"Researchers Break Apple's New MacBook Pro Weeks After Release"

"Researchers Break Apple's New MacBook Pro Weeks After Release"

A Georgia Tech researcher successfully bypassed security measures on Apple's latest MacBook Pro equipped with the M3 processor chip in order to get his fictitious target's Facebook password and second-factor authentication text. Jason Kim, a Ph.D. student, demonstrated how the recently discovered iLeakage side-channel exploit remains a genuine threat to Apple devices, regardless of how updated their software is.

Submitted by Gregory Rigby on

Pub Crawl - December 2023

Pub Crawl - December 2023

Selections by dgoff

Pub Crawl summarizes, by hard problems, sets of publications that have been peer-reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers. Select the topic name to view the corresponding list of publications. Submissions and suggestions are welcome.

Submitted by Gregory Rigby on

"CACTUS Ransomware Exploits Qlik Sense Vulnerabilities in Targeted Attacks"

"CACTUS Ransomware Exploits Qlik Sense Vulnerabilities in Targeted Attacks"

A CACTUS ransomware campaign has been spotted gaining a foothold in targeted environments by exploiting previously discovered security holes in the cloud analytics and business intelligence platform Qlik Sense. According to Arctic Wolf researchers Stefan Hostetler, Markus Neis, and Kyle Pagelow, this is the first documented instance of threat actors deploying CACTUS ransomware, exploiting vulnerabilities in Qlik Sense for initial access.

Submitted by Gregory Rigby on

"FjordPhantom Android Malware Uses Virtualization to Evade Detection"

"FjordPhantom Android Malware Uses Virtualization to Evade Detection"

FjordPhantom, a new Android malware, was discovered using virtualization to execute malicious code in a container and avoid detection. Promon discovered the malware, which is currently spreading via emails, SMS, and messaging apps targeting banking apps in Indonesia, Thailand, Vietnam, Singapore, and Malaysia. Victims are tricked into downloading what seem to be legitimate banking apps but contain malicious code that runs in a virtual environment to attack the real banking app. FjordPhantom's goal is to steal online banking credentials and manipulate transactions through on-device fraud.

Submitted by Gregory Rigby on

"CISA Urges Water Facilities to Secure Their Unitronics PLCs"

"CISA Urges Water Facilities to Secure Their Unitronics PLCs"

Following news that Iran-linked attackers had taken control of a Programmable Logic Controller (PLC) at a water system facility in Pennsylvania, a public alert was published by the Cybersecurity and Infrastructure Security Agency (CISA) urging other water authorities to secure their PLCs immediately. The cyber threat actors most likely gained access to the affected device, a Unitronics Vision Series PLC with a Human Machine Interface (HMI), by exploiting cybersecurity vulnerabilities such as poor password security and Internet exposure, according to CISA.

Submitted by Gregory Rigby on

"How a Teenage Saudi Hacker Went From Lockpicking to Ransomware"

"How a Teenage Saudi Hacker Went From Lockpicking to Ransomware"

Marco Liberale, a 13-year-old from Saudi Arabia, recently presented on navigating ransomware at the Black Hat Middle East and Africa conference. He taught himself lockpicking at the age of three, Python coding at the age of five, and malware writing shortly after. Liberale's presentation was praised, particularly by researcher and Boom Supersonic CISO Chris Roberts, who pointed out that Liberale demonstrated how to write, build, design, and launch ransomware. He also showed how to protect systems from being taken over by it.

Submitted by Gregory Rigby on

"Staples Confirms Cyberattack Behind Service Outages, Delivery Issues"

"Staples Confirms Cyberattack Behind Service Outages, Delivery Issues"

American office supply retailer Staples took down some of its systems on November 27th after a cyberattack to contain the breach's impact and protect customer data.  Staples operates 994 US and Canada stores and 40 fulfillment centers for nationwide product storage and dispatch.  The company noted that the response measures disrupted its business operations, specifically the backend processing and product delivery.

Submitted by Adam Ekwall on

"US Sanctions Cryptocurrency Mixer Sinbad for Aiding North Korean Hackers"

"US Sanctions Cryptocurrency Mixer Sinbad for Aiding North Korean Hackers"

The US Department of the Treasury recently announced sanctions against cryptocurrency mixer Sinbad for laundering stolen cryptocurrency for the North Korean state-sponsored hacking group Lazarus.  Sinbad, the Treasury says, is the preferred mixing service for Lazarus and is responsible for laundering millions of dollars in stolen cryptocurrency for the nation state threat actor.  Sinbad operates on the Bitcoin blockchain, and the mixer obfuscates illicit transactions' origin, destination, and counterparties.

Submitted by Adam Ekwall on

"Black Basta Ransomware Group Makes $100m Since 2022"

"Black Basta Ransomware Group Makes $100m Since 2022"

According to researchers at Corvus Insurance, a prolific Russian-speaking ransomware group has made over $100m from dozens of victims since April 2022.  The researchers used the Elliptic Investigator blockchain forensics tool to lift the lid on the Black Basta group.  The tool helped the researchers uncover patterns in the group’s online activities, which enabled them to trace a large number of Bitcoin ransoms with a high degree of certainty.  The researchers found that Black Basta has received at least $107m in ransom payments since early 2022 across more than 90 victims.

Submitted by Adam Ekwall on

"Thousands of Dollar Tree Staff Hit By Supplier Breach"

"Thousands of Dollar Tree Staff Hit By Supplier Breach"

A major data breach at IT provider Zeroed-In Technologies has impacted nearly two million end users, including thousands of Dollar Tree and Family Dollar employees.  The data breach affected 1,977,486 users on August 7-8, 2023.  Zeroed-In Technologies stated that the investigation determined that an unauthorized actor gained access to certain systems between August 7, 2023, and August 8, 2023.  The company found that the threat actor stole names, dates of birth, and Social Security numbers.

Submitted by Adam Ekwall on
Subscribe to