Archive for March, 2022

Airport Website Defaced In Ukrainian Related Attack

Posted in Commentary with tags on March 30, 2022 by itnerd

The website of Bradley International Airport in Windsor Locks, Connecticut, was hit with a cyberattack today, Newsweek has reported. The hackers left a message which was translated: “when the supply of weapons to Ukraine stops, attacks on the information structure of your country will instantly stop,” CyberKnow reported. “America, no one is afraid of you,” the message added. The CAA, which operates Bradley Airport, told Newsweek it was “actively monitoring an external attempt to crash the Bradley Airport website”.

Ayal Yogev, CEO and Cofounder, Anjuna Security had this comment:

The war in Ukraine means that every organization and every company should be more concerned about security. It seems that investors are getting it since the stocks of security companies are going up even as the rest of the market was going down. Companies are a part of this, whether they like it or not. They are going to become targets for both intelligence gathering and cyber-attacks. This means they should continue the invest in cybersecurity, and that they should think about their supply chain and where their software and hardware are coming from.

This attack appears just to be a website defacement. But given this was an airport, it could have been worse with far more catastrophic consequences. Thus enterprises must secure and monitor everything to ensure that they are not the next big story in Newsweek.

Yet Another Reason To #DeleteFacebook…. They Paid A Republican Linked Firm To Malign TikTok

Posted in Commentary with tags on March 30, 2022 by itnerd

Facebook continues to hit new lows with their behaviour. And today’s new low is this paywalled Washington Post story (Non paywalled source here) that details how Facebook used the services of a firm linked to the Republican Party to trash TikTok:

Employees with the firm, Targeted Victory, worked to undermine TikTok through a nationwide media and lobbying campaign portraying the fast-growing app, owned by the Beijing-based company ByteDance, as a danger to American children and society, according to internal emails shared with The Washington Post.

Targeted Victory needs to “get the message out that while Meta is the current punching bag, TikTok is the real threat especially as a foreign owned app that is #1 in sharing data that young teens are using,” a director for the firm wrote in a February email.

Campaign operatives were also encouraged to use TikTok’s prominence as a way to deflect from Meta’s own privacy and antitrust concerns.

“Bonus point if we can fit this into a broader message that the current bills/proposals aren’t where [state attorneys general] or members of Congress should be focused,” a Targeted Victory staffer wrote.

The emails, which have not been previously reported, show the extent to which Meta and its partners will use opposition-research tactics on the Chinese-owned, multibillion-dollar rival that has become one of the most downloaded apps in the world, often outranking even Meta’s popular Facebook and Instagram apps. In an internal report last year leaked by the whistleblower Frances Haugen, Facebook researchers said teens were spending “2-3X more time” on TikTok than Instagram, and that Facebook’s popularity among young people had plummeted.

So, because Facebook was losing teens to TikTok, Facebook decided to use very underhanded tactics to fight back rather than improve their product so that it would be more appealing to teens. That illustrates what sort of company Facebook is. It also underlines why people should #DeleteFacebook. Clearly they are not any sort of company that has ethics, decency, or any sort of moral compass. Though at this point, everyone should know that.

Researchers Uncover A New Malware Loader Called Verblecon 

Posted in Commentary with tags on March 29, 2022 by itnerd

Security researchers at Symantec published a technical report today on a new malware loader tracked as Verblecon, which has escaped detection due to the polymorphic nature of their code. In other words, it changes itself to evade your typical antivirus product. The malware has been observed being used in attacks that install cryptocurrency miners on compromised machines.

Chris Olson, CEO of The Media Trust, had this to say:

 “Polymorphic techniques are just another way to hide malicious intentions, along with checks for security tools and live environments. What’s interesting is this attack provides another example of how the risks of Web 2.0 are being replicated in Web 3.0. Today’s embryonic beginnings of Web 3.0 are eerily reminiscent of the Web as it existed in the 1990s, showing sporadic signs of vulnerability that may well foreshadow a future era of cyber chaos. To prevent that from happening, we must learn from our past mistakes. Today’s digital ecosystem is riddled with threats because Web 2.0 was not designed for cybersecurity from the outset. Untrusted third parties were allowed to proliferate, leading to phishing attacks, malicious advertising, rampant data privacy abuse and other threats that are hard to fix in the present. With Web 3.0, we have a chance to account for potential attack vectors by design – otherwise, the same issues will replicate themselves with greater potency than ever.”

Symantec appears to currently protect their users from this threat. But one wonders how long that will be the case. And I honestly don’t want to take any bets on that.

Log4Shell Exploited To Infect VMware Horizon Instances

Posted in Commentary with tags on March 29, 2022 by itnerd

Last year, I wrote about Log4Shell being actively exploited by threat actors to deliver malware and crypto miners. And that trend appears to be continuing as Sophos researchers warned today that Log4Shell is being exploited to infect VMware Horizon servers with backdoors and crypto miners. According to the report, the Log4Shell attacks target unpatched VMware Horizon with three different backdoors and four cryptocurrency miners.

In late December 2021 and in January 2022, there were multiple reports of active exploitation of the Log4Shell vulnerability in VMware Horizon servers. The attack used the Lightweight Directory Access Protocol resource call of Log4J to retrieve a malicious Java class file that modified existing legitimate Java code, adding a web shell that provided remote access and code execution to the attackers.  SophosLabs has observed these attacks in customer telemetry since the beginning of January.

The attempts to leverage Horizon, which continued and grew in number throughout January, were frequently associated with attempts to deploy cryptocurrency mining malware; others had less clear motives, and may be associated with initial access brokers or ransomware actors. These attacks continue.

So in short, you need to patch all the things to protect yourself… But:

Attempts to compromise Horizon servers are among the more targeted exploits of Log4Shell vulnerabilities because of their nature. VMware has pushed out patched versions of Horizon as of March 8 2022, but many organizations may still not have deployed the fixed versions or applied workarounds to vulnerable ones. Even if they have, as demonstrated by the backdoors and reverse shell activity we found, those systems may already be compromised in other ways.

That’s not good. I have a comment on this from Saryu Nayyar, CEO and Founder of Gurucul:

“Similar to Cobalt Strike, this is an example of an assessment tool being weaponized by threat actors to breach organizations. It is critical to employ self-training machine learning and behavioral models to identify exploitation of the exposed vulnerability as well as detect the remote surveillance done by the attackers. Current XDR and traditional SIEM solutions, even with claims of User Entity Behavior Analytics rooted in known patterns and rule-based artificial intelligence, are unable to adapt to these methods. Organizations need to invest in solutions that employ transparent non rule-based machine learning models to more rapidly identify new attacks.”

So not only should you patch everything that runs VMware Horizon, but you should also go over your infrastructure with a fine tooth comb because the bad guys may already be in the door.

LinkedIn Welcomes Members of Paddle HR To Accelerate The Development Of LinkedIn Learning Hub

Posted in Commentary with tags on March 29, 2022 by itnerd

In the era of the Great Reshuffle, retaining employees has arguably never been more important. When employees feel like their skills aren’t being put to use, they are 10x more likely to leave a job, making opportunities for career development and growth at a company that much more critical. 

To further help businesses retain their talent, LinkedIn is announcing that members of the Paddle HR team, including CEO, Pat Whelan and CTO, Sid Bhargava, will be joining LinkedIn.

The team at Paddle HR have deep domain expertise building internal talent mobility and career development solutions that are AI-driven, and they share a similar vision – to make skills the currency of the talent ecosystem.

By bringing the team onboard, LinkedIn can accelerate the work they’re doing to build career development and internal mobility capability within LinkedIn Learning Hub – a skill-building platform – to empower employees to accelerate their careers and help employers better retain their talent.

You can read the full announcement here.

Procore’s Annual ROI Report Reveals Significant Customer Benefits Surrounding Sustainability, Safety And The Labor Shortage In Construction

Posted in Commentary with tags on March 29, 2022 by itnerd

Procore Technologies, Inc., a leading global provider of construction management software, today released the results of its 2022 Customer Return On Invest (ROI) report. The report explores how the Procore platform is helping customers tackle the most daunting challenges in the industry, including sustainability, safety and the labour shortage by analyzing responses from 2,600+ customers across North and South America, Asia and Europe. Key takeaways include:

  • Building Scalable Businesses: Customer respondents state that using Procore enables their project teams to manage 48 per cent more construction volume per person, on average.
  • Reduced Rework: 75 per cent of respondents agree Procore has helped reduce the amount of rework.
  • Improved Efficiency: Customer respondents reported saving an average of 15 days on the overall schedule on a typical project.
  • Safer Jobsites: 79 per cent of customer respondents that use Quality and Safety agree Procore has improved their company’s safety programs.

Rising material costs and supply chain issues, labour shortages, slimming margins, continued project delays, increasing carbon emissions due to rework and waste and the need for more sustainable solutions are just a few obstacles the industry is facing and will continue to face in the years to come.

Key takeaways and supporting customer responses can be found below:

Building Scalable Businesses: Customer respondents believe using Procore enables their project teams to manage on average 48 per cent more construction volume per person.

Reduced Rework: 75 per cent of customer respondents agree Procore has helped reduce the amount of rework taking place on their projects which leads to less carbon waste, more efficiency and delivering more projects on-time and on-budget.

Improved Efficiency: Customer respondents reported saving an average of 15 days on the overall schedule on a typical project.

Safer Jobsites: 79 per cent of customer respondents that use Quality and Safety agree Procore has improved their company’s safety program.

Procore’s sole focus is construction, from preconstruction to closeout, the Procore platform is purpose-built and developed to meet the needs of the construction industry. Continually recognized with top honours by leading user review sites such as G2, the Procore platform helps customers produce more value, deliver better project outcomes, and develop stronger, safer, and more productive teams.

To discover the tools that are driving results for construction leaders across the globe, download the Procore 2022 ROI Report today.

Ukraine’s Biggest Telco Hit By “Powerful” Cyberattack

Posted in Commentary with tags on March 29, 2022 by itnerd

The war in Ukraine is clearly shifting to cyberspace as news is filtering out that Ukraine’s biggest telco has been hit by a “Powerful” cyberattack:

Ukraine’s state-owned telecommunications company Ukrtelecom experienced a disruption in internet service on Monday after a “powerful” cyberattack, according to Ukrainian government officials and company representatives.

The incident is the latest hacking attack against Ukrainian internet services since Russian military forces invaded in late February.

“Today, the enemy launched a powerful cyberattack against Ukrtelecom’s IT-infrastructure,” said Yurii Shchyhol, chairman of the State Service of Special Communication and Information Protection of Ukraine. “The attack was repelled. And now Ukrtelecom has an ability to begin restoring its services to the clients.”

“Currently, the attack is repulsed, the provision of services is gradually resumed,” said Ukrtelecom spokesperson Mikhail Shuranov.

Toby Lewis, Darktrace’s Global Head of Threat Analysis provided me with this analysis:

In what is being dubbed ‘World War Wired,’ it is no surprise that Russian cyber-attackers have targeted a major Ukrainian internet provider. Yet, while there has been some disruption to the ISP’s traffic, internet connectivity and cellular networks are largely still operable across the country. This attack has not achieved its desired level of disruption.

A lot of the discussion has focused on Russia’s offensive cyber power, but not enough time has been spent talking about Ukraine’s strong defense. Since the infamous 2015 cyber-attack on the Ukrainian power grid, Ukraine has made significant efforts to build up cyber-defenses, particularly around its critical infrastructure, and ensure resilience in future attacks. This strategy should come as no surprise to global cyber-defenders. Some intelligence even indicates alleged covert operations involving United States military personnel and private-sector engineers throughout 2021 to protect Ukraine against expected cyber-intrusions from Russian-sponsored proxies.

With little information available about the apparent DDoS attack on Ukrtelecom, the provider appears to be prioritizing critical infrastructure and managing disruption through their incident response. Like other Ukrainian organizations facing the threat of Russian cyber-aggression since 2015, it has had no choice but to develop effective cyber-defenses.

The era of they hybrid war is upon us. Which means that we will likely see more of this in Ukraine and beyond in the coming days or weeks. Thus it means that we all need to be prepared to deal with these attacks when they arrive.

TELUS Health Acquires Sprout Wellness Solutions

Posted in Commentary with tags on March 29, 2022 by itnerd

TELUS Health today announced it has acquired Sprout Wellness Solutions, a holistic digital health and wellness solution designed to educate, engage and inspire people to improve their health through behaviour change. The solution will be available as part of the TELUS Health suite of services for Canadian employers to empower their employees, through their benefits plan, to live healthier lives.

Built using machine learning and cognitive behavioural science, the Sprout platform encourages, measures, and rewards healthy behaviours through:

  • Real-time health risk assessment;
  • Wearable device integrations and activity tracking;
  • Engaging health and wellness content;
  • Dynamic goals, gamified challenges, and more.

As an early investor in Sprout since 2015, TELUS recognized the positive influence the innovative health solution had on overall health and wellness, helping employees to shift their mindset to more proactively focus on improving their overall health and happiness.

As organizations increasingly seek to embrace more digital well-being empowerment tools for their team members, this acquisition allows TELUS Health to deliver a broader suite of options to complement its established services such as virtual care, virtual pharmacy, and medical and mental health clinics to support Canada’s workforce at every step of their health journey.

Sprout will continue to be available for all its current customers. Over the coming months, TELUS Health will integrate Sprout Wellness Solutions into its Virtual Care service, making it available as a value-added solution to clients nationally in English and French.

Employers who are interested in learning more about how Sprout can improve the health and well-being of their employees by being added to their benefits plans can request information here.

Cloud Systems Are The New Battleground For Crypto Mining Threat Actors Says Trend Micro

Posted in Commentary with tags on March 29, 2022 by itnerd

Trend Micro today announced a new report revealing a fierce, hour-by-hour battle for resources among malicious cryptocurrency mining groups.

To read a full copy of the report, A Floating Battleground Navigating the Landscape of Cloud-Based Cryptocurrency Mining, please visit: https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/probing-the-activities-of-cloud-based-cryptocurrency-mining-groups

Threat actors are increasingly scanning for and exploiting these exposed instances, as well as brute-forcing SecureShell (SSH) credentials, in order to compromise cloud assets for cryptocurrency mining, the report reveals. Targets are often characterized by having outdated cloud software in the cloud environment, poor cloud security hygiene, or inadequate knowledge on how to secure cloud services and thus easily exploited by threat actors to gain access to the systems. 

Cloud computing investments have surged during the pandemic. But the ease with which new assets can be deployed has also left many cloud instances online for longer than needed—unpatched and misconfigured.

On one hand, this extra computing workload threatens to slow key user-facing services for victim organizations, as well as increasing operating costs by up to 600% for every infected system.

Crypto mining can also be a precursor to more serious compromise. Many mature threat actors deploy mining software to generate additional revenue before online buyers purchase access for ransomware, data theft, and more.

The Trend Micro report details the activity of multiple threat actor groups in this space, including:

  • Outlaw, which compromises IoT devices and Linux cloud servers by exploiting known vulnerabilities or performing brute-force SSH attacks.
  • TeamTNT, which exploits vulnerable software to compromise hosts before stealing credentials for other services to help it move around to new hosts and abuse any misconfigured services.
  • Kinsing, which sets up an XMRig kit for mining Monero and kicks any other miners off a victim system.
  • 8220, which has been observed fighting Kinsing over the same resources. They frequently eject each other from a host and then install their own cryptocurrency miners.
  • Kek Security, which has been associated with IoT malware and running botnet services.

To mitigate the threat from cryptocurrency mining attacks in the cloud, Trend Micro recommends organizations to:

  • Ensure systems are up-to-date and running only the required services
  • Deploy firewall, IDS/IPS, and cloud endpoint security to limit and filter network traffic to and from known bad hosts
  • Eliminate configuration errors via Cloud Security Posture Management tools
  • Monitor traffic to and from cloud instances and filter out domains associated with known mining pools
  • Deploy rules that monitor open ports, changes to DNS routing, and utilization of CPU resources from a cost perspective

Guest Post: Conversation Hijacking Doubles In 2021 Says Atlas VPN

Posted in Commentary with tags on March 29, 2022 by itnerd

Users are frequently aware of plain phishing schemes and do not open any fraudulent links or attachments, especially when they appear out of nowhere and with no context. However, conversation hijacking is an advanced type of phishing attack where fraudsters use already existing conversations to spread malware or extract money from the victims.

These attacks tend to be much more effective because the message comes as part of an ongoing email chain, so it doesn’t look as suspicious as an unexpected email coming out of nowhere and asking for you to pay an invoice or download an attachment to view supposedly important documents.

Even though conversation hijacking attacks are much less common than usual phishing attacks, they still happen thousands of times every month. 

Analysis by Atlas VPN reveals that conversation hijacking attacks more than doubled in 2021 surging from 5,106 in Q1 2021 to 12,606 in Q4 2021, representing a growth of 147% for the period. The data for the analysis on conversation hijacking attacks was provided by Baraccuda, a worldwide leader in online security. 

Interestingly, the most dramatic increase happened from Q1 2021 to Q2 2021, where the volume of attacks surged by 101% in a quarter. 

The volume of attacks continued to rise throughout the year but at a much slower pace. 

Looking at the volume of attacks from another angle, businesses globally encountered an average of 137 conversation hijacking attacks per day in Q4 2021.

To read the full article, head over to: https://atlasvpn.com/blog/conversation-hijacking-doubles-in-2021