Bell Canada and ServiceNow announce expanded multi-year strategic agreement

Posted in Commentary with tags , on July 18, 2024 by itnerd

Bell Canada and ServiceNow today announced a multi‑year strategic agreement to accelerate Bell’s transformation to meet the growing customer demand for tech services and digital media. The renewed commitment makes Bell one of ServiceNow’s largest communications customers with a first of its kind collaboration in Canada. Bell will expand its use of the ServiceNow platform, supporting its own digital transformation while continuing to offer ServiceNow implementation expertise to support the digital transformation of its Bell Business Markets customers.

FX Innovation, a leader in cloud focused services, an Elite ServiceNow implementation partner and acquired by Bell in 2023, will implement the Now Platform throughout Bell’s ecosystem. Bell will use automation, purpose‑built telecommunications solutions, and AI‑driven insights to provide both technicians and customers with a more efficient experience, enhancing customer service. The Now Platform is a key factor in Bell’s digital transformation strategy and will streamline several areas of the business, including Network, Customer and Field Service Operations and Corporate Services, resulting in:

  • An AI‑optimized experience leveraging the power of GenAI‑driven insights to automate scheduling, better meet customer requests, and reduce drive time.
  • Enhanced customer support with powerful automation capabilities to streamline order management, case management, and incident response processes.
  • Faster service deliveries using purpose‑built telecommunications solutions designed to enable customers to get their needs met in a matter of hours or days versus weeks.

The Bell and ServiceNow collaboration builds on an initial engagement announced in November 2023. Bell was among the first to launch ServiceNow Service Bridge capabilities in North America, augmenting Bell Business Markets’ robust suite of service offerings. The new collaboration strengthens Bell in its purpose to advance how Canadians connect with each other and the world, while supporting the company’s evolution from a telecommunications company to tech services leader.

New AI-Generated Crypto Phishing Threat Actor Exploits 30 Major Brands 17K+ Fake GitBook Lure Sites

Posted in Commentary with tags on July 18, 2024 by itnerd

Netcraft has revealed a novel crypto phishing campaign in which a threat actor that Netcraft has been tracking for a year is using AI-generated content to create 17,000 phishing lure sites impersonating more than 30 major crypto brands, including Coinbase, Crypto.com, Metamask, and Trezor. 

The lure and phishing sites are part of a massive multi-step attack, including those that capture login credentials and two-factor authentication (2FA) codes, as AI allows attackers to create high-quality content at an unprecedented scale, impossible with manual effort. 

Hosted on Gitbook, a documentation platform for software developers, the sites claim to provide advice and tutorials for a wide range of crypto industry brands. They contain a CTA link redirecting to domains with a UUID to track user visits and appear to be registered with access keys and hosted by Amazon.

The redirect URLs use advanced traffic distribution systems to mask the relationships between attack infrastructure, choosing the redirect destination based on different factors (i.e., hide the phishing infrastructure from security researchers).

The end phishing sites in this campaign aim to obtain one of two credentials: the victim’s login details for the cryptocurrency platform or the seed recovery phrase for the victim’s wallet. Netcraft has been tracking this campaign and has observed the attackers evolving their strategies in response to countermeasures. 

You can read the details here.

Bassett Furniture shuts down manufacturing after being hacked 

Posted in Commentary with tags on July 18, 2024 by itnerd

In an 8-K filing with the SEC, Bassett Furniture said it shut down some of its IT systems following a ransomware attack it discovered on July 10.

“The threat actor disrupted the Company’s business operations by encrypting some data files. As a result of the Company’s containment measures, which included shutting down some systems, the Company has not been, and, as of the date of this Report is not operating its manufacturing facilities.

“The Company’s retail stores and e-commerce platform are open, and customers are able to place orders and purchase available merchandise; however, the Company’s ability to fulfill orders is currently impacted,” Bassett Furniture said in the 8-K filing.

“[…] the incident has had and is reasonably likely to continue to have a material impact on the Company’s business operations until recovery efforts are completed,” Bassett Furniture admitted.

No ransomware group has come forward to take credit for the incident as of Tuesday afternoon.

Evan Dornbush, former NSA cybersecurity expert had this to say:

   “The 8-K disclosure does not explicitly make clear that Bassett has been prompted to pay a ransom and with none of the more notorious actors yet coming forward to claim credit, it could be the breach was by a newer operator appearing on to the scene without the refined processes seen by the more established groups.  

   “The cybersecurity community needs to do a better job of prohibiting new actors from emerging, ensuring manufacturing and retail sectors don’t have to experience downtime and face other material impacts.”

Stephen Gates, Principal Security SME, Horizon3.ai followed with this:

In Bassett Furniture’s recent Form 8-K filing with the SEC, the company announced a disruption in its operations due to a cyber incident. It appears that a threat actor may have gained a foothold inside the company’s business operations network, likely leading to a human-operated, ransom-based attack.

Considering the potential virtual connectivity between Bassett’s business network and its suppliers for ordering and fulfilling raw materials, I would recommend investigating the breach from the perspective that the attacker might have first gained access through a supplier’s network. This scenario is highly probable in today’s interconnect supply chains.

If this were the case, the attacker, once inside Bassett’s business system, would have likely escalated their privileges, moved laterally within the network, accessed critical data, and encrypted it as part of the ransom attack. Consequently, Bassett’s response appears to have included disconnecting their production network from the business network as a containment measure.

Manufacturers and organizations with supply chains must acknowledge that their cyber risk now extends to their suppliers as well. I highly advise organizations with supply chains to incorporate third-party risk management using continuous cyber risk assessments into their risk management plans. Autonomous cyber risk assessment technologies that provide continuous and affordable assessments are readily available to help meet these types of directives.

I said this yesterday. Companies can either spend money up front to protect themselves, or spend even more money after getting pwned. The choice is theirs.

Account data on 15 million Trello users stolen from open API and leaked on the web

Posted in Commentary with tags on July 18, 2024 by itnerd

Yesterday, a hacker with the alias “Emo”, leaked 21.1 GB of information on over 15 million users of the Atlassian-developed project management tool Trello.

According to the hacker, the data breach occurred in January 2024, including the following:

  • 15,182,073 email addresses
  • User IDs
  • Usernames
  • Full names
  • Profile URLs
  • Status information
  • Various settings and limits
  • Associated board memberships

Initially, the hacker used email addresses from already-breached databases and then expanded the attack. The hacker explained that Trello had an insecure API endpoint accessible without logins, allowing the hacker to link email addresses to Trello accounts, revealing user identities, resulting in the widespread breach.

“I originally was only going to feed the endpoint emails from ‘com’ (OGU, RF, Breached, etc.) databases, but I just decided to keep going with emails until I was bored. This database is very useful for doxing, find enclosed email address matched to full names and aliases matched to personal email addresses,” the hacker said.

Evan Dornbush, a former NSA cybersecurity expert offers comments:

   “Data disclosure like this is unfortunate.  The attacker was using an unauthenticated-yet-legitimate API call to obtain sensitive information. Considering we’re talking about text data, 21.2GB is a lot to leak.

   “For a long time, anomaly detection failed to live up to the hype.  Modern computational processing leveraging machine learning techniques in theory make alerting on these kinds of abnormal operating behaviors a reality.  If they can emerge onto the cybersecurity scene more aggressively, perhaps companies could more quickly detect this kind of behavior in the future.”

This is pretty bad. And Trello really has to not only explain how this specific hack happened, but what they are going to do to safeguard customer data going forward. Because a leak of this scale is completely unacceptable.

Yacht giant MarineMax data breach impacts over 123,000 people

Posted in Commentary with tags on July 17, 2024 by itnerd

Recreational boat and yacht retailer MarineMax is notifying over 123,000 individuals whose personal information was stolen in a March security breach claimed by the Rhysida ransomware gang. The hack was discovered back in March but is only being reported now. More on that in a moment.

Rogier Fischer, CEO, Hadrian had this to say:

Any organization that faces such a situation should focus on both immediate and long-term corrective actions, according to Rogier Fischer, CEO of Netherlands-based cybersecurity service Hadrian.”In the short term, they need to enhance security measures, strengthen access controls, and provide employee training to prevent future breaches. They should also automate their monitoring and detection capabilities,” he said.”For the long term, conducting a comprehensive security audit, updating their incident response plan, and moving to an automated compliance and reporting process are crucial.”Additionally, investing in advanced cybersecurity technologies and establishing robust cybersecurity governance will help them mitigate future risks and improve their overall security posture, he added.

My problem with this is that this breach is that the hack was discovered in March. It’s July and we’re only learning of this now. There’s something seriously wrong with that and I along with those who have been affected would really like to know what the deal is with that.

Nearly 150,000 Records Were Exposed Online by On-Site Medical Service Provider 

Posted in Commentary with tags on July 17, 2024 by itnerd

Documents belonging to InHouse Physicians, a US healthcare provider that offers on-site medical services and wellness programs to organizations, have been exposed as reported by cybersecurity researcher Jeremiah Fowler.

What happened: 148,415 PDF documents totalling 12 GB were exposed. The database contained documents indicating if the person was cleared to enter an event or tested positive for COVID-19 and denied entry.

Why it matters: Documents in question included the name of the event and the phone number of the attendee along with their full name. This data exposure of COVID-19 era documents is a prime example of how healthcare organizations should prioritize auditing and reviewing what information they have stored.

If you want to know more about Jeremiah’s findings you can read the full report here: https://www.websiteplanet.com/news/inhousephysicians-breach-report/

HYAS Infosec Celebrated for Excellence in Innovation and Cybersecurity at 2024 Visionary Spotlight Awards

Posted in Commentary with tags on July 17, 2024 by itnerd

HYAS Infosec is proud to announce its recognition as a recipient of the 2024 ChannelVision Magazine Visionary Spotlight Awards, winning in both the Top Innovation Award 2024 (Overall Excellence) and Cybersecurity (Business Technology) categories.

The Visionary Spotlight Awards (VSA) are an annual competition that celebrates excellence in channel and service provider innovation within the communications industry. This year, editors from Beka Business Media, along with a distinguished panel of judges from independent industry resources, evaluated hundreds of applications based on criteria such as overall innovation, future industry impact, creativity, feature set differentiation, ease of use, and interoperability.

HYAS Infosec was commended for its rapid innovation and substantial impact within the communications industry. The company’s advanced threat intelligence and protective DNS solutions, HYAS Insight and HYAS Protect, empower organizations to proactively defend their networks, and provide resiliency even in the event of a breach by ensuring that the breach does not result in a successful attack causing damage. By revealing, tracking, and attributing adversary infrastructure, HYAS enables channel partners to enhance their roles as trusted advisors in achieving business success by ensuring that their clients are properly protected with today’s most advanced solutions.

These award-winning solutions not only bolster organizational security but also provide significant advantages to channel partners. HYAS Insight and HYAS Protect offer scalable, easy-to-deploy technologies that integrate seamlessly into any existing security framework. By leveraging HYAS’s innovative solutions, channel partners can deliver enhanced security services to their clients, differentiate their offerings, expand their service portfolios, and drive new revenue streams. Additionally, the proactive nature of HYAS’s solutions helps reduce the incidence and impact of security breaches, and speeds the closure of open cases by three times or more, leading to increased client satisfaction and long-term trust.

The full list of ChannelVision’s 2024 Visionary Spotlight Award winners can be viewed online here. For more information about HYAS Infosec and its award-winning solutions, please visit HYAS.com.

Anime figurine maker exposes North American customer names, home addresses

Posted in Commentary with tags on July 17, 2024 by itnerd

The Cybernews research team has discovered that Good Smile Company, a Japanese hobby products maker best known for anime and gaming figurines, misconfigured an Amazon web services (AWS) simple storage service (S3) bucket, exposing a whopping 1.2 million files.

Key findings:

  • The exposed data hides the personally identifiable information (PII) of over 270,000 Good Smile Company customers.
  • Only a fraction of the exposed files, 156 CSV (comma-separated values) files, and 1058 XLSX files, contain sensitive information.
  • Most of the customers who had their details revealed reside in the US and Canada. 
  • The data has been exposed since at least April 2024, when the team first discovered the open instance. 

The exposed customer details include:

  • Full names
  • Email addresses
  • Nicknames
  • Home addresses
  • Order details (order date, type of purchase, payment method, and amount)
  • IP addresses

Multiple attempts to reach out to the Good Smile Company didn’t result in a response. And the instance was still open at the time of writing.

Dangers of the leak

Leaving chunks of PII belonging to a group of people with specialized interests invites attackers to use the situation to their advantage.

For the full research, please visit: https://cybernews.com/security/good-smile-company-leaks-customer-data/

Fortra Releases New Cloud Email Protection Features to Protect Against Advanced Email Threats

Posted in Commentary with tags on July 17, 2024 by itnerd

 Fortra announced today that it has released several new enhancements to its integrated cloud-based email security solution (ICES), Cloud Email Protection. New features include QR code threat detection, active content detection, and additional AI models.   

The following enhancements to Cloud Email Protection are now available: 

  • Optical Character Recognition (OCR) – detects malicious content in images (such as QR code threats) 
  • Active Content Detection – uncovers malicious code and other active content in messages, links, and attached files 
  • AI Detection of Service Abuse – protects against email threats sent from legitimate online services 
  • AI Detection of Spam Accounts – further protects against abusive spamming and related malicious activity 
  • Dashboard improvements – includes new trending visuals and sorting that displays recent brand imposters, spoofed domains, and most attacked individuals 

Fortra continues to garner acclaim for email security since the launch of Cloud Email Protection in late 2023. In addition to being named a Top Player in Email Security by The Radicati Group, Fortra has also been recognized with a Cybersecurity Excellence Award for Email Security.  

United Healthcare Discloses The Cost Of Getting Pwned

Posted in Commentary with tags on July 16, 2024 by itnerd

It costs money to have good defences against cyberattacks. But it costs way more money to when you actually get pwned by hackers. United Healthcare who’s Change Healthcare unit got in a massive way a few months ago reported their Q2 2024 numbers. And in it was an update on the fact that they got pwned:

Cyberattack Update

The company has restored the majority of the affected Change Healthcare services while continuing to provide financial support to the remaining health care providers in need. To date, the company has provided over $9 billion in advance funding and interest-free loans to support care providers.

Total cyberattack impacts in the second quarter were $0.92 per share. This included $0.64 per share to support direct response efforts such as the Change Healthcare clearinghouse platform restoration and increased medical care expenditures. Additionally, Change Healthcare business disruption impacts, reflecting lost revenue and the costs of maintaining full readiness of the affected Change Healthcare services, were $0.28 per share in the second quarter.

The company currently estimates the total full year 2024 impact at $1.90 to $2.05 per share. Within this, direct response costs are estimated at $1.30 to $1.35, an increase of $0.40 to $0.45 from the initial estimate. The change is due to the company’s care provider financial support initiatives and consumer notification costs. Business disruption impacts are estimated at $0.60 to $0.70 per share.

To say that those are non-trivial numbers is an understatement. John Gunn, CEO, Token had this comment:

Today’s disclosure of the full cost of the Change Healthcare breach is a screamingly loud wake-up call to every organization to stop being penny-wise and dollar-foolish in not adopting phishing-resistant MFA. A small investment in next-generation MFA would have saved United Healthcare more than $2 billion. This disclosure should also allay the fears of those who fear the recent SCOTUS ruling overturning the Chevron deference will weaken the strength of cybersecurity regulations and lessen companies’ motivation to implement proper cybersecurity measures. The avoidance of massive losses such as this are the greatest motivators of all for CISOs, CEOs, and boards.

So, here’s my advice to any company who thinks that they can skimp on cybersecurity. Spend the money. Because if you don’t, you will eventually be the next United Health. And that’s not a good place to be.