Newsflash 12-08-2024
Triodos hoeft slachtoffer bankhelpdeskfraude geen 9000 euro te vergoeden
(security.nl)

Triodos hoeft een klant die het slachtoffer van bankhelpdeskfraude werd geen negenduizend euro te vergoeden, zo heeft de rechtbank Midden-Nederland geoordeeld.

De klant werd eind 2022 gebeld door een oplichter die zich voordeed als medewerker van Triodos. Door middel van telefoonspoofing kreeg de klant op haar telefoon het nummer van de bank te zien.

De oplichter vertelde dat er fraude met haar rekening werd gepleegd en verzocht de klant om het programma AnyDesk te installeren, waarmee haar computer op afstand kon worden overgenomen.

Nederlandse onderzoekers vinden bluetoothkwetsbaarheden in drie EV-laders
(tweakers.net)

Nederlandse beveiligingsonderzoekers hebben diverse kwetsbaarheden gevonden in laders voor elektrische voertuigen. Ze konden daardoor zonder authenticatie code uitvoeren op de laders. De bevindingen kwamen naar boven tijdens een hackcompetitie.

Onderzoekers Thijs Alkemade, Daan Keuper en Khaled Nassar van het Nederlandse Computest ontdekten de kwetsbaarheden tijdens een nieuwe Pwn2Own-wedstrijd, waaraan het trio verschillende keren eerder heeft meegedaan.

In die wedstrijd krijgen teams van hackers de kans bepaalde soft- of hardware te hacken. Voor die hacks worden punten uitgedeeld, waar vervolgens een winnaar uit komt rollen.

74% of ransomware victims were attacked multiple times in a year
(helpnetsecurity.com)

An alarming trend toward multiple, sometimes simultaneous cyber attacks forces business leaders to re-evaluate their cyber resilience strategies to address common points of failure, including inadequate identity system backup and recovery practices, according to Semperis.

Survey of nearly 1,000 IT and security professionals shows 83% of organizations were targeted by ransomware attacks in the past year with a high degree of success, sounding alarming trends in attack frequency, severity, and consequences.

Companies are suffering successful ransomware attacks multiple times within the same year — resulting in closures, layoffs, loss of revenue and customer trust, and cancelation of cyber insurance.

I-GRIP: INTERPOL's Mechanism that Stopped a $42m BEC Fraud
(cybermagazine.com)

The I-GRIP program, launched in 2022, utilises INTERPOL's I-24/7 network and works with financial institutions to stop suspicious transfer of funds.

In a remarkable feat of international cooperation stopping cybercrime, authorities have intercepted the largest-ever business email compromise (BEC) scam in Singapore, recovering a staggering US$41m.

The incident, which occurred on July 19th, saw a commodity firm in Singapore fall victim to a sophisticated fraud scheme.

Security bugs in ransomware leak sites helped save six companies from paying hefty ransoms
(techcrunch.com)

A security researcher says six companies were saved from having to pay potentially hefty ransom demands, in part thanks to rookie security flaws found in the web infrastructure used by the ransomware gangs themselves.

Two companies received the decryption keys to unscramble their data without having to pay the cybercriminals a ransom, and four hacked crypto companies were alerted before the ransomware gang could begin encrypting their files, marking rare wins for the targeted victim organizations.

Vangelis Stykas, a security researcher and chief technology officer at Atropos.ai, set out on a research project to identify the command and control servers behind over 100 ransomware and extortion-focused groups and their data leak sites.

Solar Power Installations Worldwide Open to Cloud API Bugs
(darkreading.com)

A recent analysis of two widely used technologies in residential and commercial solar power installations revealed multiple vulnerabilities in their cloud APIs, which, if exploited, would potentially have allowed an attacker to take down parts of any connected power grid.

Researchers at Bitdefender discovered the issues on Solarman, one of the world's largest platforms for managing solar power systems, and on Deye Cloud for managing inverters from China's Ningbo Deye Inverter Technology. Both have since addressed the issues that Bitdefender reported to them.

An inverter is a device that coverts the direct current (DC) electricity produced by solar panels into alternating current (AC) electricity, the standard form used in homes and the electrical grid.

Florida Blood Supply Chain, Urgent Call for Donations
(cysecurity.news)

A recent ransomware attack on OneBlood, a leading blood supplier in the southeastern United States, has severely impacted the blood supply chain in Florida.

This cyberattack has prompted urgent health warnings and a call for donations from Florida health officials, particularly in Orlando, as the state faces a potential public health crisis due to disrupted blood supplies.

OneBlood, a nonprofit organization responsible for supplying blood to over 350 hospitals across Florida, Georgia, Alabama, North Carolina, and South Carolina, was targeted in late July 2024 by a sophisticated ransomware attack.

How to ingeniously and wirelessly inject malware onto someone's nearby Windows PC via Google's Quick Share
(theregister.com)

Ten now-fixed bugs in Google's Quick Share for Windows could have been exploited to wirelessly write new files onto victims' PCs without their approval, and ultimately execute code remotely on those victims' machines by chaining together a handful of other vulnerabilities.

SafeBreach security research team lead Or Yair and senior security researcher Shmuel Cohen demonstrated the remote code execution (RCE) attack, dubbed QuickShell, and at DEF CON today discussed the work that went into this project:

Namely, probing Quick Share's communication protocol, fuzzing and then manually searching for vulnerabilities, and eventually creating a full RCE chain.

Misconfigurations and IAM weaknesses top cloud security concerns
(helpnetsecurity.com)

Traditional cloud security issues often associated with cloud service providers (CSPs) are continuing to decrease in importance, according to the Top Threats to Cloud Computing 2024 report by the Cloud Security Alliance.

These findings continue the trajectory first seen in the 2022 report, along with the fact that threats such the persistent nature of misconfigurations, identity and access management (IAM) weaknesses, insecure application programming interfaces (APIs), and the lack of a comprehensive security strategy continue to rank high, highlighting their critical nature.

“It’s tempting to think that the reason the same issues have remained in the top spots since the report was last issued stems from a lack of progress in securing these features.

5 key takeaways from Black Hat USA 2024
(csoonline.com)

The industry’s biggest annual get together offers CISOs a chance to chart industry trends. From cloud security to AI, here’s what’s notable about this year’s ‘hacker summer camp.’

The infosecurity world came together in Las Vegas this week for Black Hat USA 2024, offering presentations and product announcements that will give CISOs plenty to consider.

Here are the top takeaways CISOs should keep in mind when adapting their cybersecurity strategies going forward.

CISA Encourages Organizations to Adopt a 'Secure by Demand' Strategy
(infosecurity-magazine.com)

One of the US Cybersecurity and Infrastructure Security Agency's (CISA) flagship initiatives is Secure by Design, launched in 2023. Now, the agency is imploring software customers to take the approach of Secure by Demand.

This was the message given by CISA director Jen Easterly during the primary stage talk at Black Hat USA.

“You have to have both the supply side and demand inside. The truth is that organizations that procure and deploy software, which is virtually all organizations, can play a leading role in advancing secure by demand,” Easterly said.

Trump campaign says emails were hacked, jumpstarting ‘a wild ride’ to election day
(cyberscoop.com)

The apparent hack-and-leak operation targeting former President Donald Trump’s presidential campaign portends a potential “wild” election season, a former top U.S. cybersecurity official said Sunday.

Rob Joyce, the former National Security Agency director of cybersecurity who retired in March, told a large crowd at the DEF CON security conference that based on news and industry reports, it seems “we are in a cycle again, with hack and leak already starting.”

Joyce told the crowd he would not speculate on who was behind the campaign and had no inside information, but noted that Russia, Iran and China have all, to varying degrees, engaged in election interference operations.

6 IT risk assessment frameworks compared
(csoonline.com)

Formal risk assessment methodologies can help take guesswork out of evaluating IT risks if applied appropriately. Here are six to consider.

Technology is one of the greatest assets companies have, essential to running or supporting many business processes. It’s also one of the biggest risks. That’s why IT risk assessment frameworks are vital.

IT risk assessments enable organizations to evaluate the risks their systems, devices, and data are facing, whether it’s cybersecurity threats, outages, or other events. They also allow them to assess the potential implications of these risks.

The UN unanimously agrees that cybercrime is bad, mkay?
(theregister.com)

The United Nations often reaches consensus rather than complete agreement, but last week a proposal from Russia to cut down on cyber crime was unanimously approved.

The Convention on Countering the Use of Information and Communications Technologies for Criminal Purposes aims to allow countries to request information on cyber crimes, ostensibly to make it easier to track down online felons.

But the move was opposed by tech companies and online privacy activists, who correctly pointed out that one country's crime is another's human right.

Facial recognition for policing – what do we expect?
(biometricupdate.com)

Last summer when I stood down as the UK’s first combined Biometrics and Surveillance Camera Commissioner the government was about to scrap what little legislation there was covering this important area for policing.

In any event the general election meant the bill was scrapped and, as it turns out, the government itself, so we are back to square one. And square one is not sustainable.

Facial recognition has already made it onto the Prime Minister’s agenda and the regulatory framework enabling its accountable use by the police remains incomplete, inconsistent and incoherent.

Are Brain-Computer Interfaces at Risk of Mass Cyberattacks?
(hackernoon.com)

Disruptive chaos ensued on the morning of July 19, 2024, when the digital realm infected the physical world due to what was reported to be a coding error in a CrowdStrike update affecting Windows users.

Airports, banks, healthcare services, and major news networks were all disrupted due to “a defect found in a single content update for Windows hosts,” and “not a security incident or cyberattack,” according to a statement from cybersecurity firm CrowdStrike.

If just one software update can cause this much disruption without the need for a malicious cyberattack, imagine what could happen in a transhumanist future when brain-computer interfaces (BCIs) like Neuralink become prevalent and require software updates of their own.

Scout Suite: Open-source cloud security auditing tool
(helpnetsecurity.com)

Scout Suite is an open-source, multi-cloud security auditing tool designed to assess the security posture of cloud environments.

By leveraging the APIs provided by cloud vendors, Scout Suite collects and organizes configuration data, making it easier to identify potential risks.

Instead of manually sifting through numerous pages on cloud web consoles, Scout Suite automatically generates a comprehensive and clear overview of the attack surface, streamlining the security assessment process.

Open source tools to boost your productivity
(techcrunch.com)

For every yin, there’s a yang; for every action, a reaction; and for every piece of proprietary software, there’s an open source alternative. Or something like that.

The issue of “openness” in technology has rarely been so front and center in the public consciousness as it has these past couple of years. Twitter’s steady demise has drawn millions to explore alternatives, many of which are open source.

And the OpenAI power struggle last year also shone a spotlight on what “open source” might actually mean in the context of the burgeoning AI revolution.

Watch Google's DeepMind robot play table tennis against human players
(techspot.com)

Google's AI company DeepMind has developed a robotic arm that can rally with the best of amateur-level table tennis players. It can handle backhands, forehands, a decent amount of spin – and even shots that graze the net – all with remarkable agility.

In a recent research paper, Google subsidiary DeepMind revealed that their robot paddle has beaten amateur-level opponents in full table tennis matches in 13 of 29 games.

Granted, it still can't quite hang with the real pros, but being able to reach the amateur skill tier is an impressive feat for an AI system nonetheless.