LAUSD Investigates Claims Of Being Pwned By A Threat Actor For A Second Time

Posted in Commentary with tags on June 7, 2024 by itnerd

The Los Angeles Unified School District (LAUSD) is currently investigating a threat actor’s claims that they are selling stolen databases containing sensitive information belonging to millions of students and thousands of teachers. LAUSD, which is the second largest public school district in the United States, had more than 563,000 students enrolled for the 2023-2024 school year.

According to the threat actor, the stolen data is being sold for $1,000 on a hacking forum. The data allegedly includes over 11GB of information, encompassing more than 24 million student records, over 24,000 teacher records, and approximately 500 records containing staff information. The hacker shared samples of the data to prove its legitimacy, which included around 1,000 student records complete with Social Security Numbers (SSNs), addresses, parent addresses, email addresses, contact information, and dates of birth.
 
The authenticity and recency of the data remain uncertain as the threat actor only shared a small portion of the allegedly stolen information. There might be new information that has not yet been disclosed.
 
“We are looking into this and will get back to you if we have further information to share,” said LAUSD Public Information Officer Britt Vaughan in a statement to BleepingComputer.
 
In a related incident, LAUSD was hit by a ransomware attack in September 2022 over the Labor Day weekend. The Vice Society gang claimed responsibility for that breach, claiming they stole 500GB of files before encrypting the district’s systems.
 
Following the 2022 attack, LAUSD mandated all employees (teachers, support staff, and administrators) as well as students, reset their @LAUSD.net account credentials in person at a district site and expedited the rollout of multi-factor authentication.

Steve Hahn, Executive VP, BullWall has this to say:

   “The threat landscape has taken a sinister turn in the last few years, partly because these (mostly) Russian based threat actors consider our support of Ukraine an act of war and also because of the financial stakes. This is a multi-billion-dollar industry now. However recent years has seen the threat actors intentionally targeting young children for extortion and blackmail, which is precisely what this. It’s unconscionable.

   “Threat actors target schools with “dual extortion” techniques. They exfiltrate data on students and encrypt all of the school’s data in a sequenced attack. The school will have to pay to not have that data leaked and pay again to get it decrypted. The information they can get in an attack like this is devastating to the children involved. Information about their grades, sexual activity, medications or mental healthcare, domestic violence, sexual orientation or identity and disciplinary actions. When this gets leaked parents will be, rightfully, outraged and the political fallout severe. The threat actors know this and seem to disregard the impact on the well-being of the targeted children.

   “Unlike big corporations or other government services, schools simply don’t have the resources or personnel to prevent these attacks. It is not a matter of “if” a school district will be hit but “when” and the funding bodies don’t seem willing to allocate pro-active funding until they’ve been hit and see first-hand the fallout. However, even with the best prevention tools in the world a determined threat actor will eventually break through.

   “Schools need to limit the sensitive information they document and retain. They need recovery strategies for the eventuality and need to also focus on rapid containment of the event to limit the amount of data impacted. It is also important to hold tabletop exercises to create a playbook for what happens when they eventually do get hit. How Legal, Boards and City Councils will be involved. These exercises often open up the eyes of the city councils to just how impactful these events are.”

Dave Ratner, CEO, HYAS follows with this:

“Schools and universities are increasingly becoming common targets, both because of the treasure trove of data they contain and their overall cyber security posture, which is unfortunately often less than perfect based on limited budgets. It’s imperative that those in the education sector prioritize cyber security hygiene — often this can be accomplished in a budget-friendly manner via one of the many MSP and MSSPs that focus on best practices.”

It will be interesting to see if these claims of LAUSD being pwned again are true. If they are, then LAUSD will have to do a lot of hard work to make sure that threat actors don’t go three for three so to speak.

Bartender Has Been Updated To Remove Analytics Gathering…. So, Do You Trust Them Now?

Posted in Commentary with tags on June 7, 2024 by itnerd

Well here’s a plot twist that I didn’t see coming after this controversy popped up. Applause the company that now owns Bartender has just put out an update to bring the version to 5.0.53. A Reddit user got this and posted about it on Reddit:

So clearly the blow back was so bad, the company claims to have removed the analytics that fanned the flames of this controversy.

On top of that, the change log seems kind of suspect as what they are saying runs counter to what Reddit users have found out about Applause via their own FAQ which you can read as part of my original story above. It honestly sounds that this has become a damage control exercise as the company bought Bartender, really screwed up how it handled the purchase with users of the app, and tossed in some shady behaviour in the form of adding analytics which make you question the explanation provided by Applause as to why these analytics were added.

The real question is if this move makes you trust them?

The answer is my case is no. I will not be updating to this version and I will continue to run Ice for the time being. For Bartender and their new owners Applause to get me back, they will have to do a whole lot more to earn my trust because at the moment, my trust level with them is zero.

Adobe Tries Again To Clarify Their Terms Of Use…. Does This Make You Feel Better About Adobe?

Posted in Commentary with tags on June 7, 2024 by itnerd

Yesterday, a C level executive tried to put out the fire surrounding the firestorm that Adobe created when changes to their terms of use came to light and made it look like Adobe products were basically spyware. And that Adobe were intent on using customer data to train their AI models.

It now Adobe is taking another crack at trying to make this issue go away via this blog post. I encourage you to read it in full. But here’s the part of it that is most relevant to this discussion:

The focus of this update was to be clearer about the improvements to our moderation processes that we have in place. Given the explosion of Generative AI and our commitment to responsible innovation, we have added more human moderation to our content submissions review processes.

And they also say this:

To be clear, Adobe requires a limited license to access content solely for the purpose of operating or improving the services and software and to enforce our terms and comply with law, such as to protect against abusive content.

Finally they say this:

  • Adobe does not train Firefly Gen AI models on customer content. Firefly generative AI models are trained on a dataset of licensed content, such as Adobe Stock, and public domain content where copyright has expired. Read more here: https://helpx.adobe.com/firefly/faq.html#training-data
  • Adobe will never assume ownership of a customer’s work. Adobe hosts content to enable customers to use our applications and services. Customers own their content and Adobe does not assume any ownership of customer work.

Now if this blog post came out at the same time the terms of use were updated, we may not be here talking about it now. And if they didn’t do any of the following, this absolutely would not have been such a huge issue:

  • To request support to clarify the terms of use, you had to agree to these terms
  • To uninstall the apps because you didn’t like these terms of use, you had to agree to these terms of use anyway.

The fact is Adobe to borrow a U.K. phrase, stuffed this whole thing. They really screwed up how they handled it and burned a whole lot of goodwill in the process. I guarantee that because of how this was handled, a lot of creative professionals are now either looking for alternatives to Adobe products, or have already switched. Will Adobe care about that? They might if it hits their bank account hard enough. I guess the central question is does this make you feel better about Adobe, and will you feel comfortable enough to use their products? Sound off in the comments below with your thoughts.

So Adobe Responds To Their Terms Of Use Change… And It Isn’t Going Over Well

Posted in Commentary with tags on June 6, 2024 by itnerd

Yesterday, I posted a story about Adobe changing their terms of use and sparking an uproar about it. At the time I said this:

Adobe could really do itself a favour by clarifying this. Because until they do, people are going to have the impression that Adobe products are basically spyware when in reality they’re likely not. Thus I’ve pinged Adobe over this and if I actually get a response, I’ll post it here.

I said that because Adobe really wasn’t saying anything about this to address this issue. But that changed when Adobe Chief Strategy Officer Scott Belsky responded to the Tweet that started this:

 I encourage you to read the entire Tweet. But The fact that Adobe as of the time that this story is written doesn’t train AI models with customer data isn’t something that inspire any confidence as their terms could allow Adobe to do so in the future.

Now if you read the entire Tweet, Belsky does say that this could be clearer. But he also uses the “everyone else does this” excuse. Which again doesn’t inspire confidence in Adobe. And from what I can tell, this isn’t going over really well on Twitter.

The bottom line is this. Even with this response from a C level executive at Adobe, I have shifted my opinion from “let’s give Adobe a chance to respond because this may not be as bad as it seems” to “Adobe is possibly setting the groundwork to do something suspect with your data in the future.” And I am likely not the only person who is thinking that given how many people are now threatening to dump Adobe products because of this. Maybe Adobe should take that into account and come up with a strategy to address these concerns and put this to bed before their reputation gets damaged beyond repair.

I’ve Found A Free Bartender Replacement and It Is Called Ice

Posted in Commentary with tags on June 6, 2024 by itnerd

Yesterday, I brought you the story of the gong show surrounding the Mac app Bartender. The TL:DR goes something like this. The app who was being written by a guy named Ben Surtees was quietly sold a couple of months ago to a company named Applause who appears to buy apps and finds new and creative ways of monetizing them. It was then discovered that the most up to date version of Bartender has a ton of analytic gathering code in it. That made me and a lot of other people instantly uninstall it. And the responses to this controversy that have been given by Applause have been shifty at best. But the question is what do you replace it with?

Well, I’ve been experimenting with a piece of software called Ice that does some of what Bartender used to do. The key word is some because one thing that Bartender was really good at is automatically making menubar icons that needed attention appear. For example, making the WiFi icon appear if you disconnect from WiFi. Ice doesn’t do that. But what it does is allow you to configure the menubar so that the items that need to always be visible, and less used items are hidden. Let me illustrate that:

What you see here is the stuff that I absolutely care about seeing 100% of the time. Besides iStat Menus which tells me all the stats related to how my Mac is performing, I want to see the WiFi icon, Battery status, Spotlight, Control Center, Siri, and the date and time. You’ll also note that next to the WiFi icon is a VPN connection. It’s there because while typing this article, I was connected to a client’s network to quickly fix something for the client in question. I want to draw your attention to the right of the Spotlight icon. You’ll see a circle which is Ice. Click it and you get this:

Now I get the the stuff that I don’t care about 90% of the time. Starting with Clyde, the G Hub app that controls the key light for my camera, Amphetamine which keeps my Mac awake during things like Power Point presentations, Garmin Connect which I use to upload new maps to my bike computer, Monitor Control which I use to control the brightness of my external display, and Time Machine. If I click on that circle again or just wait a bit, all these items disappear.

Like I said, this isn’t perfect. But it’s free (the developer does take donations) and the developer seems to have a good reputation. So I’m giving this a shot for now. But I’ll be trying a few other options to see if I can find anything better. If I come across anything that’s better, I’ll write an article on it and let you know.

Adyen Strengthens Commitment to Canadian Market with New Office Opening & Leadership Hire

Posted in Commentary with tags on June 6, 2024 by itnerd

Today, Adyen announced the opening of its own office in Toronto. The new Toronto office will serve as the company’s Canadian headquarters, underscoring Adyen’s commitment to sustained growth in the Canadian market. As part of Adyen’s ongoing commitment to growing in Canada, Adyen is also pleased to welcome Ilona Fagyas to its leadership team as its new Head of Sales later this month.

Since the start of 2020, Adyen has established a strong presence in Canada, expanding its team to 26 employees across various functions to support local and global businesses operating in the region. The company has forged local partnerships, launched new products, and added notable merchants like Moose Knuckles and Mejuri to its Canadian client base next to its already impressive global client base. Leveraging its financial technology platform, Adyen’s team offers innovative solutions that are transforming the way Canada pays.

With over 15 years of sales management experience, Ilona Fagyas is a proven payments leader in the Canadian FinTech industry. Ilona has led enterprise segments at prominent organizations including TD, Chase, and most recently, PayPal. Her dedication to excellence has been recognized through numerous President’s Club designations, highlighting her contributions to year-over-year improvement in top-performing regions. As the Head of Sales for Adyen Canada, Ilona will be focused on expanding Adyen’s footprint in the region and optimizing its growing commerce business.

Adyen has over 20,000 payment terminals in thousands of Canadian stores, with hundreds of Canadian brands interacting with Adyen’s platform daily. Adyen sets itself apart from other fintech platforms by offering all payment and financial products within its one innovative platform. Through Adyen’s platform, businesses can quickly respond to consumer demand for the latest trends in payments and consumer experiences with minimal effort – for example, by utilizing tokenization to inter-connect customer journeys across Pay By Link, mobile POS, buy online and return in-store, with a wealth of customer data captured in the process.

Adyen’s financial technology platform is available to help Canadian enterprises – including those in retail, hospitality, platform services, digital services and subscriptions, and e-commerce – achieve their ambitions faster. For more information, visit https://www.adyen.com.

Department of Labor Releases A Set Of AI Guidelines

Posted in Commentary with tags on June 6, 2024 by itnerd

The Department of Labor has announced a set of principles that provide employers and developers that create and deploy artificial intelligence with guidance:

Developed as a result of President Biden’s Executive Order on the Safe, Secure and Trustworthy Development and Use of Artificial Intelligence, this initiative underscores the administration’s commitment to ensuring AI technologies strengthen worker empowerment and well-being while addressing risks to workers.

 Kevin Surace, Chair, Token had this comment:

The DOL guidelines released today put human workers at the forefront of protection from AI including privacy, security, quality of life and ethics. This will force companies to engage HR as well as the CIO in all things AI going forward. Additional guidance is coming from all agencies. But for now this DOL guidance is very clear that worker empowerment is the north star. Meaning HR is also leading the way in all AI decisions across an organization.

DOL doesn’t make law, but does provide guiding principals for labor. These are their first AI principles and are squarely centered on the human aspects of and impact from AI. This will fly in the face of productivity gains which are often measured by reduction in headcount. How a company balances that reduction with the ethics of AI and the guiding principals here of worker empowerment are a quandary not easily resolved.

This guidance is very much focused on worker privacy and empowerment. Data security is already front and center with CIOs and CISO’s and that has less to do with employees and more to do with corporate IP.

This is another one of these good moves by the Biden administration. Hopefully this bears fruit and protects workers. That would be a great thing.

OVHcloud Continues Making AI Simple With New NVIDIA Tensor Core GPUs and Top-of-the-Line AI Models

Posted in Commentary with tags on June 6, 2024 by itnerd

OVHcloud, a global player and the European cloud leader, has taken the stage at Adopt AI, France’s new AI-focused event, to renew its commitment to democratize AI within organizations, an effort aligned with its core values for an open, transparent and trusted Cloud. In a booming AI market, OVHcloud aims to offer businesses the optimal capacity for their every AI needs through a wide range of solutions positioned at every price point. The Group’s unique value proposition aims to bring simplicity to every level of the AI pipeline while addressing the growing concerns for security, data privacy and costs that could further delay AI adoption according to recent studies. 

To propel AI into new territories, OVHcloud now offers a broad portfolio of NVIDIA Tensor Core GPUs and the latest open-source LLMs (like Mixtral 8x22B or Llama 3) available on the shelf with unmatched simplicity in a private environment. The Group relentlessly executes on its strategy focusing on the four key items that organizations need to be successful with AI: powerful yet efficient compute resources, streamlined datasets, software tooling and cutting-edge skillsets. 

Offering NVIDIA accelerated computing for every AI workload

Strategically designed to meet the needs of AI engineers today and tomorrow, OVHcloud solutions turbocharge projects from the creation of AI models to inferencing the very latest Large Language Models. As such, the Group now offers a broad portfolio of state-of-the-art NVIDIA GPUs in its Public Cloud universe, available on demand in ecofriendly datacenters, including the NVIDIA H100 Tensor Core GPU, NVIDIA L4 Tensor Core GPU and NVIDIA L40S GPU. Regardless of whether they need to provision and manage GPU instances themselves or leverage them within OVHcloud Managed Kubernetes Services, MLOps Engineers can benefit from the full range of OVHcloud PaaS offerings, including Managed Databases (such as Vector DB like pgvector or Qdrant), Kafka, as well as high-performance Object Storage.

Further delivering on its ambitious AI roadmap, OVHcloud has introduced NVIDIA L40S GPUs on its Public Cloud in addition to the NVIDIA H100 and L4 GPUs which are already available. NVIDIA L40S GPUs combine powerful AI compute with best-in-class graphics and media acceleration to power a wide range of workloads from LLM inference and training to 3D graphics, rendering and video.

Dedicated Bare Metal servers now with NVIDIA L40S GPUs

Addressing the need for powerful dedicated AI servers, OVHcloud has also introduced new Bare Metal dedicated servers powered by NVIDIA L40S GPUs. Sitting in the High Grade range, the new HGR-AI-2 server targets use cases such as deep learning, machine learning and high performance computing. The range is equipped with AMD EPYC 9354 in a dual processor configuration, thus featuring 64 cores and 128 threads with 384 GB of DDR5 memory (up to 2.3 TB). To tackle serious AI workloads, new HGR-AI-2 features 2x NVIDIA L40S 48 GB GPUs with the ability to configure up to 4x NVIDIA L40S 48 GB GPUs per server.

Easy to use tools to gets hands on with AI workloads

To further simplify AI and democratize the way businesses use AI, OVHcloud AI solutions sit at every step of the AI value chain from ideation to production. The easy-to-use, AI Notebooks, AI Training and AI Deploy services act as a complete set of serverless tools designed to experiment with data, train models and put them into production. The high-level software solutions leverage industry standard technologies and are designed to assist data scientists and machine learning engineers without the need to manage complex infrastructure scaling, and with minute-by-minute billing.

New open-source Llama and Mistral models available through AI Endpoints

OVHcloud AI Endpoints is another serverless solution that enables access to a diverse set of AI models through API endpoints thus requiring little to no knowledge on the user side. Before placing their API calls, developers can benefit from a playground to test their Endpoints. Just like critically acclaimed OVHcloud AI Notebooks, AI Training and AI Deploy, AI Endpoints leverages the Group’s infrastructure, fully respecting data privacy (in/out). The Group has added highly sought-after open-source LLMs like Mixtral 8x22b and Llama 3 that can be deployed through the OVHcloud AI Endpoints service.

Pricing and availability

New NVIDIA GPUs options including NVIDIA H100, L4 and L40S are available now in the Public Cloud universe to execute AI driven projects.

New HGR-AI-2 servers with the NVIDIA L40S GPU are available now in France and Canada, starting at 2969,99 euros/month.

New models including Mixtral 8x22b and Llama 3 are available now through OVHcloud AI Endpoints.

Resources

Australian Mining Company Pwned By BianLian

Posted in Commentary with tags on June 6, 2024 by itnerd

Recently, Australian mining company, Northern Minerals, disclosed a breach after BianLian leaked data. Exfiltrated data includes corporate, operational, shareholder and financial information, along with detailed related to current and former personnel. The company noted that the incident did not affect mining or business operations. 

Darren Williams, CEO and Founder, BlackFog:

“The attack on Northern Minerals is an example of how ransomware gangs will proceed once their demands are not met. While this is an unfortunate reality for the shareholders and the organization itself, it reflects a common trend among ransomware gangs that are focused specifically on data exfiltration rather than encryption.  Today’s gangs are about extortion and the many ways data can be leveraged for financial gain, so the focus must revolve around data security and preventing data exfiltration to protect organizations from these ongoing threats.”

The best way to make the activities of these gangs less profitable is to make sure that they can’t get into your environment. Because you can’t be extorted if they can’t get in.

TikTok Pwned… Big Name Accounts Hacked

Posted in Commentary with tags on June 6, 2024 by itnerd

TikTok has been pwned via a zero day related to opening direct messages. That’s bad. But it gets worse:

According to the report, the bad actors behind these attacks are transmitting malware through DMs on the popular social media app. Distressingly, the malware does not require the victim to download any software or click on a malicious link. Apparently, all you have to do to potentially infect your device is open a DM with the malware present.

This is seemingly connected to a separate report from Semafor, which noted on Sunday that a hacker broke into CNN’s TikTok account last week, prompting the news organization to take the account down. While some CNN staffers told Semafor that the team had been lax with its digital safety practices, one network source added that the breach came from outside of the company. It’s entirely possible that a staffer opened one of the malicious DMs.

A CNN spokesperson told Semafor that the company is “working with TikTok on the backend on additional cybersecurity measures” to ensure that their account is secure during the presidential debates and other noteworthy events in the coming weeks. At the time of writing, the main CNN TikTok account is still unavailable on the platform.

Apparently other TikTok accounts have been pwned as well. What makes this worse is that anyone can be a victim of this attack. That’s not good. Ted Miracco, CEO of Approov had this to say:

   “The TikTok security issue serves as a crucial wake-up call about the vulnerabilities present in apps from official stores. It highlights the need for greater transparency, cooperation, and the adoption of advanced security measures to protect users. Many users believe that apps available on official app stores are inherently safe. This perception is perpetuated by the rigorous app review processes that Google and Apple claim to implement. However, the reality is that even apps from these stores are not immune to zero-day vulnerabilities and sophisticated attacks. 

   “Zero-day vulnerabilities, by definition, are previously unknown flaws that can be exploited before the developer has a chance to address them. The presence of such vulnerabilities in popular apps like TikTok is alarming. It indicates that even the most widely used and scrutinized apps can have hidden security flaws, putting millions of users at risk.

   “To build a more secure app ecosystem, transparency is key, and independence from Google and Apple controlling the release process. Developers need to control the process, and users need to be informed about the security measures taken by app developers and the potential risks associated with using certain apps. Furthermore, the industry must move towards open standards and greater cooperation among stakeholders. By addressing these challenges, we can work towards a safer and more secure app ecosystem.”

This is likely the last thing that TikTok needs. Hopefully they are completely transparent about what’s going on here and how they plan on addressing this. Otherwise this will add to their problems.