Hackers Using Havoc Post-Exploitation Framework In Attacks

Posted in Commentary with tags on February 16, 2023 by itnerd

Security researchers at Zscaler ThreatLabz observed threat actors using the open-source C2 framework known as Havoc in attack campaigns targeting government organizations.

The Havoc framework is an advanced post-exploitation command and control framework is an alternative to paid options such as Cobalt Strike and Brute Ratel and is capable of bypassing the most current and updated version of Windows 11 Defender due to the implementation of advanced evasion techniques such as indirect syscalls and sleep obfuscation.

Matt Mullins, Senior Security Researcher at Cybrary had this to say:

   “Command and Control (or C2) frameworks are nothing new to the threat actor community. For a long time, the FOSS (Free and Open-Source Software) community had a harder time keeping up with the features and functionality associated with premium paid tools like Cobalt Strike. This left learners, lower budget teams, and criminal groups with limited options around older frameworks like Empire, Metasploit, and some very basic custom tooling.

   “This all changed around 2018, when it seems that C2 frameworks simply exploded in options. There were a number of very sophisticated tools that reached a fair degree of maturity (such as Sliver, Mythic, etc.) while older frameworks were forked and revisited (such as BC-Security’s Empire fork) that gave a wonderful buffet of options to the aforementioned groups.

   “As with most things in the industry, as these options became available, so did the options being implemented in threat actor TTPs. Outside of these robust options being made available, paid tooling was beginning to be leaked. Cobalt Strike has had its source code leaked a number of times now, along with other paid tools being shared and cracked. Cracked software is nothing new but what is interesting is the specific shift of criminal groups to target cracking of red team software, as well as red teams for licenses.

   “With such a cornucopia of options available to criminals, the detections and patterns used to previously sink paid tools aren’t nearly as effective. Take for consideration Cobalt Strike, it was already a big waste of money even back in 2018 because nearly every IR team, EDR tool, or any other defensive capability under the sun, has detection ruling built for a majority of its offerings. This means that it was only useful to advanced red teamers, or criminals, because of the amount of customization needed to get it to work. This brings me back to the original point, why would anybody waste their money or time on Cobalt Strike when they can just download Havoc and it “works” off of the shelf and bypasses detections? Criminals now no longer need to hunt for licenses or crack software, while red teams don’t need to pay absurd prices for tools that they have to know how to use and customize.

   “The cat-and-mouse game of detection and innovation is about to accelerate in favor of the offensive side because of this blooming of C2s. Reflecting on the implementation of new tools like ChatGPT, along with other AI tools, and you now have more rapid generation of payloads, phishing emails, and other attacker-beneficial aspects. I can only surmise that we will see more breaches (and thus more potential undetected breaches) as a result of this increase in options and sophistication.”

The best thing about this for threat actors is thatit’s free! Which is bad for you and I.

BenQ Says Our Average Screen Time Per Day Is Up, And Digital Screens Are The New Faux Pas! 

Posted in Commentary with tags on February 16, 2023 by itnerd

Digital screens in today’s day and age are the new faux pas. Screen-time has gone up significantly over the last decade, and many of us don’t really realize how much we rack up over the course of a day, a week, a month and year!  

On average, a Canadian adult spends 13.1 hours per day on screen-time, exceeding the recommended limit. In only eight hours, we are exposed to 5.8 million flickers from our screens. While making efforts to reduce screen time is important, it’s just as vital to determine whether our devices are affecting us physically. BenQ, one of North America’s leading monitor brands, understands that professional individuals, and gamers often have limitations when it comes to how much screen time they rack up, which is why they’ve implemented eye-care technology into their high-performance monitors.   

Developed to protect your eyes,BenQ’s Eye-CareU, ensures that that eyestrain, eye-pain, and headaches are reduced.  Being the first monitor manufacturer to prioritize eye health, BenQ has fitted their monitors with innovative functions such as:   

  • Brightness Intelligence+, a feature that detects screen content and environmental lighting, adjusting display brightness and colour temperature 
  • Brightness Intelligence, a sensor that detects ambient light as well as the brightness and contrast of screen content. It adapts brightness and enhances dark areas on the display without overexposing in bright regions   
  • Flicker-free, a technology certified by international TÜV Rheinland, which eliminates flicker  
  • Low Blue Light, a technology that filters harmful blue light.  
  • Low Blue Light+, a technology that filters out the shorter, higher energy blue-violet radiation.  

Here’s a round-up of some of BenQ’s high performance monitors that include the Eye-Care Solution:

EX240N – MOBIUZ 1ms 23.8″ 165Hz Gaming Monitor 

  • Adjusts display brightness and color temperature for a more comfortable viewing experience 
  • Colour Weakness Mode – Red and green filters help individuals with the common types of color vision deficiency distinguish colors more easily 

GW2785TC 27″ 1080p Eye-Care Monitor 

  • Reading Mode – Designed to filter out harmful blue light 
  • Coding Mode – Devised to make every color pop out for easy readability and coding efficiency 
  • Care Mode – Specially-tuned to lowered brightness and color saturation to protect sensitive eyes 

TELUS becomes official premier partner of Vancouver Whitecaps FC

Posted in Commentary with tags on February 16, 2023 by itnerd

The Vancouver Whitecaps FC announced TELUS as the club’s premier partner through 2027. The multi-year partnership brings together two longstanding Vancouver-based organizations with a proven and shared commitment to drive meaningful change in their local communities. 

To kick off the new partnership and 2023 season, Vancouver Whitecaps FC also unveiled its new 2023 jersey today, featuring the iconic TELUS brand. The new ‘Bloodlines’ Jersey shines a light on the pressing need for donors to support Canadian Blood Services, encouraging all Canadians from coast to coast to coast to download the Canadian Blood Services app and learn how they can help save lives.

The new jersey prominently featuring TELUS, will hit the field for the first time at the Whitecaps FC home opener on Saturday, February 25. To celebrate the new partnership, TELUS team members will be giving away co-branded Whitecaps scarves to every fan attending the match.

From February 16 to March 31, fans will be able to register for an account on the Canadian Blood Services app GiveBlood (myaccount.blood.ca) and show it at the Whitecaps FC Official Store or at a home match at BC Place to receive free personalized cresting (name and number) on a 2023 Bloodlines jersey. For more information on how to help support the Canadian Blood Services, visit blood.ca

Critical Insight Finds Healthcare Data Breach in 2H 2022 Higher than Pre-Pandemic Levels Affecting More Individuals

Posted in Commentary with tags on February 16, 2023 by itnerd

Critical Insight, the Cybersecurity-as-a-Service provider specializing in helping critical organizations Prepare, Detect, and Respond in today’s threat environment, announced today the release of the firm’s H2 2022 Healthcare Data Breach Report, which analyzes ​​breach data reported to the U.S. Department of Health and Human Services by healthcare organizations. The number of data breaches affecting healthcare providers declined in the second half of 2022, consistent with a downward trend over the past two years, but a deeper dive into the data reveals that current breach totals are still higher than pre-pandemic levels; breaches are affecting more individuals; and hackers are shifting tactics to attack weak links in the healthcare system supply chain, most notably attacking EHR systems. 

The report shows that while the number of data breaches affecting healthcare providers declined in the second half of 2022, the number of individual records exposed by these breaches increased by 35%. The report also highlights the evolving tactics of hackers and the need for healthcare organizations to prioritize preparation, detection, and incident response. Key Findings: Breach numbers are down: Total breaches dropped 9% between the first six months of 2022 and the year’s second half, declining since a high-water mark at the height of the pandemic from 393 breaches in the second half of 2020 to 313 in the latest reporting period. Records affected are up: The number of individual records exposed by breaches skyrocketed by 35% in the second half of 2022 to hit 28 million. 

In other words, fewer but more significant breaches reflect consolidation within the industry and the evolving tactics of attackers. Hacking remains high: Most data breaches are due to hacking. Healthcare organizations have done an excellent job of shoring up their policies around handling and storing medical records. Hacking accounted for 79% of all incidents and 84% of individual records exposed in 2022. Most common breach causes: Unauthorized access/disclosure now affects more records per breach than any other breach type. On average, the number of individuals affected per unauthorized access/disclosure breach spiked from 5,700 in the first half of 2022 to over 143,000 in the second half. By comparison, the average number of individuals affected per hacking breach grew from 73,900 to 87,000 in 2022. 

Who’s getting breached?: Attackers continue to attack hospitals but have found increasing success targeting business associates and third-party vendors such as electronic medical record providers, lawyers, accountants, billing companies, and medical device manufacturers. In the second half of 2022, more records were exposed due to breaches at business associates (48%) than actual healthcare providers (47%). 

What they’re watching: Attacks against EMR systems which were non-existent in past years, spiked to 7% in the first half of 2022 and 4% in the second half of 2022. For the full year 2022, EMR-related breaches accounted for 6 million individual records exposed.

This report provides valuable insights into the current state of healthcare breaches and the need for organizations to implement a comprehensive security strategy, including risk assessments, third-party risk management, and incident response planning.

To download the report, please visit https://cybersecurity.criticalinsight.com/healthcare-breach-report-h2-2022.

LinkedIn’s Publishes Their 2023 Most In-Demand Skills List

Posted in Commentary with tags on February 16, 2023 by itnerd

As the 2023 workforce rapidly evolves, conversations around ‘recession’ are up nearly 900% since last year and topics like layoffs are trending on LinkedIn. However, today’s professionals are finding confidence in their skills, allowing them to bounce back and move forward when facing job change – planned or not.

A complement to this year’s Jobs on the Rise list, which identified the 25 jobs which have grown most over the past five years, the Most In-Demand Skillslist offers an insider look at the skills companies need most right now and free LinkedIn Learning courses to learn these skills.

The 2023 top 10 most in-demand skills in Canada include:

  1. Management – Be The Manager People Won’t Leave
  2. Communication – Communication Foundations
  3. Customer Service – Customer Service Foundations
  4. Leadership – Human Leadership
  5. Microsoft Office – Excel Essential Training (Office 365)
  6. Sales – Sales Foundations
  7. Project Management – Project Management Foundations
  8. Teamwork – Being an Effective Team Member
  9. Research – Market Research Foundations
  10. Analytical Skills – Critical Thinking and Problem Solving

For the full list of the Most In-Demand Skills, and their corresponding LinkedIn Learning courses, visit here.

New Variation Of The PayPal Phishing Attack Sends Malicious Invoices Victims to Steal Personal Credentials

Posted in Commentary with tags on February 16, 2023 by itnerd

In July 2022, researchers at Avanan, a Check Point Software Company, wrote about a new campaign where hackers are sending phishing emails and malicious invoices directly from PayPal. Avanan has released its latest blog discussing how threat actors are continuing to take advantage of PayPal in a variety of ways to send malicious invoices directly to users. 

In this attack, victims are presented with emails, coming directly from PayPal, regarding fraudulent charges or renewal notifications. These notifications encourage users to take action by calling the provided number to reverse the charges. They are then prompted to provide personal information in which hackers save and use for future attacks. 

You can read the blog here.

Multilingual BEC Groups Use Auto Translate Tools for Payment Fraud, Payroll Diversion, And Executive Impersonation

Posted in Commentary with tags on February 16, 2023 by itnerd

Abnormal Security has identified two groups using executive impersonation to execute BEC attacks on companies worldwide. In a new report, the company provides details on Midnight Hedgehog, a group engaging in payment fraud, and Mandarin Capybara, a group performing payroll diversion attacks. This new report provides insight into the impact of multilingual BEC attacks, in-depth analysis of the tactics and techniques used by these groups, and offers actionable advice to organizations to defend against multilingual email-based attacks.

These groups use executive impersonation to deceive recipients into making payments for bogus services or changing payroll account details, often posing as a company’s CEO. The report highlights that by leveraging commercial online services and widely available marketing technology, BEC actors can rapidly scale their efforts, maximizing their reach and wreaking havoc across the globe.

You can read the report here.

Nozomi Networks Expands Strategic Partnership with Mandiant 

Posted in Commentary with tags on February 16, 2023 by itnerd

Nozomi Networks, the leader in OT and IoT security, today announced an expanded global strategic partnership with Mandiant to help industrial and enterprise customers anticipate, diagnose and respond to IT and OT cyber threats in their critical business operations.

As part of the strategic partnership, Mandiant expanded the number of certified Nozomi Networks experts on its global OT incident response team and will utilize Nozomi Networks’ solutions to further forensic analysis and incident assessments. The companies are also investing in a new initiative that will include threat intelligence sharing and joint security research, and plan to introduce custom-designed incident response and assessment programs for joint customers. These new efforts reinforce a trusted partnership that began in 2016 and continues to expand with the shared mission to strengthen the security of industrial control systems.

Recognized as a market leader in OT and IoT security, Nozomi Networks is valued for superior operational visibility, advanced OT and IoT threat detection and strength across deployments. Nozomi Networks solutions support more than 89 million devices in thousands of installations across energy, manufacturing, mining, transportation, utilities, building automation, smart cities, and critical infrastructure. Nozomi Networks products are deployable onsite and in the cloud, and span IT, OT and IoT to automate the hard work of inventorying, visualizing and monitoring industrial control networks through the innovative use of artificial intelligence. Use cases stretch beyond cybersecurity, and include troubleshooting, asset management and predictive maintenance.

By combining their market leadership in OT, IT & IoT cybersecurity, Nozomi Networks and Mandiant are bringing a new level of cyber defenses to critical infrastructure organizations worldwide.

Guest Post: Ukraine suffered 29 state-sponsored cyberattacks in 2022

Posted in Commentary with tags on February 16, 2023 by itnerd

In recent years, state-sponsored cyberattacks have become a growing concern for governments, businesses, and individuals alike.

According to the data analyzed by the Atlas VPN team, Ukraine was a victim of 29 state-sponsored attacks in 2022. Behind most of the government-backed attacks stand China and Russia, with 44 and 38 cyberattacks, respectively.

The United States suffered 14 state-sponsored cyberattacks. Most of these attacks came from Iran or China-backed hackers who launched phishing and malware campaigns against US companies or government entities.

State-backed hackers launched 7 attacks on Russia in 2022. The majority of them were by the Ukrainian IT army in response to Kremlin’s started war on Ukraine.

South Korea was a victim of 6 government-backed cyberattacks. North Korean cybercriminals were behind most of the threats. In addition, they were responsible for all 5 attacks on cryptocurrency companies.

Finally, all other state-sponsored threats on countries not mentioned here made up 76 total cyberattacks.

​​Cybersecurity writer at Atlas VPN, Vilius Kardelis, shares his thoughts on state-sponsored attacks:

“The rise of state-sponsored cyberattacks poses a significant threat to the stability of our interconnected world. Governments must collaborate to establish clear rules of engagement in cyberspace to prevent the expansion of malicious cyber activities that undermine trust and confidence in the digital infrastructure.”

State-sponsored spying

Governments around the world are engaged in a race to gather as much intelligence as possible.

Nonetheless, out of all government-backed attacks in 2022, 110 were launched to spy on another country or organization. Financial theft was the reason behind 11 threats, while cybercriminals destroyed sensitive information in 8 cyberattacks.

Governments were the primary targets of state-backed hackers, as they launched 75 attacks on such entities. Businesses faced 55 nation-sponsored cyberattacks. Cybercriminals hacked journalists, human rights activists, or other citizens 48 times. Lastly, military objects suffered 8 state-sponsored cyberattacks.

To read the full article, head over to:

https://atlasvpn.com/blog/unveiling-the-invisible-war-ukraine-suffered-29-state-sponsored-cyberattacks-in-2022

A North Korean Espionage Group Is Using M2RAT Malware For Cyber Espionage

Posted in Commentary with tags on February 16, 2023 by itnerd

A new North Korean malware M2RAT, discovered by ASEC researchers (Translation here) is in the wild. It begins with a phishing attack, installing its malware via a downloaded jpeg using steganography. Then the malware performs keylogging, data theft, command execution, and the taking of screenshots from the desktop. As if that’s not intrusive enough, it locates any attached portable devices such as phones, scans them for documents and voice recording files and transfers them to the attacker’s servers.
 
The malware is being used by the RedEyes attack group (aka APT37, ScarCruft), a North Korean cyber espionage hacking group believed to be state-supported. The group targets personal PC information and mobile phone data of specific individuals, not companies. The malware is distributed through the Hangul word processor EPS vulnerability (CVE-2017-8291). The vulnerability used in the attack is old and has been patched in newer versions of the word processor. The attackers seemed to know in advance that the targets are using the older version of the word processor that supports the EPS.

James Lively, Endpoint Security Research Specialist for Tanium:

   “While M2RAT, the capabilities, and the delivery process are indicative of a state-sponsored APT, the initial access vectors are the real highlight here. Phishing and exploiting unpatched services and software are generally the easiest and most cost-effective methods to gain access to a target network.

   “APTs have a reputation for operating solely out of memory while using encrypted communications to their C2’s. It’s difficult to detect malicious activity within memory without escalating costs and business disruptions. Combined with encrypted C2 communications, network analyzers are often rendered ineffective since they cannot identify traffic.  Based on these factors, it’s extraordinarily difficult to identify a sophisticated attacker, such as an APT, once they have gained a foothold inside of a network.”

   “It’s important for organizations to employ phishing training and campaigns often, ideally monthly or quarterly, to raise employee awareness and help them identify and report phishing attempts. Unpatched services and software allow attackers to use even decade old vulnerabilities to gain access. Proper asset management, inventory, and patching are critical to fortifying an enterprise against attackers seeking low hanging fruit. It only takes one employee to click a malicious link or unpatched system to compromise a network and potentially the entire enterprise.

While this is highly targeted malware, I suspect it’s a matter of time before attacks become broader in nature. Thus my advice would be to ensure that every endpoint, server, mobile phone, etc is fully patch to defend against this and other threats.