"US Seizes $1.4 Million in Cryptocurrency From Tech Scammers"

"US Seizes $1.4 Million in Cryptocurrency From Tech Scammers"

US law enforcement recently seized $1.4 million worth of Tether (USDT) tokens believed to have been fraudulently obtained through tech support scams.  As part of the alleged scheme, which mainly targeted the elderly across the US, victims were targeted with popups on their computers, claiming that the system had been compromised.  The FBI noted that the victims were directed to contact Microsoft or Apple, depending on the operating system on their machine, by calling a certain phone number that connected them with the perpetrators, who posed as tech support employees.

Submitted by Adam Ekwall on

"ICS Researchers Awarded Best Technical Poster at NDSS"

"ICS Researchers Awarded Best Technical Poster at NDSS"

According to Alfred Chen, an assistant professor at UC Irvine's Donald Bren School of Information and Computer Sciences (ICS), the cyber-physical nature of Indoor Delivery Robot (IDR) systems can result in significant security and safety damages if they are attacked. Computer science Ph.D. student Fayzah Alshammari is researching IDR vulnerabilities to prevent such attacks. Chen says Fayzah's work aims to conduct the first security analysis of IDR systems in real-world commercial environments.

Submitted by Gregory Rigby on

"Phishing Campaign Leverages AWS and GitHub to Launch RATs"

"Phishing Campaign Leverages AWS and GitHub to Launch RATs"

In a new phishing campaign, malicious actors store malware on public cloud services such as Amazon Web Services (AWS) and GitHub. Then they use email to launch an attack and gain control of newly infected systems. According to FortiGuard Labs, the phishing email tricks victims into running a malicious, high-severity Java downloader to spread a new VCURMS Remote Access Trojan (RAT) and a STRRAT RAT. This article continues to discuss findings regarding the phishing campaign involving the use of AWS and GitHub to launch RATs.

Submitted by Gregory Rigby on

"Image-Based Phishing Tactics Evolve"

"Image-Based Phishing Tactics Evolve"

According to IRONSCALES and Osterman Research, 70 percent of organizations believe their current security stacks are effective against image-based and QR code phishing attacks. However, 76 percent were still compromised in the last 12 months. Organizations are aware of the growing threat posed by image-based and QR code phishing attacks, with 90 percent of respondents revealing that such attacks target their organizations. Despite this high level of awareness, 94 percent of these organizations have seen these new attacks evade their email security stack.

Submitted by Gregory Rigby on

"These PyPI Python Packages Can Drain Your Crypto Wallets"

"These PyPI Python Packages Can Drain Your Crypto Wallets"

Researchers have discovered seven packages on the Python Package Index (PyPI) repository designed to steal BIP39 mnemonic phrases used to recover private keys of cryptocurrency wallets. ReversingLabs has codenamed the software supply chain attack campaign "BIPClip." The packages were downloaded 7,451 times before being removed from PyPI. BIPClip, aimed at developers on projects related to generating and securing cryptocurrency wallets, is said to have been in operation since at least December 4, 2022.

Submitted by Gregory Rigby on

"Under Increasing Federal Scrutiny, BlackCat Ransomware Gang Pulls Exit Scam on Its Way Out"

"Under Increasing Federal Scrutiny, BlackCat Ransomware Gang Pulls Exit Scam on Its Way Out"

The ALPHV/BlackCat ransomware gang has committed a scam on its way out. BlackCat affiliates complained on dark web forums that they had successfully breached victims, but the ransomware gang had not paid their share, becoming unresponsive. This was quickly followed by the closure of affiliate accounts and a law enforcement seizure notice posted on its dark web site, which does not appear to be legitimate. The ransomware gang's unusual behavior is likely due to international law enforcement taking down its data leak site in December.

Submitted by Gregory Rigby on

"French Government Agencies Hit by Cyberattacks of 'Unprecedented Intensity'"

"French Government Agencies Hit by Cyberattacks of 'Unprecedented Intensity'"

Several French government agencies have experienced "intense" cyberattacks. The description of the attacks aligns with that of Distributed Denial-of-Service (DDoS) attacks. According to the French government, the attack was carried out with familiar technical means but at an unprecedented level of intensity. Although DDoS incidents have been attributed to state-sponsored groups, the attack's simplicity prevents it from providing a long-term disruptive capability or a method for the attacker to infiltrate target networks.

Submitted by Gregory Rigby on

"Google Paid $10 Million in Bug Bounty Rewards Last Year"

"Google Paid $10 Million in Bug Bounty Rewards Last Year"

Google recently revealed that it had awarded $10 million to 632 researchers from 68 countries in 2023 for finding and responsibly reporting security flaws in the company's products and services.  Though this is lower than the $12 million Google's Vulnerability Reward Program paid to researchers in 2022, the amount is still significant, showcasing a high level of community participation in Google's security efforts.

Submitted by Adam Ekwall on

"Researchers Jailbreak AI Chatbots With ASCII Art -- ArtPrompt Bypasses Safety Measures to Unlock Malicious Queries"

"Researchers Jailbreak AI Chatbots With ASCII Art -- ArtPrompt Bypasses Safety Measures to Unlock Malicious Queries"

A team of researchers has developed ArtPrompt, a new approach for bypassing the safety measures built into Large Language Models (LLMs). According to the researchers' paper titled "ArtPrompt: ASCII Art-based Jailbreak Attacks against Aligned LLMs," users can make chatbots such as GPT-3.5, GPT-4, Gemini, Claude, and Llama2 respond to queries that are supposed to be rejected. The attack involves using ASCII art prompts generated by their ArtPrompt tool.

Submitted by Gregory Rigby on

"Researchers Develop Tantalizing Method to Study Cyberdeterrence"

"Researchers Develop Tantalizing Method to Study Cyberdeterrence"

An experimental multiplayer online war game named "Tantalus," after a figure from Greek mythology, provides insightful data for real-world cyberattacks. Researchers at Sandia National Laboratories have used the game to study different conditions in cyberdeterrence strategies. The game is a human research study designed to collect data on how people's decisions during threatening situations affect national security.

Submitted by Gregory Rigby on
Subscribe to