Archive for February 10, 2025

Lee Enterprises Has Apparently Been Pwned

Posted in Commentary with tags on February 10, 2025 by itnerd

It is being reported that newspapers across the country owned by the news media company Lee Enterprises, parent company of more than 70 daily newspapers and nearly 350 weekly and specialty publications in 25 states, were impacted by a cyberattack which made them unable to print newspapers and created problems with their websites.

Erich Kron, security awareness advocate at KnowBe4, commented:

“Although it isn’t officially announced, the symptoms of this attack have all of the signs of a significant ransomware event. Ransomware groups love to target organizations that are time sensitive, and media outlets absolutely fit that description, especially ones that produce a physical product.

Unfortunately, during these attacks cybercriminals very often steal any data they can find that may be useful to sell, or to use as leverage when paying a ransom. This is often going to include employee or customer information, and in the case of media outlets could include sensitive information such as confidential informants and other people who may want to remain anonymous.

Ransomware attacks are often very costly and don’t end with simply paying the ransom. The cybercriminals will often leave back doors in the network that need to be found and removed to ensure the attackers don’t simply reinfect the network, demanding yet another ransom payment. Hiring cybersecurity experts to find and remove back doors can be extremely costly, plus there is the cost of sales and advertising that would be halted while the systems are still down.

Because ransomware is most often spread by targeting employees with social engineering attacks, such as phishing, smishing, or even vishing, it’s critical that organizations not only have technical controls in place, but also have a robust human risk management program as well.”

I was hoping that things would be better in 2025, but given the number of attacks that I am reporting on, it honestly feels worse than 2024. Which means that this is going to be a very long year.

A Massive Brute Force Attack Is Underway

Posted in Commentary with tags on February 10, 2025 by itnerd

A large-scale brute force password attack using almost 2.8 million IP addresses is underway, attempting to guess the credentials for a wide range of networking devices, including those from Palo Alto Networks, Ivanti, and SonicWall.

I have commentary on this from a variety of experts. Starting with Erich Kron, Security Awareness Advocate at KnowBe4

“VPNs are a great target for bad actors because in a corporate world, they can lead to direct access to the network behind the protection of firewalls and other edge security devices. If these bad actors are able to guess or brute force the VPN password, cybercriminals could attempt anything from data theft to ransomware, or more. In many cases, cybercriminals could simply sell this network access to other bad actors as well, pocketing the cash and letting the buyer do whatever nefarious deeds they would like.”

“These types of attacks trying to break into networks though VPNs are often driven by processes such as ‘password spraying,’ which is using a predefined list of simple or common passwords, and a list of known email addresses or usernames, or through ‘credential stuffing,’ which is using a list of usernames and passwords stolen in other data breaches or by tricking employees to give up credentials through fake login portals. The use of MFA, or some other sort of secondary authentication technology, can help stop the ability of bad actors to log in, however, it is not foolproof.”

“By using so many IP addresses that are scattered throughout the globe to carry out these attacks, the cybercriminals can make it extremely difficult for defenders to stop the brute force attacks attempting to pierce the protections put in place by targeted organizations. These source IP addresses are often from individual computers infected with malware, IoT devices that have been compromised, or out of date consumer routers or internet facing devices that attackers have already taken over.”

“These sorts of attacks stress the importance of educating employees about good password hygiene, including not reusing passwords that may have been stolen in other breaches, and the need for a second factor of authentication for any important accounts, especially those that can access the organization from the internet.”

Next up is Chris Hauk, Consumer Privacy Champion at Pixel Privacy:

“Brute force password attacks have long been and will continue to be, a popular method of attacking systems, websites, VPN appliances, and other password-protected devices. While there are more sophisticated ways to perform attacks, hackers depend on the fact that their targets haven’t been kept updated to the latest software, firmware, or operating system versions, or that the device’s logins aren’t protected with two-factor or multi-factor authentication methods.”

Finally we have Brian Higgins, Security Specialist at Comparitech:

“This uptick in high-volume activity is symptomatic of the monetary allure that access dangles in front of cyber-criminal enterprises. Although such a massive brute-force endeavor smacks a little of the old ‘spray and pray’ methodology, the sheer volume and potential value of online targets these days makes the whole thing worthwhile. If anyone still hasn’t switched to Two or Multi Factor authentication or is adamantly clicking ‘ask me later’ when they see an update prompt, then this should be their final warning. There is research that says we will hit 75 billion connected devices in 2025 so Bot-Nets will only get bigger and from a criminal’s point of view, there’s no point letting them sit idle.”

Solutions such as MFA/2FA as well as totally passwordless solutions are no longer optional based on an attack like this one. Because when attacks like this one succeed, they have grave consequences for the organization at the receiving end.

UPDATE: Darren James, Senior Product Manager at Specops Software, commented:

“Brute Force attacks aren’t usually very sophisticated, but this example does certainly seem to demonstrate a well-planned and determined attack against its potential victims using such a large number of compromised devices based all over the globe.

The benefit of a brute force attack of this nature is that it’s in no hurry to crack the security of a specific individual, but instead targets hundreds, thousands maybe even millions of individual user accounts, trying to connect using a list of already known breached passwords, once it finds a match it might then proceed to deliver a payload or it may just keep that user/password pair to one side to be used later or sold on to the highest bidder.

This process usually takes a lot of time, but by simultaneously using 2.8 million devices they can certainly speed up this type of attack and the amount of positive “hits” they get.

From our own recent research we found that “admin” was still one of the most common base terms used in breach passwords, so it’s vitally important to make sure that the admin interfaces of these VPN and Firewall servers and devices that are being targeted are not using easily guessable passwords or default passwords set by their manufacturers.

Even if those passwords have been changed, organizations should also continuously scan to make certain that the passwords that have been set haven’t themselves become breached.

Implement MFA on these devices. This can be done using RADIUS authentication if there’s no secure built-in 2FA option, and finally consider whether you need to expose the admin interface externally, usually this is not a good idea, but could have been left over from a support session.”

This is also being reported by Bleeping Computer and has been tracked by The Shadowserver Foundation

UPDATE #2: Lawrence Pingree, VP, Dispersive adds this:

This problem is solved by separating the control plane and data plane for VPNs and transport infrastructure, as we do. A recent analysis of 2024 breaches found that over 56% of enterprises experienced an attack related to their VPNs (report link: https://blog.dispersive.io/vpns-under-siege-2024-cyber-attacks-data-breach-in-review ). I do not think most Zero Trust providers are immune to this same style of attack.

TikTok Ban: Cross-Platform Trends in Reach and Engagement 

Posted in Commentary with tags on February 10, 2025 by itnerd

Research done by the team at SafetyDetectives has been posted that  measured how the news of the TikTok ban in the US affected major accounts and analyze how different strategies led to growth or decline across platforms.Despite it being a short ban, they found that the news produced surprising effects. Some of their key findings were:

  • Of the 30 accounts included in their research, half gained followers after January 19, while the rest experienced neither loss nor gain. Of the other 14 accounts that gained followers after the temporary suspension, half are news outlets while high-profile celebrities and brands showed little to no gain.
  • Surprisingly, more accounts suffered engagement losses on Instagram than on TikTok. Accounts lost a combined total of 8.1 million in average likes (versus TikTok’s 7.7 million) and 104,000 in average comments (versus TikTok’s 159,000).
  • Only 8 of the accounts included in their study experienced growth on Facebook during this period, and Amazon was the only one to lose followers, while the rest maintained stability.
  • As on TikTok, none of the accounts included in their study lost followers on YouTube. Not surprisingly, the top 5 accounts include a professional YouTuber, a streamer, and 3 musicians.

The temporary suspension of TikTok highlighted how different platforms, while typically offering the same basic capabilities, won’t necessarily cater to the same categories of content. For creators, brands, and social media managers, this reinforces the importance of understanding your target audience and meeting them where they are.

You can access their report here: https://www.safetydetectives.com/blog/tik-tok-ban-research/

Patch or Perish: Why Vulnerability Management Can’t Wait According To ESET

Posted in Commentary with tags on February 10, 2025 by itnerd

ESET has put up a blog post titled, “Patch or perish: How organizations can master vulnerability management” that I think those who are responsible for patching all the things should read.

Cybercriminals are moving faster than ever, with vulnerability exploitation now a leading cause of ransomware attacks and data breaches. A recent report found that observed cases of vulnerability exploitation tripled in 2023 alone. Yet, with record-high CVEs and shrinking patching windows, many organizations are struggling to keep up. 

ESET’s latest blog post insights dive into: 

  • Why organizations are overwhelmed by a relentless surge in software vulnerabilities 
  • The rise of zero-day exploits and perimeter-based attacks 
  • How AI-driven threat actors are making patching even more urgent 
  • Actionable steps to automate and prioritize vulnerability management 

You can read the blog post here.

Bell Sponsors The Commemoration Of The 25th Anniversary of Vince Carter’s Iconic Dunk

Posted in Commentary with tags on February 10, 2025 by itnerd

Bell has announced that it is sponsoring the Toronto Raptors’ commemoration of the 25th anniversary of Vince Carter’s legendary between-the-legs dunk from the 2000 NBA Slam Dunk Contest. 

This momentous occasion will be commemorated during a special “GOAT Night” game at Scotiabank Arena this Wednesday, February 12th, featuring the Raptors versus the Cleveland Cavaliers. Bell is presenting this “Dunkaversary,” a tribute to Carter’s enduring legacy and his impact on Toronto basketball.

As part of the sponsorship, Bell has developed an innovative augmented reality (AR) experience, Bell SkySlam. Fans across Canada can use the Raptors App or BellSkySlam.ca to virtually place Carter’s iconic dunk onto any city skyline, experiencing this historic moment in stunning 3D.

You can read the press release here for more details. 

Other World Computing (OWC) and ARCHIWARE Partner Up

Posted in Commentary with tags on February 10, 2025 by itnerd

Other World Computing and ARCHIWARE, a leading provider of data management software, today announced a strategic partnership to deliver seamless shared storage, cloning, backup, and archiving for collaborative workflows. Under the terms of the partnership agreement, the ARCHIWARE P5 platform will now be natively integrated with the OWC’s Jellyfish Shared Storage for Video Production to enhance collaboration capabilities, ensure data protection, and future-proof asset management.

With the new Jellyfish Manager 3.0, using ARCHIWARE P5 with Jellyfish storage products to protect production data is now easier than ever. Users can install, activate, and launch ARCHIWARE P5 directly within the Jellyfish Manager interface with just a few clicks – no additional P5 server is required. Running natively on all Jellyfish NAS solutions, P5 can be enabled simply by toggling a switch in the Jellyfish Manager. Once activated, users can seamlessly access and manage ARCHIWARE P5 without ever leaving the Jellyfish Manager UI, ensuring a streamlined and efficient workflow.

The Perfect Fit to Keep Your Media Safe and On Hand in A Collaborative Workflow

  • P5 Synchronize clones data from Jellyfish to secondary online storage and creates an identical file system for high availability. If needed, file access is instantaneous without restore.
  • P5 Backup creates security copies of files and projects on disk, LTO or Cloud storage so they can be restored in case of accidental deletion, file corruption, or technical failure. At least one of these periodic security copies can and should be kept offsite, so data is safe even in case of natural disaster.
  • P5 Archive comes in when long-term storage and preservation are required. Archived media and projects are comprised in the P5 Archive catalog, including previews for visual browsing. User-definable metadata fields and extensive search features make it incredibly easy to find relevant media and restore it quickly and easily with just one click.
  • The flexible Archive with the P5 Data Mover add-on to P5 Archive: everything archived can be migrated or replicated to a different storage anytime. This way, the Archive can adapt to changing policies, requirements or price points and stays flexible and future-proof. Like P5 Backup, P5 Archive is compatible with numerous cloud services such as Amazon S3, Glacier, Microsoft Azure, Backblaze, and Wasabi. If you prefer a local Archive, you may choose virtually any disk or LTO tape storage on the market.

Jellyfish High-Performance Shared Storage for Modern Post-Production

  • Purpose-built for creative professionals, by post-production professionals, Jellyfish delivers turn-key high-speed production storage optimized for film, television, corporate communication, live events, broadcasting, government, and education.
  • Scalable and versatile shared storage for any workflow – offering HDD, SSD, and all-flash configurations in both desktop and rack-mounted systems. From compact solutions for small teams to petabyte-scale Full Flash and Hybrid options for enterprise and mission-critical applications, Jellyfish adapts to evolving workflow needs.

Want to learn more? Please join this live webinar:

Webinar: Effortless Video Storage and Backup: Jellyfish Manager 3.0 and ARCHIWARE P5 Integration Made Simple

About: With OWC Jellyfish, you don’t need to be an IT expert in order to use shared storage for your video projects. With ARCHIWARE P5, professional backup, archive, and replication are also simplified. P5 and Jellyfish come together in the latest Jellyfish Manager 3.0 release, where P5 is integrated and enabled with a single click. In this webinar, OWC’s Luke Marchant and ARCHIWARE’s David Fox run through the joint solution, showing how to access P5 and explaining some simple archive and replication workflows. Register now for what promises to be a highly informative 40 minutes.

When

Wed, Feb 19, 2025, 2:00 PM – 2:40 PM Central European Time (CET)

Register here: https://register.gotowebinar.com/register/8008420929092270941

Wed, Feb 19, 2025, 1:00 PM – 1:40 PM Eastern Standard Time

Register here: https://register.gotowebinar.com/register/6959993711078798679