Industry 4.0, it's the financial sector. The finance sector has been a prime target for fraud, cybercrime and laundering illicit funds. This alarming trend underscores the need for robust cybersecurity measures, particularly regarding the shadowy corners of the internet: The dark web.

The dark web refers to encrypted online spaces not indexed by search engines. This anonymity fosters criminal activity, with forums and marketplaces dedicated to selling stolen data, including login credentials, customer information, and intellectual property. Banks, brimming with valuable financial information, are a prime target for these cybercriminals.

The Dark Web Threat Landscape for Banks

Data breaches are a constant threat to banks. In 2022, Flagstar Bank in the U.S. notified 1.5 million customers of a data breach where hackers accessed their personal data, including Social Security numbers. Flagstar is a Michigan-based financial services provider and one of the largest banks in the United States, with total assets of over $30 billion.

In 2023, the U.S. bank faced another breach that stemmed from a MOVEit Transfer software vulnerability that was accessed using stolen contractor login credentials. This highlights the vulnerability of even well-established banking institutions.

Stolen banking data is a valuable commodity on the dark web. Cybercriminals can utilize this data for a range of nefarious purposes, including:

  • Account Takeover (ATO): Using stolen login credentials, criminals can hijack customer accounts and steal funds.
  • Identity Theft: Stolen personal information can be used to open fraudulent accounts or obtain credit cards.
  • Selling on Marketplaces: Criminals can sell stolen data in bulk to other cybercriminals for further exploitation.

The consequences of a data breach can be devastating for banks. Beyond the financial losses incurred from fraudulent transactions, banks face reputational damage, eroded customer trust, and potential regulatory fines.

How Dark Web Monitoring for CEOs in Banking Is Useful

Dark web monitoring is a proactive cybersecurity strategy that involves continuously scanning dark web forums, marketplaces, and other hidden corners of the internet for mentions of the bank's data. Here's how this can benefit CEOs and CISOs in the banking industry:

Proactive Defense: Early detection is crucial in mitigating the damage caused by a data breach. Dark web monitoring allows banks to identify potential leaks before they become full-blown crises. Informed Decision-Making: Knowing what type of data is exposed empowers CEOs to prioritize security measures. This could involve tightening access controls, implementing stricter password policies, or focusing security awareness training on specific vulnerabilities. Improved Customer Trust: Proactive data security measures demonstrate a commitment to safeguarding customer information, fostering trust and loyalty.

A study by IBM found that organizations that detected and contained a data breach within 30 days experienced an average cost of $3.8 million, compared to $4.35 million for those taking longer. This highlights the significant cost savings associated with early detection through dark web monitoring.

Third-Party Risk Management (TPRM) and Dark Web Monitoring

Banks rely heavily on third-party vendors for various services, from cloud computing to payment processing. These third parties may connect to bank networks and possess sensitive data, making them prime targets for cybercriminals. A successful attack on a third-party vendor can expose a bank's data as well. Integrating dark web monitoring into a comprehensive TPRM program strengthens a bank's overall cybersecurity posture. Here's how:

Vendor Due Diligence: During vendor selection, dark web monitoring can reveal potential red flags associated with a vendor's security practices. A history of data breaches or associations with suspicious online activity can be a cause for concern. Ongoing Monitoring: Even after onboarding a vendor, continuous dark web monitoring can identify leaks or compromises within the vendor's systems that might indirectly expose the bank's data. Contractual Obligations: Banks can leverage dark web monitoring capabilities as part of their vendor contracts, ensuring vendors maintain robust cybersecurity practices and promptly disclose any security incidents.

The Power of AI and Threat Intelligence in Dark Web Monitoring

The dark web is vast and complex, generating massive volumes of data. Manually analyzing this data is time-consuming and inefficient, if not impossible. This is where AI and threat intelligence come into play.

AI-Powered Analysis: Advanced AI algorithms can process vast amounts of dark web data, identifying patterns, anomalies, and potential threats with speed and accuracy far surpassing human capabilities. Threat Intelligence Enrichment: Integrating threat intelligence feeds provides context to the detected threats. Understanding the tactics, techniques, and procedures (TTPs) of cybercriminals helps prioritize alerts and develop effective countermeasures. Predictive Analytics: By analyzing historical threat data, AI can predict potential attack vectors, enabling proactive security measures.

Actionable Steps for Banking CEOs

Here are concrete steps CEOs in banking can take to leverage dark web monitoring:

Implement Dark Web Monitoring Services: Several reputable cybersecurity firms including Cyble offer dark web monitoring solutions tailored for the financial industry. These services typically involve continuous scanning, real-time alerts, and expert analysis of potential threats. Employee Training: Educate employees on cybersecurity best practices, including strong password hygiene, phishing awareness, and the importance of reporting suspicious activity. Human error is a significant factor in data breaches, so a well-trained workforce is critical. Develop a Data Breach Response Plan: Having a plan in place ensures a swift and coordinated response if a data breach occurs. This plan should outline communication protocols, customer notification procedures, and steps to contain the damage. Invest in AI and Threat Intelligence: Incorporate AI-powered dark web monitoring solutions like Cyble's award-winning AI-Powered cyber threat intelligence platform and leverage threat intelligence feeds to enhance your organization's cybersecurity posture.

By combining dark web monitoring, third-party risk management, AI and threat intelligence, CEOs in the banking industry can significantly reduce the risk of data breaches, protect customer information, and maintain a strong reputation with customers.

12.9 Million Australians Impacted in MediSecure Data Breach

MediSecure, MediSecure Data Breach, Data Breach, Australia, OAIC, ASD,

A cyberattack on MediSecure, a former Australian e-prescription delivery service, has resulted in a colossal data breach impacting nearly 13 million individuals. This staggering number makes the MediSecure data breach one of the largest healthcare data breaches in Australian history.

MediSecure disclosed on Thursday that a malicious actor breached its database and potentially exfiltrated 6.5 terabytes of data that contained 12.9 million records of Australians.

The findings are a part of the investigation conducted along with cyber and forensic experts from McGrathNicol Advisory in collaboration with the National Cyber Security Coordinator. The main motive of taking outside help was to confirm the extent of the data breach and all individuals impacted, at the earliest.

According to the findings, the compromised data includes a treasure trove of highly sensitive personal and health information.

  • full name;
  • title;
  • date of birth;
  • gender;
  • email address;
  • address;
  • phone number;
  • individual healthcare identifier (IHI);
  • Medicare card number, including individual identifier, and expiry;
  • Pensioner Concession card number and expiry;
  • Commonwealth Seniors card number and expiry;
  • Healthcare Concession card number and expiry;
  • Department of Veterans’ Affairs (DVA) (Gold, White, Orange) card number and expiry;
  • prescription medication, including name of drug, strength, quantity and repeats; and
  • reason for prescription and instructions.

While MediSecure emphasizes that Medicare and other government-issued card numbers cannot be used solely for identity theft, the breach significantly increases the risk of phishing attacks and other online scams targeting the affected individuals.

Challenges in Identifying Victims and Questions of Financial Preparedness

While acknowledging the severity of the breach, MediSecure highlighted the difficulty in pinpointing every impacted individual. The company cites the sheer volume (6.5 terabytes) and complexity of the exposed data as hindrances. This lack of granular identification raises concerns about the timeliness of notifying victims and empowering them to take proactive security measures. MediSecure further explains that financial limitations prevented them from conducting a more in-depth analysis to identify specific victims, which questions the company's preparedness for such large-scale cyber incidents and their commitment to user data security.
"The impacted server analyzed by McGrathNicol Advisory consisted of an extremely large volume of semi-structured and unstructured data stored across a variety of data sets. This made it not practicable to specifically identify all individuals and their information impacted by the Incident without incurring substantial cost that MediSecure was not in a financial position to meet." - MediSecure

The company also reveals that their request for financial assistance from the Commonwealth Government to aid in the response efforts was denied.

Addressing recent reports suggesting they requested government funding to cover operational costs unrelated to the cyberattack, the company clarified that the funding request was "limited and confined" to the specific costs associated with the cyberattack incident response.

This clarification comes amidst concerns regarding the financial viability of MediSecure after it filed for liquidation in June 2024.

Despite the funding denial, MediSecure maintains it has been working diligently with various government agencies, including the National Cyber Security Coordinator (ACSC), the Australian Federal Police (AFP), and the Australian Signals Directorate (ASD).

Dark Web Data Sale Claim Investigation Ongoing

According to a MediSecure's statement, the company is also currently reviewing a data set recovered from a dark web forum to determine which individuals were affected by the breach. This process, however, appears to be taking longer than anticipated. The company is collaborating with the Commonwealth Government to notify all impacted individuals as soon as possible. A week after the MediSecure data breach incident became public, a Russian hacking forum member claimed to have 6.5TB of data including personal information of thousands of Australians. The post on the forum read, “For sale: Database of an Australian medical prescriptions company MedSecure [sic].” The forum user detailed the leaked information available, which likely matches the data that MediSecure now confirmed as compromised. The Australian National Cyber Security Coordinator, however, warned people against hunting for any such leaked data sets. No one should go looking for or access stolen sensitive or personal information from the dark web. This activity only feeds the business model of cyber criminals and can be a criminal offence," the Australian NCSC said.

MediSecure No Longer Part of National System, But Risk of Phishing and Scams Remains High

Both MediSecure and the Home Affairs Department said it's crucial to clarify that MediSecure is no longer involved in Australia's national prescription delivery service.​ This e-prescription service transitioned to eRx Script Exchange (eRx) in late 2023, and this new system remains unaffected by the current breach, the Home Affairs ministry said.
"The affected data relates to prescriptions distributed by MediSecure’s systems up until November 2023." - Australian Department of Home Affairs
However, while the specific individuals impacted remain unidentified, that exposed data significantly increases the risk of cyberattacks targeting these individuals. Phishing scams, identity theft attempts, and other online fraud schemes are likely to exploit the stolen information, the home department warned.

Recommendations for Impacted Australians and Lingering Concerns

Heightened Vigilance Advised: While the investigation unfolds, MediSecure advises potentially affected individuals to exercise heightened vigilance against phishing attempts, identity theft, and other cyber scams. Australians are encouraged to monitor their financial statements closely, be wary of unsolicited emails or calls, and leverage strong passwords across all online accounts. Additionally, the Australian Government's dedicated webpage provides resources and guidance on protecting personal information and online accounts. Long-Term Impact and Importance of Robust Cybersecurity: This unprecedented data breach exposes critical vulnerabilities in data security practices and raises concerns about the long-term impact on affected individuals. The potential for misuse of sensitive health information is significant, and the lack of immediate identification hinders proactive measures. This incident serves as a stark reminder for organizations handling sensitive data to invest in robust cybersecurity measures and prioritize user privacy.

Gemini AI’s 6,000 Cybersecurity Prompts that Will Help Your Career in Cybersecurity

Cybersecurity Prompts, Gemini AI, Mandiant, Google, Artificial Intelligence

A new revolution in cybersecurity training is underway, driven by the fusion of artificial intelligence and the NIST NICE framework. Google Gemini AI now offers a comprehensive library of over 6,000 cybersecurity prompts, designed to enhance cybersecurity skills and knowledge. The NIST NICE framework, developed by the U.S. National Institute of Standards and Technology, serves as the cornerstone of cybersecurity education. It maps specific tasks, knowledge, and skills (TKSs) required for various cybersecurity roles, helping individuals, employers, and training providers. The NICE framework helps in identifying career paths, defining job requirements and developing targeted curricula. Aligning one’s skillset with the NICE framework invests in career development and bolsters collective defense against cyber threats. But the framework's vastness can be daunting. Here’s where AI steps in. Google Gemini AI's prompts are tailored to offer a dynamic, personalized learning experience, accelerating the journey to cybersecurity expertise.
Also listen to our Podcast: AI’s Role in Cybersecurity: Insights From Mike Beck

Prompt Engineering: The Key to Unlocking LLM Potential

Large Language Models like Google Gemini and OpenAI's ChatGPT are powerful tools capable of understanding and generating human-like text. But how do we harness this power for cybersecurity learning? The answer lies in prompt engineering – the art of crafting the right questions and scenarios to guide the LLM's responses.

Well-crafted prompts tailored to the NICE Framework TKSs can:

  • Pinpoint Knowledge Gaps: Identify areas where you need to upskill by analyzing the TKSs for your target role.
  • Develop Specific Skills: Craft prompts that focus on specific TKSs, enabling deep dives into crucial cybersecurity skills.
  • Simulate Real-World Scenarios: Put yourself in the shoes of a security professional facing real-world challenges, applying TKSs in practical situations.
  • Create Personalized Learning Plans: LLMs can generate personalized learning paths based on your needs and goals, ensuring efficient progress.

There are several prompt types to consider:

  1. Conceptual prompts, which challenge understanding of fundamental concepts like encryption and risk management.
  2. Scenario-based prompts, which simulate real-world challenges, such as responding to data breaches.
  3. Knowledge-check prompts, which test understanding of specific TKSs.

Google Gemini AI's natural language processing capabilities make it ideal for crafting prompts aligned with the NICE Framework and accelerates skill development.

The researchers behind this project created a comprehensive library of prompts by:

  1. TKS Identification: Extracting unique TKS statement IDs and descriptions from the NICE Framework.
  2. Prompt Generation with Gemini: Using Gemini within AI Studio to create three prompt types for each TKS: conceptual, scenario-based, and knowledge-check.
  3. Structured Organization: Utilizing AI Studio's table formatting to organize prompts with corresponding TKS IDs, descriptions, and outputs.

This streamlined process ensures each prompt precisely aligns with the corresponding NICE Framework competency.

The NICE framework aids in training security-specific LLMs, such as Google's SecLM. By aligning LLMs with specific TKSs, models proficient in cybersecurity tasks are created, enhancing threat detection, analysis and response.

AI-Powered Cybersecurity Toolkit

The meticulously crafted library of NIST NICE-aligned prompts is now freely available to the entire cybersecurity community.

Editor's Note: Clicking on the above link will directly download a ZIP file, which contains the cybersecurity prompts aligned with the NIST NICE framework in a spreadsheet format.

This treasure trove includes prompts for various TKSs, giving you a glimpse of what awaits. The format followed is:

  • TKS ID
  • TKS Description
  • Conceptual Prompt
  • Scenario-Based Prompt
  • Knowledge-Check Prompt

Elevate Your Expertise Taking these Actions

Here's how to effectively integrate these cybersecurity prompts into your daily routine:

  • Identify Your Goals: Define your learning objectives. Are you targeting a specific NICE category or certification exam? Choose relevant prompts to focus on.
  • Daily Integration: Dedicate time each day to engage with the prompts. Use them as warm-up exercises, knowledge checks, or creative sparks for brainstorming.
  • Experiment with Styles: The beauty of prompts lies in their versatility. Use them for solo study, group discussions, or even presentations.
  • Embrace the Interactive Nature: Ask follow-up questions, challenge the AI's responses, and delve deeper into the topics at hand.
  • Track Your Progress: Monitor your responses, insights, and questions as you work through the prompts. This helps measure progress and identify areas for improvement.
The release of the NIST NICE-aligned prompt library marks a significant step in empowering the cybersecurity community with AI. Future explorations will delve into advanced prompt engineering, real-world AI applications in cybersecurity, and innovative integration of AI into daily workflows.

Hackney Council Reprimanded for Catastrophic ‘Avoidable’ Data Breach

Hackney Council Reprimanded

The Information Commissioner's Office (ICO) has issued a damning verdict on the London Borough of Hackney's (LBoH) cybersecurity practices following a 2020 ransomware attack that exposed the personal data of at least 280,000 residents. The privacy watchdog did not impose any fines, but the Hackney Council has been reprimanded for the catastrophic incident that was "avoidable."

The breach, attributed to the Pysa ransomware gang, highlights the devastating consequences of lax security protocols and underscores the importance of robust patch management and access controls.

The 2020 Hackney Council Ransomware Incident

The attack unfolded through a series of critical security lapses. A dormant account with a username and password – both set to "kiosk" – remained active for eight years, providing a backdoor for attackers. This vulnerability was compounded by a failure to apply a critical Microsoft security patch for a bug tracked as CVE-2020-0787 that had been readily available since March 2020. The attackers exploited this unpatched system to gain elevated privileges and access the council's network.

In October 2020, using the elevated privileges, the attacker accessed servers and devices within the LBoH network and encrypted its data. Data encryption is a known attack methodology of ransomware attackers.

The attacker was able to encrypt LBoH's on-premises environment that included 125 servers running Microsoft server operating systems and approximately 1,000 VDI desktop instances running Microsoft client OS. Overall, 440,000 files containing data of 280,000 resident of Hackney and their staff was encrypted.

The breach wasn't limited to data encryption. The attacker also accessed the LBoH's backup and initiated a deletion process of the data. The deletion process was identified and stopped by the engineers responding to the attack but not before 10% of the data was lost.

The attackers also managed to exfiltrate a subset of the compromised data, further jeopardizing the privacy of 9,605 individuals. The ICO investigation revealed that this data included highly sensitive categories such as racial or ethnic origin, religious beliefs, sexual orientation, and health information.

While LBoH took steps to mitigate the damage and improve security posture post-breach, the ICO emphasized that these efforts came too late. Stephen Bonner, Deputy Commissioner of the ICO, stated, "This was a clear and avoidable error... This is entirely unacceptable and should not have happened."

"Whilst nefarious actors may always exist, the council failed to effectively implement sufficient measures that could have better protected their systems and data from cyber-attacks. Anyone responsible for protecting personal data should not make simple mistakes like having dormant accounts where the username and password are the same. Time and time again, we see breaches that would not have happened if such mistakes were avoided."

- Stephen Bonner, Deputy Commissioner of the ICO

Hackney Council Reprimanded, Not Fined; Why?

The ICO opted for a reprimand instead of a fine due to LBoH's remedial actions. Bonner said the council took swift and comprehensive action to mitigate the harm of the attack as soon as it became aware of the incident, engaged with NCSC, the NCA and the Metropolitan Police, and took a number of remedial steps since the incident.

These steps included breach notifications to all residents, in-person notifications for those deemed at significant risk, and improved cybersecurity with a new "zero trust" model designed to provide resilience against future ransomware attacks. The council had also sought to replace its patch management system with a new state-of-the-art system to reduce vulnerabilities, but the ransomware attack took place before that. "We commend the council's good governance structures, policies, improvement plans and training and development of staff, as well as acknowledging the impact that the Covid-19 pandemic has had on the resources of organisations like local authorities... the public sector approach has been applied and a reprimand has been issued instead for the established infringements of UK GDPR," the ICO said.

The incident serves as a reminder for local authorities and organizations handling sensitive data. Patch management, proper access control practices, and vigilant monitoring are fundamental to preventing such catastrophic breaches.

The ramifications of the Hackney breach extend beyond financial penalties. The potential for identity theft, discrimination, and reputational damage for affected individuals underscores the importance of prioritizing cybersecurity even at a local governance level. In light of the ransomware attack on local London hospitals last month that has led to the cancellation of more than 8,000 surgeries and appointments, this seems to be more important than ever.

EU and Ukraine Forge Stronger Cybersecurity Partnership in Face of Russian Aggression

EU-Ukraine Cybersecurity Partnership, Cybersecurity Partnership

With Ukraine embroiled in a brutal war and formally seeking EU membership, the recent EU-Ukraine Cyber Dialogue in Brussels signaled a critical shift – cybersecurity is no longer just a technical concern, it's a cornerstone of national security and geopolitical strategy.

The 3rd EU-Ukraine Cyber Dialogue that took place on Monday yielded a multi-pronged approach. Both parties reaffirmed their commitment to responsible state behavior in cyberspace, a crucial step in deterring future cyberattacks. Collaboration on cyber diplomacy in international forums will further amplify their voices and shape global norms.

Harmonizing EU and Ukraine Cybersecurity Frameworks, Sharing

Recognizing the evolving threat landscape, the EU and Ukraine will work together to harmonize their cybersecurity frameworks. Ukraine will align its legislation with the EU's Network and Information Security (NIS) 2 Directive, strengthening critical infrastructure and supply chain resilience. This harmonization, however, goes beyond technicalities. It fosters a unified approach to cyber defense, making it harder for attackers to exploit vulnerabilities across borders.

The dialogue wasn't merely theoretical. The EU and Ukraine agreed to enhance information sharing on cyber threats, risks, and crisis management. This improved situational awareness will aid in understanding the cyber landscape in real-time and be crucial in countering ongoing and future Russian cyberattacks.

The EU's commitment to Ukraine's cyber resilience is unwavering. The union has pledged continued support through initiatives like "CyberEast" and collaboration with member states through the Tallinn Mechanism, a platform for coordinating cyber defense efforts.

[caption id="attachment_82058" align="aligncenter" width="1024"]cyber dialogue UA-EU, cybersecurity partnership Attendees of the 3rd EU Ukraine Cyber Dialogue, (Source: National Security and Defense Council of Ukraine)[/caption]

Looking ahead, Ukraine may leverage the EU Cybersecurity Reserve, a pool of cybersecurity experts readily deployable in crisis situations. Additionally, the European Security and Defence College, EUAM Ukraine (European Union Advisory Mission), and EUMAM Ukraine (EU Military Assistance Mission) will provide targeted training for Ukrainian civilian and military personnel.

The existing working arrangement with ENISA, the EU's cybersecurity agency, and operational agreement with Europol will continue to facilitate close cooperation between relevant authorities. This structured collaboration ensures a swift and coordinated response to cyber threats.

U.S.-Ukraine Bilateral Cybersecurity Partnership

Last month, a similar extension of a cybersecurity partnership between Washington and Kyiv was announced. The 10-year bilateral security agreement provides a framework for continued U.S. support for Ukraine’s defense and deterrence capabilities, as well as for Ukraine’s economic recovery and reconstruction. One of the key components of the Security Agreement signed by U.S. President Joe Biden and Ukrainian President Volodymyr Zelensky is cybersecurity and critical infrastructure protection. Biden committed to support Ukraine’s capacity to increase the cybersecurity and protection of its critical infrastructure and government information resources, including by strengthening its cyber defenses against malicious cyber activities by Russia and other hostile state and non-state actors. "Both sides commit to work together to improve Ukraine’s ability to detect and remediate intrusions by malicious actors, including through technical assistance from the United States," the Security Agreement said. "The United States intends to assist Ukraine to improve the cyber resilience of its critical infrastructure, especially energy facilities, against aerial strikes, and to support the quick restoration of destroyed infrastructure, including by providing material and technical assistance."

Virginia Elections Department Dismisses Data Breach Claims

virginia department of elections

After multiple claims that Virginia election candidates' data had been leaked surfaced in the past few weeks, the Virginia Department of Elections has finally dismissed the allegations, saying the details were scraped from the election department's official website. The Virginia Department of Elections is responsible for providing and overseeing open and secure elections for the citizens of the Commonwealth of Virginia. It is responsible for voter registration, absentee voting, ballot access for candidates, campaign finance disclosure and voting equipment certification in coordination with about 133 local election offices.

Virginia Department of Elections Breach Claims

On June 29, a threat actor under the moniker IntelBroker claimed a breach of the Virginia Department of Elections, which resulted in the siphoning of 65,000 election candidate records. The compromised data allegedly included sensitive information such as timestamps, usernames, election data, candidate information, and voting method details. [caption id="attachment_81842" align="aligncenter" width="1024"]Virginia Department of Elections Virginia Department of Elections data breach claim on an underground hacker forum[/caption] "This breach was previously being sold on the forum, but as the data is still online, I decided to leak it to prevent new accounts scamming and gatekeeping this database," the threat actor said. Prior to this, another threat actor on the same hacker forum under the moniker "pwns3c" claimed a breach of the Virginia Department of Elections, but said only 6,500 records were compromised. The hacker was selling the data set, which contained similar details as those advertised by IntelBroker, for just $30. “pwns3c” has also offered access and sale of a database purported to contain sensitive data and documents from a City of New York data breach. On Monday, another threat actor known as "LoveBeauty" exposed detailed information about election candidates and results, raising concerns over the integrity of the state’s electoral data and processes. The data, easily understandable to anyone, consisted of a 16.6MB CSV file with 65,548 lines of detailed election-related information. This dataset includes candidate IDs, names, total votes received, party affiliations, write-in votes, locality codes, precinct details, district information, office titles, and specific election details. Covering local governmental roles and legislative positions from Virginia's 2023 November General and Special Elections, the data’s scope is extensive. The allegedly leaked data includes unique identifiers and vote counts for candidates running for the house of delegates, commissioners, senators, directors, and members of the board of supervisors. An independent media agency that claimed to have investigated the data’s legitimacy by cross-referencing a sample of the leaked information with actual candidates and parties from the 2023 elections, confirmed the data's authenticity.

Data Likely Scraped: Virginia Department of Elections

However, the Virginia Department of Elections spokesperson told The Cyber Express that this is likely scraped data.
"No breaches or data compromises have been detected." - Virginia Department of Elections
The Department of Elections (ELECT) is aware of the social media post from a user purporting to expose a data breach of Department of Elections data. The message posted on X, formerly known as Twitter, references data that is already publicly available on the Department of Elections’ website under Election Reports/Results," the spokesperson said. Although election authorities dismissed the leak claims this time, the repercussions of such data breaches are potentially significant. Not only could they put the personal information of candidates at risk, but they could also undermine confidence in the electoral process. Public trust, already fragile in many places, could be further eroded by a significant breach. Election integrity is a cornerstone of democracy, and breach threats underscore the urgent need for enhanced cybersecurity measures to safeguard electoral processes. The Virginia Department of Elections pledged vigilance around any potential threats to its election infrastructure. It continues to work with local, state and federal partners to ensure the safety and security of the electoral process. State officials are involved in the MS-ISAC pilot project. The Department of Homeland Security and the Virginia Information Technologies Agency continue to provide various cyber services to the department, and any identified issues will be addressed appropriately, the department said.

Kaspersky Exits U.S. Market After Commerce Department Ban

Kaspersky, Kaspersky top executives, Kaspersky top executives sanctioned

Kaspersky Lab, the embattled Russian cybersecurity firm, has announced the closure of its U.S. operations this week, laying off its entire American workforce of less than 50 employees.

In a statement to The Cyber Express, Kaspersky said:

"Starting from July 20, 2024 Kaspersky will gradually wind down its U.S. operations and eliminate U.S.-based positions. The decision and process follows the Final Determination by the U.S. Department of Commerce, prohibiting the sales and distribution of Kaspersky products in the U.S."

The completion of its exit formalities, however, will still take time. "It's a long process that can take more than a year," Kaspersky said.

The antivirus provider has been operating in the U.S. for close to 20 years. But after last month's ban, the company "carefully examined and evaluated the impact of the U.S. legal requirements and made this sad and difficult decision as business opportunities in the country are no longer viable," Kaspersky told The Cyber Express.

As told by Kaspersky, the move follows last month's U.S. Commerce Department ban on Kaspersky software sales and the U.S. Treasury Department's sanctioning of its top executives, citing national security concerns.

The Treasury Department’s Office of Foreign Assets Control (OFAC) specifically targeted key individuals within Kaspersky Lab, including the chief operating officer, chief legal officer, chief of human resources, and chief business development and technology officers, among others.

The Department of Homeland Security (DHS) had previously banned Kaspersky from government systems in 2017, followed by a similar ban on its use within the U.S. military in 2018. However, the June 2024 Commerce Department ban effectively crippled Kaspersky's commercial business in the U.S.

The U.S. government has never provided concrete evidence that Kaspersky or the Russian government used its software for espionage. Kaspersky maintains its innocence, claiming the ban is based on "geopolitical climate and theoretical concerns" rather than a factual evaluation of their products.

Unanswered Questions and Potential Security Risks

Despite the lack of concrete evidence, the U.S. government expressed concern about Russia's potential to compel Kaspersky to cooperate with surveillance activities. Secretary of Commerce Gina Raimondo said last month, “Russia has shown time and again they have the capability and intent to exploit Russian companies, like Kaspersky Lab, to collect and weaponize sensitive U.S. information, and we will continue to use every tool at our disposal to safeguard U.S. national security and the American people."

Kaspersky software's deep access to system files, a necessity for antivirus functionality, raises potential security risks in the eyes of U.S. officials.

The recent ban prevents Kaspersky from not only selling new software but also providing security updates to existing users after September 29. This leaves millions of endpoints vulnerable as the software becomes increasingly ineffective against evolving threats.

Uncertain Future for Existing Users

While the U.S. government won't penalize those continuing to use Kaspersky software, they strongly advise switching to alternative solutions. Security professionals managing potentially vulnerable systems with Kaspersky software face a critical decision: replace Kaspersky entirely or find alternative mitigation strategies until a new solution can be implemented.

Fallout for Kaspersky

The U.S. ban is a significant blow to Kaspersky. While the U.S. sales only accounted for roughly 10% of their global revenue and only about 3% of antivirus users were running Kaspersky software in the country before the U.S. government banned sales in June, losing access to the U.S. market weakens their brand reputation and could potentially influence other countries to follow suit.

Kaspersky's future remains uncertain, particularly as they grapple with the closure of their U.S. operations and the ongoing scrutiny from governments around the world. However Kaspersky told The Cyber Express:

"Kaspersky's business remains resilient, and our key priority remains the same – to protect our customers in any country from cyberthreats. Being a global cybersecurity vendor, the company will continue investing in strategic markets and remain committed to serving its customers and partners and ensuring their protection."

"As a global company operating in more than 200 territories and countries, Kaspersky will be able to adapt its sales pipeline and maintain its global presence by focusing on the markets where it sees the most potential for its business development," the company told TCE.

Security professionals and network engineers should closely monitor this evolving situation and consider alternative antivirus solutions to ensure the security of their networks.

* Update July 15, 4:15 p.m.- Added Kaspersky's statement on how much time it will take for the company to completely exit U.S.

Weekly Vulnerability Report: Cyble Urges Fixes in Rockwell Automation, Microsoft and Rejetto

Weekly Vulnerability Report, Cyble, The Cyber Express

Cyble Research & Intelligence Labs (CRIL) analyzed 21 vulnerabilities in its weekly vulnerability report for the second week of July, including high severity flaws in products from Rockwell Automation, Microsoft and Johnson Controls. The report also emphasized critical-severity vulnerabilities in Gogs, Rejetto and OpenSource Geospatial Foundation, which pose a significant threat. A recent study led by Microsoft found that more than 80% of successful cyberattacks could have easily been prevented through timely patches and software updates. And with an estimate that the average computer needs about 76 patches per year from 22 different vendors, The Cyber Express each week partners with Cyble’s highly efficient dark web and threat intelligence to highlight critical security vulnerabilities that warrant urgent attention.

The Week’s Top Vulnerabilities

These are the three most critical vulnerabilities Cyble researchers focused on this week:

CVE-2024-39930: Gogs

Impact Analysis: A critical vulnerability in the built-in SSH server of Gogs versions through 0.13.0 that allows argument injection in internal/ssh/ssh.go, leading to remote code execution. Successful exploitation could lead to unauthorized access, data breaches, and complete compromise of the Gogs server potentially allowing attackers to run arbitrary commands, access or modify sensitive data, install malware, or use the server as a pivot point for further attacks on the network. Internet Exposure? Yes Patch? Yes

CVE-2023-2071: Rockwell Automation

Impact Analysis: This is a critical vulnerability in Rockwell Automation's FactoryTalk View Machine Edition on PanelView Plus that allows an unauthenticated attacker to achieve remote code execution. Successful exploitation could lead to complete system compromise, allowing attackers to gain unauthorized access, steal sensitive data, or use the compromised system as a foothold for further attacks on the network. Internet Exposure? NA Patch? Yes

CVE-2023-29464: Rockwell Automation

Impact Analysis: This is a vulnerability in Rockwell Automation's FactoryTalk Linx that allows an unauthorized attacker to achieve a denial-of-service (DoS) condition. The vulnerability stems from improper input validation, where the FactoryTalk Linx software fails to handle certain malformed packets properly. Exploitation of the vulnerability may lead to a DoS that could disrupt critical industrial control systems and processes that rely on FactoryTalk Linx for communication, potentially leading to operational downtime, production delays, and safety risks. Internet Exposure? NA Patch? Yes

CISA Adds 3 Vulnerabilities to KEV Catalog

Three of the vulnerabilities in the Cyble report were added to CISA’s Known Exploited Vulnerabilities (KEV) catalog:
  • CVE-2024-23692, Rejetto HTTP File Server vulnerability with a 9.8 CVSSv3 criticality score
  • CVE-2024-38080, a Microsoft Windows Hyper-V Elevation of Privilege vulnerability with a 7.8 criticality rating that gives attackers SYSTEM privileges to the attacker
  • CVE-2024-38112, a Windows MSHTML Platform Spoofing vulnerability with a 7.8 criticality rating
The researchers observed multiple threat actors, including notable groups like LemonDuck, actively exploiting CVE-2024-23692 vulnerability to gain initial access to the infected system and deploy various malware. The full report available for CRIL subscribers covers all these vulnerabilities and more, 5 advisories covering eight vulnerabilities specific to Industrial Control Systems (ICS) assets affecting the likes of Johnson Controls, Mitsubishi Electric and Delta Electronincs. Weekly Vulnerability Report

EU’s Breton vs. X’s Musk: The Duo Spar after the Latter’s Platform was Found in Breach of the Digital Services Act

Breton

The European Commission's Thierry Breton and platform X (formerly known as Twitter) owner Elon Musk were seen sparring each other - ironically - on the latter's platform after the commission found X in violation of the Digital Services Act. The war of words began when Breton tweeted in support of the commissions preliminary findings into X's non-compliance linked to dark patterns, advertising transparency and data access for researchers. Breton said: "Back in the day, Blue Checks used to mean trustworthy sources of information. Now with X, our preliminary view is that they deceive users and infringe DSA. We also consider that X’s ads repository and conditions for data access by researchers are not in line with the DSA transparency requirements." Breton said that Musk and X now have the right to defense but threatened that "if our view is confirmed we will impose fines and require significant changes." Initially, Musk cheekily responded to the tweet saying "How we know you’re real?" possibly referring to the blue tick against Breton's name. However, a couple of hours later the social media platform owner blew the battle bugle by saying, "The European Commission offered 𝕏 an illegal secret deal: if we quietly censored speech without telling anyone, they would not fine us. The other platforms accepted that deal. 𝕏 did not." He then added: "We look forward to a very public battle in court, so that the people of Europe can know the truth." [caption id="attachment_81543" align="aligncenter" width="500"]Breton, Breton vs Musk, Musk, Elon Musk, Thierry Breton, European Commission, X, Platform X, Twitter, DSA, Digital Services Act, European Union, EU Source: X[/caption] Breton responded asking Musk to be his guest. "There has never been — and will never be — any “secret deal”. With anyone," Breton said. "The DSA provides X (and any large platform) with the possibility to offer commitments to settle a case. To be extra clear: it’s *YOUR* team who asked the Commission to explain the process for settlement and to clarify our concerns. We did it in line with established regulatory procedures. Up to you to decide whether to offer commitments or not. That is how rule of law procedures work." The sparring seemed to have stopped for the time being but will be interesting to know whether it will continue or as Breton said: "See you (in court or not)."

Breton Says X in Violation with Dark Patterns, Ad Transparency and Researcher Data Access

The European Commission (EC) flexed its regulatory muscle today, sending a shot across the bow of social media giant X with preliminary findings of non-compliance with the Digital Services Act (DSA).

The DSA, a landmark piece of legislation enacted in November 2022, aims to create a safer and fairer online environment by holding large platforms accountable for content moderation and advertising practices.

The EC's investigation focused on three key areas:

  • Deceptive "Verified Accounts": The Commission alleges X employs misleading tactics with its "verified account" system, which awards a blue checkmark. They argue the current system, where users can potentially subscribe for verification, undermines users' ability to discern genuine accounts and the legitimacy of information. The EC points to instances of malicious actors exploiting this system to deceive users.

  • Opaque Advertising Practices: X is also accused of failing to provide a transparent and accessible advertising repository. According to the EC, the current system uses design elements and access barriers that hinder users and researchers from effectively scrutinizing online advertising practices. This lack of transparency hampers efforts to identify and mitigate emerging risks associated with online advertising.

  • Limited Researcher Data Access: The EC further found X's current approach to public data access for researchers falls short of DSA requirements. Specifically, X reportedly prohibits researchers from independently accessing public data through techniques like scraping, a practice explicitly permitted by the DSA's terms. The API access process for researchers is also criticized for being cumbersome and potentially dissuasive, with some researchers facing exorbitant fees.

These preliminary findings initiate a formal process where X can respond to the EC's concerns. They have the right to examine the investigation file and submit a written defense. The European Board for Digital Services will also be consulted.

If the EC's preliminary findings are upheld, X could face significant consequences. Potential sanctions include fines up to 6% of its global annual turnover and mandated corrective actions to address the identified violations. The EC may also impose enhanced supervision or even periodic penalty payments to ensure compliance.

"Today we issue for the first time preliminary findings under the Digital Services Act. In our view, X does not comply with the DSA in key transparency areas, by using dark patterns and thus misleading users, by failing to provide an adequate ad repository, and by blocking access to data for researchers. The DSA has transparency at its very core, and we are determined to ensure that all platforms, including X, comply with EU legislation."  - Margrethe Vestager, Executive Vice-President for a Europe Fit for the Digital Age

This move by the EC signals a strong commitment to enforcing the DSA and holding Very Large Online Platforms (VLOPs) accountable. The investigation against X follows similar actions initiated against TikTok, AliExpress, and Meta earlier this year. Security professionals and researchers closely following the evolution of the online landscape will be keenly interested in the outcome of this case and its potential impact on the broader VLOP landscape.

Massive AT&T Data Breach: Call and Text Records of ‘Nearly All’ Customers Compromised

AT&T Data Breach, AT&T, Data Breach, Snowflake, Data Leak, Telecommunication

AT&T disclosed a massive data breach today that impacts "nearly all" its customers call and text records. The hackers gained unauthorized access to a third-party cloud platform containing this data, which an AT&T spokesperson confirmed to be Snowflake to The Cyber Express.

The incident, discovered in April, impacts a vast swathe of AT&T's mobile and landline customers, raising concerns about potential identity theft and targeted attacks. However, a spokesperson for AT&T told The Cyber Express:

"This was aggregated metadata, not the content of calls or texts, nor was it social security numbers or credit card information. This incident took place outside of our network. Our systems were not breached."

According to AT&T, the compromised data spans May 1 to October 31, 2022, for most customers, with a limited number affected from January 2nd, 2023. While the data doesn't include call and text content, Social Security numbers, or other personally identifiable information (PII), it does contain phone numbers and, for some records, cellular site location details.

"Based on our investigation, the compromised data includes files containing AT&T records of calls and texts of nearly all of AT&T's cellular customers, customers of mobile virtual network operators (MVNOs) using AT&T's wireless network, as well as AT&T's landline customers who interacted with those cellular numbers."

The phone numbers, coupled with publicly available online tools, can be used to identify individuals, AT&T warned. Though the telecom giant assures the data isn't publicly available currently, the potential for future exposure remains a significant risk.

AT&T Data Breach Tied to Larger Snowflake Breach

Details regarding the attackers or their motivations are not yet clear, however, an AT&T spokesperson told TCE the access point for the breach was through cloud platform Snowflake.

Snowflake is currently at the center of probably the biggest and most high profile breaches, including Ticketmaster, Santander, Advanced Auto Parts, Pure Storage, and Neiman Marcus, among others.

In June, cybersecurity company Mandiant said it had found 165 of Snowflake customers’ credentials exposed by infostealer malware since 2020. Infostealers typically harvest credentials from infected machines, including usernames and passwords but also authentication tokens and cookies. Many of these credentials are then put out for sale on dark web forums from a few tens to thousands of dollars.

Snowflake did not immediately respond for comment request but in May the company’s CISO Brad Jones had said, “We have not identified evidence suggesting this activity was caused by a vulnerability, misconfiguration, or breach of Snowflake’s platform,” attributing the breaches to poor credential hygiene in customer accounts instead.

Since then, Snowflake has taken several measures to refine it security posture including the establishment of a Trust Center and enabling Snowflake admins to make multifactor authentication (MFA) mandatory.

One Arrested in Relation to the AT&T Data Breach

The telecom giant has enlisted cybersecurity experts to investigate the intrusion and partnered with law enforcement, the company confirmed in an 8-K filing with the U.S. Securities and Exchange Commission.

"AT&T is working with law enforcement in its efforts to arrest those involved in the incident. Based on information available to AT&T, it understands that at least one person has been apprehended."

AT&T plans to notify impacted customers and offer resources to safeguard their information. This incident underscores the critical need for robust cloud security measures and highlights the expanding threat landscape for the telecommunication industry.

The lack of call content or PII might be a saving grace, but the potential for identity theft and targeted attacks using phone numbers persists. Security professionals will be keenly interested in learning more about the attack methodology and the specific cloud platform vulnerability exploited.

U.S. Counties Reeling Through the Aftermath of Ransomware Attacks

Ransomware, Dallas County, Monroe County, Clay County, Indiana County, Dallas County Data Breach, Dallas County Ransomware Attack, Clay County Ransomware attack. BlackSuit ransomware,

Several counties in the United States are facing the wrath of ransomware - with one confirming hundreds of thousands were impacted in a late 2023 attack and the other declaring an attack from earlier this week as a “local disaster.” Last year, 95 ransomware attacks on local governments were reported, according to Emsisoft. There have already been more than 50 reported attacks on cities and counties this year with the most prominent ones being Washington, Miami, Fulton, Kershaw, Hidalgo, Gallup-Mckinsley, and Los Angeles.

Dallas County October Ransomware Attack Exposed Data of 200,000 People

In October 2023, the Play ransomware gang claimed to have stolen data during an attack on Dallas County systems. The county publicly acknowledged the incident and assured the public that they successfully contained the damage caused in the incident. “Due to our containment measures, Dallas County interrupted data exfiltration from its environment and effectively prevented any encryption of its files or systems,” the county said, at the time. However, it also said that it was in process of assessing the nature of the exposed information when Play published it. As the review process was extensive, Dallas County provided details of the actual impact only on Wednesday in a filing with the Maine Attorney General and sent data breach notices to 201,404 impacted individuals. The types of data confirmed to have been exposed could contain full name, Social Security number (SSN), dates of birth, driver's license, state identification number, taxpayer identification number, medical information, and Health insurance information.
There are several reasons as to why the Dallas County might hold such sensitive information. It said, “You could be a resident, an employee, or you might have received services from or interacted with one of our agencies (e.g., Department of Health and Human Services). Additionally, the County participates in data sharing agreements with other organizations to enhance the services we offer to our residents and the public.”

Ransomware Attack Forced Indiana County to File a Local Disaster Declaration

Clay County, Indiana, a rural community of roughly 25,000 residents, declared a local disaster Thursday after a ransomware attack crippled critical government services.

The attack, discovered early Tuesday morning, rendered county data inaccessible and severed electronic connections with state partners hindering essential operations at the Clay County Courthouse, Community Corrections, and Clay County Probation.

"We cannot access our data or electronically connect with some of the state partners we work with for many of our tasks," Clay County commissioners revealed in a local press conference.

County officials immediately contacted local and federal law enforcement to investigate the incident. The Clay County Courthouse and Health Department remained shuttered throughout Tuesday and Wednesday.

While the 911 system remained operational, non-emergency lines experienced temporary disruptions that have since been rectified. As of Thursday afternoon, the Clay County website is also unavailable.

This incident comes on the heels of a similar attack on neighboring Monroe County, Indiana. Earlier this week, Monroe County commissioners confirmed that the BlackSuit ransomware gang targeted their systems, potentially compromising personal information of its 140,000 residents.

[caption id="attachment_81405" align="aligncenter" width="940"]Monroe County Source: Monroe County Board of Commissioners[/caption]

BlackSuit is a rebranded version of the Royal ransomware group also responsible for a crippling attack on the Dallas city government last year. The group recently targeted Cedar Falls, Iowa. However, city officials there were able to thwart the attack before significant damage occurred.

Cedar Falls officials reported the incident to the FBI and assured residents that city services remained unaffected. BlackSuit claimed to have stolen employee data and county business information during the attack.

This recent string of attacks underscores the growing threat posed by ransomware gangs, particularly to smaller municipalities with potentially less robust cybersecurity defenses.

The Clay County and Monroe County incident highlights the critical need for local governments to prioritize cybersecurity preparedness and invest in robust incident response plans to minimize disruption and safeguard sensitive data.

Patch Now! Critical Flaw Found in Palo Alto Networks Expedition Migration Tool

Expedition Migration Tool, Palo Alto Networks, Palo Alto, critical vulnerability

Palo Alto Networks has issued security updates to address vulnerabilities impacting its products, including a critical vulnerability in its Expedition migration tool that could grant attackers complete administrator control.

This critical vulnerability, designated CVE-2024-5910, boasts a CVSS score of 9.3 and stems from a lack of authentication within the Expedition migration tool. This missing safeguard could allow malicious actors with network access to Expedition to seize administrative accounts.

All Expedition Versions Before 1.2.92 At Risk

The ramifications of a compromised Expedition migration tool admin account are significant. According to the Palo Alto Networks advisory, "configuration secrets, credentials, and other data imported into Expedition is at risk" and would be exposed to attackers who exploit this flaw.

The vulnerability affects all versions of Expedition prior to 1.2.92, which incorporates a fix. Thankfully, there's no evidence of this vulnerability being actively exploited. However, Palo Alto Networks strongly recommends updating Expedition to the latest version to mitigate potential threats.

As a temporary workaround, Palo Alto Networks advises restricting network access to Expedition solely to authorized users, devices and networks.

Palo Alto Firewalls Face Blast-RADIUS

In addition to the Expedition migration tool flaw, Palo Alto Networks also addressed a recently discovered vulnerability in the RADIUS protocol, dubbed Blast-RADIUS. This vulnerability, tracked as CVE-2024-3596, could enable attackers to bypass authentication procedures on Palo Alto Networks firewalls leveraging RADIUS servers.

Technical details delve into how Blast-RADIUS exploits a scenario where an attacker positions themselves between a Palo Alto Networks PAN-OS firewall and a RADIUS server, launching a so-called "man-in-the-middle" attack. This maneuver allows the attacker to potentially "escalate privileges to 'superuser' when RADIUS authentication is in use and either CHAP or PAP is selected in the RADIUS server profile," as outlined in the Palo Alto Networks advisory.

For those unfamiliar, CHAP (Challenge-Handshake Authentication Protocol) and PAP (Password Authentication Protocol) are two authentication protocols that, according to the advisory, "should not be used unless they are encapsulated by an encrypted tunnel" due to their lack of inherent Transport Layer Security (TLS) encryption. Luckily, PAN-OS firewalls configured to utilize EAP-TTLS with PAP for RADIUS server authentication are not susceptible to this exploit.

"Palo Alto Networks is aware of proof of concept code demonstrating how to exploit this generic issue."

Palo Alto Networks has identified several PAN-OS versions impacted by Blast-RADIUS, with fixes already available for most.

The following PAN-OS versions are impacted:

  • PAN-OS 11.1 (fixed in versions >= 11.1.3)
  • PAN-OS 11.0 (fixed in versions >= 11.0.4-h4)
  • PAN-OS 10.2 (fixed in versions >= 10.2.10)
  • PAN-OS 10.1 (fixed in versions >= 10.1.14)
  • PAN-OS 9.1 (fixed in versions >= 9.1.19)

A fix for Prisma Access is anticipated by July 30.

Citrix, CISA and NCSC Warn of a Critical-Severity Bug in NetScaler Console

Citrix NetScaler Console, NetScaler, NetScaler Console

Security professionals and system administrators should prioritize patching a critical vulnerability in Citrix NetScaler Console, as recommended not only by the networking appliance manufacturer but also the U.S. Cybersecurity and Infrastructure Security Agency and the National Cyber Security Centre of Ireland.

The vulnerability, tracked as CVE-2024-6235, is found in the Citrix NetScaler Console, a cloud-based management tool for NetScaler appliances. Exploiting this flaw could grant attackers unauthorized access to sensitive data, posing a significant security risk.

This high-severity vulnerability scores 9.4 on the Common Vulnerability Scoring System (CVSS), indicating its critical nature. It stems from improper authentication controls within NetScaler Console, potentially allowing attackers with access to the console's IP address to bypass security measures and steal sensitive information.

Versions of NetScaler Console 14.1 before 14.1-25.53 are impacted.

Both CISA and NCSC issued advisories urging immediate patching. CISA’s alert warns, “A cyber threat actor could exploit some of these vulnerabilities to take control of an affected system.

Patching Beyond NetScaler Console: Addressing Denial-of-Service Threats

The security updates address not only the critical authentication bypass vulnerability but also a high-severity denial-of-service (DoS) flaw within NetScaler Console that is tracked as CVE-2024-6236. This DoS vulnerability exists similarly in the NetScaler Agent and NetScaler Service Virtual Machine (SVM). The flaw allows attackers with access to any of these components' IPs to launch DoS attacks, potentially disrupting critical services.

Citrix also addressed another high-severity DoS vulnerability (CVE-2024-5491) affecting NetScaler ADC and Gateway appliances.

Privilege Escalation Risk in Citrix Workspace App

The security updates encompass a high-severity vulnerability (CVE-2024-6286) within the Citrix Workspace app for Windows. This flaw could allow low-privileged attackers with local access to a system to escalate their privileges to SYSTEM level, granting them complete control over the system. This vulnerability impacts Citrix Workspace app versions before 2403.1 in the current release and versions before 2402 in the long-term service release.

NetScaler: A Repeated Target

This is not the first time NetScaler has been exploited by malicious actors. Last year, a critical-severity flaw, identified as CVE-2023-4966, in Citrix NetScaler ADC and Gateway appliances was leveraged to target professional services, technology, and government organizations. This previous flaw stemmed from an unauthenticated buffer overflow issue and could enable attackers to steal sensitive information.

Given NetScaler's history as a target and the severity of the newly patched vulnerabilities, applying the security updates is paramount to maintaining a secure environment. Security professionals and system administrators should prioritize patching all affected Citrix products immediately.

Global Crypto Exchange BitMEX Pleads Guilty to Money Laundering Violations

BitMEX, Cryptocurrency, Cryptocurrency Exchange

A global cryptocurrency derivatives exchange BitMEX (HDR Global Trading Limited) admitted guilt on Wednesday to violating the Bank Secrecy Act by "willfully" flouting U.S. anti-money laundering (AML) regulations. This admission, following previous actions against its founders, exposes significant vulnerabilities in cryptocurrency exchange oversight.

The Department of Justice (DoJ) accused BitMEX of operating from 2015 to 2020 as a "vehicle for large-scale money laundering and sanctions evasion schemes." The exchange allegedly failed to implement a "Know Your Customer" (KYC) program, a cornerstone of AML compliance that verifies user identities and helps prevent illicit activities.

"By only mandating lax service access credentials, BitMEX not only failed to comply with nationally required anti-money laundering procedures designed to protect the US financial markets from illicit actors and transactions, but knowingly did so to increase the business’s revenue," said FBI Assistant Director Christie M. Curtis, highlighting a deliberate effort to circumvent regulations. This raises concerns about the potential for other cryptocurrency exchanges to exploit similar loopholes.

The DoJ charges echo a 2022 guilty plea by Gregory Dwyer, BitMEX's first employee, for violating the Bank Secrecy Act. Prosecutors previously secured convictions against the exchange's founders for similar offenses. These actions demonstrate a coordinated effort to hold BitMEX and its leadership accountable.

BitMEX Founders Also Admitted Guilt and Received Sentences

In 2022, the three founders of BitMEX pleaded guilty to the same charges as Dwyer. Judge Koeltl took into account the exchange's belated efforts to implement AML and KYC controls during sentencing.

36-year-old Florida resident Hayes, the former CEO, received a six-month home detention sentence and two years of probation. 38-year-old Delo was sentenced to 30 months of probation and allowed to return to Hong Kong. The judge found Reed slightly less culpable than the other founders and sentenced the Massachusetts resident to 18 months of probation in July.

Both, Hayes and Delo agreed to pay a $10 million fine, at the time. All three founders – Hayes, Delo, and Reed – still own BitMEX.

The founders also reached a settlement agreement with the Department of Treasury. The agreement did not require them to admit or deny allegations that BitMEX "processed over $200 million in suspicious transactions and failed to report nearly 600 suspicious activities," according to the DOJ.

Cryptocurrency's Regulatory Struggles

The case also underscores the ongoing struggle to regulate the cryptocurrency space. While the Commodity Futures Trading Commission (CFTC) imposed a $100 million civil penalty on BitMEX in 2021 for related violations, the lack of a centralized authority creates challenges in enforcing AML and KYC requirements across the entire cryptocurrency ecosystem.

This incident serves as a wake-up call for regulatory bodies. It necessitates a collaborative effort to establish clear and comprehensive AML/KYC frameworks for cryptocurrency exchanges. Strengthening international cooperation and information sharing is also crucial to combatting money laundering and other illicit activities within the crypto sphere.

Recently, the FBI warned of the financial risks associated with using unregistered cryptocurrency transfer services, especially considering potential law enforcement actions against these platforms. The warning focussed on crypto transfer platforms that operate without proper registration as Money Services Businesses (MSB) and fail to comply with anti-money laundering regulations mandated by the U.S. federal law.

The future of BitMEX remains uncertain. The exchange faces potential financial penalties and could struggle to regain user trust. The DOJ had earlier noted that "due to the lack of KYC controls, the full extent of criminal activity on BitMEX may never be known."

This case sets a significant precedent and paves the way for stricter enforcement of AML regulations within the cryptocurrency industry.

7.64 Million Individuals Impacted in Evolve Bank Ransomware Attack

Evolve Bank ransomware

Evolve Bank & Trust, a financial institution with both traditional banking and open banking services, disclosed a data breach impacting a staggering 7.64 million individuals.

The Arkansas-based bank initially believed a "hardware failure" caused system disruptions in late May, but an investigation revealed a cyberattack with a much longer timeline.

Evolve confirmed hackers infiltrated their network as early as February, potentially compromising sensitive customer data. While the official notification letter filed with the Maine Attorney General avoids specifics, the bank has acknowledged stolen information, including names, Social Security numbers, bank account numbers, and contact details.

Affirm and Wise Customers Hit By Attack

This breach extends beyond Evolve's core clientele, impacting customers of its open banking platform (often referred to as Banking-as-a-Service) used by several fintech firms. "Buy now, pay later" provider Affirm and money transfer service Wise are among those notifying their customers of potential data exposure due to Evolve's security lapse.

The incident adds another layer of concern for Evolve, which faced a regulatory order from the Federal Reserve Board in June. The order mandated improvements to Evolve's anti-money laundering (AML) and risk management programs, citing the need for enhanced procedures in record keeping and consumer compliance. This regulatory action raises questions about whether vulnerabilities exploited in the cyberattack might have been linked to the bank's AML/compliance shortcomings.

LockBit Claims Evolve Bank Attack

LockBit, a Russian-speaking ransomware-as-a-service (RaaS) group, claimed responsibility for the attack. Interestingly, LockBit initially attributed the stolen data to the Federal Reserve, likely due to a stolen document referencing the central bank.

“The threat actor also encrypted some data within our environment. However, we have backups available and experienced limited data loss and impact on our operations. We refused to pay the ransom demanded by the threat actor. As a result, they leaked the data they downloaded. They also mistakenly attributed the source of the data to the Federal Reserve Bank,” Evolve Bank said at the time.

This error highlights the evolving tactics of RaaS groups, who often employ misinformation or disinformation campaigns alongside cyberattacks to create confusion and maximize impact.

The Evolve breach serves as a stark reminder for financial institutions of the critical need for robust cybersecurity measures. With the increasing adoption of open banking platforms and the ever-present threat of RaaS attacks, institutions must prioritize data security and implement strong access controls, encryption, and incident response protocols. Regulatory bodies are likely to intensify their scrutiny of financial institutions' cybersecurity posture in the wake of this incident.

Big Tech Retreats: Microsoft Exits OpenAI Board Amid Regulatory Pressure

Microsoft Exits OpenAI, OpenAI Announces Safety and Security Committee

In a move likely fueled by intensifying antitrust scrutiny, Microsoft is exiting OpenAI and stepping down from its non-voting observer seat of the AI company's board of directors. This comes just days after reports suggested Apple might take a similar observer role, but now the Cupertino giant has also opted out.

Microsoft's exit, communicated via a letter on Tuesday, cited "significant progress" made by OpenAI's newly formed board, according to Axios. This explanation rings somewhat hollow, considering Microsoft's role was established just last November following a period of upheaval at OpenAI that saw the ousting and reinstatement of CEO Sam Altman.

OpenAI announced a new safety and security committee in May end as it began training a new AI model intended to replace the GPT-4 chatbot. A month later, OpenAI pushed out the rollout of its highly anticipated “Voice Mode” feature for ChatGPT to July, citing safety concerns. The company said it needed more time to ensure the model could “detect and refuse certain content.”

Microsoft Exits OpenAI, Caving to Regulatory Pressure?

The timing of these decisions coincides neatly with growing regulatory pressure on Big Tech's influence in the burgeoning field of artificial intelligence. Both the U.S. Federal Trade Commission (FTC) and the European Commission (EC) have expressed concerns that tech giants' investments in AI startups like OpenAI could stifle competition and create monopolies in key technological areas.

In June, the FTC launched an investigation into Big Tech investments in generative AI startups, including Microsoft, Amazon, and Google. The EC, meanwhile, explored the possibility of an antitrust probe into the Microsoft-OpenAI partnership after deciding against a merger control investigation.

AI Model Access Scrutinized

While both Microsoft and OpenAI maintain the company's independence despite the multi-billion dollar investment, the optics surrounding the close relationship are not lost on regulators. Microsoft's access to cutting-edge AI models through this partnership gives them a significant advantage, potentially hindering the growth of smaller competitors.

OpenAI seems to be taking a new approach to partner engagement. Moving forward, they plan to host regular meetings with key partners like Microsoft and Apple, alongside investors, to foster communication and collaboration. This strategy aims to maintain strong relationships without raising red flags for regulators.

The future trajectory of Big Tech's involvement in AI development remains to be seen. The recent retreat from board positions suggests a potential shift as companies navigate the increasingly complex regulatory landscape as they strive to maintain a competitive edge in the race for AI dominance.

NATO Faces Escalating Cyberthreats: From Espionage to Disinformation

NATO

As NATO leaders convene in Washington, D.C. for the organization's 75th Anniversary summit, a hidden war rages on – a relentless campaign of cyberattacks targeting the Alliance and its members.

This threat landscape is not merely a static backdrop, but a dynamic battlefield where adversaries employ a growing arsenal of tactics, from stealthy espionage to disruptive cyberattacks and disinformation campaigns, a report from Google-owned cybersecurity firm Mandiant said.

Espionage Actors Set Their Sights on Alliance Secrets

Nation-state actors like APT29 (ICECAP), attributed to Russia's SVR intelligence service, are notorious for targeting NATO members. These actors excel at compromising networks, often through social engineering or exploiting zero-day vulnerabilities, to steal sensitive political, diplomatic, and military intelligence. Their ability to operate undetected within compromised environments makes them particularly troublesome adversaries, Mandiant said.

China's cyber espionage efforts have also become more sophisticated, transitioning from loud operations to stealthier techniques. These actors exploit network edges and leverage complex infrastructure like operational relay box networks to mask their activities and hinder detection. Additionally, they increasingly rely on "living off the land" techniques, using legitimate system tools for malicious purposes, further complicating defenders' ability to identify intrusions.

Beyond Espionage: Disruptive and Destructive Attacks

Disruptive and destructive cyberattacks pose a direct threat to NATO's operational capabilities. Iranian and Russian actors have demonstrated a willingness to launch such attacks, often masking their involvement behind hacktivist groups. For instance, the destructive 2022 attack on Albania, initially attributed to "HomeLand Justice" hacktivists, was later linked to Iranian state actors. These incidents highlight the growing risk of attacks targeting critical infrastructure that could cripple essential services for NATO members.

Hacktivists and criminal actors further complicate the threat landscape. The global resurgence of hacktivism, fueled by geopolitical flashpoints like the Ukraine war, has resulted in a surge of attacks against NATO members. While these operations often lack sophistication and lasting impact, they can garner significant media attention and sow discord. Additionally, some hacktivist groups, like the pro-Russian Cyber Army Russia Reborn (CARR), are experimenting with more disruptive tactics, targeting critical infrastructure such as water supplies.

Financially motivated cybercrime, particularly ransomware attacks, pose a significant threat to critical infrastructure across NATO states. Healthcare institutions have become prime targets, disrupting patient care and highlighting the potential for widespread societal consequences. The ability of cybercriminals to operate with impunity from lax jurisdictions and the lucrative nature of ransomware attacks suggest this threat will only escalate.

Disinformation: A Weapon to Sow Discord

Information operations, encompassing social media manipulation and complex network intrusions, have become a hallmark of modern cyberwarfare. Russian and Belarusian actors have heavily targeted NATO with disinformation campaigns aimed at undermining Alliance unity and objectives. These efforts range from social media manipulation by "troll farms" to the coordinated leaking of stolen information.

In fact, on the same day as Mandiant released this report, the U.S. Department of Justice disrupted a Russia-run AI-enabled Twitter disinformation bot farm. Almost 1,000 accounts were seized. These bots masqueraded as Americans and promoted Russian government narratives.

Countering such campaigns requires collaboration between governments and the private sector, with tech giants like Google actively removing malicious content and disrupting information operations.

A Collective Defense is Paramount

A senior NATO official on Tuesday during the NATO Summit said Russia can sustain its war economy for 3-4 more years. "Ultimately, we all have to be prepared to continue to support Ukraine well beyond 2025. This is certainly something that we all understand very well," the official added.

The cyber threat landscape facing NATO is vast and ever-evolving. Unlike traditional warfare, cyberattacks can persist irrespective of broader geopolitical tensions. The war in Ukraine has undoubtedly emboldened reckless cyber activity against NATO allies, highlighting the need for a collective defense strategy. To effectively counter these threats, NATO must leverage the technological expertise of the private sector and foster strong partnerships with its member states. Only through a united front can the Alliance seize the initiative in cyberspace and secure its future.

Alabama Education Department Breach Raises Concerns About Student Data Security

Alabama Education Department, Alabama, Ransomware

The Alabama State Department of Education (ALSDE) narrowly avoided a crippling ransomware attack on June 17, but not before hackers breached sensitive data, raising concerns about the security of student and employee information.

While ALSDE officials successfully prevented a complete system lockdown, they acknowledged in a statement earlier this week that the attackers gained access to some data before being stopped. The department is currently working with federal law enforcement to investigate the scope of the breach and determine what information was compromised.

Education Ransomware Attacks Soar

The incident comes amidst a wave of cyberattacks targeting educational institutions across the United States. In fact, 2023 was the worst ransomware year on record for the education sector, with a 92% spike.

Although the attacks were carried out by several ransomware gangs, LockBit and Rhysida (a rebrand of Vice Society) had the lion’s share of 2023 attacks, with half credited to them. While ransomware attacks against education are a global phenomenon, the U.S. education sector has faced 80% of known attacks.

Scope of Alabama Education Department Breach Unknown

The exact nature of the stolen data remains unclear. ALSDE has not confirmed the type of information compromised, but at a press conference, State Superintendent Eric Mackey warned that student and employee data, including "some personally identifiable information," may have been accessed. The department has set up a dedicated webpage, alabamaachieves.org/databreach, to provide updates on the investigation.

While ALSDE has taken steps to mitigate the damage, several questions remain unanswered. The investigation into the attack is ongoing, and the department has not responded to requests for further details about the compromised data. The potential impact on students, families, and school employees will depend on the nature and volume of the information accessed by the attackers.

The department reiterated its firm stance against negotiating with cybercriminals. We have taken the position not to negotiate with foreign actors and extortionists," the department's statement said, reflecting growing law enforcement guidance against feeding the ransomware ecosystem.

Importance of Data Backups for Ransomware Protection

Despite the breach, ALSDE was able to restore its systems and data using clean backups, highlighting the importance of robust data backup and recovery strategies for organizations of all sizes.

The incident underscores the need for educational institutions to invest in cybersecurity measures to protect sensitive student and staff data, and serves as a stark reminder of the growing cybersecurity threats faced by educational institutions. As schools continue to collect and store sensitive student data, robust cybersecurity protocols and incident response plans are critical to safeguard this valuable information.

Third-Party Data Breach Exposes Video Gaming Giant Roblox Developers’ Data

American video game giant Roblox has reported a data breach stemming from a third-party service provider that helps host its annual Developer Conference. Result? Data related to its in-person and online attendees registered through the third-party's platform in the last two years leaked. Roblox Corp. is an American video game developer based in San Mateo, California. Founded in 2004 by David Baszucki and Erik Cassel, the company is the developer of Roblox, which was released in 2006. As of December 2023, the company employs over 2,400 people. The gaming company has an average monthly user base of 214 million players and makes around $7 million per day from a user base that is primarily youngsters below the age of 16 years. In fact, 21% of its users are aged between 9 and 12 years.

Roblox Developers Conference Data Leak

Roblox on Friday notified all developers who registered on its FNTech platform about a recent data breach. FNTech is advertised on its website as a one-stop shop for everything related to in-person, virtual and hybrid events.

Roblox said an "unauthorized" actor intruded its third-party's systems and accessed a subset of user information from a Roblox Developer Conference registration list from there. Roblox said the details compromised likely contained the Developer Conferences users full names, email addresses and IP addresses that were possibly collected for users attending the conference via the hybrid option.

[caption id="attachment_80631" align="aligncenter" width="814"]Roblox, Roblox Data Breach Roblox data breach notification (Source: X)[/caption]

Roblox did not confirm if any other data or if its own systems were affected in a supply chain-type attack but said it has "made efforts to ensure this type of incident is avoided in the future." What measures were implemented remains unclear. The Roblox Developer Conference 2024 will be hosted in San Jose, California on September 6-7. 

Gamers often have valuable virtual assets and in-game purchases linked to their accounts. Hackers exploit vulnerabilities in servers and platforms to steal the data, which can be sold in the underground market.

Recently, two prominent online gaming platforms in India, Teenpatti.com and Mobile Premier League (MPL.live), allegedly experienced data breaches. Similarly, Fortnite and Insomniac games also experienced breaches from ransomware actors, which shows a steady interest by threat actors in the gaming sector that has largely been off the radar until now.

RockYou2024: Massive 10-Billion Password Leak Raises Credential Stuffing Concerns

RockYou2024, Password Leak, data breach,

Security researchers are scrambling to assess the fallout from a massive leak of stolen passwords, dubbed "RockYou2024." Uploaded to a notorious cybercrime forum, the database allegedly contains nearly 10 billion unique passwords – a staggering figure that dwarfs previous records.

Unprecedented Scale of RockYou2024 Password Leak

According to Cybernews researchers, the RockYou2024 compilation appears to be the largest collection of leaked credentials ever discovered. The data offered by a hacker using the alias "ObamaCare" reportedly consists of 9.948 billion unique passwords in plain text format. This builds upon the RockYou2021 database, which exposed 8.4 billion passwords, with an additional 1.5 billion entries added from 2021 to 2024. Researchers estimate the trove originates from at least 4,000 separate data breaches spanning two decades.

Credential Stuffing Bonanza

Security experts warn that RockYou2024 presents a significant risk for credential stuffing attacks. These automated assaults use stolen login credentials against multiple online services, often succeeding when users employ the same password across different accounts.

The researchers emphasize the danger that "revealing that many passwords for threat actors substantially heightens the risk of credential stuffing attacks." Attackers could potentially gain unauthorized access to a vast array of targets, including personal accounts, internet-connected devices, and even industrial control systems. Furthermore, when combined with other leaked data like email addresses – readily available on hacker forums – RockYou2024 could fuel a wave of data breaches, financial fraud, and identity theft.

Mitigating the RockYou2024 Threat

Chris Bates, chief information security officer at SandboxAQ, said, “Companies should assume all passwords are compromised and build the correct mitigating controls. This include phishing resistant MFA, passwordless authentication, and behaviour-based detection and response programs to detect malicious use.”

Adding to this advice, these are the steps users can take to mitigate the risks associated with RockYou2024. Services like the "AmIBreached" data leak checker from Cyble allow individuals to verify if their credentials have been compromised. More importantly, adopting strong, unique passwords for every online account is crucial.

Password managers like LastPass, Password1 and Enpass can be invaluable tools for generating and storing complex passwords, ensuring each account has a unique login.

Finally, identity theft protection services can provide an extra layer of security, assisting with recovery efforts in the event of fraud or identity theft.

The Road Ahead

The RockYou2024 leak serves as a stark reminder of the ever-evolving cyber threat landscape.

Marc Manzano, general manager at SandboxAQ, said, “It's imperative for organizations to implement and enforce stringent password policies, educate users about the risks of password reuse, and put into action multi-factor authentication widespread adoption.” He added, “Enhancing overall IT systems security by deploying modern cryptography management platforms will be crucial in defending against large-scale threats leveraging stolen passwords.”

Organizations and individuals alike must prioritize robust password security practices to stay ahead of malicious actors. As investigations into the leak continue, security professionals remain vigilant, anticipating the potential consequences of this colossal data breach.

Hackers Compromise Ethereum Mailing List to Send Phishing Emails Directing Subscribers to Crypto Drainers

Ethereum Mailing List

The Ethereum Foundation (EF) this week disclosed a phishing campaign that targeted its email subscribers. The attack that took place on June 23, saw a malicious email sent to over 35,794 recipients from the compromised email account of ethereum - "updates@blog.ethereum.org".

[caption id="attachment_80450" align="aligncenter" width="1024"]Ethereum Mailing List Phishing mail sent on 23-06-2024, 00:19 AM UTC, to 35,794 email addresses from updates@blog.ethereum.org[/caption]

The phishing email sent from this address leveraged social engineering tactics, luring users with the promise of a high annual percentage yield (APY) through a fake collaboration between Ethereum and Lido DAO. Clicking the embedded "Begin staking" button led victims to a well disguised website designed to steal cryptocurrency from unsuspecting users' crypto wallets.

Dissecting the Ethereum Mailing List Attack

Investigators discovered the attacker used a combined email list, incorporating both their own addresses and a subset of 3,759 addresses harvested from the Ethereum blog's mailing list. Fortunately, only 81 of the obtained addresses were new to the attacker.

The phishing email advertised a lucrative 6.8% APY on staked Ethereum. Upon clicking the malicious link and attempting to connect their wallets, users would unknowingly initiate a transaction that would drain their crypto holdings straight into the attacker's wallet.

[caption id="attachment_80452" align="aligncenter" width="1024"]Ethereum Mailing List Fake website where crypto drainers were masqueraded[/caption]

Swift Response and Ongoing Measures

The Ethereum Foundation's security team swiftly responded to the incident. They identified and blocked the attacker from sending further emails, while simultaneously alerting the community via Twitter about the malicious campaign. Additionally, the team submitted the fraudulent link to various blocklists, effectively hindering its reach and protecting users of popular Web3 wallet providers and Cloudflare.

While on-chain analysis revealed no successful thefts during this specific campaign, the EF emphasizes the importance of vigilance. They have implemented additional security measures and are migrating some email services to mitigate future risks.

Similar Incidents

This incident highlights the evolving tactics of cybercriminals who exploit trust in reputable organizations to target cryptocurrency users. In February, crypto scammers devised a new tactic to deceive owners of Ethereum Name Service (ENS) domains, commonly recognized by their “.eth” extension. The ENS email phishing scam involved sending emails to ENS owners, purportedly alerting them about the expiration of their domains. But, as seen in the latest campaign victims were directed to fraudulent platforms designed to siphon their funds.

Nick Bax, a prominent figure in cryptocurrency analysis, first reported the crypto scam, suggesting that attackers could be exploiting the extensive data leaked from previous data breaches. This leak potentially provides scammers with access to genuine email addresses associated with [.]eth accounts, facilitating the targeting of ENS owners.

Security professionals and crypto enthusiasts alike should remain vigilant against phishing attempts and prioritize verifying information before interacting with suspicious links or investment opportunities.

Apple Caves to Roskomnadzor Demands, Removes VPNs From Russia’s App Store

VPN Apps, Apps Removal, App Store

In a move that tightens Russia's grip on internet control, Apple has removed several Virtual Private Network (VPN) applications from the App Store in response to a request by Roskomnadzor, the country's federal media watchdog.

The deleted VPN apps belonging to ProtonVPN, Red Shield VPN, NordVPN, and Le VPN were popular tools used by Russians to bypass government-imposed internet censorship. Red Shield VPN and Le VPN confirmed the removals, sharing messages from Apple stating the apps were deleted per "demand from Roskomnadzor" for containing "content considered illegal in Russia."

VPNs creates encrypted tunnels for internet traffic, allowing users to access blocked websites and applications anonymously.

Apple offered little explanation, suggesting developers contact Roskomnadzor directly. Red Shield VPN, in turn, advised users to switch their Apple ID country to access the app and updates elsewhere. But the suggestion came not before it used some stern wordings against the Cupertino giant. It said:

"Apple's actions, motivated by a desire to retain revenue from the Russian market, actively support an authoritarian regime. This is not just reckless but a crime against civil society. The fact that a corporation with a capitalization larger than Russia's GDP helps support authoritarianism says a lot about the moral principles of that corporation." - Red Shield VPN

Red Shield said its services aims to provide free access to information and improving the world. But in the notification, Apple refers to Roskomnadzor's request to remove the app and claims that its app "solicits, promotes, or encourages criminal or clearly reckless behavior," which it strongly disagrees with.

A similar notice was sent to LeVPN as seen in the image below:

[caption id="attachment_80371" align="aligncenter" width="1024"] Apple Notice to LeVPN (Source: LeVPN)[/caption]

Banning and Removal of VPN Apps Not New

This is just the latest chapter in Russia's escalating efforts to control online information. The crackdown on VPN Apps and their services predates the Ukraine war but has intensified significantly since. Roskomnadzor executed large-scale blocks targeting VPN protocols like WireGuard, OpenVPN, and IPSec in August and September 2023.

According to Sergei Khutortsev, Director of Roskomnadzor's Public Communications Network Monitoring and Management Centre, 167 "malicious" VPN services and 84 applications have been blocked in just two years.

This aggressive censorship push extends beyond VPNs. Roskomnadzor is reportedly developing an AI-powered system to maintain a vast register of banned information, further solidifying its control over the Russian online landscape. Additionally, the agency compels telecom operators to block roughly 300,000 unregistered SIM cards weekly.

While Apple's compliance with Roskomnadzor's demands raises concerns about corporate responsibility in the face of authoritarian restrictions, it's a tactic with limited effectiveness. Tech-savvy users will undoubtedly explore alternative methods to access VPN services. The bigger worry lies with Roskomnadzor's growing arsenal of censorship tools and its potential to stifle free speech and the flow of information within Russia.

Australia Gives Online Industry Ultimatum to Protect Children from Age-Explicit Harmful Content

enforceable codes

Australia’s eSafety Commissioner has given key online industry players six months to develop "enforceable codes" to shield children from exposure to pornography and other harmful content. The codes will aim to prevent young children from encountering explicit material that is deemed unsuitable for their age. They will also seek to empower Australian internet users with options to manage their exposure to various online materials. While the primary focus is on pornography, the codes will also cover other high-impact content, including themes of suicide, self-harm, and disordered eating. The regulations will apply to app stores, apps, websites (including porn sites), search engines, social media, hosting services, ISPs, messaging platforms, multiplayer games, online dating services, and device providers. The European Union calls these large digital platforms “gatekeepers.”

Why 'Enforceable Codes' are Important

eSafety Commissioner Julie Inman Grant noted the pervasive and invasive nature of online pornography. She said children often encounter explicit material accidentally and at younger ages than before.
“Our own research shows that while the average age when Australian children first encounter pornography is around 13, a third of these children are actually seeing this content younger and often by accident,”  - eSafety Commissioner Julie Inman Grant
She clarified that these measures focus on preventing young children’s unintentional exposure to explicit content that revolves around such a sensitive topic. Social media plays a significant role in unintentional exposure, with 60% of young people encountering pornography on platforms like TikTok, Instagram, and Snapchat, according to Inman Grant. “The last thing anyone wants is children seeing violent or extreme pornography without guidance, context or the appropriate maturity levels because they may think that a video showing a man aggressively choking a woman during sex on a porn site is what consent, sex and healthy relationships should look like,” she added. Parents and caregivers are crucial in protecting children, but the industry must also implement effective barriers, Inman Grant stressed. These could include age verification, default safety settings, parental controls, and tools to filter or blur unwanted sexual content. Such measures should apply across all technology layers, from connected devices to app stores, messaging services, social media platforms, and search engines, providing multi-layered protection, the eSafety Commissioner said.

Draft Due Oct. 3, Final Versions by Dec. 19

Industry bodies are required to submit a preliminary draft of the codes by October 3, with final versions due at the end of the year on December 19. Public consultations in the process of defining "enforceable codes" is also a requirement from the eSafety commissioner. eSafety has released a Position Paper to help industry develop these codes and clarify expectations.
“We want industry to succeed here and we will work with them to help them come up with codes that provide meaningful protections for children.” - eSafety Commissioner Julie Inman Grant

eSafety Commissioner Can Set Rules if Efforts Fail

But if any code falls short, then the eSafety commissioner can set the rules for them, under the Online Safety Act provisions. eSafety has also published an Age Assurance Tech Trends Paper examining recent developments in age verification technology to provide additional context. These new codes will complement existing protections under the Online Safety Act, including the Restricted Access System Declaration, Basic Online Safety Expectations Determination, and initial industry codes addressing illegal content like online child sexual abuse material. Additionally, the codes align with broader initiatives such as the Government’s Age Assurance Trial, Privacy Act reforms, the statutory review of the Online Safety Act, and efforts under the National Plan to End Violence Against Women and Children 2022-2032. Last year, the eSafety commissioner had also issued notices to online platforms like Twitter, Meta, and others concerning their approaches to combatting online child abuse. This was followed by a similar action from Inman Grant against online hate over social media platforms.

Law Enforcement and Private Sector Team Up to Disrupt Cobalt Strike Abuse

Cobalt strike

In a coordinated takedown, law enforcement and cybersecurity firms joined forces to cripple cybercriminals' misuse of a legitimate security tool – Cobalt Strike. The week-long operation, codenamed MORPHEUS and spearheaded by UK's National Crime Agency, targeted unlicensed versions of Cobalt Strike used to infiltrate victim networks.

Europol, which helped coordinate the operation involving authorities from six other countries, said a total of 690 IP addresses linked to criminal activity were flagged. By the end of the week, over 85% (593) of these addresses associated with unlicensed Cobalt Strike instances were disabled by internet service providers (ISPs) in 27 countries.

Cobalt Strike: Double-Edged Sword

Cobalt Strike, a commercially available tool by Fortra, is used by ethical hackers for penetration testing – simulating cyberattacks to identify vulnerabilities in a network's defenses. However, in the hands of malicious actors, unlicensed versions of Cobalt Strike transform into a powerful weapon.

"Since the mid 2010’s, pirated and unlicensed versions of the software downloaded by criminals from illegal marketplaces and the dark web have gained a reputation as the ‘go-to’ network intrusion tool for those seeking to build a cyberattack, allowing them to deploy ransomware at speed and at scale." - UK's NCA

Cybercriminals typically deploy Cobalt Strike through spear phishing emails, tricking victims into clicking malicious links or opening infected attachments. Once a victim clicks, a "Beacon" is installed, granting the attacker remote access to the compromised system. This access allows them to steal data, through infostealers, or launch further attacks.

Criminals also exploit these cracked copies to establish backdoors on compromised systems, and deploy malware. Notably, investigations into ransomware strains like Ryuk, Trickbot, and Conti have linked them to the use of unlicensed Cobalt Strike, Europol said.

Paul Foster, director of threat leadership at the National Crime Agency, said, “Although Cobalt Strike is a legitimate piece of software, sadly cybercriminals have exploited its use for nefarious purposes. Illegal versions of it have helped lower the barrier of entry into cybercrime, making it easier for online criminals to unleash damaging ransomware and malware attacks with little or no technical expertise." Foster warned  that such attacks could cost companies millions in terms of losses and recovery.

Public-Private Partnership: A Winning Formula

The success of Operation MORPHEUS hinges on the unprecedented cooperation between law enforcement and the private sector. Key industry partners like BAE Systems Digital Intelligence, Trellix, Spamhaus, and The Shadowserver Foundation provided crucial support. Their expertise in threat intelligence, network scanning, and data analysis proved instrumental in identifying malicious activities and pinpointing cybercriminal infrastructure.

This collaboration is a direct consequence of Europol's recent regulatory amendments, empowering the agency to work more effectively with private entities. This novel approach grants Europol access to real-time threat intelligence and a broader understanding of cybercriminal tactics. This translates to a more coordinated and comprehensive response, ultimately strengthening the overall cybersecurity posture across Europe.

Europol's European Cybercrime Centre (EC3) played a pivotal role throughout the investigation, offering analytical and forensic support while facilitating seamless information exchange between all partners, while the FBI, Australian Federal Police, and other national agencies provided critical support.

Over the past two and a half years, law enforcement utilized the Malware Information Sharing Platform (MISP) to facilitate real-time threat intelligence sharing with the private sector. Nearly 730 intelligence reports containing almost 1.2 million indicators of compromise (IOCs) were exchanged during the investigation. Additionally, EC3 organized over 40 coordination meetings to ensure smooth collaboration between law enforcement and private partners. Europol even established a virtual command post during the takedown week to coordinate global law enforcement activities.

The Fight Continues

While Operation MORPHEUS represents a significant victory, the war against cybercrime is far from over. Law enforcement agencies remain vigilant, prepared to conduct similar disruptive actions as long as criminals continue to exploit vulnerabilities in legitimate security tools.

Fortra, the developer of Cobalt Strike, has also released a new version with enhanced security measures and is committed to working with law enforcement to remove older, vulnerable versions from circulation.

EU Flexes Muscles: Meta’s ‘Pay or Consent’ Model Faces DMA Challenge

Pay or Consent, Meta

The European Commission has found that Meta's "pay or consent" advertising model breaches the Digital Markets Act (DMA). The preliminary findings highlight concerns about user choice and data control within the social media landscape. The comprehensive investigation will take a year's time, after which a formal decision will be made, the Commission said.

Meta DMA, Pay or Consent

DMA Compliance: A New Benchmark for User Privacy

The Digital Markets Act (DMA) was signed into law by the European Parliament and the Council presidency in September 2022. It became legally effective two months later and most of its regulations took effect on May 2, 2023.

The DMA is a European law that aims to prevent large online platforms from abusing their market power and to ensure fair competition in the digital economy. The law primarily targets "gatekeepers," which are large digital platforms that provide core services like search engines, messaging services, app stores and dominant online platforms like Meta.

Meta's Model Under Fire: Limited Options, Privacy Concerns

Online platforms collect a lot of personal data to power online advertising. Their dominant position allows them to set user agreements that enable vast data collection, giving them a big advantage over competitors.

New EU regulations - DMA Article 5(2) - aim to empower users by requiring platforms to get explicit consent before combining their data across different services. Even if users refuse consent, they must still have access to a basic version of the service, even if it's less personalized. This stops platforms from forcing users to give up their data to use the service entirely.

Meta's "pay or consent" model, launched in response to the DMA, presents EU users with a binary choice, the commission argued. Subscribe for an ad-free version or accept personalized ads in the free version. The Commission said this approach fails to comply with the DMA on two key points:

  • Lack of a "Less Personalized" Option: Users are not offered a service with reduced data collection and ad personalization, violating their right to control their data footprint.
  • Consent Coercion: The model allegedly coerces consent by making access to certain functionalities conditional on agreeing to data combination.

The Commission asserted that users who choose not to consent should still have access to an equivalent service with less data collection for advertising purposes.

Next Steps: Dialog and Potential Penalties

Meta now has the opportunity to respond to the preliminary findings and defend its practices. The Commission will conclude its investigation within a year, potentially leading to a formal decision against Meta if the concerns are confirmed.

Meta DMA, Pay or Consent

Potential consequences for non-compliance include hefty fines – up to 20% of global turnover for repeated offenses. More drastic measures like forced business divestments are also on the table.

The Commission remains open to discussions with Meta to find a solution that complies with the DMA. This case sets a crucial precedent for how dominant platforms handle user data and privacy in the age of stricter regulations.

French Authorities Seized Nearly $6M in Child Sexual Abuse and Drug Dealing Platform Takedown

French Authorities

French authorities seized servers and proceeds worth millions belonging to the "Coco" chat website, a free-for-all online platform that facilitated child sexual abuse and drug dealing, among other illegal activities.

In a major international cooperative effort, the French authorities, alongside Bulgaria, Germany, Lithuania, Netherlands, and Hungary, dismantled a notorious online platform that facilitated a range of criminal activities.

Under investigation since December 2023, the website called "Coco" has facilitated child pornography, sexual exploitation, drug dealing and violent acts including homicides, said Eurojust, the European Union Agency for Criminal Justice Cooperation.

The details of the seizure were revealed on Monday, a week after the initial announcement from the Paris prosecutor's office that the website was no longer available and only displayed a seizure notice from the French national police.

Platform Served as Hub for Organized Crime

For years, the platform served as a virtual meeting ground for criminals, enabling them to communicate, plan operations, and conduct transactions, said Eurojust. Over 23,000 judicial procedures linked to this platform have been initiated since 2021, with at least 480 victims identified to date.

French authorities launched an investigation in December last year after it received a host of allegations about the abuse faced by some individuals through the platform. The investigation uncovered the platform's role in facilitating activities like human trafficking and child exploitation for organized crime groups, after which the authorities took steps to shut it down.

Coordinated Takedown Nets Servers and Millions

A synchronized operation supported by Eurojust led to the seizure of servers located in Germany, effectively shutting down the platform and displaying a splash page. Lithuanian and Hungarian authorities swiftly executed freezing orders, securing over €5.6 million in suspected criminal funds.

Furthermore, a European Investigation Order (EIO) issued by France was successfully executed in Bulgaria. French magistrates and law enforcement officials, authorized by Bulgarian authorities, conducted bank statement reviews, searches, seizures, and witness interviews.

Coco Chat Site's Links to Violence

Coco was a chat website with a notorious lack of moderation. Rights groups in France have labeled it a "predator's den" due to its alleged links to violence. SOS Homophobie, for instance, called for its closure after a brutal attack on a gay man allegedly planned by Coco users. Child protection groups have also campaigned against Coco since 2013, citing its easy access for criminals. The website, owned by a Bulgarian company and operating outside French jurisdiction with a [.]gg domain, boasted over 850,000 users in France as of 2023. Paris prosecutors connect Coco's anonymity to its appeal for criminals, highlighting a recent murder allegedly set up on the platform.

Prudential Data Breach Grows Nearly 70-Fold: Over 2.5 Million Affected

Prudential Data Breach, Prudential

A data breach at insurance giant Prudential has ballooned far beyond initial estimates, with regulators informed that over 2.5 million individuals may have had personal information compromised. This significant update comes after Prudential downplayed the incident in March, stating only 36,545 customers were affected. Prudential is the second largest life insurance company in the United States, with 40,000 employees worldwide and revenue of $50 billion in 2023.

Initial Claims vs. Updated Numbers

In March 2024, following a February network intrusion, Prudential reported to regulators that hackers accessed a limited dataset, including names, addresses, and driver's license/ID numbers, for 36,545 individuals. However, updated data breach filings submitted to Maine regulators on June 30th paint a much bleaker picture. The revised figures show a staggering 2,556,210 customers potentially impacted by the data leak.

A Prudential spokesperson clarified that the leaked information may vary for each affected individual. While the full scope of the breach is under investigation, the significant increase in reported victims raises concerns about the initial assessment and potential notification delays.

Prudential's Response and Next Steps

Prudential maintains they have completed a "complex analysis" of the affected data and initiated a rolling notification process starting in March. However, the vast increase in impacted individuals begs the question of whether these notifications were comprehensive and timely. The company assures it's offering all affected individuals 24 months of complimentary credit monitoring.

ALPHV Ransomware Gang Claimed Prudential Data Breach

Prudential has yet to disclose details about the attackers behind the February data breach. However, the ALPHV/BlackCat ransomware gang took responsibility for the incident on February 13. The gang is now shut down, but not before running an exit scam and getting a hefty ransom of $22 million from the Change Healthcare breach. The FBI tied ALPHV to over 60 breaches in its first four months, netting at least $300 million from more than 1,000 victims by September 2023.

Notably, this is not Prudential's first major data breach. In 2023, a separate attack involving a compromised file transfer tool exposed the Social Security numbers and other sensitive data of over 320,000 customers.

Prudential's revised data breach figures raise critical questions about incident response protocols, data forensics capabilities, and the potential impact on millions of customers. Regulatory bodies could scrutinize Prudential's handling of the situation as the situation evolves.

Synnovis Ransomware Attack: Slow Recovery and Potential Patient Data Breach

Synnovis ransomware attack, ransomware attack, Synnovis, NHS Blood Testing, Synnovis

The ransomware attack that crippled Synnovis, a key pathology provider for southeast London's NHS Trusts, continues to disrupt critical services nearly a month after the initial attack. While some progress has been made, the slow recovery highlights the fragility of healthcare infrastructure and the potential for wider patient data breaches.

Technical Hurdles Plague Restoration Efforts

The attack that took place on June 3 knocked out most of Synnovis' IT systems, impacting everything from lab analysis equipment to results transmission. With electronic workflows crippled, the lab reverted to manual processes, significantly hindering processing capacity and turnaround times.

The daily blood sampling count in major London hospitals plunged from 10,000 to merely 400 per day after the cyberattack. The biggest challenge that Synnovis is facing is that all its automated end-to-end laboratory processes are offline, since all IT systems have been locked down in response to the ransomware attack.

The ongoing recovery prioritizes critical systems first. New middleware deployed at partner hospitals aims to streamline result reporting, but full restoration remains a distant prospect. Synnovis is collaborating its parent company, SYNLAB, and NHS to ensure a secure and phased recovery.

Mutual Aid Boosts Capacity, But Data Breach Looms Large

To address the backlog of critical tests, Synnovis implemented a "Mutual Aid" program across southeast London boroughs, leveraging partner labs within the NHS network. Additionally, SYNLAB is diverting resources from its wider UK and international network to bolster processing capacity.

However, a more concerning development emerged on June 20. A Russian ransomware group called Qilin claimed responsibility for the attack and leaked data online. Synnovis later confirmed the published data was stolen from its administrative drives.

"This drive held information which supported our corporate and business support activities. Synnovis personnel files and payroll information were not published, but more needs to be done to review other data that has been published relating to our employees." - Synnovis

While a full analysis is ongoing, initial findings suggest the data may contain patient information like full names, NHS numbers, and test codes.

Uncertainties for Synnovis Remain as Investigation Continues

The stolen data appears partial and in a complex format, making analysis and identification of impacted individuals challenging. Synnovis, with assistance from the NCSC and NHS cybersecurity specialists, is investigating the attack's scope and potential data breach. Law enforcement and the Information Commissioner are also kept informed.

Mark Dollar, CEO of Synnovis, acknowledged the disruption and expressed regret for the inconvenience caused.

“We are very aware of the impact and upset this incident is causing to patients, service users and frontline NHS colleagues, and for that I am truly sorry. While progress has been made, there is much yet to do, both on the forensic IT investigation and the technical recovery. We are working as fast as we can and will keep our service users, employees and partners updated.” - Mark Dollar, CEO of Synnovis

However, the timeline for full system restoration and the extent of the potential data breach remain unclear.

The Synnovis attack highlights a broader trend within healthcare IT systems and the potential consequences of third-party cyberattacks. SYNLAB, the parent company of Synnovis, has been targeted by cybercriminals multiple times in the last year. Similar attacks hit their subsidiaries in Italy in April 2024 and a year earlier in France. These incidents underline a concerning rise in third-party vulnerabilities within the healthcare industry.

As Synnovis grapples with recovery, the cybersecurity community awaits further details on the data breach and its potential impact on patients.

Chrome to ‘Distrust’ Entrust Certificates: Major Shakeup for Website Security

Chrome Entrust

Google's Chrome browser is making a significant security move by distrusting certificates issued by Entrust, a prominent Certificate Authority (CA), beginning late 2024. This decision throws a wrench into the operations of numerous websites including those of major organizations like Bank of America, ESPN, and IRS.GOV, among others.

Digital certificates (SSL/TLS) play a vital role in ensuring secure connections between users and websites. These certificates issued by trusted CAs act as a security seal - more like a blue tick for websites - and helps users gauge the legitimacy of the website. It also ensures an encrypted communication to prevent data breaches.

However, Chrome is removing Entrust from its list of trusted CAs due to a concerning pattern of "compliance failures, unmet improvement commitments, and the absence of tangible, measurable progress" over the past six years. Entrust's repeated shortcomings in upholding security standards have led Google to lose confidence in their ability to act as a reliable CA.

"It is our opinion that Chrome’s continued trust in Entrust is no longer justified." - Google Chrome

This move also extends to AffirmTrust, a lesser-known provider acquired by Entrust. While these certificates account for only a small fraction (0.1%) compared to Let's Encrypt (49.7%), the impact is still significant considering organizations like Bank of America, BookMyShow, ESPN and even government websites like IRS.gov, which have high internet traffic volumes, are also certified by Entrust.

[caption id="attachment_79569" align="aligncenter" width="1024"]Entrust, Bank of America, IRS Bank of America and IRS.gov certificates as displayed on Chrome Certificate Viewer[/caption]

What This Means for Users and Website Owners

Starting November 1, 2024, Chrome users encountering websites with distrusted Entrust certificates will be met with a full-page warning proclaiming the site as "not secure."

[caption id="attachment_79563" align="aligncenter" width="1024"]Entrust Sample of how Chrome will display warning for websites having a certificate from Entrust or AffirmTrust (Source: Google)[/caption]

This warning only applies to certificates issued after October 31, 2024, providing a grace period for websites with existing Entrust certificates. However, as certificates have lifespans, website owners must transition to a different CA before expiration. Considering its market share Let's Encrypt, a free and trusted option, comes highly recommended.

This shift is crucial for maintaining a secure web environment. When a CA fails to meet expectations, it jeopardizes the entire internet ecosystem. Chrome's decision prioritizes user protection by eliminating trust in potentially compromised certificates.

Website owners using impacted Entrust certificates should act swiftly to switch to a different CA. The Chrome Certificate Viewer can be used to identify certificates issued by Entrust. While this may seem inconvenient, it's necessary to ensure continued user access without security warnings.

Potential Workaround Only on Internal Networks

Large organizations managing internal networks have some leeway. Chrome allows enterprises to bypass these changes by installing the affected certificates as trusted on their local networks. This ensures internal websites using these certificates function normally.

The Entrust Controversy: A Deeper Look

Further context emerges from discussions on Mozilla's Bug Tracker (Bug 1890685). It reveals a critical issue – Entrust's failure to revoke a specific set of Extended Validation (EV) TLS certificates issued between March 18 and 21, 2024. This violated their own Certification Practice Statement (CPS).

Entrust opted against revoking the certificates, citing potential customer confusion and denying any security risks. However, this decision sparked outrage. Critics emphasized the importance of proper revocation procedures to uphold trust in the CA system. Entrust's prioritization of customer convenience over security raised concerns about their commitment to strict adherence to security best practices.

A detailed post on Google Groups by Mike Shaver sheds further light on the situation. Shaver expresses doubt in Entrust's ability to comply with WebPKI and Mozilla Root Store Program (MRSP) requirements. Despite attempts to address these concerns, Entrust's handling of certificate revocation, operational accountability, and transparency remain under scrutiny.

Shaver points out Entrust's tendency to prioritize customer convenience over strict adherence to security standards. He also criticizes the lack of detailed information regarding organizational changes and Entrust's failure to meet Mozilla's incident response requirements. Until Entrust demonstrates substantial improvements and transparency, continued trust in their certificates poses a significant risk to the overall web PKI and the security of internet users.

But this is not the end of it. In fact it is just the tip of the ice berg. Shaver's comments in the forum are in response to a host of compliance incidents between March and May related to Entrust. Ben Wilson summarized these recent incidents in a dedicated wiki page.

"In brief, these incidents arose out of certificate mis-issuance due to a misunderstanding of the EV Guidelines, followed by numerous mistakes in incident handling including a deliberate decision to continue mis-issuance," Wilson said.

This is a very serious shortcoming on Entrust's behalf considering the stringent norms and root store requirements, he added.

However, Chrome's decision to distrust Entrust certificates sends a strong message – prioritizing user safety requires holding CAs accountable for upholding the highest security standards.

Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Crypto Scammers Hijack Channel 7 News Australia’s YouTube Account, Use Elon Musk Deepfake to Ask for Crypto Investment

Crypto Scammers, Channel 7, 7 News, Deepfake

Crypto scammers hijacked Channel 7 News Australia's YouTube account to run a live stream of an Elon Musk deepfake on loop. The AI-generated version of the business tycoon was seen luring users to scan a QR code and invest in a money-doubling scheme through cryptocurrency. The news and media company is investigating claims even as traces of account takeover persist at the time this article was published.

Crypto Scammers Shift to Deepfake Deployment

Crypto scammers hijacking social media accounts of popular brands and celebrities on platforms like YouTube and X is not a novel thing. But what transpired on Thursday could very well be a snippet of things to come as we move towards the Age of AI.

Crypto scammers first took over the YouTube account of Channel 7 News and modified it in a way that it masqueraded the official Tesla channel.

[caption id="attachment_79292" align="aligncenter" width="300"]Crypto Scammers Hijacked Channel 7 News' YouTube Account Screenshot (Source: Reddit)[/caption]

After making aesthetic changes to the YouTube account, the crypto scammers replaced the videos in the channel with a deepfake live stream of Tesla chief Elon Musk. The AI-generated Musk was seen encouraging viewers to scan a QR code and invest in cryptocurrency.

[caption id="attachment_79296" align="aligncenter" width="600"]Crypto scammers, Elon Musk Deepfake Musk's Deepfake Asking Users to Scan or Regret (Source: Reddit)[/caption] As per local media, the Musk deepfake said, "All you need to do is scan the QR code on the screen, go to the website and watch your cryptocurrency double. Today's event is a chance for all crypto enthusiasts and users to double their assets."

"This is an opportunity that cannot be missed." - Elon Musk Deepfake

The deepfake video was made in a way that Musk's AI version even interacted with the audience, where he continued to say that twice as much would return to investors' wallets.

The Channel 7 News has several region- and programming-specific YouTube channels, and most of them seemed to be hijacked at present, with all of them running the same deepfake live stream on loop. The page is no longer accessible via direct links from the company website, but as pointed by a Reddit user, if you go to the YouTube channel via the platform's search, it still displays the changes made by crypto scammers, which is a Tesla logo as seen in the images above.

Experts, Leaders Press for Deep Fake Regulations

Owing to the menace of deepfakes, nearly 1,500 AI and tech experts in February urged global regulation of deepfakes to curb risks like fraud and political disinformation. An open letter recommends that lawmakers criminalize deepfake child pornography, penalize creators and facilitators of harmful deepfakes, and hold software developers accountable.
"The whole deepfake supply chain should be held accountable, just as they are for malware and child pornography." - The Open Letter
Legal experts and technologists have also previously urged the U.S. Congress to regulate the use of deepfake technologies and provide new protections particularly for women and minority communities against the use of digitally manipulated media. Experts warned that the deceptive content is already affecting national security, personal privacy and public trust.

More than $250M Seized in Global Online Scam Crackdown

Global Online Scam, Global Online Scam Crackdown, Interpol

A coordinated international police operation led by Interpol has resulted in the disruption of global online scam networks that carried out phishing, investment fraud, romance and impersonation scams and operated fake online shopping sites. The global operation, codenamed “First Light,” led to the seizure of assets amounting to $257 million and froze more than 6,700 bank accounts linked to the online scam syndicates. Under the banner of Operation First Light 2024, the police also arrested a total of 3,950 suspects and identified another 14,643 as likely members of the global online scam syndicates.
“By confiscating such large amounts of money, and disrupting the networks behind them, we not only safeguard our communities but also deal a significant blow to the transnational organized crime groups that pose such a serious threat to global security.” - Director of Interpol’s Financial Crime and Anti-Corruption Centre (IFCACC), Dr Isaac Kehinde Oginni

Global Online Scam Crackdown Impact

The impact of this police operation against global online scam is “more than just numbers – they represent lives protected, crimes prevented, and a healthier global economy worldwide,” Oginni said. Interpol’s Global Rapid Intervention of Payments (I-GRIP) mechanism traced and intercepted the illicit proceeds from online scams across borders in both, fiat currency cash ($135 million) and cryptocurrency ($2 million). An example of this interception was a business email compromise fraud that involved a Spanish citizen who unwittingly transferred $331,000 to Hong Kong, China, the Interpol said. In another case, the Australian authorities successfully recovered AU$ 5.5 million (approximately $3.7 million) for an impersonation scam victim, after the online scammers fraudulently transferred the funds to Malaysia and Hong Kong-based bank accounts. The global nature of online scams was underscored by the operation’s diverse participants. From rescuing 88 young people forced to work in a Namibian scam ring to preventing a tech support scam targeting a senior citizen in Singapore, Operation First Light 2024 showcased the importance of international cooperation. Operations of First Light have been coordinated since 2014 and are designed to fight social engineering and telecom fraud. The operation is funded by China’s Ministry of Public Security and coordinated by Interpol. [caption id="attachment_79238" align="aligncenter" width="1024"]Global Online Scam, Global Online Scam Crackdown, Interpol Operation First Light conclusion meeting in Tianjin, China (Source: Interpol)[/caption] In 2022, First Light saw a coordinated effort between law enforcement of 76 countries that resulted in the seizure of $50 million worth of illicit funds that was defrauded from more than 24,000 victims. “The world is grappling with the severe challenges of social engineering fraud, and organized crime groups are operating from Southeast Asia to the Middle East and Africa, with victims on every continent,” Oginni said.
“No country is immune to this type of crime, and combating it requires very strong international cooperation.” - Dr Isaac Kehinde Oginni

Investment and Phishing Scams Top Threats to U.S.

According to FBI's Internet Crime report (IC3), Investment scams led to the highest reported losses in the United Stated last year. Totaling $4.57 billion, investment scams saw a 38% increase from 2022. Crypto-investment fraud also rose 53% to $3.94 billion. Scammers mainly targeted individuals aged 30-49 in these scam types. Phishing schemes, on the other hand, were the most reported crime in 2023, with over 298,000 complaints, comprising 34% of all complaints received. In the FBI San Francisco division, there were 364 complaints with nearly $1.5 million in losses. Santa Clara County had the most complaints, while Alameda County had the highest losses at $500,000.

OpenAI’s ChatGPT ‘Voice Mode’ Doesn’t Meet Safety Standards; Rollout Pushed to July

Voice Mode, OpenAI Voice Mode

Experts are raising eyebrows after OpenAI announced a one-month delay in the rollout of its highly anticipated “Voice Mode” feature for ChatGPT, citing safety concerns. The company said it needs more time to ensure the model can “detect and refuse certain content.”
“We’re improving the model’s ability to detect and refuse certain content. We’re also working on enhancing the user experience and scaling our infrastructure to support millions of users while maintaining real-time responses.” - OpenAI
The stalling of the rollout comes a month after OpenAI announced a new safety and security committee that would oversee issues related to the company’s future projects and operations. It is unclear if this postponement was suggested by the committee or by internal stakeholders.

Features of ChatGPT’s ‘Voice Mode’

OpenAI unveiled its GPT-4o system in May, boasting significant advancements in human-computer interaction. “GPT-4o (‘o’ for ‘omni’) is a step towards much more natural human-computer interaction,” OpenAI said at the time. The omni model can respond to audio inputs at an average of 320 milliseconds, which is similar to the response time of humans. Other salient features of the “Voice Mode” promise real-time conversations with human-like emotional responses, but this also raises concerns about potential manipulation and the spread of misinformation. The May announcement gave a snippet at the model’s ability to understand nuances like tone, non-verbal cues and background noise, further blurring the lines between human and machine interaction. While OpenAI plans an alpha release for a limited group of paid subscribers in July, the broader rollout remains uncertain. The company emphasizes its commitment to a “high safety and reliability” standard but the exact timeline for wider access hinges on user feedback.

The ‘Sky’ of Controversy Surrounding ‘Voice Mode’

The rollout delay of “voice mode” feature of ChatGPT follows the controversy sparked by actress Scarlett Johansson, who accused OpenAI of using her voice without permission in demonstrations of the technology. OpenAI refuted the claim stating the controversial voice of “Sky” - one of the five voice modulation that the Voice Mode offers for responses – belonged to a voice artist and not Johansson. The company said an internal team reviewed the voices it received from over 400 artists, from a product and research perspective, and after careful consideration zeroed on five of them, namely Breeze, Cove, Ember, Juniper and Sky. OpenAI, however, did confirm that its top boss Sam Altman reached out to Johannson to integrate her voice.
“On September 11, 2023, Sam spoke with Ms. Johansson and her team to discuss her potential involvement as a sixth voice actor for ChatGPT, along with the other five voices, including Sky. She politely declined the opportunity one week later through her agent.” - OpenAI
Altman took a last chance of onboarding the Hollywood star this May, when he again contacted her team to inform the launch of GPT-4o and asked if she might reconsider joining as a future additional voice in ChatGPT. But instead, with the demo version of Sky airing through, Johannson threatened to sue the company for “stealing” her voice. Owing to the pressure from her lawyers, OpenAI removed the Sky voice sample since May 19.
“The voice of Sky is not Scarlett Johansson's, and it was never intended to resemble hers. We cast the voice actor behind Sky’s voice before any outreach to Ms. Johansson. Out of respect for Ms. Johansson, we have paused using Sky’s voice in our products. We are sorry to Ms. Johansson that we didn’t communicate better.” – Sam Altman
Although the issue seems to have resolved for the time being, this duel between Johannson and Altman brought to the fore the ethical considerations surrounding deepfakes and synthetic media.

Likely Delays in Apple AI and OpenAI Partnership Too

If the technical issues and the Sky voice mode controversy weren’t enough, adding another layer of complication to OpenAI’s woes is Apple’s recent brush with EU regulators that now casts a shadow over the future of ChatGPT integration into Apple devices. Announced earlier this month, the partnership aimed to leverage OpenAI's technology in Cupertino tech giant’s “Apple Intelligence” system. However, with Apple facing potential regulatory roadblocks under the EU’s Digital Markets Act (DMA), the integration’s fate remains unclear. This confluence of factors – safety concerns, potential for misuse, and regulatory hurdles – paints a complex picture for OpenAI's “Voice Mode.” The cybersecurity and regulatory industry will undoubtedly be watching closely as the technology evolves, with a keen eye on potential security vulnerabilities and the implications for responsible AI development.

Russian Man Indicted for Cyberattacks Targeting Ukraine with WhisperGate Malware Ahead of 2022 Invasion

Amin Stigal, Cyberattacks on Ukraine

A U.S. grand jury has indicted a Russian citizen, Amin Timovich Stigal, for allegedly conspiring with Russia's military intelligence agency (GRU) to launch cyberattacks crippling Ukrainian government systems and data ahead of Russia's full-scale invasion in February 2022.

The indictment, unsealed yesterday in Maryland, sheds light on a coordinated effort to disrupt critical Ukrainian infrastructure and sow panic among the population.

“As alleged, the defendant conspired with Russian military intelligence on the eve of Russia’s unjust and unprovoked invasion of Ukraine to launch cyberattacks targeting the Ukrainian government and later targeting its allies, including the United States.” - Attorney General Merrick B. Garland

Attacker Aimed for 'Complete Destruction' in Cyberattacks Targeting Ukraine

Stigal, 22, who remains at large, was charged for his alleged role in using a deceptive malware strain called "WhisperGate" to infiltrate dozens of Ukrainian government networks, including ministries, state services, and critical infrastructure entities. Disguised as ransomware, WhisperGate reportedly went beyond data encryption, aiming for complete destruction of targeted systems and data.

The attacks coincided with the defacement of Ukrainian websites displaying threatening messages designed to intimidate the public. Sensitive data, including patient health records, was exfiltrated and offered for sale online, further amplifying the chaos.

U.S. Critical Infrastructure Targeted Too

But the malicious campaign wasn't limited to cyberattacks targeting Ukraine. The indictment broadens the scope beyond Ukraine, revealing attempts to probe U.S. government networks in Maryland using similar tactics.

“These GRU actors are known to have targeted U.S. critical infrastructure. During these malicious cyber activities, GRU actors launched efforts to scan for vulnerabilities, map networks, and identify potential website vulnerabilities in U.S.-based critical infrastructure – particularly the energy, government, and aerospace sectors.” - Rewards for Justice

The scope of the malicious campaign highlights the potential wide-ranging objectives of the GRU cyber campaign and the ongoing threat posed by nation-state actors.

Reward Offered for Info Leading to Capture

The Justice Department emphasized its commitment to holding accountable those responsible for Russia's malicious cyber activity. The indictment carries a maximum sentence of five years, but international cooperation remains crucial to apprehend Stigal.

The U.S. Department of State's Rewards for Justice program is offering a significant reward – up to $10 million – for information leading to Stigal's capture or the disruption of his cyber operations. This substantial reward underscores the seriousness of the charges and the international effort to dismantle Russia's cyber warfare apparatus.

This case serves as a stark reminder of the evolving cyber threat landscape. The destructive capabilities of malware like WhisperGate, coupled with the targeting of critical infrastructure necessitates vigilance and collaboration between governments and security professionals to defend against nation-state cyberattacks.

“Malicious cyber actors who attack our allies should know that we will pursue them to the full extent of the law,” said Erek L. Barron, U.S. Attorney for the District of Maryland. “Cyber intrusion schemes such as the one alleged threaten our national security, and we will use all the technologies and investigative measures at our disposal to disrupt and track down these cybercriminals.”

Who is Amin Stigal?

The U.S. linked 22-year-old Amin Stigal to the Russian GRU and labelled him for his involvement in the WhisperGate malware operations. But who is Amin Stigal and what is the extent of his involvement? [caption id="attachment_79079" align="aligncenter" width="947"]Amin Stigal Source: Rewards for Justice[/caption] The U.S. authorities, along with the $10 million bounty, released scarce but very important details on Stigal's cyber trail - his aliases or the threat group names with whom he is affiliated. The Cyber Express did an open-source intelligence (OSINT) study on these aliases and found the following details on Amin Stigal's cyber activities:

DEV-0586/Cadet Blizzard

Microsoft first tracked this threat actor as DEV-0586 and observed its destructive malware targeting Ukrainian organizations in January 2022. The tech giant later in April 2023 shifted to a new threat actor-naming taxonomy and thus named the TA "Cadet Blizzard." Cadet Blizzard has been operational since at least 2020 and has initiated a wave of destructive wiper attacks against Ukraine in the lead up to Russia's February 2022 invasion of Ukraine. Specifically, it created and developed WhisperGate, a wiper that deletes the master boot record, Microsoft said.

EMBER BEAR

Crowd Strike tracked this threat actor as EMBER BEAR (aka Lorec Bear, Bleeding Bear, Saint Bear) and linked it to an adversary group that has operated against government and military organizations in eastern Europe since early 2021. The likely motive of this TA is to collect intelligence from target networks, the cybersecurity firm said. EMBER BEAR primarily weaponized the access and data obtained during their intrusions to support information operations (IO), according to CrowdStrike. Their aim in employing this tactic was to create public mistrust in targeted institutions and degrade respective government's ability to counter Russian cyber operations.

UAC-0056

The Computer Emergency Response Team of Ukraine tracked this Russian-linked threat actor/group as UAC-0056 and observed its malicious campaigns targeting Ukraine through phishing campaigns in July 2022. In the discovered attack, threat actors sought to disrupt the integrity and availability of government websites by exploiting several backdoors and deploying Cobalt Strike Beacon malware. The threat actors communicated with the web shell using IP addresses, including those belonging to neighboring devices of other hacked organizations due to their previous account abuse and additional VPN connection to the corresponding organizations. The hackers also applied other malware samples in this campaign including the GOST (Go Simple Tunnel) and Ngrok utilities, to deploy the HoaxPen backdoor.

What is WhisperGate Malware?

WhisperGate is a destructive malware that is seemingly designed like a ransomware, but it is not. Unlike ransomware, which encrypts data and demands a ransom for decryption, WhisperGate aimed to completely destroy data, rendering the infected systems inoperable. It first targeted Ukrainian organizations in January 2022 and ever since continues to remain on the list of top malware variants used to target Kyiv.

Key Points on WhisperGate:

  • Multi-stage Attack: It operated in stages, with the first stage overwriting the Master Boot Record (MBR) to prevent the system from booting normally and displaying a fake ransom note.
  • Data Wiping: The MBR overwrite made data recovery nearly impossible.
  • Motive: Experts believe the goal was data destruction, not financial gain, due to the lack of a real decryption method.
  • Deployment: The malware resided in common directories like C:\PerfLogs and used a publicly available tool called Impacket to spread laterally within networks.

California Privacy Watchdog Inks Deal with French Counterpart to Strengthen Data Privacy Protections

Data Privacy Protections, Data Privacy, CNIL, CPPA, CCPA, Privacy, Protection

In a significant move to bolster data privacy protections, the California Privacy Protection Agency (CPPA) inked a new partnership with France’s Commission Nationale de l'Informatique et des Libertés (CNIL). The collaboration aims to conduct joint research on data privacy issues and share investigative findings that will enhance the capabilities of both organizations in safeguarding personal data. The partnership between CPPA and CNIL shows the growing emphasis on international collaboration in data privacy protection. Both California and France, along with the broader European Union (EU) through its General Data Protection Regulation (GDPR), recognize that effective data privacy measures require global cooperation. France’s membership in the EU brings additional regulatory weight to this partnership and highlights the necessity of cross-border collaboration to tackle the complex challenges of data protection in an interconnected world.

What the CPPA-CNIL Data Privacy Protections Deal Means

The CPPA on Tuesday outlined the goals of the partnership, stating, “This declaration establishes a general framework of cooperation to facilitate joint internal research and education related to new technologies and data protection issues, share best practices, and convene periodic meetings.” The strengthened framework is designed to enable both agencies to stay ahead of emerging threats and innovations in data privacy. Michael Macko, the deputy director of enforcement at the CPPA, said there were practical benefits of this collaboration. “Privacy rights are a commercial reality in our global economy,” Macko said. “We’re going to learn as much as we can from each other to advance our enforcement priorities.” This mutual learning approach aims to enhance the enforcement capabilities of both agencies, ensuring they can better protect consumers’ data in an ever-evolving digital landscape.

CPPA’s Collaborative Approach

The partnership with CNIL is not the CPPA’s first foray into international cooperation. The California agency also collaborates with three other major international organizations: the Asia Pacific Privacy Authorities (APPA), the Global Privacy Assembly, and the Global Privacy Enforcement Network (GPEN). These collaborations help create a robust network of privacy regulators working together to uphold high standards of data protection worldwide. The CPPA was established following the implementation of California's groundbreaking consumer privacy law, the California Consumer Privacy Act (CCPA). As the first comprehensive consumer privacy law in the United States, the CCPA set a precedent for other states and countries looking to enhance their data protection frameworks. The CPPA’s role as an independent data protection authority mirror that of the CNIL - France’s first independent data protection agency – which highlights the pioneering efforts of both regions in the field of data privacy. Data Privacy Protections By combining their resources and expertise, the CPPA and CNIL aim to tackle a range of data privacy issues, from the implications of new technologies to the enforcement of data protection laws. This partnership is expected to lead to the development of innovative solutions and best practices that can be shared with other regulatory bodies around the world. As more organizations and governments recognize the importance of safeguarding personal data, the need for robust and cooperative frameworks becomes increasingly clear. The CPPA-CNIL partnership serves as a model for other regions looking to strengthen their data privacy measures through international collaboration.

CISA: Hackers Breached Chemical Facilities’ Data in January

Chemical Facilities', Chemical Facilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) confirmed on Monday that a cyberattack in January may have compromised sensitive information related to the nation's chemical facilities. Initially reported in March, the attack exploited a vulnerability in Ivanti products, leading to the temporary shutdown of two systems. In an advisory this week, CISA detailed that the Chemical Security Assessment Tool (CSAT) was specifically targeted by the cyber intrusion, which occurred between January 23 and 26. CSAT contains highly sensitive industrial data, and while all information was encrypted, CISA warned affected participants of the potential for unauthorized access.

Potential Data Compromised in Chemical Facilities' Targeting

CISA's investigation found no direct evidence of data exfiltration but indicated that the hackers might have accessed critical information such as site security plans, security vulnerability assessments (SVAs), and user accounts within CSAT. Additionally, "Top-Screen surveys," which detail the types and quantities of chemicals, their properties, and storage methods at facilities, might have been exposed. High-risk chemical facilities are mandated to submit SVAs outlining their critical assets, cyber and physical security policies, and an analysis of potential vulnerabilities. Other compromised documents could include details on cybersecurity measures, alarms and physical barriers in place at these facilities.

CISA's Response and Recommendations

CISA has informed participants in the Chemical Facility Anti-Terrorism Standards (CFATS) program about the potential data exposure. Although no credentials were confirmed to be stolen, CISA advises those with CSAT accounts reset any identical business or personal passwords. They also recommend organizations using Ivanti products review a February advisory about recent vulnerabilities. The agency cannot directly notify individuals submitted for terrorist vetting under the CFATS Personnel Surety Program because it did not collect their contact information. However, identity protection services will be offered to those affected, specifically those vetted between December 2015 and July 2023.

Investigation Findings

The breach was detected on January 26, when CISA discovered hackers installing tools on an Ivanti device. Further investigation revealed multiple accesses to the system over two days. Various departments within CISA and the Department of Homeland Security (DHS) were involved in the investigation, which confirmed no hacker access beyond the initial Ivanti device. Despite the absence of evidence for data exfiltration, the potential risk to numerous individuals and organizations categorized this intrusion as a "major incident" under the Federal Information Security Modernization Act (FISMA). CISA is setting up a call center to assist impacted individuals, although it is not yet operational. The agency did not comment on the perpetrators of the attack, but since 2020, CISA has cautioned organizations about state-sponsored hackers, including those linked to China, exploiting vulnerabilities in Ivanti products.

Experts Say More Transparency Required

Roger Grimes, a data-driven defense evangelist at KnowBe4, lauded CISA's intent and the fact that it publicly accepted the hack but said a bit more transparency would have done no harm.

"I'm a big fan of CISA. I think they do wonderful work. Still, it would be useful to have better, full transparency," Grimes told The Cyber Express. "Was their Ivanti device exploited by an unpatched, but known vulnerability, or exploited by a 0-day? If they were exploited by a known vulnerability where a patch was available, which is more likely, why wasn't the patch installed? Was it simply due to the fact that the exploit happened faster than the patch could be applied? Was the patch missed? If the patch was missed, why? Or was it a 0-day, misconfiguration, or credential compromise?"

"This is not to embarrass CISA, but to learn why one of the best, most aggressive patch-pushing, cyber-defending organizations in the world got compromised," Grimes added. "Sharing what happened and why can help other organizations facing similar problems and challenges learn lessons.

"CISA is always pushing for other industries and vendors to be more transparent about their compromises so that we can all learn from the lessons and mistakes. I expect CISA to do the same and even lead by example when it's their infrastructure involved."

With U.S. Plea Deal, WikiLeaks Founder Assange is Free after 14-Year Legal Battle

Julian Assange, WikiLeaks, Julian Assange is free

After a 14-year legal battle, WikiLeaks founder Julian Assange walked out of the United Kingdom’s Belmarsh prison Monday morning, where he agreed to a plea deal with the United States. According to court documents, Assange agreed to plead guilty to a single charge of conspiracy to obtain and disclose national defense information, which violates espionage law in the United States. The sole charge carries a sentence of 62 months in prison, but under the plea deal the time he has already served in the UK prison — a little over 62 months — will be counted as time served. Thus, Assange will not be required to spend any more time behind bars in the U.S., the UK or anywhere else.

WikiLeaks and Human Rights Groups Celebrate Assange's Release

In a statement on platform X, WikiLeaks wrote, “Julian Assange is free.”
“He left Belmarsh maximum security prison on the morning of 24 June, after having spent 1901 days there. He was granted bail by the High Court in London and was released at Stansted airport during the afternoon, where he boarded a plane and departed the UK.” – WikiLeaks
Assange is being flown to Saipan, the capital of the Northern Mariana Islands and a U.S. commonwealth in the Western Pacific Ocean. The formal hearing and sentencing is set to take place in the U.S. District Court for the Northern Mariana Islands at 9 a.m. local time Wednesday. Assange was reluctant to fly to the mainland U.S., his prosecutors said, and thus Saipan was decided as an alternative due to its proximity with Australia. If the guilty plea is approved by the judge – as is expected – the WikiLeaks founder will head to Australia after the sentencing. Human rights organization Amnesty International’s Secretary General, Agnès Callamard welcomed the “positive news.”
“We firmly believe that Julian Assange should never have been imprisoned in the first place and have continuously called for charges to be dropped.” - Amnesty International’s Secretary General, Agnès Callamard 
“The years-long global spectacle of the US authorities hell-bent on violating press freedom and freedom of expression by making an example of Assange for exposing alleged war crimes committed by the USA has undoubtedly done historic damage,” Callamard said. “Amnesty International salutes the work of Julian Assange’s family, campaigners, lawyers, press freedom organizations and many within the media community and beyond who have stood by him and the fundamental principles that should govern society’s right and access to information and justice.” The Mexican President Andrés Manuel, sounded a similar sentiment and said:
“I celebrate the release of Julian Assange from prison. At least in this case, the Statue of Liberty did not remain an empty symbol; She is alive and happy like millions in the world.”

Brief Timeline of Julian Assange Espionage Case

Julian Assange, the founder and Editor-in-Chief of WikiLeaks, gained prominence after the site published more than 90,000 classified U.S. military documents on the Afghanistan war and about 400,000 classified U.S. documents on the Iraq war. After the release of these documents via WikiLeaks, Assange was indicted by the U.S. on 18 counts, including 17 espionage charges under the 1917 Espionage Act and one for computer misuse, where he allegedly gained unauthorized access to a government computer system of a NATO country. In 2012, Assange communicated directly with a leader of the hacking group LulzSec (who by then was cooperating with the FBI), and provided a list of targets for LulzSec to hack, the indictment said. With respect to one target, Assange asked the LulzSec leader to look for (and provide to WikiLeaks) mail and documents, databases and PDFs. In another communication, Assange told the LulzSec leader that the most impactful release of hacked materials would be from the CIA, NSA, or the New York Times. WikiLeaks obtained and published emails from a data breach committed against an American intelligence consulting company by an “Anonymous” and LulzSec-affiliated hacker. According to that hacker, Assange indirectly asked him to spam that victim company again. An August 2010 arrest warrant for sexual assault allegations in Sweden was initially dropped but later reopened, leading to an international arrest warrant against him. Assange then sought refuge in the Ecuadorian embassy in London. In 2019, Ecuador revoked his asylum, and he was arrested by London police and sentenced to 50 weeks in prison for breaching bail conditions. Swedish prosecutors dropped their case in 2019 because the passage of time had weakened evidence, but they said they retained confidence in the complainant.

Assange’s Freedom Starts ‘a New Chapter’

Stella Assange, the WikiLeaks founder’s wife, was elated and thanked everyone who stood by her husband. “Throughout the years of Julian’s imprisonment and persecution, an incredible movement has been formed. People from all walks of life from around the world who support not just Julian ... but what Julian stands for: truth and justice,” Stella Assange said. “What starts now with Julian’s freedom is a new chapter.” It will be interesting to see if Assange will be back at the helm of WikiLeaks and if he will keep his fight on against human right exploitations but for now it seems like he would be eager to reunite with his wife Stella Assange, and his children, “who have only known their father from behind bars.” Update* (June 25 1:30 p.m. ET): Added comments from Amnesty International’s Secretary General, Agnès Callamard and President of Mexico, Andrés Manuel.
❌