Archive for October 17, 2024

CISA warns of Iranian initial access brokers targeting critical infrastructure 

Posted in Commentary with tags on October 17, 2024 by itnerd

Yesterday, CISA published a joint advisory stating that Iranian hackers are acting as initial access brokers to gain access to critical infrastructure organizations to collect credentials and network data that can be sold on cybercriminal forums to enable cyberattacks by other threat actors. 

The government agencies warn that since October 2023, Iranian actors have used brute force, such as password spraying, and MFA ‘push bombing’ or fatigue to compromise user accounts and obtain access to organizations.

Once threat actors obtain persistent access, they typically register their own devices with the organization’s MFA system, collect more credentials, escalate privileges, and learn about the breached systems and the network, allowing them to move laterally and identify other points of access and exploitation.

The agencies made numerous recommendations including but not limited to:

  • Reviewing authentication logs for failed logins
  • Looking for MFA registrations with MFA in unexpected locales/devices
  • Checking for suspicious privileged account use after resetting passwords 
  • Applying user account mitigations after password resets
  • Investigating unusual activity in typically dormant accounts
  • Scanning for unusual user agent strings

The alert is co-authored by the FBI, NSA, the Communications Security Establishment Canada, the Australian Federal Police, and the Australian Signals Directorate’s Australian Cyber Security Centre.

Evan Dornbush, former NSA cybersecurity expert has some perspective on this:

   “Google released a report noting 70% of exploited flaws disclosed in 2023 were zero-days. Mandiant released a report noting attackers have incredibly decreased the time it takes to convert a disclosed flaw into an easily-available exploit product. Microsoft released a report noting that 78% of nation state activity is against the private sector, often in the form of for-profit actions. And CISA in collaboration with the UK and Australia are noting that criminals and governments are working together, sharing tools and access.

“The essential insight here is the necessity to evolve from purely reactive posturing, and shift to take proactive measures as part of one’s applied cybersecurity strategy. The amount of money criminals can earn is getting too little attention. It is too costly to defend, and too cheap to attack, and until we can affect a paradigm shift, things will continue to escalate.”

This is another one of those documents that’s required reading if your job is to keep your organization from getting pwned. Something that is getting harder to do these days.

UPDATE: I have two more comments on this. Starting with Avishai Avivi, CISO, SafeBreach:

“The CISA alert of Iranian cyber actors’ brute force and credential access activity is a good reminder – especially during cybersecurity awareness month – that these malicious actors are working to abuse ‘Multifactor Authentication (MFA) Exhaustion.’ If, as a good cyber-aware person, you’ve enabled MFA on your social networking, WhatsApp or other messaging apps, and bank accounts, you may have grown used to getting and approving MFA requests. The malicious actors hope you won’t pay attention and approve any MFA push notification you may receive. So, as a reminder, when you are prompted to authorize a session, please take a quick second to verify that you are the one who made that request. Malicious actors are constantly testing credentials they’ve obtained through breaches. They hope that the combination of these credentials and MFA exhaustion will let them take over your account. While the CISA alert specifically mentions critical infrastructure as the target of these malicious actors, this diligence is important to prevent access to your work and personal accounts.”

Followed by James Winebrenner, Chief Executive Officer, Elisity:

“On October 16, 2024, FBI, CISA, NSA, and other global government agencies published an advisory about how Iranian cyber actors recently compromised critical infrastructure organizations using brute force attacks and MFA bombing, then performed network discovery and lateral movement. This is just one more example of a nation-state cyber attack that used lateral movement. Also in 2024, China’s Volt Typhoon group compromised IT networks of multiple critical infrastructure organizations in the U.S., using lateral movement to access operational technology assets for potential disruptive attacks. North Korean hackers targeted aerospace and defense organizations with a new ransomware variant called FakePenny, using lateral movement for intelligence gathering. A modern identity-based microsegmentation platform would detect and prevent such unauthorized lateral movement attempts, preventing attackers from accessing sensitive systems even if initial credentials are compromised. CISOs and security architects want to look for a platform that provides comprehensive asset discovery and visibility and enables identity-based policies that enforce least-privilege access across users, devices, and applications, significantly reducing the attack surface and stopping threat actors from moving laterally within the network.”

Finally Ryan Patrick, VP of Adoption, HITRUST:

“In response to the recent joint advisory issued by the Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and their international counterparts, HITRUST acknowledges the escalating threat posed by Iranian cyber actors who are actively targeting critical infrastructure sectors, including healthcare and public health (HPH).

We recognize the critical importance of safeguarding sensitive data and systems in these highly targeted industries. The advisory highlights the need for organizations across healthcare, government, energy, and information technology to reinforce their defenses against advanced tactics, including brute force credential attacks. Cybercriminals are increasingly sophisticated in their efforts to exploit vulnerabilities and sell access to compromised networks, putting critical infrastructure at risk. A key aspect of preventing these attacks lies in integrating threat intelligence into cybersecurity strategies. HITRUST emphasizes that assessments and controls informed by up-to-date threat intelligence are crucial in identifying and mitigating emerging risks. By embedding intelligence-driven controls into their operational security, organizations can proactively defend against evolving tactics used by cybercriminals, including brute force attacks. This continuous monitoring and refinement process allows for stronger protection of sensitive data and critical infrastructure.

We encourage all organizations, especially those in the healthcare and public health sectors, to review the joint cybersecurity advisory and ensure that appropriate safeguards are in place, including the use of strong authentication methods, continuous monitoring, and proactive threat intelligence. HITRUST will continue to support these efforts by delivering the tools and resources necessary to meet the highest standards of information protection and compliance.”

New Q3 Report From GuidePoint Highlights Rise in Social Engineered Ransomware Attacks

Posted in Commentary with tags on October 17, 2024 by itnerd

Today, GuidePoint Security published its quarterly GRIT Ransomware report, diving into the evolving ransomware ecosystem and the top tactics and procedures threat actors are leveraging. Additionally, research unveils a rise in social engineering tactics by an emerging Ransomware-as-a-Service (RaaS) “middle class.”  

Highlights of the report:

  • Ransomware remains a threat, with 49 active groups impacting more than 1,000 publicly posted victims in Q3 2024.
  • A strong “middle class” has surfaced in the RaaS ecosystem, distributing ransomware victims across a greater number of diverse groups.
  • The industries most impacted by ransomware in Q3 2024 were manufacturing, technology and healthcare, respectively. Manufacturing remains the most impacted industry.

You can download the report here: https://www.guidepointsecurity.com/resources/ransomware-cyber-threat-insights-the-rise-of-ransomwares-middle-class/

Foxit to Showcase PDF Accessibility Innovations At EDUCAUSE 2024

Posted in Commentary with tags on October 17, 2024 by itnerd

Foxit, a leading provider of innovative PDF and eSignature products and services, helping knowledge workers to increase their productivity and do more with documents, today announced it will be showcasing its cutting-edge PDF accessibility features at EDUCAUSE 2024 in San Antonio, Texas. Foxit will be highlighting its newly enhanced Accessible Math capabilities, which leverage the latest PDF 2.0 standards to make complex mathematical formulas accessible to individuals with disabilities, including those who are blind, visually impaired, or have learning disabilities.

WHEN:

October 22, 2024 | 9:00 a.m. – 5:15 p.m.

October 23, 2024 | 9:00 a.m. – 4:45 p.m.

WHERE:

San Antonio, TX – EDUCAUSE 2024 Exhibit Hall

Henry B. Gonzalez Convention Center

Booth #10068 (across from Dell) 

BOOTH HIGHLIGHTS:

Accessible Math Capabilities:

  • Discover how Foxit is pioneering the future of Accessible Math. With the implementation of PDF 2.0 and MathML, Foxit is enabling complex mathematical formulas to be accurately navigated and read aloud by screen readers, making it easier for students and professionals to access and engage with scientific and technical content. To learn more about Foxit’s Accessible Math advancements, read its blog titled, “Foxit’s Role in the Future of Accessible Math” here: https://www.foxit.com/blog/foxits-role-in-the-future-of-accessible-math/ 

Foxit AI Assistant Live Demos:

  • See Foxit’s AI Assistant in action! Live laptop demos will be available for attendees to try out Foxit’s AI features firsthand.

Learn About PDF Accessibility Initiatives:

  • Sign up at the booth for an exclusive upcoming webinar on PDF Accessibility, hosted by The Accessibility Guy.

“6x Student” Promotion:

  • Learn more about Foxit’s “6x Student” promotion, where purchasing licenses for at least half of your campus employees gets you six times that amount in free licenses for students. Limited time offer!

Giveaways:

  • Let Foxit scan your badge to enter a drawing for Raycon Everyday Earbuds.
  • Participate in a 60-second on-camera interview to share your experiences with digital documents, and you’ll be entered to win a $500 Amazon Gift Card! (Signing a digital waiver is required.)

FOXIT PDF EDITOR+ FOR EDUCATION – SPECIAL DISCOUNTED RATE:

Learn more about Foxit PDF Editor+ for education; as well as how colleges, universities, and K-12 schools can get it for faculty, staff, and students at a special discounted rate, here: https://www.foxit.com/edu/.

DIGITAL ACCESSIBILITY COMPLIANCE:

Foxit solutions adhere to major digital accessibility standards, including (but not limited to): Section 508, PDF/UA, and WCAG 2.0 and WCAG 2.1 Standards. 

JOIN FOXIT’S PDF ACCESSIBILITY WORKSHOP WITH THE ACCESSIBILITY GUY:

Tue, Oct 29, 2024 2:00 PM – 3:00 PM EDT

Are your PDFs truly accessible? Don’t miss out on this opportunity to learn the ins and outs of creating inclusive, compliant, and user-friendly PDFs that everyone can access. In this hands-on workshop, Shawn Jordison, aka The Accessibility Guy, will guide you through the essentials of PDF accessibility, including legal requirements, best practices for document properties, tagging, and using Foxit’s built-in tools to ensure your PDFs are optimized for all users. Key takeaways: 

  • Understand the importance of PDF accessibility for inclusivity and compliance 
  • Learn how to set up your workstation for efficient accessibility workflows 
  • Master the use of tags, reading order, alt text, and more 
  • Discover how Foxit’s tools can streamline your accessibility tasks

Whether you’re new to accessibility or looking to sharpen your skills, this workshop is for you. Sign up today and take your PDFs to the next level! https://register.gotowebinar.com/register/2900939826726438749 

Election Security Risks Revealed By Illinois Voters Data Breach

Posted in Commentary with tags on October 17, 2024 by itnerd

In a previous report, cybersecurity researcher Jeremiah Fowler uncovered a significant breach where 4.6 million Illinois voter records were exposed due to unsecured databases, exposing Voter’s sensitive data. +This incident underscores election security vulnerabilities and the risks associated with it such as identity theft and fraud among many others. 

VPN Mentor’s new report provides valuable insights and protection tips from Jeremiah related to this situation.

You can read the report here: https://www.vpnmentor.com/news/votersdb-lessons/ 

Here’s A Couple Of New Reasons To Dump Twitter ASAP

Posted in Commentary with tags on October 17, 2024 by itnerd

If you’re one of the few people left on Twitter, you might have noticed that a pop up informing you of a change to the Twitter terms of service is happening.

Now I encourage you to read their blog post on this here. But that doesn’t tell the whole story. For that you have to go to the actual terms of service and scroll down to the section called “Your Rights and Grant of Rights in the Content” you will see this:

The key part of this paragraph is here:

In short, if you post content to Twitter, Elon gets to use it to train his AI models. I’ve read this a few times, along with looking at the Twitter app and it doesn’t seem that there is any way that you can opt out of this. Though I am free to be proven wrong about this via posting a comment below showing me where you can opt out of this. But assuming that I am right about this, this is really inexcusable and Elon has really crossed the line here.

But that’s not all. If you continue to read these terms of service, you’ll also see this.

If you view more than 1 million posts, which includes replies, within 24 hours, you will be charged $15,000 USD per 1 million posts. No human could actually do that. Thus one plausible explanation is that this is there to stop organizations from scraping his site using automated tools. For example organizations that are looking at Twitter to see how racist, homophobic, or whatever else that dumpster fire of a site has become. I say that because this sounds sort of like Elon charging for Twitter API access, and these sorts of organizations finding ways around that. Another plausible explanation is that it would stop people like me from embedding Tweets in their stories. Particularly big news organizations that gets millions of views on something they post so that Elon either gets paid, or he can hid the bad behaviour that is pretty pervasive on Twitter these days. If you have other possible explanations for this, please post them in the comments below.

It wouldn’t surprise me if this drives more signups on platforms like Threads, Bluesky, and Mastodon once word of the changes to Twitter’s terms of service start to circulate. Because this is the sort of stuff that upsets people and drives them away. Which if a problem if you’re Elon and you desperately need eyeballs on Twitter to sell advertising. I wonder how he’s going to square that circle?

The new terms of service go into effect on November 15th. But you’re going to see the backlash happen way before then.

Twitter Changes How The Block Function Works And Gets Trolled By Bluesky On Twitter As A Result

Posted in Commentary with tags , on October 17, 2024 by itnerd

Elon Musk must really want to destroy the social media platform that he bought for $44 billion. I say that because Elon has decided to change how Twitter’s block function works as per this Tweet:

To be frank, this is stupid. I block accounts because they harass me, or I don’t want to see their content. But more specifically because I don’t want them to see what I am doing. This must be about Elon and the fact that I suspect that he gets blocked a lot and feels that this change needs to be made to address the fact that he has the thinnest skin on the planet. Well, if you look at the replies to this, it’s not going over well. And rival social network Bluesky who has a presence on Twitter joined in:

And they also posted this:

And the fact that Bluesky is trending on Twitter as evidenced here shows that people are at least going to take a look at this rival social network:

Once again, Elon has found a new and creative way to drive people off of Twitter and into the hands of his competition. Which continues to illustrate that Elon isn’t all that smart. I for one cannot wait to see the boost to Bluesky’s numbers that comes from this ill advised move by Elon.

275% Rise In Ransomware-Related Attacks: Microsoft

Posted in Commentary with tags on October 17, 2024 by itnerd

Yesterday, Microsoft published its annual Digital Defense Report analyzing trends among its customers from June 2022 to July 2023 with the company noting a 275% year-over-year rise in human-operated ransomware-linked encounters.

On a positive note, over the past two years, the number of ransomware attacks that reached the encryption stage fell by 300%, primarily due to advancements in automatic attack disruption technologies.

In over 90% of cases where attacks advanced to the ransom stage, the attackers exploited unmanaged devices within the network, either to gain initial access or to remotely encrypt assets during the impact phase.

The most common initial access techniques continue to be social engineering, identity compromise and exploiting vulnerabilities in publicly facing applications or unpatched operating systems.

According to Tom Burt, Microsoft’s corporate vice president of customer security and trust, the ransomware issue underscores the connection between nation-state activities and financially motivated cybercrime. This problem is exacerbated by countries leveraging these operations for profit, as well as those that take little to no action against cybercrime occurring within their borders.

Expert Evan Dornbush, former NSA cybersecurity expert, offers perspectives on the matter:

  “This report signals one trend currently getting little attention and likely to define the future of cyber: the amount of money criminals can earn.

  “Per the Microsoft report, government, as a sector, only makes up 12% of the aggressors’ targeting sets. The vast majority of victims are in the private sector.

  “Tom writes “improved defense will not be enough”. Until the economic model is fundamentally altered, making it cheaper to defend or more expensive to attack, the advantage will increasingly drift towards the criminal.”

The Microsoft Digital Defense Report is required reading as it provides facts on how dangerous and complex the threat is. And by understanding that, it will allow organizations to better prepare for the attacks that are headed their way.

Two Canadian companies nominated for Procore’s Groundbreaker Awards 2024

Posted in Commentary with tags on October 17, 2024 by itnerd

Yesterday, Procore announced the nominees for its Groundbreaker Awards 24. Two of the nominees are from Canada, including Toronto-based Multiplex Construction for the Excellence in Sustainability Award; and Burnaby, B.C.-based Houle Electric for the Excellence in Culture & Workforce Development Award. 

Procore’s Groundbreaker Awards 24

Procore looked for the companies, projects and people behind the construction industry’s boldest achievements in the following categories: 

  • Excellence in Sustainability
  • Excellence in Innovation
  • Excellence in Health & Safety
  • Excellence in Community
  • Excellence in Culture & Workforce Development
  • Groundbreaker of the Year
  • Excellence in Project Delivery – People’s Choice Award

Two Canadian companies are among this year’s nominees.

Excellence in Sustainability
This award celebrates the company or project that most efficiently uses resources and embraces environmentally responsible processes throughout every stage of construction.

Nominee: 

Multiplex Construction (Toronto, ON)
Multiplex Construction Canada is focused on their path towards sustainability— they intend to reach net zero carbon in their supply chain by 2050 or earlier, plus zero Scope 1 & 2 on-site and office emissions by 2030. Multiplex is the first Canadian construction company to set a Science-Based Target and the first contractor globally to sign the World Green Building Council’s Net Zero Carbon Commitment. As they progress on their Decarbonization Roadmap, they utilize alternative fuels, conduct embodied carbon assessments, embrace low carbon solutions and engage their supply chain to track and collaboratively reduce emissions throughout the construction process.

Other nominees in this category:

REI Distribution Center 4, Al. Neyer (US)
Ceylon E-8 (Responsive Arts & STEAM Academy) for Denver Public Schools, U.S. Engineering (US)

Excellence in Culture & Workforce Development
This award celebrates the company that displays a focus on company culture including, but not limited to diversity, equity and inclusion and best promotes a continued focus on developing the next construction generation.

Nominee: 

Houle Electric Limited (Burnaby, B.C.)
As BC’s leading electrical contractor and systems integrator, Houle is a company that puts people first–empowering communities through local projects that positively impact people’s lives. Houle champions diversity, equity, and inclusion and is committed to fostering a workplace where everyone is valued, supported, and provided the opportunity to grow. In addition to initiatives that focus on employee development, professional advancement, and continuous improvement, Houle supports programs for underrepresented groups, provides training for 300+ apprentices annually, and has higher than industry average participation of women in the electrical trade. By connecting people with purpose, they’re building a safer, more inclusive workplace and industry for everyone. 

Read more about Houle Electric.

Other nominees in this category: 

McCarthy Holdings, Inc. (US)
Hardy Corporation (US)

Winners will be announced and celebrated at Groundbreak 2024 in Denver, Colorado, on November 20-21, 2024. For more information on this year’s award nominees, please visit: https://www.procore.com/groundbreaker-awards