Archive for December, 2024

The AbilityTo Back Up A Mac Running Sequoia Has Gotten Worse And Not Better

Posted in Commentary with tags on December 22, 2024 by itnerd

As I type this, we are up to macOS Sequoia 15.2 which was just released to the public. And I have to say that when it comes to backing up your Mac, things are worse than when Sequoia was first released.

Let’s start with the inability to back up using Time Machine. When I wrote this, Time Machine Backups to be frank were inconsistent. And as I type this, I can say that what 15.2 has marginally improved backups via Time Machine. By that I mean that I only see the message that it has failed to back up less often. But I still see it. Now there is the possibility that a fix that I recommended in my original article to disable Time Machine throttling is also responsible for that improvement. But I am not 100% sure about that as I have another Mac that does not have Time Machine throttling disabled, and it has seen the same marginal improvement. That kind of implies that Apple might have done something to make things better. If they did, they in typical Apple fashion aren’t saying anything. I continue to monitor the situation and I will post any updates that may be of value to you here.

By the way, while I have your attention, some of you emailed me about that the fact that the ability to disable throttling of Time Machine only lasts until the next reboot is a bit of a problem. That’s fair and I perhaps should have pointed that out in my original post. But I do have a fix for that. This guy has a method of having this setting remain persistent after a reboot. I’ve done this and it does work without an issue. So you can give that a shot.

So, now you’re wondering why I am saying that if things have had a marginal improvement, why am I also saying that things are getting worse? Well, if you use a third party backup tool, macOS Sequoia seems to have broken two of the most popular ones. SuperDuper is one of those apps, and 15.2 broke the ability to create bootable backups, according to the app’s chief developer Dave Nanian. There are also reports of CarbonCopyCloner having worse issue. With them it’s not just bootable backups, but non-bootable backups as well was also affected were also failing according to this post. Also in the post was the assertion that 15.2 will wipe out Time Machine backups. Now I haven’t seen that, but that doesn’t mean that the problem doesn’t exist. But if that is accurate, this absolutely qualifies as things getting worse.

You have to wonder at what point Apple will get serious about addressing these issues so that things are better and not worse. Right now Apple hasn’t commented of this at all. And the silence suggests that they don’t want to admit to a problem until they come up with a fix, which is typical Apple behaviour. But given that they have effectively impaired at best, broken at worst their customers ability to properly protect their data, they need to do way better than what they are doing right now. Because the status quo is not acceptable.

Apple Kills Lightning Equipped iPhones In EU

Posted in Commentary with tags on December 21, 2024 by itnerd

The EU has pretty much forced Apple to switch to USB-C. But Apple were still selling a couple of iPhone models with Lightning ports on them. That’s now officially over. A French blog (Translation here) reported last week that Apple was going to stop selling the iPhone SE and the iPhone 14/14 Plus in the EU to comply with a deadline set by the EU to switch to USB-C all the things by the end of this year. And as of today, these phones don’t seem to be on Apple’s various EU online stores.

Now this presents a bit of a problem for Apple as Apple keeps older phones around along with the iPhone SE to compete with cheap Android phones. By not being able to sell these phone in 27 countries, that leaves Apple in a bit of a difficult spot. At least until a new iPhone SE with USB-C comes out. But that’s not likely to happen for a few months. Since this deadline didn’t sneak up on Apple, you have to figure that Apple has some sort of plan as they’re not the sort of company to leave money on the table. How long before we see what that plan is? Your guess is as good as mine.

Bell Achieves Canadian First: Successful 50G PON Technology Trial with Nokia

Posted in Commentary with tags on December 20, 2024 by itnerd

Bell is proud to announce a significant achievement in Canadian broadband technology: the first successful test of 50G PON fibre broadband technology in the country. This trial, conducted in partnership with Nokia at Bell’s Advanced Technical Lab in Montréal, Québec, demonstrates a major leap forward in network capacity and capability. 50G PON is the next generation of fibre technology.

This successful trial proves the seamless integration of 50G PON technology with our existing PON networks, utilizing their current fibre infrastructure. This means they can efficiently and cost-effectively prepare for the future demands of high-bandwidth applications while maximizing their existing network investments. 50G PON allows Bell to offer higher speeds over their existing fibre infrastructure, eliminating the need for additional installations.

Key benefits of this Canadian-first 50G PON trial:

  • Unprecedented Speed Increases: Significantly faster upload and download speeds for residential and business customers. On a single fibre, they can reach speeds of up to 10Gbps, 25Gbps, and even 50Gbps.
  • Future-Proof Network: Ensures Bell’s network remains at the forefront of technology, ready to handle exponentially growing bandwidth demands. This future-proofing benefits their customers on their network today.
  • Efficient Upgrade Path: Leverages existing fibre infrastructure, minimizing upgrade costs and environmental impact.
  • Cost-Effective and Enhanced Security: From a business perspective, 50G PON allows Bell to offer services more efficiently at a reduced cost, while also improving security.
  • New Service Opportunities: Opens the door to new, high-bandwidth services, including advanced enterprise applications and robust 5G backhaul capabilities.

As part of Bell’s purpose to advance how Canadians connect with each other and the world, Bell ensure that they remain at the forefront of broadband innovation by embracing next-generation technologies like 50G PON. Their successful work with Nokia to deliver the first 50G PON trial in Canada helps ensure they maximize the Bell fibre advantage for their customers in the years to come.

A Very Scary Extortion Phishing Email Scam Has Surfaced

Posted in Commentary with tags on December 20, 2024 by itnerd

Yesterday I got a panic call from a client who received a very scary email from someone who wanted Bitcoin or else they were some embarrassing videos would be released. This is of course the classic extortion phishing scam. But this one has a twist that makes it very scary. I have reprinted it verbatim with personal information redacted:

[NAME REDACTED], I suggest you read this message carefully. Take a moment to chill, breathe, and analyze it thoroughly. We’re talking about something serious here, and I ain’t playing games. You don’t know anything about me whereas I know you and right now, you are thinking how, right? I know that calling [PHONE NUMBER REDACTED] or knocking [ADDRESS REDACTED] would be a convenient way to contact you in case you don’t take action. Don’t even try to escape from this, I know where your family lives and you have no idea what all I can do in [CITY REDACTED]. You’ve been treading on thin ice with your browsing habits, clicking through those girlie videos and clicking on links, stumbling upon some not-so-safe sites. I placed a Malware on one such website & you visited it to have fun (if you know what I mean). And when you got busy accessing that website, my malware gave me total control over your device and your smartphone started out working as a RDP (Remote Protocol). I can look at everything on your display, switch on your camera to record you, and you wouldn’t even notice. Oh! you guessed it right, I have recorded you and I’ve got access to all your contacts, and social media accounts too. Been keeping tabs on your pathetic existence for a while now. It’s simply your misfortune that I saw your misdemeanor. I put in more days than I should’ve looking into your life. Extracted quite a bit of juicy info from your system. and I’ve seen it all. Yeah, Yeah, I’ve got footage of you doing filthy things in your house (nice setup, by the way). I then developed videos and screenshots where on one side of the screen, there’s the videos you were watching, and on the other part, it is your vacant face. With just a single click, I can send this filth to all of your contacts. Your confusion is clear, but don’t expect sympathy. Genuinely, I’m ready to wipe the slate clean, and allow you to get on with your life and forget you ever existed. I will give you two alternatives now. First Option is to turn a blind eye to my email. Y ou should know what is going to happen if you take this path. Y our video will get sent to your contacts. The video was lit, and I can’t even fathom the embarrasement you’ll face when your colleagues, friends, and fam see it. But hey, that’s life, ain’t it? Don’t be playing the victim here. Second wise option is to pay me, and be confidential about it. We will name it my “privacy fee”. Let’s discuss what happens if you choose this path. Your filthy secret remains your secret. I’ll wipe everything clean once you come through with the payment. You will make the payment by Bitcoin only. Pay attention, I’m telling you straight: ‘We gotta make a deal’. I want you to know I’m coming at you with good intentions. I’m a person of integrity. Amount to be paid: $ 2000 BTC ADDRESS: [BITCOIN WALLET ADDRESS REDACTED] (Copy it carefully) Once you pay up, you’ll sleep like a baby. I keep my word. And of course: You got one day to sort this out and I will only accept Bitcoins (I’ve a unique pixel in this email message, and now I know that you have read this mail). Once my system will catch that full Bitcoin payment, it’ll wipe out all the dirt I got on you. Don’t even think about replying to this or negotiating, it’s pointless. The email and wallet are custom-made for you, untraceable. If I suspect that you’ve shared or discussed this email with anyone else or online, the shitty video will instantly start getting sent to your contacts. And don’t even think about turning off your phone or resetting it to factory settings. It’s pointless. I don’t make mistakes, [NAME REDACTED]. Honestly, those online tips about covering your camera aren’t as useless as they seem. I am waiting for my payment.

This was sent in the form of a PDF. And that was likely done to evade spam filters which would look for keywords in the body of the email in order to filter out emails like this one. A PDF solves that problem for the threat actor as it is an attachment that at best is scanned to confirm that it isn’t malware, but isn’t scanned for keywords that would indicate that it is a scam.

What makes this specific scam email unique is that the threat actor is using the name, address, and phone number of the recipient. That’s something that I haven’t seen before, and I am sure that it would freak out anyone who receives such an email. The thing is that it isn’t hard to come up with this sort of information. Two methods that come to mind are a data leak of some sort where a threat actor gets their hands on this information to use it in a scam like this. Or via Open Source Intelligence which is the use of publicly available information. Threat actors can use this information to go after a target. In this case, I’m thinking that this came from a data leak. The sort of people who do these sorts of scams need to get thousands or tens of thousands of emails out there hoping that 1% fall for it which in turn results in a payday for the threat actor. Thus they don’t have time to use Open Source Intelligence to pick and choose their victims. This is strictly a numbers game for them. By the way, you can find out if your address has been part of a data breach by going to haveibeenpwned.com and typing in your email address.

As for the rest of the email, it has the usual traits of a extortion phishing email:

  • The email claims that the threat actor has installed malware that has recorded you doing “naughty” things. Fun fact, anybody who was capable of creating malware of that sort would be working for a nation state employed to go after high value targets such as politicians and sensitive industries. They would not be trying to get Bitcoin from anyone that they send an email to. So the threat actor is lying about that.
  • The threat actor claims that if you pay them, they will know about it and instantly delete everything. This is also false. Bitcoin transactions are anonymous. So there’s no way the threat actor would know who paid them. As an aside, I checked the Bitcoin wallet that was in the email and there was no Bitcoin in it. So at the time of writing, nobody has fallen for this. Yet.
  • Next up is the purported use of the webcam to record the victim. It is possible to remotely take over a webcam in a laptop. So if you’re the least bit paranoid about that, cover yours with tape. Or you can disable it entirely. Ditto for the microphone as well.

Finally, I will leave you with two pieces of advice. If you’re the least bit concerned about whether your system is compromised, consult a computer professional and have them check things over. It would also be a good idea to make sure your anti-virus is up to date and fully functioning as well.

And my final piece of advice is that under no circumstances should you pay up. It only encourages the scumbag threat actors, which in turn creates more victims. Thus don’t pay them. Ever.

The Dark Side of Christmas: How Scams Exploit the Festive Spirit

Posted in Commentary with tags on December 20, 2024 by itnerd

The SafetyDetectives team has been exploring the evolution, tactics, and impact of Christmas scams to offer our readers actionable advice to avoid falling victim to fraud this holiday season. 

Key findings at a glance: 

  • Different types of scams are present year-round, but the incidents typically increase during the holidays when people may be more susceptible to social engineering. 
  • In 2023, the AARP reported that 80% of adult consumers in the US have experienced holiday-themed fraudulent activity
  • It was found that 1 in 5 adults would provide their personal information or click questionable links for a chance to redeem a desired item at a bargain during the holidays.

Scammers’ practices have noticeably grown in complexity and sophistication over the years, for that reason people should remain vigilant during the season becomes more imperative given the potentially enormous financial and psychosocial fallout of those.

You can access their detailed report here: https://www.safetydetectives.com/blog/christmas-scams-research/

Over 1.2 TB of Data Exposed by Builder.Ai

Posted in Commentary with tags on December 19, 2024 by itnerd

A significant data exposure involving Builder.ai, a London based company offering AI software and app development solutions, was recently uncovered by cybersecurity researcher Jeremiah Fowler. 

What happened: 

A database totaling 1.2TB and containing over 3 million records was exposed. The data exposed includes secret access keys, customer PII, cost proposals, NDA agreements, invoices, tax documents, email correspondence screenshots, and more. 

Why it matters: 

This exposure presents serious risks, such as invoice fraud, phishing attempts, and potential business privacy breaches. 

To learn more, read the detailed report here: https://www.websiteplanet.com/news/builderai-breach-report/

2025 Predictions From Some Leading Cybersecurity Experts

Posted in Commentary on December 19, 2024 by itnerd

As the year draws to a close, we have gathered predictions from an array of cybersecurity experts who have given insights into trends they see in 2025.

Marina Segal, CEO, Tamnoon

Shift to Cloud-Based Risk Management

Cloud adoption doesn’t show any signs of slowing down in 2025. CISOs and security leaders will be hyper-focused on reducing cloud threat exposure. After all, no CISO wants to be in the spotlight of a high-profile data breach.

As a result, more companies will shift to cloud-based risk management. This change will largely be driven by: 

  • Geopolitical tension and threats to critical infrastructure
  • Sophisticated AI-driven attacks
  • Governments adopting stricter regulations
  • Economic pressures forcing companies to optimize cloud spend and security budgets
  • Consolidation of cloud providers

This will lead to stricter cloud security standards and compliance requirements for all industries — a trend private enterprises will be ready to capitalize on through compliance-friendly solutions. 

More importantly, this trend will highlight the need for more diversified risk management strategies.

Piotr Kupisiewicz, CTO Elisity

In 2025 some verticals will be highly relevant for new microsegmenation projects that enable least-privilege zero trust security policies.

Manufacturing, industrial, and healthcare organizations are prime candidates for microsegmentation projects due to their complex, interconnected environments and high-value assets. These sectors often have a mix of legacy systems, IoT and IoMT devices, and critical infrastructure that require granular access control. Microsegmentation enables the implementation of least-privilege zero trust policies, effectively isolating critical assets and limiting lateral movement in case of a breach. For manufacturing and industrial environments, it helps protect operational technology (OT) systems from IT-based threats. In healthcare, microsegmentation safeguards sensitive patient data and ensures compliance with strict regulatory requirements. The ability to maintain service continuity during cyber incidents is crucial for these sectors, making microsegmentation an essential security strategy.

In 2025 the top cybersecurity frameworks and security regulations and government agencies will increase their pressure for organizations to adopt microsegmentation.

Several prominent cybersecurity frameworks, regulations, and government agencies recommend microsegmentation or network segmentation as critical security measures. These include the NIST Cybersecurity Framework, ISO 27001, HIPAA, PCI DSS, CMMC 2.0, IEC 62443, HHS 405(d), and the EU’s GDPR. The NSA and CISA in the United States strongly advocate for these practices, particularly in the context of zero-trust architecture. The Purdue Model, while not a regulation, is widely used in industrial control systems for segmentation. Additionally, the Federal Zero Trust Strategy mandates network segmentation for U.S. government agencies. These frameworks and agencies recognize the importance of segmentation in limiting lateral movement during cyberattacks and enhancing overall network security posture.

SecureWorks

Ransomware

Opportunistic ransomware and data exfiltration attacks will continue at a high tempo into 2025 as ransomware affiliates, displaced in 2024 from disrupted ransomware operations such as LockBit and ALPHV/BlackCat, continue to form new allegiances with new entrants, previously lower profile groups, or rebranded returnees. Many affiliates will continue to work with multiple groups, some continuing to experiment with operating on their own behalf using leaked ransomware builders. Being able to detect and disrupt attacks at an early stage before data can be stolen or encrypted will remain essential for organizations in all sectors.

China

China will continue to focus on its political, military and economic priorities when collecting intelligence via cyber (or any other) means. The targeting will therefore change little but can always be swayed by political developments around the world.

In terms of more tactical elements: Chinese state sponsored threats will develop zero-day exploits for network perimeter devices that are deemed to be vulnerable targets (there are several firewall and VPN devices/vendors that fall into this category). Chinese state sponsored threats will be driven toward further emphasizing stealth in its operations by the continuing strategy of the U.S. to employ sanctions and indict specific named individuals connected with cyber intrusions.

China will continue to seek to understand as much as it can about Western (particularly U.S.) technology used on the battlefield in Ukraine to prepare countermeasures for a possible future invasion of Taiwan. Its cyberespionage operations will likely be similarly geared to such preparations.

More predictions from Secureworks can be found here.

Action1 Makes Its Full-Featured Patch Management Platform Free for Everyone Including Home Users

Posted in Commentary with tags on December 19, 2024 by itnerd

Action1, a leading provider of real-time vulnerability discovery and automated patch management solutions, today announced a significant expansion of its free patch management offering. Previously available exclusively to business users, Action1 is now breaking down barriers to advanced endpoint security for everyone—including nonprofits, independent consultants, small businesses, and home users—ensuring no one is left vulnerable to cyber threats. 

With 100 endpoints free forever, Action1 makes itsrobust, cloud-native patch management solution equitable for both individuals and organizations worldwide, empowering them to combat cyberattacks and safeguard their digital environment.

 Small Targets, Big Risks

Cybercriminals are increasingly targeting the most vulnerable among us—small businesses, nonprofits, and independent professionals. According to Cybersecurity Ventures, more than 60% of ransomware attacks now focus on organizations with fewer than 100 employees. Unpatched vulnerabilities, which account for nearly 60% of all cyberattacks,according to the Ponemon Institute, are particularly harmful to small businesses and individuals with limited resources. Action1 addresses these challenges by delivering automated patching and vulnerability management across both operating systems and third-party applications, ensuring the broader community stays protected without requiring extensive IT or budget resources.

With Action1, users gain the benefits of an autonomous endpoint management solution for the first 100 endpoints at no cost, with features including:

  • Ease of Use: Start patching endpoints in under five minutes and rapidly scale to as many endpoints as needed. No dependency on legacy tools, clunky integrations, or on-premise software.
  • Unified Cross-OS and Third-Party Patching: Automate the entire patching process for remote and onsite endpoints, from identifying and deploying missing updates to real-time reporting. 
  • Vulnerability Discovery and Remediation: Prevent security breaches and ransomware attacks. Detect vulnerabilities in OS and applications in real-time and enforce remediation. 

With this initiative, Action1 now accepts both personal and business emails for new account registration at https://www.action1.com/signup.

To learn more about Action1 Patch Management, visit https://www.action1.com/free-edition/.

Legit Security Enhances Secrets Detection & Prevention with a Single, Integrated View of All Secrets Findings and Recovery Actions Across the SDLC

Posted in Commentary with tags on December 19, 2024 by itnerd

Legit Security, the definitive application security posture management (ASPM) leader providing end-to-end visibility and protection across the entire software factory, today announced enhancements to its secrets scanning product. Available as either a stand-alone product or as part of a broader ASPM platform, Legit released a new secrets dashboard for an integrated view of all findings and recovery actions taken to remediate secrets. In addition, Legit released new discovery and remediation capabilities for secrets found within developers’ personal GitHub repositories.

Secrets – from API keys and tokens to credentials and PII – play a vital role in application development. However, the high value of secrets makes them a prime target for attackers and creates risk across the organization, from security operations to cloud and platform engineering. Legit’s new capabilities greatly improve the ability to mitigate risk and reduce the attack surface associated with secrets.

The explosive growth in non-human identities (NHIs), which need credentials to manage authentication and authorization, has increased the prevalence of secrets. While security teams typically focus on secrets in source code, they are increasingly emerging in ticket systems, artifact registries, and other systems, such as Confluence, Jira, and Slack. Organizations are challenged with protecting secrets from exposure while enabling developers to build services that rely on them. This challenge is further exacerbated by compliance requirements, such as HIPPA, PCI DSS and GDPR, that direct organizations to secure secrets.

Legits’ enhancements are the latest in the company’s track record of delivering innovative capabilities to secure the modern software factory. With the earlier release of its AI-powered capabilities to detect and protect secrets across the software development pipeline, Legit was the first to apply AI/ML to significantly reduce noise associated with secrets scanning.

Legit’s new secrets dashboard gives teams: 

  • Centralized visualization: Provides the most complete view of all secrets detection and prevention activities across the enterprise to prioritize remediation and ensure guardrails are in place. 
  • Secrets analytics: Prioritizes secrets remediation based on factors such as severity, source, repo/product, and user.
  • Secrets prevention: Provides insights into potential new secrets that have been prevented based on an organization’s policies and established guardrails, and identifies developers actively using preventative measures. 
  • Secrets growth and remediation trends: Insights into new secrets, issues resolution, and backlog trends, so that organizations can measure the effectiveness of AppSec programs in preventing and remediating secrets. 

Legit’s new ability to discover secrets in personal GitHub repositories gives teams:

  • Secrets discovery: Identifies and monitors secrets within a developer’s personal GitHub and the organization’s account, ensuring that developers do not expose secrets.
  • Personal repository discovery: Identifies and builds an inventory of all personal repositories owned by an organization’s developers for a comprehensive list of assets used by developers.
  • Consolidated triage and remediation: Integrates findings from business and personal accounts into the Legit platform to provide a single view of the risk associated with secrets, regardless of where they reside.

With Legit’s new and enhanced capabilities, organizations gain critical insights into the enterprise’s secrets posture to understand risk and remediation trends over time. They are also provided with the broadest coverage to strengthen their security posture and protect their development environment from end to end.

Legit offers a free trial of its secrets detection and prevention solution. To register, visit https://info.legitsecurity.com/secrets-detection-and-prevention-free-trial.

US Supreme Court To Hear Last Ditch Attempt By TikTok To Stay Alive In The US

Posted in Commentary with tags on December 18, 2024 by itnerd

To be honest, I’m not surprised that the US Supreme Court is going to hear an appeal from TikTok to stop it from being banned in the US:

The country’s highest court set oral arguments in the case for Friday, January 10, just nine days ahead of the looming deadline on January 19. 

It comes after Congress passed a law earlier this year banning TikTok unless its Chinese parent company ByteDance sells its stakes by the deadline. 

Lawmakers were responding to warnings that the wildly popular social media app is a national security concern with the collection of Americans’ data. 

But some 170 million Americans use the video app. 

Now the Supreme Court will decide whether the Protecting Americans from Foreign Adversary Controlled Applications Act, which would ban TikTok, violates the First Amendment. 

Both TikTok and the Justice Department were directed to file briefs before 5pm ET on Friday, December 27. 

Will it succeed? Well, I am not a lawyer so I don’t know. But YouTube channel Legal Eagle who is an actual lawyer suggests that Congress has the right to ban TikTok for national security reasons and the courts have tended to steer clear of national security issues in the past. Which is likely why TikTok is going with the First Amendment option as they will argue that a ban violates the free speech of Americans. And there’s the Donald Trump factor. In the past he’s been anti TikTok. But he’s said that he may stop a ban of the social media platform. So who knows where this will go. All I know is that we’re in the endgame now.