Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 12814

Checks for new stories every ~15 minutes

Title Summary
ROWS
2024-10-14 22:05:25 theregister DATA BREACH Major Data Breach Affects 400,000 in Healthcare Sector
Gryphon Healthcare reported unauthorized access to personal data of up to 400,000 individuals, including sensitive health information. Names, Social Security numbers, addresses, medical diagnoses, insurance details, and other personal health information were compromised. The breach was initially detected on August 13 with the first unauthorized access occurring on July 6. Victims were offered 12 months of free credit monitoring and identity protection services following the incident. This breach has led to legal action; a class-action lawsuit spearheaded by Tulsa law firm Abington Cole and Ellery is currently appealing for affected victims. Gryphon Healthcare is implementing enhanced security measures to prevent future incidents. The breach disclosure timing and subsequent legal implications underscore the ongoing risks and ramifications of data security incidents in the healthcare industry.
Details
2024-10-14 19:32:29 bleepingcomputer DATA BREACH Jetpack Releases Fix for Long-Standing Information Disclosure Flaw
Jetpack, a popular WordPress plugin, released a critical security update to address an information disclosure vulnerability. The flaw, present since Jetpack version 3.9.9 (2016), allowed logged-in users to access forms submitted by site visitors. This vulnerability was identified during an internal audit by Automattic, affecting all versions up to the latest release. Automattic noted the plugin is installed on 27 million websites, emphasizing the wide impact of the vulnerability. Fixes have been deployed for 101 versions of Jetpack; users must check and manually update if their plugin has not automatically upgraded. There is no evidence that the flaw was exploited, but users are advised to upgrade immediately due to potential risks now that the flaw is public. No workarounds or mitigations exist; applying the security patches released is the only recommended solution. Details on the technical mechanics of the vulnerability are currently withheld to give users time to update their systems.
Details
2024-10-14 17:39:21 bleepingcomputer MALWARE TrickMo Malware Variant Targets Android Users Globally
Zimperium identified 40 new variants of the TrickMo Android banking trojan designed to steal Android PINs, with links to 16 droppers and 22 C2 infrastructures. TrickMo uses phishing overlays on login screens for banking apps and other platforms to capture credentials. New features of TrickMo include OTP interception, screen recording, data exfiltration, remote control, and an advanced fake lock screen. The fake lock screen mimics the Android unlock prompt and sends captured PIN or unlock patterns to attackers via a PHP script. Flaws in TrickMo’s C2 servers revealed at least 13,000 victims primarily in Canada, UAE, Turkey, and Germany; actual figures likely higher. Sensitive data from millions of records indicate extensive device compromises and data access by threat actors. Zimperium released all findings on GitHub, despite previous concerns of exposing victim data. Users are advised to avoid downloading APKs from unofficial sources and ensure Google Play Protect is activated.
Details
2024-10-14 15:46:55 bleepingcomputer DATA BREACH Game Freak Confirms Data Breach Affecting Employee Info
Japanese game developer Game Freak experienced a cyberattack in August, leading to data leaks online. Unauthorized access to servers resulted in the theft of personal details for employees, contractors, and associates. Leaked content includes source code and designs of upcoming Pokémon games but not player data. Game Freak has concluded its investigation, implementing enhanced security measures to prevent future breaches. Those whose data may be compromised will be contacted directly; others were informed via the company's website. The breach specifically impacted personal information, limiting risks mainly to phishing and brute-force attacks.
Details
2024-10-14 14:45:22 theregister MISCELLANEOUS Enhancing SOCs with AI and ML for Improved Cybersecurity
Traditional Security Operation Centers (SOCs) are crucial in monitoring cybersecurity but require updates to keep up with modern cyber threats. Artificial Intelligence (AI) and Machine Learning (ML) integration into SOCs enhances threat detection, analysis, and response capabilities, transitioning from reactive to proactive security measures. Overwhelming data volumes and lack of data enrichment in SIEM systems are primary challenges for traditional SOCs, hindering effective threat handling. Modern SOC environments utilize AI/ML for automated response strategies, real-time anomaly detection, and comprehensive log management, significantly reducing false positives. SIEM and XDR platforms, such as Wazuh, aid in creating AI/ML-driven SOC environments by simplifying setup and enhancing security threat detection across diverse IT infrastructures. Integration of Large Language Models (LLMs) with security platforms can automate alert interpretation and improve decision-making processes. Wazuh's compatibility with AI/ML tools, like the OpenSearch anomaly detection plugin, helps identify and respond to security anomalies quickly, enhancing organizational IT security. Wazuh, both as a tool and community, offers extensive resources for users to optimize their security operations and share security insights.
Details
2024-10-14 14:34:50 theregister NATION STATE ACTIVITY Trump Campaign Adopts 'Unhackable' Phones to Thwart Hacking
With the U.S. presidential elections nearing, the Trump campaign has enhanced its cybersecurity measures by investing in supposedly "unhackable" phones and computers, provided by military supplier Green Hills Software. These enhanced security measures come after previous incidents where the team experienced breaches attributed to pro-Iranian hackers who accessed sensitive data. Green Hills asserts that its technology, powered by the Integrity-178B operating system also used in U.S. military stealth bombers and fighters, offers robust protection against intrusions, thus making them highly secure. The operating system is built on a tight codebase of approximately 10,000 lines, which undergo rigorous penetration testing to identify any potential vulnerabilities. Despite the manufacturer’s claims of their system's invulnerability to hacks, including protection against zero-click surveillance tools like NSO Group's Pegasus, some experts remain skeptical of any system being entirely secure. Green Hills Software’s CEO has expressed an intent to extend their highly secure software frameworks to voting systems to safeguard the integrity of the electoral process. The company already provides similar security solutions to high-profile sectors including military and law enforcement, focusing on a security-first approach in their development and code review processes.
Details
2024-10-14 12:37:05 theregister CYBERCRIME Critical Flaw in Fortinet Devices Widely Unpatched, Under Attack
More than 86,000 Fortinet instances globally are still vulnerable to a critically exploited security flaw, despite it being disclosed nine months ago. The majority of the vulnerable devices are located in Asia, with significant numbers also in North America and Europe. The flaw, identified as CVE-2024-23113 with a CVSS severity rating of 9.8, allows for remote code execution and requires no user interaction. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added the vulnerability to its Known Exploited Vulnerabilities catalog, signaling that it is actively exploited and poses a significant threat. Federal civilian executive branch agencies were given a 21-day period to either patch the vulnerability or disconnect affected devices. Fortinet recommends upgrading to the latest firmware or implementing specific mitigations to disable the vulnerable fgfm daemon on affected interfaces. The exact usage of this vulnerability in ransomware attacks remains uncertain; however, the potential impact on data confidentiality, system integrity, and service continuity is high.
Details
2024-10-14 11:39:04 thehackernews NATION STATE ACTIVITY Nation-State Attackers Exploit Ivanti Flaws for Network Access
A suspected nation-state adversary exploited three vulnerabilities in Ivanti Cloud Service Appliance (CSA) to gain unauthorized network entry and user information access. The attackers utilized stolen credentials to perform further attacks and deploy a web shell on the compromised network. Post-exploitation, the attackers "patched" the vulnerabilities used, likely to prevent other threat actors from exploiting the same flaws and interfering with their operations. The same threat actors were also observed exploiting a critical flaw, CVE-2024-29824, in Ivanti Endpoint Manager (EPM) to enable remote code execution. Additional malicious activities included the creation of new user accounts, execution of reconnaissance commands, and data exfiltration using DNS tunneling. A rootkit was installed on the compromised CSA device to maintain low-level persistence, potentially surviving even a factory reset. This incident was significant enough to be listed in the U.S. Cybersecurity and Infrastructure Security Agency's (CISA) Known Exploited Vulnerabilities (KEV) catalog.
Details
2024-10-14 11:13:19 thehackernews CYBERCRIME Rise of Stealthy Supply Chain Attacks in Open-Source Software
Cybersecurity experts identified potential for supply chain attacks across PyPI, npm, and other programming ecosystems. Malicious actors can deploy code through command-jacking or rogue plugins, compromising user systems. Entry points allow functionality exposure in programming languages, but can be misused to execute harmful code. Techniques like command wrapping operate under the radar, executing legitimate and malicious commands simultaneously. The manipulative tactics used can alter program behavior and evade traditional security measures, posing long-term threats. Over half a million malicious packages were recently found in major open-source ecosystems, marking a significant increase in such threats. Researchers stress the need for tailored security strategies to combat sophisticated attacks targeting software developers and supply chains.
Details
2024-10-14 11:13:18 thehackernews MISCELLANEOUS Enhancing Cloud Security with Improved Detection and Response
Organizations adopting cloud environments face challenges with detection and response capabilities, leading to delayed incident resolution. Security strategies have overly relied on a multitude of detection and response tools, causing tool sprawl and high false positive rates. Introducing real-time visibility with eBPF sensors can enhance security by providing deep observability across all layers without affecting performance. A multi-layered detection strategy can address the inadequacy of fragmented security approaches, allowing for effective breach detection and response. Integrating vulnerability management with incident monitoring reduces response delays and improves the context for patch prioritization. Implementing identity baselines aids in detecting unusual access behaviors and potential credential theft. Flexible response strategies are crucial for addressing specific challenges presented by different types of cloud breaches. The article advocates for a comprehensive approach to improve detection and response in cloud security to prevent breaches effectively.
Details
2024-10-14 10:52:46 thehackernews NATION STATE ACTIVITY GoldenJackal Crew Breaches Air-Gapped Networks with USB Worms
GoldenJackal, an emerging hacking group, successfully infiltrated air-gapped systems using sophisticated worms transmitted via USB drives. Their targets included a South Asian embassy in Belarus and a European Union government organization, indicating the high-profile nature of their operations. ESET security researchers uncovered the attacks, noting the deployment of two distinct custom-built tools by the hackers. This breach underscores the vulnerability of even the most secure networks that are isolated from the internet. The incident highlights a growing trend wherein highly isolated systems are still at risk from physical access attacks. Executives should amplify physical security measures and educate staff on the dangers of unknown USB devices to mitigate similar threats. Overall cybersecurity awareness should be escalated, ensuring all levels of personnel understand how to identify and handle suspicious activities.
Details
2024-10-14 09:05:24 theregister DATA BREACH Escalating Data Breach Costs Drive Need for Advanced CIAM Solutions
Recent studies indicate that 61% of data breaches are due to stolen identity and access credentials, with the trend rising as AI enhances hacker efficiency. The financial impact of data breaches has risen to $4.88 million in 2024, up from $4.45 million the previous year, spurred by increased costs associated with lost customers, downtime, and regulatory fines. Organizations are encouraged to adopt proactive, comprehensive security and identity management strategies to mitigate these risks. Utilizing a Customer Identity and Access Management (CIAM) platform can strengthen security by implementing multi-factor authentication and biometric techniques, alongside adaptive authentication. Okta has developed a series of webinars focusing on the benefits of CIAM platforms, featuring discussions with product marketing managers and professional services from Deloitte. These webinars detail how Okta’s Customer Identity Cloud uses AI to analyze login requests, enhancing security measures to prevent unauthorized access.
Details
2024-10-14 09:00:03 thehackernews CYBERCRIME Critical Veeam Flaw Exploited in Widespread Ransomware Attacks
Threat actors exploited a critical vulnerability in Veeam Backup & Replication, CVE-2024-40711, to deploy Akira and Fog ransomware. The CVE-2024-40711 flaw, scoring 9.8/10 on the CVSS scale, allows unauthenticated remote code execution and was patched in September 2024. Attackers used compromised VPN credentials to access target networks, specifically exploiting VPNs without multifactor authentication and running outdated software. Upon gaining access, attackers manipulated Veeam software to create a local admin account "point," and used it to facilitate ransomware deployment. The successful attack involved dropping Fog ransomware on an unprotected Hyper-V server and exfiltrating data using the rclone utility. This incident has prompted a security advisory from NHS England, highlighting the high value of enterprise backup and disaster recovery applications to cybercriminals. Related cyber incidents include the emergence of Lynx ransomware in the U.S. and U.K., and an advisory on Trinity ransomware targeting the U.S. healthcare sector.
Details
2024-10-14 06:35:18 theregister NATION STATE ACTIVITY Chinese Researchers Use Quantum Computing to Threaten Encryption
Chinese scientists have utilized a D-Wave quantum annealing system to develop an attack on public key cryptography, potentially destabilizing current encryption methods. The research, documented in a peer-reviewed paper titled "Quantum Annealing Public Key Cryptographic Attack Algorithm Based on D-Wave Advantage," indicates the ability to compromise SPN (Substitution-Permutation Network) structured algorithms, including widely-used AES (Advanced Encryption Standard) encryption. The study describes how quantum computing could allow for the decryption of data protected by traditional cryptographic systems, a significant concern as these technologies are foundational for global digital security. The implications extend to both public-key and symmetric cryptographic systems, suggesting a broader potential impact than initially assessed. The use of a commercially available quantum system in such a capacity underscores the urgent need for the development of "quantum-safe" encryption technologies. Entities like Singapore’s central bank have already acknowledged the imminent risk, suggesting possible decryption capabilities materializing within the next decade. According to cryptographer Adi Shamir, a full-fledged quantum threat to existing encryption systems may still be 30 years away, highlighting a divide in the scientific community regarding the timeline of quantum computing maturity.
Details
2024-10-13 22:19:09 bleepingcomputer MISCELLANEOUS Google Plans to Disable uBlock Origin Due to Policy Update
Google's Chrome Web Store issued a warning that uBlock Origin and other extensions using Manifest V2 might soon be disabled, urging users to adopt alternatives. This action is part of Google's shift from Manifest V2 to Manifest V3 extension specifications, aiming to enhance user privacy and security. The Chrome team has started advising users to migrate to extensions compliant with Manifest V3, like uBlock Original Lite, which adheres to new requirements. Despite the change, there is no indication that uBlock Origin or similar extensions pose any security risk under the existing framework. Many Chrome users express intentions to switch to different browsers if uBlock Origin becomes unavailable in Chrome. The transition poses significant technical challenges for developers, especially those needing more extensive web control, such as ad blockers. Users can still employ uBlock Origin using the Manifest V2 framework until June 2025 through the ExtensionManifestV2Availability policy on supported platforms. Alternative browsers like Firefox, Brave, and Vivaldi have committed to continuing support for Manifest V2 extensions, providing refuge for users impacted by the shift.
Details