It’s Official, TikTok Is Screwed…. Probably

Posted in Commentary with tags on January 17, 2025 by itnerd

The Supreme Court just handed TikTok a virtual death sentence in the US by upholding a law that bans them effective Sunday:

The U.S. Supreme Court on Friday unanimously upheld the federal law banning TikTok, beginning Sunday, unless it’s sold by its China-based parent company, holding that the risk to national security posed by its ties to China overcomes concerns about limiting speech.

TikTok’s parent company, China’s ByteDance, was given until Sunday to find an American owner for the app or face going dark in the U.S., under bipartisan legislation signed last year by outgoing President Joe Biden.

Now there is a possibility that Donald Trump who takes over as President of the United States as of Monday could save TikTok. Which is interesting as he was anti TikTok the last time he was president. So we will have to see if he is able to do so. But as it stands now, it looks like TikTok will be dead in the US as of Sunday. And one has to wonder if other countries will follow suit.

UPDATE: Here’s some commentary from some industry experts:

Lawrence Pingree, VP, Dispersive

“I think that there are some valid concerns about the involvement of government agencies in espionage and influence operations that are important issues to address. Things like data sovereignty, isolation networks and access, regular trusted third-party audits, background checks, authentication of remote employees, and, potentially, source code review are all prudent measures to require. Bans need to consider the totality of the situation and the politics of the time.”

Ted Miracco, Approov CEO

“Liberty can only thrive when paired with accountability. As the Supreme Court shutters TikTok, it’s a reminder that safeguarding freedom of speech means not just shouting into the void, but doing so with transparency and responsibility. Regardless of where a platform originates, our online spaces must be protected from manipulation to uphold the integrity of our perspectives.”

Willy Leichter, CMO, AppSOC

“If you peel back all the politics, international negotiations, and social media hype, the TikTok ban came from genuine concerns about privacy and national security. To say that banning one platform will permanently affect free speech seems like a stretch. The fickle social media market will quickly find many alternative ways to share content and amuse themselves. Assuming this ruling doesn’t get watered down by the Trump administration, it’s an example of pursuing and acting upon serious security issues.”

CISA shares guidance for Microsoft expanded logging capabilities

Posted in Commentary with tags on January 17, 2025 by itnerd

This week, CISA shared guidance for government agencies and enterprises on using expanded cloud logs in their Microsoft 365 tenants as part of their forensic and compliance investigations:

This playbook provides an overview of the newly introduced logs in Microsoft Purview Audit (Standard), which enable organizations to conduct forensic and compliance investigations by accessing critical events, such as mail items accessed, mail items sent, and user searches in SharePoint Online and Exchange Online. In addition, the playbook also discusses significant events in other M365 services such as Teams. Lastly, administration/enabling actions and ingestion of these logs to Microsoft Sentinel and Splunk Security Information and Event Management (SIEM) systems are covered in detail.

The desired outcome of this playbook is to empower enterprises seeking to operationalize these expanded cloud logs in their M365 tenant. It provides guidance on how to navigate to the logs within M365 and how to perform administration actions to enable the logs. A key outcome from the playbook is making the newly available logs an actionable part of enterprise cybersecurity operations. The analytical methodologies tied to using these logs to detect advanced threat actor behavior are covered in detail.

Botond Botyánszki, founder and CTO at NXLogcommented:

“Compromised business email accounts remain the most common type of security breaches, underscoring the need for accurate and timely log collection and processing. Audit logs of relevant events — such as email activity, mailbox access, and user searches in Exchange Online and SharePoint Online — are vital for investigating potential intrusions and continuous monitoring can help detect and prevent breaches before it’s too late.”

“The release of the “Microsoft Expanded Cloud Logs Implementation Playbook” is a significant step forward in enhancing organizational security posture. The playbook empowers organizations to detect and respond to potential intruders targeting M365 more effectively, aligning with modern cybersecurity needs.”

“The newly added logs available with Microsoft Purview Audit (Standard) include events such as email items accessed, email items sent, user searches in SharePoint and OneDrive, and Exchange Online activities. These audit logs provide critical visibility into key actions, such as monitoring email access for unauthorized data access, tracking outbound email activity to detect possible exfiltration, and identifying unusual searches for sensitive files. The guidance on integrating these logs with SIEM solutions like Microsoft Sentinel and Splunk ensures that security teams can seamlessly leverage their existing tools for proactive threat hunting and incident response. This initiative underscores the importance of robust log management practices in a cloud-first world, empowering organizations to defend against advanced intrusion tactics effectively.”

Every organization should read this playbook from the CISA as it offers excellent guidance which will help them to better defend against cyberthreats which are always evolving.

New LA Fire Phishing Campaigns Discovered Exploiting GoFundMe, Cleanup Services, Insurance Claims

Posted in Commentary with tags on January 17, 2025 by itnerd

BforeAI has revealed that its researchers have discovered multiple threats surrounding the recent LA wildfires, involving multiple phishing campaigns centered around various themes, including insurance, fundraising, claims, restorations, and the fire department. 

To maintain the relevance of the campaigns, the majority of domains retrieved since the incident target support, LA, fire, relief, fund, etc. BforeAI’s threat research report examines the patterns of domain registrations related to the LA wildfires, identifying trends and potential risks. 

Key findings include LA wildfire-themed cryptocurrency, GoFundMe campaigns, and misleading malicious merchandise stores. BforeAI also compares the fraudulent domain activity to other campaigns exploiting natural disasters previously, such as hurricanes that hit in 2024. 

You can read the research here: http://bfore.ai/malicious-domain-activity-during-the-los-angeles-wildfires

HP Unveils AI-Powered Innovations for the Future of Work and Play at CES 2025

Posted in Commentary with tags on January 16, 2025 by itnerd

At CES 2025, HP unveiled a wide-ranging portfolio of groundbreaking innovations designed to supercharge the future of work and play. These new AI-powered solutions enable professionals, gamers, and creatives to achieve uncompromising performance, productivity, and personalization.

AI-Powered Experiences to Supercharge Productivity and Shape the Future of Work

As the work landscape evolves, so do expectations for technology. That’s why HP meticulously designed its latest lineup of commercial next-gen AI PCs to give professionals the right tools for their unique work experiences.

  • Modern leaders will make a powerful impression with a new class of PCs that unlock their full potential including the HP EliteBook Ultra G1i – the world’s most immersive AI business notebook
  • Be the company superhero, managing high-performance workflows simultaneously with the world’s most powerful 14-inch mobile workstation, the HP ZBook Ultra G1a 14 and the world’s most powerful mini workstation, the HP Z2 Mini G1a
  • Freelancers and creators can enhance productivity, creativity, and multi-tasking with the HP OmniStudio X and HP OmniDesk PCs, featuring Intel® Core™ Ultra processors and built-in AI.

See more here

HP’s OMEN AI Casts a Spell on Gaming, Optimizing Performance with a Single Click

PC gamers demand the best when it comes to powerful and personalized gaming technology. Three-quarters of them are purchasing new devices for better performance and features, while more than half want customization options to represent their individuality. With the newest OMEN Max 16 Laptop paired with OMEN AI technology, gamers can play with confidence knowing that their device is designed to automatically and continually adjust performance and thermals for the best in uninterrupted gameplay.

  • OMEN AI introduces the world’s first AI-driven 1-click performance optimization tool.
  • OMEN MAX 16, HP’s most powerful gaming laptop
  • OMEN 32x Smart Gaming Monitor is HP’s first gaming monitor with built-in Google TV™
  • HyperX Pulsefire Saga mice family with innovative shape modularity and customizable options

See more here

Shaping the Future of Play

  • HP unveils the OMEN 16 Laptop and OMEN 16L Desktop, alongside new OMEN displays with up to 280Hz refresh rates for enhanced gaming experience
  • Truly experience the power and performance of your laptop, desktop, and the stunning displays that accompany them, with a quality HyperX mouse 

See more here

Unlock Your Potential with HP’s Next-Gen AI Desktop PCs

Alongside HP’s latest portfolio of innovations for work and play, HP is enabling freelancers and creators with new tools to boost productivity with desktop AI PCs from HP.

  • The newest HP OmniStudio X All-in-One Next-Gen AI PC features the latest Intel® Core™ Ultra processors, designed for freelancers who prefer a focused environment to help optimize their productivity and creativity.
  • The latest HP OmniDesk Slim Desktop PCs and HP OmniDesk Desktop PCs offer intelligent performance and efficiency in a premium, compact, and sustainable form factor.

Canadian Pricing and Availability (unless noted in USD)

  • The HP EliteBook Ultra G1i will be available on HP.ca later this month for a starting price of $2,649.
  • The HP EliteBook X G1i and HP EliteBook X Flip G1i are expected to be available on HP.ca in the coming months.
  • The HP ZBook Ultra G1a is expected to be available on HP.ca in spring of 2025. Pricing will be announced closer to availability.
  • The HP Z2 Mini G1a is expected to be available on HP.ca in spring of 2025. Pricing will be announced closer to availability.
  • HP Thunderbolt 4 G6 Docks are expected to be available on HP.ca in April. Pricing will be announced closer to availability.
  • The Poly Voyager Legend 30 & 50 Series are expected to be available later this month in select regions and worldwide on HP.ca in February. The Voyager Legend 30 will be available for $139.95, the Poly Voyager Legend 50 for $167.95, and Poly Voyager Legend 50 UC for $363.95.
  • The HP 720/725 Multi-Device Rechargeable Wireless Keyboard and Mouse Combo is available now on HP.com for a starting price of $89.99 USD and $80.00 USD respectively.
  • The HP 400 Quiet Wireless Mouse is expected to be available on HP.ca in May.
  • HP OmniStudio X All-in-One Desktop Next-Gen AI PCs (available in 27- and 31.5-inch models) are expected to be available from February for a starting price of $1,799.99.
  • HP OmniDesk Desktop AI PC is expected to be available from April for a starting price of $1,099.99. 
  • HP OmniDesk Slim Desktop PC is expected to be available from April for a starting price of $739.99. 
  • The OMEN MAX 16 Gaming Laptop is expected to be available in the coming months on HP.ca for a starting price of $2,399.99.
  • OMEN AI Beta is available world-wide this week.
  • The OMEN 32x Smart Gaming Monitor is expected to be available on HP.ca in April for a starting price of $899.99.
  • The HyperX Pulsefire Saga Pro Wireless Gaming Mouse is expected to be available on HP.ca in March for a starting price of $169.99.
  • The HyperX Pulsefire Saga Gaming Mouse is expected to be available on HP.ca in March for a starting price of $119.99.
  • The OMEN 16 Gaming Laptop is expected to be available on HP.ca in March for a starting price of $1,899.99.
  • The OMEN 16L Gaming Desktop is expected to be available on HP.ca in late March for a starting price of $1,699.99.
  • The latest refreshed Victus 15 Gaming Laptop is expected to be available on HP.ca in January with an enhanced version in May for a starting price of $1,399.99.
  • The latest refreshed OMEN 45L Gaming Desktop is expected to be available on Hp.ca in late April for a starting price of $4,499.99.
  • The latest refreshed OMEN 35L Gaming Desktop is expected to be available on Hp.ca in late April for a starting price of $2,999.99.
  • The OMEN 27 G2 Gaming Monitor is expected to be available at Best Buy in April for a starting price of $359.99.
  • The OMEN 27q G2 Gaming Monitor is expected to be available on HP.ca in April for a starting price of $359.99.
  • The OMEN 27qs Gaming Monitor is expected to be available on HP.ca in April for a starting price of $639.99.
  • The OMEN 34c G2 Gaming Monitor is expected to be available on HP.ca April for a starting price of $639.99.
  • The HyperX Pulsefire Haste 2 S Wireless Gaming Mouse is expected to be available on HP.ca in March for a starting price of $199.99.
  • The HyperX Pulsefire Haste 2 Pro 4K Wireless Gaming Mouse is expected to be available on HP.ca in January for a starting price of $159.99.
  • The HyperX Pulsefire Fuse Wireless Gaming Mouse is expected to be available on HP.ca in March for a starting price of $69.99.
  • The HyperX Glass Skates is expected to be available on HP.ca in January for a starting price of $29.99.

Dispersive Posts White Paper Called “How Cybercriminals Are Using AI: Exploring the New Threat Landscape”

Posted in Commentary with tags on January 16, 2025 by itnerd

Cybersecurity expert Lawrence Pingree, VP of Technical Marketing with Dispersive (former Vice President at Gartner’s Technology and Service Provider research practice) has just published the concise white paper “How Cybercriminals Are Using AI: Exploring the New Threat Landscape.”

Key elements of the white paper are summarized in the Dispersive blog post “Addressing the AI ARMS Race: Why Preemptive Defense is Essential”. Topics covered include:

  • AI driven methods and techniques such as automated attacks; phishing, social engineering and automated auth bypass, knowledge acquisition and polymorphic malware; and auth layer bypass such as CAPTCHA cracking and voice biometrics exploitation.
  • Examples of AI exploiting vulnerabilities and evasion strategies.
  • Deepfakes and types of AI used by attackers.
  • Anticipating AI’s future cybercrime impacts.
  • Practical steps for winning the AI ARMS (Automation, Reconnaissance, and Misinformation) race between attackers and defenders, including preemptive cyber defenses such as:
    • Automated Moving Target Defense (AMTD) – randomization and preemptive changes to IP addresses, system configurations, etc.,
    • Threat Simulation and Predictive Intelligence – leveraging AI to simulate potential attack scenarios and predict adversary behavior enables defenders to stay one step ahead, and
    • Generative AI Runtime Defenses – using AI to detect and neutralize generative AI-based threats in real time enhances security resilience.

I read the white paper this morning and even though I work in this space, it was eye opening for me. It was also a bit scary to be honest as well. If you are responsible for defending your organization from cyberthreats, I would read the blog post and sign up to get the white paper as I think it will get your attention and make you rethink how you defend your organization.

Biden administration’s drops a cybersecurity executive order on America

Posted in Commentary with tags on January 16, 2025 by itnerd

Today, President Biden laid out an executive order that proposes to strengthen and promote Innovation in the nation’s cybersecurity efforts. This builds on previous executive orders and I encourage you to give this one a read.

Dr. Marc Manzano, general manager for cybersecurity at SandboxAQ had this comment:

“The Biden administration’s emphasis on requiring software vendors to provide proof of security is a significant step toward strengthening the software supply chain and ensuring greater accountability. This focus on security aligns with the critical need for improved compliance, auditing, observability, and agility in managing modern cybersecurity challenges. With this new EO, I am delighted to see additional efforts to push the current status quo and establish a more regulated framework, as this will ultimately improve IT resilience and safeguard critical systems across industries.”

Roger Grimes, Data-Driven Defense Evangelist at KnowBe4 adds this comment:

“This is a huge, widely varying cybersecurity EO that covers dozens of technologies and initiatives. There is a lot to love in it. Here’s what I like:

  • It focuses on software security (although not firmware, strangely), stating that vendors to the US government must prove they are following secure development practices and secure software chain procedures.
  • It’s going to add how to secure deploy patches and updates to NIST SP 800-53.
  • It promotes strong open-source security practices.
  • It is prioritizing investment in PHISHING-RESISTANT MFA.
  • It is increasing the focus on threat hunting and threat identification, empowering CISA to do more of it.
  • It is creating working groups around supported Endpoint Detection and Response (EDR) products to improve them.
  • It is requiring the encryption of civilian space-related commands.
  • It is creating new policies for cloud vendors in the FedRAMP program.
  • It is increasing the security of Border Gateway Protocol (BGP) and the government’s IP address space (decades overdue).
  • Promotes encrypted DNS.
  • Requires email to be encrypted.
  • Requires end-to-end encryption on email and other messaging apps (this is HUGE!!!).
  • Promotes post-quantum cryptography protections.
  • Sets aggressive 90-, 180-, and 270-day deadlines for each.”

Paul Bischoff, Consumer Privacy Advocate at Comparitech follows with this comment: 

“I suspect the federal government was already vetting the security of its software in this way to some extent, but this executive order codifies the process and makes the results of that vetting available to everyone. Many of Biden’s efforts to strengthen cybersecurity have been about improving threat intelligence and transparency, and this EO is in line with those efforts.”

Chris Hauk, Consumer Privacy Champion at Pixel Privacy concludes with this:

“I am particularly happy to see that cloud providers will be required to publish information to clients on how to operate securely. Too many data breaches have been due to misconfigured data buckets, many times leaving the data stored in those buckets open to anyone with an internet connection and a little bit of knowledge. While it is not certain whether incoming U.S. President Donald Trump’s new administration will uphold the executive order, we can hope that they see the value in this executive order. Software companies should be required to demonstrate the security protections of their software.”

As one of the commenters above said, this is a big deal. My only question is if this will actually get carried out or will it be killed by the incoming Trump administration. Hopefully not.

UPDATE: Christian Geyer, CEO and founder of Actfore adds these comments:

“The US needs to remain at the forefront of AI adoption and innovation because that will significantly strengthen national security. While it’s crucial to recognize the expanding attack surface that AI may bring, we can be optimistic about the incredible potential it holds for enhancing security and efficiency. The main challenge lies in navigating the complexities of government processes, but with the right approach, these challenges can be overcome, ensuring that technology initiatives are both effective and secure. For example, international data transfer laws in the EU are way ahead compared to the US. One thing we need to be cautious about is stepping on the gas too hard to accelerate AI adoption before we have our legislative foundation settled. That could do more harm and be more of a national security threat.

The growing focus on AI integration is a positive sign of progress, but it’s essential to approach this with a clear commitment to cybersecurity and robust legislative protections. With careful planning and due diligence, we can ensure that AI adoption is not only rapid but also responsible, safeguarding against vulnerabilities and data risks for US-based companies and the government. Although the pace of technological advancement may sometimes outstrip current legislation, this presents an opportunity for the US to strengthen its regulatory frameworks and stay ahead of potential threats.

These executive orders signal a forward-thinking, proactive strategy for incorporating AI into national security. The focus must remain on integrating AI securely, with ongoing vigilance and the development of strong safeguards. The long-term success of these initiatives will depend on the ability of future policymakers to adapt swiftly to technological changes and prioritize both implementation and legal protections for the American people and their sensitive data. It will be very interesting to see what the incoming administration does with these executive orders from President Biden.”

UPDATE #2: Saviynt Chief Trust Officer, Jim Routh provided this comment:

“Today’s Executive Order on Cybersecurity provides additive guidance to the previous Executive Order primarily for federal agencies, those that provide product & services to federal agencies, and also includes guidance for the private sector. There is greater emphasis on resilience in cloud computing, which is timely as enterprises in the federal sector and private sector dedicate more resources to the consumption of SaaS and PaaS. Digital identity management is also a dominant theme in the Order with a clear direction toward the maturity of interoperability standards for easier management of digital identities with less dependence on storing credentials. This is more of a 10-year view on the maturity of digital identity standards but important nonetheless. 

“Third-party risk management is another dominant theme in the Order and appropriately so. My blunt assessment is that existing third-party risk management functions are woefully insufficient to meet today’s needs for all types of enterprises. Conventional third-party risk management (TPRM) practices evolved from the creation of an annual cyber security risk assessment originating from a response to a security questionnaire updated annually for high risk vendors. Regulatory requirements and compliance activities promote the continued use of this obsolete framework. 

The right approach for TPRM is to conduct vendor risk assessments daily through the aggregation of data derived from near real time sources/feeds across multiple domains such as:

1.      cyber resilience

2.      financial resilience

3.      geographic/political risk

4.      extreme weather events

5.      supply chain disruption

6.      environmental sustainability

7.      legal liability

Limited resources dedicated to TPRM can and should focus on the highest risk third parties on any particular day based on real data vs. self-attestations produced annually. Managing third-party risk should include the establishment of digital identities for third parties requiring access to cloud and on prem systems essential to perform their function reducing the risk of credentials being harvested and used maliciously. 

Another threat vector covered in the Order is the increased threat of a ransomware attack. Ransomware as a service has increased the probability of extortion through the exfiltration and dissemination of sensitive data. Nation state sponsored threat actors are using this attack vector to fund third-party resources to perform cyber espionage. Sanctions have been used as a tool to combat the spread of ransomware, but the results are mixed. Authoritative regimes continue to proliferate the use of extortion for funding purposes of other cyber-criminal activity.  Enterprises are forced to make extortion payments when existing recovery methods fail to restore core business functions in a timely manner. 

How impactful the Order will be remains to be seen in addition to its shelf life as an Executive Order given the new administration taking over the Executive Branch. The role of CISA will likely evolve as will the security requirements for federal agencies. The private sector will continue to be prodded toward a more effective model of building resilience into the delivery of IT products and services for all enterprises and consumers in addition to federal agencies.” 

UPDATE #3: Jonathan Gill, CEO at Panaseer provided me with this comment:

“It’s great to see such a detailed executive order relating to cybersecurity. This reflects the importance of cybersecurity at the highest levels – it is an issue of national security and should be treated as such. One of the big themes coming out of the order is the need to implement the right controls, and being able to provide evidence. Section two really underscores the need for secure software development. If it is followed through, software publishers will need to open their kimonos to show they have the right controls in place and that these are working effectively. It is also interesting to see in section seven that NIST will be issuing guidance on “minimum cybersecurity practices”, considering common cybersecurity practices and security controls.”

“Moving forward, we can expect to see even greater emphasis not just on encouraging companies to implement controls, but on providing evidence of such. However, many companies will struggle here. IT infrastructures and ecosystems have become incredibly complex. Most large organizations do not even have visibility of what assets they have, let alone the status of their security controls across those assets. This isn’t due to a lack of effort or care from cybersecurity professionals. The challenge lies in the fact that most large organizations rely on 50+ cybersecurity tools to protect their fast-moving IT environments. These tools operate in silos, disconnected from one another and informed by incomplete configuration management databases (CMDB). As we move into an era of ‘trust, but verify’, organizations will be under increasing pressure not only to outline what controls they have, but to demonstrate their effectiveness. Most large organizations already possess the data they need to understand their assets, controls coverage, and controls effectiveness, but it’s scattered and inaccessible. This data must be transformed into actionable, trusted intel, enabling security leaders to identify gaps, enforce accountability, and ensure stakeholders meet agreed-upon standards of controls.”

Hiding in Plain Site: Attackers Sneaking Malware into Images on Websites

Posted in Commentary with tags on January 16, 2025 by itnerd

 HP Inc. today issued its latest Threat Insights Report, highlighting how threat actors are using malware kits and generative artificial intelligence (GenAI) to improve the efficiency of their attacks. Such tools are reducing the time and skill needed to create attack components, enabling attackers to focus on experimenting with techniques to bypass detection and trick victims into infecting their endpoints, such as embedding malicious code inside images. 

The report provides an analysis of real-world cyberattacks, helping organizations to keep up with the latest techniques cybercriminals are using to evade detection and breach PCs in the fast-changing cybercrime landscape. Based on data from millions of endpoints running HP Wolf Security1, notable campaigns identified by HP threat researchers include: 

  • Malware-by-numbers kits: HP threat researchers observed large campaigns spreading VIP Keylogger and 0bj3ctivityStealer malware that leverage the same techniques and loaders, suggesting the use of malware kits to deliver different payloads. In both campaigns, attackers hid the same malicious code in images on file hosting websites like archive.org, as well as using the same loader to install the final payload. Such techniques help attackers circumvent detection, as image files appear benign when downloaded from well-known websites, bypassing network security like web proxies that rely on reputation.
  • GenAI helping to create malicious HTML documents: Researchers also identified an XWorm remote access trojan (RAT) campaign initiated by HTML smuggling, which contained malicious code that downloads and runs the malware. Notably, similar to an AsyncRAT campaign analyzed in the previous quarter, the loader bore hallmarks that indicate that it may have been written with the help of GenAI, for example, including a line-by-line description and the design of the HTML page.
  • Gaming cheaters never prosper: Attackers are compromising video game cheat tools and modification repositories hosted on GitHub, adding executable files containing Lumma Stealer malware. This infostealer scrapes victims’ passwords, crypto wallets, and browser information. Users frequently deactivate security tools to download and use cheats, putting them at greater risk of infection without isolation technology in place.

By isolating threats that have evaded detection tools on PCs – but still allowing malware to detonate safely – HP Wolf Security has specific insight into the latest techniques used by cybercriminals. To date, HP Wolf Security customers have clicked on over 65 billion email attachments, web pages, and downloaded files with no reported breaches.  

The report, which examines data from calendar Q3 2024, details how cybercriminals continue to diversify attack methods to bypass security tools that rely on detection, such as: 

  • At least 11% of email threats identified by HP Sure Click bypassed one or more email gateway scanners.
  • Executables were the most popular malware delivery type (40%), followed by archive files (34%).
  • There was a notable rise in .lzh files, which made up 11% of archive files analyzed – with most malicious .lzh archive files targeting Japanese-speaking users.

HP Wolf Security runs risky tasks in isolated, hardware-enforced virtual machines running on the endpoint to protect users, without impacting their productivity. It also captures detailed traces of attempted infections. HP’s application isolation technology mitigates threats that can slip past other security tools and provides unique insights into intrusion techniques and threat actor behavior.  

About the Data

This data was gathered from consenting HP Wolf Security customers from July-September 2024

Guest Post: Major leak exposes 1.5 billion Weibo, DiDi, Shanghai Communist Party, and others’ records

Posted in Commentary with tags on January 16, 2025 by itnerd

The Cybernews research team recently discovered one of the largest data leaks mainly involving Chinese nationals. One unknown server exposed 1.5 billion records of users’ sensitive data, such as full names, government ID numbers, and more.

The unprotected server, which contains hundreds of millions of records, houses data from several major brands, such as JD.com, Weibo, DiDi, various Chinese banks, and many others.

Cybernews researchers believe the dataset is likely a mix of known and completely new data leaks collated on a single now-closed Elasticsearch server. While not all 1.5 billion records were exposed for the first time, some undoubtedly were, as we’ve found no indication of previous data leaks from companies included in the list.

“Saying the magnitude of this leak is alarming is an understatement. The leaks’ volume alone is mind-boggling. Worse so, the exposed server had data from essential sectors like healthcare and finance, amplifying the potential harm,” Cybernews researchers said. 

As the database’s owner remains unknown, it raises serious concerns about data privacy and security.

Key findings:

  • While nearly 1.5 billion records were exposed, that doesn’t mean the same number of individuals had their details leaked online. Since details come from different platforms, organizations, and economic sectors, some users may have had their data leaked several times.
  • The largest number of identifiable records were grouped in a collection credited to QQ messenger, Tencent’s instant messaging software. 
  • The second largest collection of leaked records, 504 million, was credited to Weibo, sometimes called China’s Twitter.
  • The exposed instance our team discovered had a whopping 142 million JD.comrecords exposed.
  • The third largest exposed dataset, with over 25 million records, was credited to China’s largest courier service, SF Express. 
  • The team discovered tens of thousands of leaked records titled Sichuan Nurse, another million titled Doctor and Patient, and 400k more credited to pharmacies.
  • Collections like Securities (243k), China Provident Fund (531k), China Union Pay Users (1.1 million), China Merchants Bank (1 million), Bank of China (985k), as well as a collection named Cryptocurrency (100k), strongly suggest a massive financial data exposure.
  • The collection of Zhejiang Student Records (9 million) and Graduate data (366k) points to the exposure of educational data likely involving millions of Chinese students.
  • There’s also the addition of the Zhilian collection (1.1 million), which likely refers to Zhillian Technology, an automotive R&D company.
  • 2.6 million records were credited to vehicle owners, and another 3.5 million were credited to an unnamed driving school, pointing to the server owners’ interest in Chinese motorists.
  • Another 65k records were attributed to customers of an unknown mobile carrier, residents of Beijing (196k), KFC China (5 million), and Household registration data (5.4 million)
  • Some collections were ominously dubbed ‘friendly nations’ (313k) and ‘data of multiple neighboring countries’ (2 million), signaling at least some level of political motivation for whoever’s behind the dataset.
  • The inclusion of 1.6 million records in a collection titled The Communist Party of Shanghai only strengthened the impression.
  • Another 74 million records were included in collections that we could not reliably translate or name using random collections of numbers and letters.

What data was exposed?

  • Full names
  • Email addresses
  • Platform ID numbers
  • Usernames
  • Phone numbers
  • Healthcare data
  • Financial records
  • Transportation-related details
  • Education-related records

To read the full research, please click here.

The World’s Most Digitalized Countries According To Safety Detectives

Posted in Commentary with tags on January 16, 2025 by itnerd

Here’s some new research done Safety Detective’s team that examines three areas of digitalization: connectivity, digital health, and e-government, highlighting critical areas of digital interconnectivity: mobile infrastructure, health-related services, and the extent of government influence on citizens’ lives.

Key findings at a glance:

  • According to DataReportal and GSMA Intelligence, worldwide, 5.35 billion people (66% of the global population) use the internet, while 5.61 billion (69.4%) individuals are mobile subscribers, highlighting a growing shift toward mobile-first connectivity.
  • Furthermore, social media users grew from 4.2 billion in 2021 to 5.04 billion in 2024, indicating worldwide adoption has increased by 20% in just 3 years.
  • Countries, like Saudi Arabia, Portugal, UAE and Brazil excel across multiple GDHM categoriesincluding Leadership and Governance, Strategy and Investment, Infrastructure and Services and Applications, showcasing comprehensive digital health strategies.
  • European and North American nations dominate the EGDI rankings, showcasing their robust digital infrastructure and governance. South Korea in particular, is the only country that has achieved 100% OSI score, providing government services.

Digital advancements offer significant potential to improve quality of life. However, they also bring potential challenges, such as data misuse, surveillance, and privacy concerns. Addressing these issues through thoughtful policies as well as promoting equitable access will likely help shape the future impact of these technologies.

You can access their report here: https://www.safetydetectives.com/blog/digitalized-countries-research/

Ransomware Victims and Threat Groups Have Reached An All-Time High, GuidePoint Security Finds

Posted in Commentary with tags on January 16, 2025 by itnerd

GuidePoint Security, a cybersecurity solutions leader enabling organizations to make smarter decisions and minimize risk, announced today the release of the GuidePoint Research and Intelligence Team’s (GRIT) annual Ransomware & Cyber Threat Report.

The GRIT 2025 Ransomware & Cyber Threat Report provides exclusive in-depth research, insights and analysis on the evolving ransomware ecosystem, exploring who cybercriminals are targeting (and why), the top tactics threat actors are using and what the future may hold for emerging ransomware groups in 2025. 

Noteworthy findings from this year’s report include: 

  • A record high of ransomware victims, with 1,600+ ransomware victims in Q4 2024 alone—the largest number recorded in a single quarter since the report’s inception. 
  • A 40% YoY increase in active threat groups, illustrating a continually-developing threat landscape. GRIT identified 88+ total active threat groups in 2024, including 40 newly observed adversaries.
  • An average of 92 ransomware victims were posted per week on the dark web. RansomHub claimed the largest number of victims in 2024, displacing LockBit as the most active ransomware group for the first time since 2021.
  • The United States remains a top geographic target for ransomware attacks. In 2024, more than half (52%) of ransomware victims were based in the U.S. 
  • An average of 110 Common Vulnerabilities and Exposures (CVEs) published per day,underscoring the overwhelming volume and velocity of information which cybersecurity teams are facing. Almost 40,000 CVEs were reported in 2024, a 43% increase from 2023.
  • Nearly 44% of vulnerabilities were rated “High” or “Critical” severity. However, threat actors continue to rely on historical vulnerabilities from preceding years.
  • The Manufacturing industry was most heavily impacted by ransomware, followed by the Technology and Retail/Wholesale industries. Interestingly, despite several high-profile attacks in 2024, the Healthcare sector dropped out of the top three most affected industries by the end of the year.

The report also explores the impacts of ransomware on critical infrastructure, examines threat actor deception and misinformation efforts in 2024 and examines major ransomware events throughout the year, including the continued fallout from Operation Cronos. 

The GRIT 2025 Ransomware & Cyber Threat Report is based on data obtained from publicly available resources, vendor threat research, internal incident response case data and open-source intelligence collected from illicit forums and marketplaces.

For more information: