Newsflash maandag 25 maart 2024
Bedrijven mogen dreigingsinformatie ontvangen van de overheid
(agconnect.nl)

De Tweede Kamer heeft ingestemd met een wetsvoorstel waarmee het voor overheden mogelijk wordt om informatie over digitale kwetsbaarheden en dreigingen te delen met niet-vitale bedrijven. Alleen BBB, SP en PvdD stemden tegen.

Bedrijven die nu als ‘niet-vitaal’ voor Nederland worden beschouwd worden tot op heden niet door de overheid geïnformeerd over digitale bedreigingen en kwetsbaarheden in hun eigen digitale omgeving. Met de Wet bevordering digitale weerbaarheid bedrijven wordt dat mogelijk.

Het Digital Trust Center, dat inmiddels is samengegaan met het Nationaal Cyber Security Centrum (NCSC) en CSIRT-DSP, is al langer bezig met specifieke kwetsbaarheids- en dreigingsinformatie delen met niet-vitale bedrijven in Nederland.

Flevoziekenhuis laat e-mailadressen van 800 patiënten uitlekken
(tweakers.net)

Het Flevoziekenhuis in Almere heeft donderdag per abuis de e-mailadressen van 800 patiënten laten uitlekken. Dat gebeurde toen er een mail werd verstuurd met informatie over een nieuwe app en het gebruik ervan.

Volgens het ziekenhuis ging het voornamelijk om patiënten bij de maag-, darm- en leverafdeling. Bij het verzenden van de e-mail rond 16.30 uur werd geen gebruik gemaakt van de bcc-functie, waardoor de patiënten de e-mailadressen van andere personen konden zien .

Inmiddels loopt er een onderzoek over hoe het lek heeft kunnen ontstaan. Ook heeft het ziekenhuis het datalek gemeld bij de Autoriteit Persoonsgegevens.

Some 300,000 IPs vulnerable to this Loop DoS attack
(theregister.com)

As many as 300,000 servers or devices on the public internet are thought to be vulnerable right now to the recently disclosed Loop Denial-of-Service technique that works against some UDP-based application-level services.

It's said that certain implementations of TFTP, DNS, and NTP, as well as legacy protocols, such as Echo, Chargen, and QOTD, are at risk. Exploitation may result in services going down, if not whole machines or networks.

Judging from DNS, NTP, and TFTP scans, the largest number of public-facing potentially vulnerable systems are in China, Russia, and America, followed by Iran, South Korea, Italy, France, Canada, and Brazil.

Russian APT Releases More Deadly Variant of AcidRain Wiper Malware
(darkreading.com)

New AcidPour variant can attack a significantly broader range of targets including IoT devices, storage area networks, and handhelds.

Researchers have uncovered a more dangerous and prolific version of the wiper malware used by Russian military intelligence to disrupt satellite broadband service in Ukraine just prior to Russia's invasion of the country in February 2022.

The new variant, "AcidPour," bears multiple similarities with its predecessor but is compiled for X86 architecture, unlike AcidRain which targeted MIPS-based systems.

China accused of targeting millions of UK voters in cyber attack
(inews.co.uk)

The personal details of 40 millions voters were allegedly accessed in a cyber attack by China, ministers are expected to say today.

Deputy Prime Minister Oliver Dowden is expected to tell Parliament that Beijing is behind a wave of state-backed interference, which also targeted a group of 43 people including senior MPs and peers.

Ministers will set out details of the attack, in which Chinese hackers were reportedly able to access the name and address of anyone in Great Britain who was registered to vote between 2014 and 2022.

Scams are becoming more convincing and costly
(helpnetsecurity.com)

Scams directly targeting consumers continue to increase in both complexity and volume, according to Visa.

Consumers are increasingly targeted by scammers, who rely on heightened emotions to create fraud opportunities. While the number of individual scam reports from June to December decreased, the total money lost increased, indicating scammers are targeting victims with more effective – and costly – scams.

According to another Visa survey, more than one-third of adults surveyed decided not to report scams committed against them, suggesting the losses are higher than reported.

February 2024 Healthcare Data Breach Report
(hipaajournal.com)

There has been a fall in the number of reported healthcare data breaches for the second consecutive month, with 59 data breaches of 500 or more records reported to the Department of Health and Human Services’ Office for Civil Rights (OCR).

There were 10.6% fewer breaches reported in February than in January, which followed a 22% reduction between December 2023 and January 2024.

Over the past 12 months, an average of 64 healthcare breaches have been reported each month, and while February is well under that average, 22.9% more breaches were reported in February 2024 than in February 2023.

UnitedHealth Unit Will Start Processing $14B Medical Claims Backlog After Hack
(insurancejournal.com)

UnitedHealth Group said on Friday its Change Healthcare unit will start to process the medical claims backlog of more than $14 billion as it resumes some software services disrupted by a cyberattack last month.

The company has been scrambling to resume services at the technology unit that was hit by a cyberattack on Feb. 21, disrupting payments to U.S. doctors and healthcare facilities and forcing the U.S. government to launch a probe.

Community health centers that serve more than 30 million poor and uninsured patients have been especially hit.

Chinese snoops use F5, ConnectWise bugs to sell access into top US, UK networks
(theregister.com)

Chinese spies exploited a couple of critical-severity bugs in F5 and ConnectWise equipment earlier this year to sell access to compromised US defense organizations, UK government agencies, and hundreds of other entities, according to Mandiant.

The Google-owned threat hunters said they assess, "with moderate confidence," that a crew they track as UNC5174 was behind the exploitation of CVE-2023-46747, a 9.8-out-of-10-CVSS-rated remote code execution bug in the F5 BIG-IP Traffic Management User Interface, and CVE-2024-1709, a path traversal flaw in ConnectWise ScreenConnect that scored a perfect 10 out of 10 CVSS severity rating.

UNC5174 uses the online persona Uteus, and has bragged about its links to China's Ministry of State Security (MSS) – boasts that may well be true.

Vans claims cyber crooks didn't run off with its customers' financial info
(theregister.com)

Clothing and footwear giant VF Corporation is letting 35.5 million of its customers know they may find themselves victims of identity theft following last year's security breach.

In an email to customers, the Vans and North Face parent promised that crooks didn't swipe their credit card or bank account details.

And, it added, there's "no evidence" suggesting any stolen personal info, including names, emails, addresses, and phone numbers, has been used for nefarious purposes.

Gmail and Facebook Users Advised to Secure Their Accounts Immediately
(cysecurity.news)

According to Pauline Smith, Head of Action Fraud, the ubiquity of social media and email accounts makes everyone susceptible to fraudulent activities and cyberattacks.

As technology advances, detecting fraud becomes increasingly challenging, emphasising the critical need for enhanced security measures.

The report highlights three primary methods exploited by hackers to compromise accounts: on-platform chain hacking, leaked passwords, and phishing. On-platform chain hacking involves cybercriminals seizing control of one account to infiltrate others.

Strengthening Cyber Resiliency through Collaboration
(fortinet.com)

According to the National Institute of Standards and Technology (NIST), cyber resilience is “the ability to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises on systems that use or are enabled by cyber resources.”

Resilience focuses on reducing the consequences that could be caused by a cyber incident. The more resilient an organization is, the greater its ability to bounce back after a cyber incident or maintain mission-essential functions in a degraded environment.

Resilience denies an adversary the benefits they seek, potentially serving as a deterrent by altering their cost-benefit analysis.

Data tampering is an underrated threat — get your backup ready
(securitybrief.co.nz)

World Backup Day is an annual reminder of how important it is to have an up-to-date, readily accessible copy of everything that matters to your business.

Resilient backups allow you to recover more quickly from data damage, disruption, or loss, particularly if a ransomware attack has resulted in encrypted or deleted files.

These are well-known and widely reported benefits of backups — but there’s more. Immutable data backups can also protect you from the underrated threats of data tampering and malicious insiders, unpredictable activities that can significantly damage brand trust and reputation if they’re not addressed.

Shrouded Horizons: My Passage to the Dark Web Marketplaces
(hackernoon.com)

When I first began my journey into cybersecurity, everything was surrounded in mystery pertaining to the dark web and its marketplaces. I thought only those who dabbled in cybercrime knew how to get there, and we were locked out.

This echoed with me being in cybersecurity and watching so many companies getting compromised and having to pay ransoms just to be able to operate and take care of customers.

I couldn’t believe there was a cybercrime underbelly we all didn’t know about and could potentially utilize for research. It was at this moment that I decided to put on my black hoodie, drink an energy drink, and venture into the dark. Or, in this case, the dark web marketplaces.

Offline man says smartphone ban would be difficult
(bbc.com)

A Brighton man who has been offline for six years has said enforcing a smartphone ban on children would be difficult.

Luke Young, who came off social media completely at the age of 18, said: "I think the difficulty is that if they do ban it and treat it like a substance, then I think a lot of people will use it secretly."

A poll commissioned by Parentkind suggests that 58% of parents surveyed believed the Government should introduce a ban on smartphones for under-16s.

Cern: Scientists search for mysterious ghost particles
(bbc.com)

Some physicists have long suspected that mysterious 'ghost' particles in the world around us could greatly advance our understanding of the true nature of the Universe.

Now scientists think they've found a way to prove whether or not they exist. Europe's centre for particle research, Cern, has approved an experiment designed to find evidence for them.

The new instrument will be a thousand times more sensitive to such particles than previous devices. It will smash particles into a hard surface to detect them instead of against each other like Cern's main device the Large Hadron Collider (LHC).

20 essential open-source cybersecurity tools that save you time
(helpnetsecurity.com)

Open-source software’s adaptive nature ensures its durability, relevance, and compatibility with new technologies.

When I started digging deeper into the open-source cybersecurity ecosystem, I discovered an engaged community of developers working to find practical solutions to many problems, one of them being saving time.

Here are 20 essential open-source cybersecurity tools that are freely available and waiting for you to include them in your arsenal.

8 cybersecurity predictions shaping the future of cyber defense
(helpnetsecurity.com)

Among Gartner’s top predictions are the collapse of the cybersecurity skills gap and the reduction of employee-driven cybersecurity incidents through the adoption of generative AI (GenAI).

Two-thirds of global 100 organizations are expected to extend directors’ and officers’ insurance to cybersecurity leaders due to personal legal exposure. Furthermore, battling malinformation is projected to cost enterprises more than $500 billion.

“As we start moving beyond what’s possible with GenAI, solid opportunities are emerging to help solve a number of perennial issues plaguing cybersecurity, particularly the skills shortage and unsecure human behavior.

Why AI Obituary Scams Are a Cyber-Risk for Businesses
(darkreading.com)

Scammers now use AI to instantly whip up SEO-friendly bereavement scams, and it's never been easier to swindle mourners or use them to get to their employers.

Two-bit scammers are generating near-instant obituaries for recently deceased strangers, taking advantage of vulnerable loved ones and potentially infecting their devices with malware.

A new Secureworks blog post highlights just how rapidly these fake obits can be created and disseminated, as well as the potential risk that more sophisticated attackers could use the same scheme to cause more serious consequences for victims.

Tech Bytes: Researchers identify “enormous potential” for generative AI to be used in cyber security
(proactiveinvestors.com.au)

Researchers identifies “enormous potential” for generative AI to be used in cyber security
A study by researchers at Charles Darwin University (CDU) has uncovered the potential for generative artificial intelligence or GenAI tools to become a crucial asset in fighting cybercrime.

The study, conducted by researchers from CDU’s Energy and Resources Institute and India’s Christ Academy Institute for Advanced Studies, examined GenAI’s potential in penetration testing (pentesting), a security test which identifies weak points in a cyber security system’s defences.

Excellent tool for cyber security testing
“In the reconnaissance phase, ChatGPT can be used for gathering information about the target system, network or organisation for the purpose of identifying potential vulnerabilities and attack vectors,” CDU senior lecturer in Information Technology Dr Shanmugam said.

That Asian meal you eat on holidays could launder money for North Korea
(theregister.com)

If you dine out at an Asian restaurant on your next holiday, the United Nations thinks your meal could help North Korea to launder money.

That bitter tidbit is detailed by the United Nations Panel of Experts dedicated to assessing the Security Council's sanctions against The Democratic People's Republic of Korea (DPRK, aka North Korea) in its annual report [PDF].

The report finds that North-Korea-run eateries can be found in China, Laos, Thailand, and Russia. Not all offer Korean food – some specialize in Japanese or other cuisines. China alone houses 65 such restaurants.

This $40,000 Alibaba drone can carry a passenger, but would you risk it?
(electrek.co)

When I first got into flying quadcopters (back when they were still called quadcopters), I would sometimes imagine what it would be like to shrink myself down Rick Moranis-style and hop aboard.

But now thanks to some enterprising Chinese engineers – or perhaps garage tinkerers – I don’t have to imagine it anymore. Instead of shrinking the passengers down, they’ve scaled up the entire drone and added a pilot’s chair.

Now the only question is, how brave are you?