At least 36 US schools involved in data breach following ransomware attack

Posted in Commentary with tags on March 7, 2025 by itnerd

The ransomware gang known as Skira yesterday claimed responsibility for a December 2024 data breach at Carruth Compliance Consulting, a company which administers retirement savings plans. 

Comparitech reported that this breach led to at least three dozen school districts and colleges across the US–Carruth’s clients–reporting data breaches that compromised the personal data of more than 110,000 school employees.

Rebecca Moody, Head of Data Research at Comparitech commented: 

“Attacks like this highlight how far-reaching the impact of these data breaches via ransomware can be. A breach on one provider can affect multiple educational institutions, as we saw only too well with Blackbaud in 2020. Schools and colleges may have the best cybersecurity measures in place, but they’re only as good as the third parties they use.”

“It remains to be seen just how many schools have been affected by this attack, but we’ve found over 30 that have reported breaches so far. And with sensitive data involved, such as Social Security Numbers, schools need to act fast to ensure those affected are aware as soon as possible. We’d highly recommend people take up the offer of free credit monitoring and that they also remain vigilant for any phishing emails, calls, or text, and suspicious activities on their accounts.”

Paul Bischoff, Consumer Privacy Advocate at Comparitech adds:

“Ransomware attacks on US finance companies can lock down computer systems and steal data. Companies must then either pay a ransom or face extended downtime, data loss, and putting data subjects at increased risk of fraud. Ransomware can disrupt a wide range of operations including communication, financial transactions, access to stored files, and more.”

“Comparitech researchers logged 58 confirmed ransomware attacks on US finance companies in 2024, compromising 34.6 million records. The average ransom for a finance company is $1 million.”

“In addition to confirmed attacks, Comparitech tracked 151 unconfirmed claims against US finance companies in 2024, and 43 so far in 2025. These are claims made by ransomware groups but not acknowledged by the targeted organizations.”

While this isn’t the worst attack that I have seen, I would not be shocked if this does get worse. Because these sorts of attacks have a habit of starting out being not that bad. Then they get worse as more facts come to light. So be sure to bookmark this for updates as they become available.

Malvertising Campaign Leads to GitHub-Hosted Info Stealers

Posted in Commentary with tags on March 7, 2025 by itnerd

Microsoft has removed some undisclosed GitHub repositories leveraged in a massive malvertising campaign that affected nearly 1 million devices worldwide. The company had this to say:

In early December 2024, Microsoft Threat Intelligence detected a large-scale malvertising campaign that impacted nearly one million devices globally in an opportunistic attack to steal information. The attack originated from illegal streaming websites embedded with malvertising redirectors, leading to an intermediary website where the user was then redirected to GitHub and two other platforms. The campaign impacted a wide range of organizations and industries, including both consumer and enterprise devices, highlighting the indiscriminate nature of the attack.

GitHub was the primary platform used in the delivery of the initial access payloads and is referenced throughout this blog post; however, Microsoft Threat Intelligence also observed one payload hosted on Discord and another hosted on Dropbox.

The GitHub repositories, which were taken down, stored malware used to deploy additional malicious files and scripts. Once the initial malware from GitHub gained a foothold on the device, the additional files deployed had a modular and multi-stage approach to payload delivery, execution, and persistence. The files were used to collect system information and to set up further malware and scripts to exfiltrate documents and data from the compromised host. This activity is tracked under the umbrella name Storm-0408 that we use to track numerous threat actors associated with remote access or information-stealing malware and who use phishing, search engine optimization (SEO), or malvertising campaigns to distribute malicious payloads.

I have a number of comments on this. Starting with Ensar Seker, CSO at SOCRadar:

“The attackers used geofencing, device fingerprinting, and cloaking techniques to evade detection, which means the malicious payload is only delivered to targeted users, making it harder for security solutions to track and mitigate the campaign.

This campaign is likely part of a broader MaaS (Malware as a Service) ecosystem, where attackers use pre-built malvertising kits to distribute payloads like stealers, ransomware, and banking trojans. Malvertising has traditionally targeted Windows users, but with more professionals using macOS and Linux, we’ll see cross-platform payloads becoming more common.”

Roger Grimes, data-driven defense evangelist at KnowBe4 follows with this:

“It’s important to remember that despite the ingenuity and complexity of this malware dropper campaign, the victims still had to be socially engineered into executing the content on their system for their system to be compromised. They didn’t just see a (malicious) advertisement, click on it, and get compromised. No, they had been socially engineered into not only clicking on the ad, but then into approving the resultant prompts that then ran the malicious content (as long as they were fully patched). Seventy to ninety percent (70% – 90%) of all successful data breaches involve social engineering. A common type of social engineering is malicious advertising. Make sure your users are aware of how not every ad or internet search will lead them to a good place. In fact, these ads and Internet search returns often lead people to bad places. It’s something they need to be aware of.”

It’s good that Microsoft has taken action to take these repositories down. Hopefully they can maintain their vigilance to make sure that this doesn’t become a common occurrence.

KnowBe4 Researchers Uncover 36.5% Spike in Phishing Attacks Leveraging QuickBooks’ Legitimate Domain in 2025

Posted in Commentary with tags on March 7, 2025 by itnerd

KnowBe4’s Threat Research team has observed a growing proportion of phishing emails sent using the popular accounting software Intuit QuickBooks. The team has observed a 36.5% increase in the use of this platform since January 1, 2025.

To facilitate these attacks, cybercriminals are creating free accounts on the platform, which makes these attacks challenging for people to distinguish from genuine communications.

These attacks are part of a global trend of phishing emails being sent using legitimate platforms. These platforms are not compromised; cybercriminals create (usually free) authorized accounts, which are provisioned with email-sending privileges. From there, they simply create their attacks within the platform and hit ‘send’. This is much the same as creating free webmail email accounts (like Gmail or Hotmail), with the added benefit of leveraging the platform’s trusted brand and sender domain. 

Between January 1, 2022, and February 28, 2025, KnowBe4’s Threat Research team has seen a 376.6% increase in these types of attack, with a 43.6% increase in 2025 so far versus 2024.

You can read the research here.

Guest Post: Apple’s Encryption Rollback in the UK Puts International Users at Risk – Here’s Why 

Posted in Commentary with tags on March 7, 2025 by itnerd

By Vincentas Baubonis

Apple swore it would never build a backdoor. But by killing end-to-end encryption (E2EE) for UK users, it just left the door open. Under pressure from the British government, Apple quietly pulled Advanced Data Protection (ADP) – stripping UK users of their strongest defense against mass surveillance. Now, authorities can demand access to iCloud backups, something even Apple couldn’t touch before.

But here’s where it gets even messier: Apple didn’t just roll over – it fought back. Instead of complying with the UK’s sweeping demand for a built-in “back door,” Apple appealed. US officials are now investigating whether the UK violated the CLOUD Act.

Bad news for UK users? Absolutely. But here’s the real kicker: this isn’t just a UK problem. If people think their iCloud data is safe just because they don’t live in the UK, they might want to rethink that.

1. The UK just became the weakest link in Apple’s security model.

Encryption’s strength depends on its weakest point. By stripping UK users of ADP, Apple has created a jurisdiction where iCloud data is less protected by default. End-to-end encryption requires all participants to have ADP enabled to maintain the highest level of security. This means that any iCloud file, photo, or backup shared with a UK user is now more exposed than it would be elsewhere. 

By stripping UK users of ADP, Apple has created a high-value target for attackers. If UK iCloud data is no longer encrypted end-to-end, it’s more vulnerable to hacking, government surveillance, and legal demands. If that data is shared with a non-UK user, their data is also at risk – even if they still have ADP enabled.

Cybercriminals and state-backed hackers actively exploit low-security regions to gain footholds into global systems. Look no further than Russia’s 2020 SolarWinds attack, where attackers targeted less-secure systems to pivot into US federal networks. Creating an intentionally weaker iCloud environment in the UK gives adversaries an entry point that could be exploited to compromise data beyond British borders.

2. This creates a precedent for more governments to demand the same.

Governments worldwide are watching Apple’s move closely. If the UK can pressure Apple into rolling back encryption, other countries may demand similar concessions.

The FBI has long pushed for encryption backdoors, arguing that law enforcement needs access to private communications. In 2020, then-Attorney General William Barr pressured Apple to weaken encryption in the name of national security. The UK’s success gives US agencies leverage to try again.

The EU is currently debating legislation that could mandate message scanning in encrypted apps, including Apple’s iMessage. The UK’s demand will encourage lawmakers pushing for surveillance-based security policies.

Authoritarian regimes like China and Russia have previously sought access to Apple user data. If a democratic country like the UK can force Apple to roll back encryption, regimes with less regard for privacy will use this as justification for even harsher demands. Simply put: if Apple caves once, expect more governments to have similar requests.

3. Weak encryption could fuel the growing wave of cyberattacks. 

Encryption is a core cybersecurity defense. When end-to-end encryption is removed, data can become a bigger target for cybercriminals and state actors.

Last year’s numbers show how active cyber criminals are:

  • Mobile malware continued to rise – 6.7 million attacks involving malware, adware or potentially unwanted mobile apps were blocked in Q3 2024 by the Kaspersky Lab alone.
  • The average cost of a data breach reached 4.88 million USD.
  • Ransomware attacks surged, and nearly all the key numbers – ransomware gangs, targets and payouts – went up; for instance, the medium ransom payment skyrocketed from less than 199,000 USD in early 2023 to 1.5 million USD in June 2024.

4. Apple’s credibility on privacy is crumbling. 

Apple has long marketed itself as a privacy-first company. It famously fought the FBI’s demand to unlock an iPhone in the 2016 San Bernardino case, refusing to build a backdoor. But its decision to proactively disable ADP under UK pressure suggests that its commitment to encryption is negotiable when governments apply enough force.

Apple’s statement claimed it was “deeply disappointed” by the UK’s move, but disappointment doesn’t undo the damage. It appears that Apple doesn’t control its own encryption policies anymore – governments do.

What can users do?

If you’re a non-UK user, your data might still be protected – for now. You should approach Apple services with caution:

  • Avoid iCloud for sensitive backups – consider using encrypted alternatives like Proton Drive, Tresorit, or self-hosted storage.
  • Encrypt locally before uploading – use tools like Cryptomator to encrypt files before storing them in the cloud.
  • Follow legislative debates on encryption – policies like the UK’s could soon come to other countries.
  • Pressure Apple to resist further rollbacks – public outcry influences corporate decision-making. If users accept this, more encryption rollbacks will follow. In other words, the power to strengthen data security is also in users’ hands.

ABOUT THE EXPERT

Vincentas Baubonis is an expert in Full-Stack Software Development and Web App Security, with a specialized focus on identifying and mitigating critical vulnerabilities in IoT, hardware hacking, and organizational penetration testing. As Head of Security Research at Cybernews, he leads a team that has uncovered significant privacy and security issues affecting high-profile organizations and platforms such as NASA, Google Play, and PayPal. Under his leadership, the Cybernews team conducts over 7,000 pieces of research annually, publishing more than 600 studies each year that provide consumers and businesses with actionable insights on data security risks. 

Major Drop in Cobalt Strike Misuse Says Fortra

Posted in Commentary with tags on March 7, 2025 by itnerd

Two years ago, Microsoft, Fortra, and Health ISAC launched an aggressive takedown campaign to stop cybercriminals from weaponizing unauthorized versions of Cobalt Strike. Many questioned if the effort would work – and it has!

Today this is what they are seeing:

  • 80% reduction in unauthorized Cobalt Strike copies circulating in the wild
  • 200+ malicious domains seized to cut off cybercriminal access
  • Dwell time reduced to under a week in the U.S. (down from months)
  • Operation MORPHEUS: A global law enforcement collaboration shutting down 593 criminal infrastructure points across 27 countries

This initiative is now entering a new phase, with automated takedowns and tighter security controls, making it even harder for cybercriminals to exploit red team tools.

You can find out more details here.

Other World Computing Helps Power the Future for Mac Users with Thunderbolt Solutions for New Apple Mac Studio and MacBook Air

Posted in Commentary on March 6, 2025 by itnerd

 Other World Computing today announced the compatibility of its OWC Thunderbolt 4 and Thunderbolt 5 solutions with the new Apple MacBook Air and Mac Studio, respectively. With these cutting-edge OWC solutions, Mac users are empowered to unlock the full potential of their new Apple products, and enjoy a new era of speed, reliability, connectivity, and creativity.

OWC’s full suite of Thunderbolt 5 solutions, which are perfect for the new Mac Studio, include:

●     The OWC Envoy Ultra is the first and fastest Thunderbolt 5 portable SSD – built for those who refuse to slow down.

●     The OWC Thunderbolt 5 Hub is the perfect compact connectivity solution for even more Thunderbolt 5 ports.

●     The OWC Thunderbolt 5 (USB-C) Cable is the only cable you’ll ever need. Built for the speed, power, and compatibility of the new Mac Studio.

In addition, OWC offers a line of Thunderbolt 4 solutions, which are perfect for the new MacBook Air: 

●     The OWC Thunderbolt Hub enables you to add three Thunderbolt 4 ports and one USB port to expand your connection possibilities.

●     The OWC 11-Port Thunderbolt Dock enables you to add three Thunderbolt 4 ports and four USB ports, as well as Ethernet, audio, and card reader functionality to the new MacBook Air.

●     The OWC Express 1M2 is an ultra-fast, compatible, and reliable portable USB4 NVMe SSD. You can build your own or choose ready-to-run solutions. The Express 1M2 is also the perfect external storage solution for smaller-capacity MacBook Airs.

●     The OWC Envoy Pro FX is a universally compatible, portable SSD for Thunderbolt and USB devices, offering performance of up to 2800MB/s in a crushproof and waterproof case.

●     The OWC USB-C Dual HDMI 4K Display Adapter enables two external displays on the new MacBook Air, eliminating the factory limitation of only a single display.

●     The OWC Thunderbolt 5 (USB-C) Cable is a Thunderbolt 5-certified cable for universal use with Thunderbolt 4, Thunderbolt 3, and USB-C-equipped Macs, iPads, and iPhones.

●     OWC USB-C Travel Docks enhance connectivity on the go with multiple USB ports, HDMI connections, and Ethernet support.

More information on OWC’s full line of Thunderbolt solutions, including storagedocks, card readers, and more, is available on owc.com.

KnowBe4 Wins Cybersecurity Company of the Year at the 2025 teissAwards

Posted in Commentary on March 6, 2025 by itnerd

KnowBe4, the world-renowned cybersecurity platform that comprehensively addresses human risk management, today announced that it has been awarded first place in this year’s teissAwards Cybersecurity Company of the Year category for enterprise organisations.

The teissAwards celebrate excellence in cyber and information security, recognising the outstanding contributions of vendors and technologies over the past year.

Winning first place in the Cybersecurity Company of the Year category underscores KnowBe4’s commitment to innovation, product development, and addressing the human element in cybersecurity. It also reflects the organisation’s dedication to improving cyber resilience by placing the customer at the heart of its operations.

Over the past 12 months, KnowBe4 has consistently integrated advanced AI-driven capabilities into its platform, providing organisations with an innovative approach to managing human risk in real-time. This enhancement highlights KnowBe4’s ongoing commitment to adapting its offerings to meet the evolving demands of the security landscape, particularly in addressing vulnerabilities stemming from human error.

For more information on the teissAwards, please visit here. For more information on KnowBe4, please visit here.

Quorum Cyber Receives Microsoft Security Excellence Awards Trifecta 

Posted in Commentary with tags on March 6, 2025 by itnerd

Quorum Cyber today announced it is a Security MSSP of the Year, Data Security & Compliance Trailblazer, and Security Changemaker award finalist in the Microsoft Security Excellence Awards. The company was honored among a global field of industry leaders that demonstrated success across the security landscape during the past twelve months. 

At the Microsoft Security Excellence Awards on April 28, 2025, Microsoft will celebrate finalists in nine award categories honoring partner trailblazers, solution innovators, customer and technology champions, and changemakers. This is the sixth year Microsoft is recognizing partners for their outstanding work in the security landscape. All finalists are members of the Microsoft Intelligent Security Association (MISA), an ecosystem of independent software vendors (ISVs) and managed security service providers (MSSPs) that have integrated their security products and services with Microsoft’s security technology. 

MISA was established to bring together Microsoft leaders, ISVs, and MSSPs to work together to defeat security threats and make the world a safer place. The industry veterans in MISA and Microsoft will vote to select the winners of the Microsoft Security Excellence Awards, providing an opportunity for colleagues to honor their peers for delivering exceptional work to our shared customers.

PKI Solutions Announces First and Only Vendor-Agnostic Solution for HSMs

Posted in Commentary with tags on March 6, 2025 by itnerd

 PKI Solutions is excited to announce a significant advancement in cryptographic security management: PKI Spotlight’s Multi-HSM Monitoring, the industry’s first, and ONLY, vendor-agnostic solution for Hardware Security Modules (HSMs). For the first time, organizations can gain unified, real-time visibility into both nCipher (Entrust) and Luna (Thales) HSMs, including on-premises and cloud-based deployments (Luna DPoD and nCipher HSM as a Service).

In an era where enterprises operate with increasingly complex and diverse cryptographic infrastructures, PKI Spotlight addresses a critical need—ensuring seamless monitoring, availability, and compliance for HSMs from multiple vendors. Previously, organizations had to rely on disparate, proprietary monitoring tools, resulting in operational silos and limited visibility. Now, with PKI Spotlight’s latest innovation, security teams can monitor HSM availability, configurations, and usage through a single, intuitive interface without needing to provide credentials for your HSMs.

Key Benefits of PKI Spotlight’s Multi-HSM Support:

  • Real-Time HSM Monitoring: Track the operational status of nCipher and Luna HSMs instantly, receive immediate alerts for any failures, and proactively address performance issues.
  • Configuration & Firmware Oversight: Maintain compliance by monitoring firmware versions and configuration settings and identifying inconsistencies that could pose security risks.
  • Partition Utilization Insights – Optimize resource allocation by gaining deep visibility into partition usage to ensure efficient cryptographic operations.

Gartner recognizes PKI Spotlight as the only PKI posture management solution on the market. It continues to lead the way in enterprise security innovation. While some HSM vendors offer proprietary monitoring tools, PKI Spotlight is the only commercial solution to bridge the gap between monitoring multiple HSM vendors, delivering unparalleled visibility and control.

Organizations looking to enhance their HSM strategy can experience the power of PKI Spotlight firsthand. Request a demo today and discover how real-time monitoring and actionable insights can transform your cryptographic security operations.

Comparitech Has A Ransomware Roundup: A short but busy February

Posted in Commentary with tags on March 6, 2025 by itnerd

Comparitech researchers have published a ransomware roundup for the month of February. Although it may be the shortest month of the year, February 2025 actually turned into one of the busiest months for ransomware attacks over the last year or so. 

Key findings include: 

  • 959 attacks in total — 41 confirmed attacks
  • Of the 41 confirmed attacks:
    • 20 were on businesses
    • 8 were on government entities
    • 7 were on healthcare companies
    • 6 were on educational institutions
  • Of the 918 unconfirmed attacks:
    • 824 were on businesses
    • 11 were on government entities
    • 40 were on healthcare companies
    • 21 were on educational institutions
  • The most prolific ransomware gangs were Clop (323), RansomHub (95), Akira (80), Play (47), and Qilin (43). RansomHub and Qilin had the most confirmed attacks out of these claims with six and four, respectively

For full details, the study can be read here: https://www.comparitech.com/news/ransomware-roundup-february-2025/