"Suspected China-Based Hackers Target Uzbekistan Gov't, South Koreans, Cisco Says"

"Suspected China-Based Hackers Target Uzbekistan Gov't, South Koreans, Cisco Says"

A new report reveals that the Uzbekistan Ministry of Foreign Affairs and people in South Korea are being targeted by hackers based in China using the SugarGh0st malware strain. Cisco highlighted the malware, which researchers believe is a variant of Gh0st RAT. Gh0st RAT has been used by different Advanced Persistent Threat (APT) groups for over a decade against diplomatic, political, economic, and military targets globally. In the latest campaign, researchers discovered four samples launched as part of the campaign, including one sent to users in the Uzbekistan Ministry of Foreign Affairs.

Submitted by grigby1 CPVI on

"The Vast Majority of Us Have No Idea What the Padlock Icon on Our Internet Browser Is – And It's Putting Us at Risk"

"The Vast Majority of Us Have No Idea What the Padlock Icon on Our Internet Browser Is – And It's Putting Us at Risk"

According to a new study from Cardiff Metropolitan University, only 5 percent of UK adults understand the significance of the padlock in the Internet browser's address bar, posing a threat to online safety. The padlock icon on a web browser indicates that the data sent between the web server and the user's computer is encrypted and cannot be read by others. Researchers got various wrong answers when they asked people what they thought it meant. This article continues to discuss findings from the study and what it means for online safety.

Submitted by grigby1 CPVI on

"AI: The New Puppet Master Behind Cyberattacks"

"AI: The New Puppet Master Behind Cyberattacks"

Artificial Intelligence (AI)-driven social engineering attacks are reshaping the threat landscape. AI has emerged as a significant tool for manipulation, helping to stage attacks with precision and personalization far exceeding the capabilities of its human predecessors. The ability to digest and interpret large datasets and learn from them is at the heart of AI and Machine Learning (ML). Targeting and personalization at scale are some of the goals of cybercriminals.

Submitted by grigby1 CPVI on

"Understanding the Security of Mobile Apps in Africa"

"Understanding the Security of Mobile Apps in Africa"

A team of researchers from CyLab-Africa and the Upanzi Network recently collaborated with Approov, a mobile security provider, to analyze the security of popular financial services apps used across Africa. A survey of 224 popular financial apps revealed that 95 percent of these Android apps exposed secrets. These secrets could be used to reveal personal and financial information. The discovered security flaws have the potential to impact about 272 million users. This article continues to discuss the study aimed at understanding the security of mobile apps in Africa.

Submitted by grigby1 CPVI on

"Researchers Break Apple's New MacBook Pro Weeks After Release"

"Researchers Break Apple's New MacBook Pro Weeks After Release"

A Georgia Tech researcher successfully bypassed security measures on Apple's latest MacBook Pro equipped with the M3 processor chip in order to get his fictitious target's Facebook password and second-factor authentication text. Jason Kim, a Ph.D. student, demonstrated how the recently discovered iLeakage side-channel exploit remains a genuine threat to Apple devices, regardless of how updated their software is.

Submitted by grigby1 CPVI on

Pub Crawl - December 2023

Pub Crawl - December 2023

Selections by dgoff

Pub Crawl summarizes, by hard problems, sets of publications that have been peer-reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers. Select the topic name to view the corresponding list of publications. Submissions and suggestions are welcome.

Submitted by grigby1 CPVI on

"CACTUS Ransomware Exploits Qlik Sense Vulnerabilities in Targeted Attacks"

"CACTUS Ransomware Exploits Qlik Sense Vulnerabilities in Targeted Attacks"

A CACTUS ransomware campaign has been spotted gaining a foothold in targeted environments by exploiting previously discovered security holes in the cloud analytics and business intelligence platform Qlik Sense. According to Arctic Wolf researchers Stefan Hostetler, Markus Neis, and Kyle Pagelow, this is the first documented instance of threat actors deploying CACTUS ransomware, exploiting vulnerabilities in Qlik Sense for initial access.

Submitted by grigby1 CPVI on

"FjordPhantom Android Malware Uses Virtualization to Evade Detection"

"FjordPhantom Android Malware Uses Virtualization to Evade Detection"

FjordPhantom, a new Android malware, was discovered using virtualization to execute malicious code in a container and avoid detection. Promon discovered the malware, which is currently spreading via emails, SMS, and messaging apps targeting banking apps in Indonesia, Thailand, Vietnam, Singapore, and Malaysia. Victims are tricked into downloading what seem to be legitimate banking apps but contain malicious code that runs in a virtual environment to attack the real banking app. FjordPhantom's goal is to steal online banking credentials and manipulate transactions through on-device fraud.

Submitted by grigby1 CPVI on

"CISA Urges Water Facilities to Secure Their Unitronics PLCs"

"CISA Urges Water Facilities to Secure Their Unitronics PLCs"

Following news that Iran-linked attackers had taken control of a Programmable Logic Controller (PLC) at a water system facility in Pennsylvania, a public alert was published by the Cybersecurity and Infrastructure Security Agency (CISA) urging other water authorities to secure their PLCs immediately. The cyber threat actors most likely gained access to the affected device, a Unitronics Vision Series PLC with a Human Machine Interface (HMI), by exploiting cybersecurity vulnerabilities such as poor password security and Internet exposure, according to CISA.

Submitted by grigby1 CPVI on

"How a Teenage Saudi Hacker Went From Lockpicking to Ransomware"

"How a Teenage Saudi Hacker Went From Lockpicking to Ransomware"

Marco Liberale, a 13-year-old from Saudi Arabia, recently presented on navigating ransomware at the Black Hat Middle East and Africa conference. He taught himself lockpicking at the age of three, Python coding at the age of five, and malware writing shortly after. Liberale's presentation was praised, particularly by researcher and Boom Supersonic CISO Chris Roberts, who pointed out that Liberale demonstrated how to write, build, design, and launch ransomware. He also showed how to protect systems from being taken over by it.

Submitted by grigby1 CPVI on
Subscribe to