"BlackCat Ransomware Successor Cicada3301 Emerges"

"BlackCat Ransomware Successor Cicada3301 Emerges"

The "Alphv/BlackCat" ransomware gang appears to have resurfaced as "Cicada3301," which is written in the Rust programming language. It has many similarities to BlackCat, claiming over 30 victims since June 2024, primarily in the healthcare, hospitality, manufacturing/industrial, and retail industries of North America and the UK. This article continues to discuss findings regarding the Cicada3301 ransomware.

SecurityWeek reports "BlackCat Ransomware Successor Cicada3301 Emerges"

 

Submitted by Gregory Rigby on

"Engineers Build Zero-Trust, Real-Time Cybersecurity Tools to Protect Renewables on the Grid"

"Engineers Build Zero-Trust, Real-Time Cybersecurity Tools to Protect Renewables on the Grid"

Researchers at Iowa State University are building zero-trust cybersecurity tools to protect power grids that include renewable resources such as wind or solar farms. The research project, supported by the US Department of Energy's (DOE) Office of Cybersecurity, Energy Security, and Emergency Response (CESER), will develop zero-trust-based cybersecurity algorithms and tools to reduce cyber exposure. The developed solutions will also improve real-time situational awareness and mitigate attacks on grids integrated with renewable energy sources.

Submitted by Gregory Rigby on

"Critical Vulnerabilities Expose mbNET.mini, Helmholz Industrial Routers to Attacks"

"Critical Vulnerabilities Expose mbNET.mini, Helmholz Industrial Routers to Attacks"

Germany's CERT@VDE has notified organizations of several critical and high-severity vulnerabilities found in industrial routers. One of the vulnerable devices is the MB Connect Line's mbNET.mini router, which is used worldwide as a Virtual Private Network (VPN) gateway for remote access and maintenance of industrial environments. This article continues to discuss the potential exploitation and impact of the vulnerabilities found in mbNET.mini and Helmholz industrial routers.

Submitted by Gregory Rigby on

"Penn Engineering Research Discovers Critical Vulnerabilities in AI-Enabled Robots to Increase Safety and Security"

"Penn Engineering Research Discovers Critical Vulnerabilities in AI-Enabled Robots to Increase Safety and Security"

Researchers at the University of Pennsylvania's School of Engineering and Applied Science (Penn Engineering) discovered that certain features of Artificial Intelligence (AI)-governed robots have previously unidentified security vulnerabilities. The research, funded by the National Science Foundation (NSF) and the Army Research Laboratory (ARL), seeks to address the emerging vulnerability to ensure the safe deployment of Large Language Models (LLMs) in robotics.

Submitted by Gregory Rigby on

"Severe Flaws in E2EE Cloud Storage Platforms Used by Millions"

"Severe Flaws in E2EE Cloud Storage Platforms Used by Millions"

According to ETH Zurich researchers Jonas Hofmann and Kien Tuong Turong, multiple End-to-End Encrypted (E2EE) cloud storage platforms have security vulnerabilities that could expose user data to malicious actors. The researchers revealed issues with Sync, pCloud, Icedrive, Seafile, and Tresorit, which over 22 million people collectively use. They found severe vulnerabilities in all five products, including implementations that enable malicious actors to inject files, tamper with data, or access user files.

Submitted by Gregory Rigby on

"Half of Organizations Have Unmanaged Long-Lived Cloud Credentials"

"Half of Organizations Have Unmanaged Long-Lived Cloud Credentials"

Datadog's "State of Cloud Security 2024" report found that 46 percent of organizations have unmanaged users with long-lived credentials in cloud services, putting them at risk of data breaches. Long-lived credentials, which are authentication tokens or keys in the cloud that remain valid for a long time, can give attackers persistent access with the same privileges as the owner. According to the report, long-lived credentials are widespread across Google Cloud, Amazon Web Services (AWS), and more.

Submitted by Gregory Rigby on

"ESET Distributor's Systems Abused to Deliver Wiper Malware"

"ESET Distributor's Systems Abused to Deliver Wiper Malware"

ESET is investigating the abuse of the systems of its official product distributor in Israel to send emails delivering wiper malware. ESET's Advanced Threat Defense (ATD) team notified targeted users of government-backed attackers trying to compromise their devices. The attack's email passed DomainKeys Identified Mail (DKIM) and Sender Policy Framework (SPF) checks, and linked to the ESET Israel store, according to researcher Kevin Beaumont. The link pointed to a ZIP file with ESET DLLs and an executable aimed at installing wiper malware on the victim's system.

Submitted by Gregory Rigby on

Pub Crawl - October 2024

Pub Crawl - October 2024

Selections by dgoff

Pub Crawl summarizes sets of publications that have been peer-reviewed and presented at Science of Security (SoS) conferences or referenced in current work. The topics are chosen for their usefulness for current researchers. Select the topic name to view the corresponding list of publications. Submissions and suggestions are welcome.

Submitted by Gregory Rigby on

"New Algorithm Identifies Increase in Critical Infrastructure Security Vulnerabilities"

"New Algorithm Identifies Increase in Critical Infrastructure Security Vulnerabilities"

A team of researchers at the Georgia Tech School of Electrical and Computer Engineering (ECE) has developed an algorithm named "PLCHound" to improve critical infrastructure security. The development aims to more accurately identify devices vulnerable to remote cyberattacks. It involves the use of advanced Natural Language Processing (NLP) and Machine Learning (ML) techniques to search through large databases of Internet records as well as log the IP address and security of Internet-connected devices.

Submitted by Gregory Rigby on

"Using Generative AI to Outsmart Cyberattackers Before They Strike"

"Using Generative AI to Outsmart Cyberattackers Before They Strike"

According to Mohamed Rahouti, a professor at Fordham University, generative Artificial Intelligence (GenAI) holds the key to a new system that anticipates potential cyberattacks and prepares systems to counter previously unknown cyber threats. He and a group of graduate students are developing new systems to get ahead of sophisticated, constantly changing attacks. The researchers have used GenAI and other methods in one of their projects to expand on a snapshot of network traffic data and create a more complete picture of what is normal and abnormal.

Submitted by Gregory Rigby on
Subscribe to