Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for US Election Systems  ...

 Security

According to a study released Wednesday, election systems in the United States are vulnerable to cyber intrusions like the one that hit federal agencies and various businesses last year. After those attacks, the previously mentioned institutions remain a target for international hacking.  The Center for Internet   show more ...

Security, a non-profit that collaborates with the federal government on election security measures, released a study that focuses on how hardware and software components can serve as hacking entry points.  Aaron Wilson, a co-author of the report said that “We have to continue to get better." He also stated that “We have to improve our defenses, as those that are on the other side are likely honing their attack strategy, as well.”  A group of government cybersecurity experts along with state and local election officials declared the ... (read more)

image for Twitter’s New Tip  ...

 Security

Twitter recently introduced a new feature that allows users to tip one another. This feature, dubbed ‘Tip Jar,' allows users to submit a tip to each others, including journalists, security professionals, developers, and others. However, Twitter users' privacy is jeopardized by this exciting new Tip Jar   show more ...

feature.  Tip Jar is the newest addition to Twitter. The new feature allows you to submit tips to other Twitter users directly through PayPal.  According to their blog post, the feature allows users to tip someone they admire. On a user's Twitter profile, the Tip Jar icon will appear next to the "Follow" button. By clicking this icon, the other user can select an appropriate payment service to submit money.  Twitter currently allows support for PayPal, Venmo, Patreon, Bandcamp, and Cash App for this feature. Android users, on the other hand, have an additional o... (read more)

image for Hacked Fuel Pipe Shu ...

 Security

Tokyo (Reuters) stated that “Crude prices rose on Monday after a major cyberattack forced the shutdown of critical fuel supply pipelines in the United States and highlighted the fragility of its oil infrastructure.”  Brent crude was up 76 cents, or 1.1%, at $69.04 a barrel at 0039 GMT, after rising l.5% last week.   show more ...

After gaining more than 2% last week, U.S. West Texas Intermediate futures gained 70 cents, or 1.1%, to $65.60 a barrel.  The White House is currently working with Colonial Pipeline to help it recover from the cyberattack that forced the largest U.S. fuel pipeline operator to shut down a network supplying populated Eastern states, signaling the gravity of the situation.  Colonial's network ensures about half of the fuel supply on the U.S. East Coast, carrying 2.5 million barrels of gasoline and other fuels every day. The identity of the attackers is still unknown

image for Apple AirTag Hacked  ...

 Security

A security researcher discovered that Apple's AirTag can be hacked, and thus its software modified. Using a microcontroller, he unraveled elements that can be reprogrammed to alter basic functions.  Apple is known for using high standards of protection in its devices, so the latest AirTags have inevitably become   show more ...

a priority for security researchers. Released a week ago, the devices appear to have some critical vulnerabilities. German security researcher "Stack Smashing" stated on Twitter that he was able to "break into the microcontroller" of the AirTag. The tweet thread, which was first published by The 8-Bit on Saturday, contains some information about the researcher's investigation of the unit.  Yet hacking AirTag is not as easy as you might think The researcher demonstrated t... (read more)

image for COVID-related Cyberc ...

 Security

More scams were taken down by the UK's cybersecurity agency in the last year compared to the previous three years combined. Coronavirus swindles are fueling the increase.  According to the National Cyber Security Centre (NCSC), experts saw a 15-fold increase in the removal of online campaigns in 2020 compared to   show more ...

the previous year.  People's personal information has been fraudulently harvested using the official Covid-19 vaccine rollout both through email and text messages.The result is an increase of phishing attacks that feature the NHS branding to fool victims. In addition, 43 fake NHS Covid-19 apps that were hosted outside of official app stores were removed.  Dr Ian Levy, the technical director of the NCSC told reporters that the big increase in Covid-19-related scams, fake vaccine shops, fake PPE shops show that criminals have no bounds on what they will abuse and the f... (read more)

image for Biden Plans to Stren ...

 Security

After yet another ransomware attack, the pipeline that supplies nearly half of the East Coast's gasoline and jet fuel, remained shut down on Sunday. The event led to emergency meetings in the White House and fresh concerns about whether President Biden's executive order improving cybersecurity for federal   show more ...

agencies and contractors goes far enough.  The order is a new road map for the nation's cyberdefense. Drafts circulated among government officials and corporate executives for weeks and summaries were obtained by The New York Times.  The sources claim the order provides a set of digital security guidelines for federal agencies and contractors that design software for the government. The guidelines include m... (read more)

image for Fintech Startup Offe ...

 A Little Sunshine

How much is your payroll data worth? Probably a lot more than you think. One financial startup that’s targeting the gig worker market is offering up to $500 to anyone willing to hand over the payroll account username and password given to them by their employer, plus a regular payment for each month afterwards   show more ...

in which those credentials still work. This ad, from workplaceunited[.]com, promised up to $500 for people who provided their payroll passwords, plus $25 a month for each month those credentials kept working. New York-based Argyle.com says it’s building a platform where people who work multiple jobs and/or side hustles can improve their credit and employment options by pooling all of their gig work data in one place. “Consumers’ access to financial security and upward mobility is dependent on their access to and control over their own employment records and how easily they can share those records with financial institutions,” Argyle explained in a May 3 blog post. “We enable access to a dataset that, for too long, has gone unstandardized, unregulated, and controlled by corporations instead of consumers, contributing to system-wide inequalities.” Argyle’s app flow. Image: Argyle.com. In that sense, Argyle is making a play for a discrete chunk of a much larger employment data market dominated by the major credit bureaus, which have been hoovering up and selling access to employment data for years. The 800-lb. gorilla there is Equifax, whose The Work Number product has for years purchased employment data flows from some of the world’s largest companies (employees consent to this sharing as part of their employment contract, and The Work Number makes it fairly easy for anyone to learn how much you earn). The Work Number is designed to provide automated employment and income verification for prospective employers, and tens of thousands of companies report employee salary data to it. It also allows anyone whose employer uses the service to provide proof of their income when purchasing a home or applying for a loan. On its blog, Argyle imagines a world in which companies choose to integrate its application platform interface (API) and share their employee payroll data. At the same time, the company appears to be part of an effort in which non-salaried workers are prompted to repay their erstwhile employers’ trust by selling payroll credentials. If Argyle is worried these two goals might somehow conflict, that is not obvious by looking at some of its direct-to-consumer efforts. The website pictured below prompts visitors to “connect payroll,” and those who proceed agree to have their payroll data shared with a company called Earnin, a mobile payday loan app that lets users get an advance on their upcoming paycheck. Clicking “Connect Payroll” brings up a list of payroll login pages for brand name companies, including Walmart, Starbucks, Amazon, Uber, Chipotle, etc., with a search feature that reveals login pages for everyone from the Federal Bureau of Investigation (FBI) to the Federal Reserve and Federal Trade Commission (FTC). The default Argyle list of payroll login pages for major companies. Here’s what comes up when you search by “Department of” at this site: Drilling down into individual companies listed here produces a username and password form that in some cases is modified to request an employee identifier other than a username, such as a employee ID, associate or partner number instead. Here’s the login page for Starbucks employees: The site pictured above actively checks if any submitted credentials are working, by submitting them directly to the employer in question. This Argyle status page indicates the system’s “data connection status” to countless employers. Some of you may be thinking, “How many of us actually know or have our payroll passwords?” According to Argyle, plenty of people do. “At Argyle, we are intimately familiar with how likely someone is to know the password for their employment account or payroll system, because we’ve seen hundreds of thousands of users successfully (and unsuccessfully) provide their credentials,” Argyle’s Billy Mardsen wrote on Apr. 1. “We closely monitor their success rate—what we call conversion—because it drives the performance of the products and applications that our clients build on top of Argyle.” Argyle’s “conversion” numbers by employer. Image: Argyle.com UNCOMMON GROUNDS KrebsOnSecurity first heard about this company via Twitter from security researcher Kevin Beaumont, who pointed to a nest of domains associated with Argyle’s API — nearly all of which are offline now. At the time, Beaumont and others digging into this suspected the sites were part of an elaborate phishing scam. These sites, which seemed to be grouped around a recent recruitment effort variously called “Workers United,” “UniteAtWork,” “WageCompete” and “CommonGrounds,” indicate that Argyle’s platform has been pivotal in a slew of campaigns paying employees at specific companies up to $100 for their payroll account passwords. Here’s one seeking T-Mobile employees: A promotion offering T-Mobile employees $100 to give up their T-Mobile payroll account passwords. Another recent promotion targeted employees at J.P. Morgan Chase, the largest financial institution in the United States: Argyle declined multiple interview requests for this story, so it’s not clear how much of a role — if any — the company may have played in these various sites. But code prebuilds and instructions published in the company’s name on Github strongly suggest Argyle was instrumental in the WageCompete initiative. Also, this page over at Scopeinc.com says the WageCompete program is provided by Argyle Expert Services. Here’s a graphical look at the various websites mentioned here and their ties to Argyle’s API (click to enlarge): The network of sites paying people for payroll passwords and their connections to Argyle’s API. Click to enlarge. Image: Virustotal One of the sites in that graphic above that’s connected to Argyle’s API — workerresearchalliances[.]com — is currently live and includes the same verbiage about participants getting paid for their payroll credentials. The terms and conditions of the “WorkersApp beta program” were set by a company called Workers Research Alliances LLC, incorporated in February. The address for Workers Research Alliances is just a few blocks from Argyle’s office in New York City. ‘WE DO THINGS OTHERS DARE NOT DO’ Steve Friedl, an IT consultant in the payroll service bureau industry, said it appears Argyle has been paying people to help them refine their API and data scraping technology. “They are not paying this money just to be able to sell people services, they are doing so to maintain their screen-scraping software API,” Friedl said. “This is essentially paying employees to help Argyle hack their payroll provider.” Last fall Argyle announced it had landed a $20 million investment from Bain Capital, among others. The company’s co-founder, Shmulik Fishman, is described as a “disruptor” who says he wants to make credit scores obsolete. “We’re fearless,” Fishman told Authority Magazine. “We do things other people dare not do.” That much is clear. Hey, I can get behind almost anything that disintermediates the creaky old credit bureaus in a straightforward and consumer-friendly way. And the last time I checked, it’s not against the law to give someone your password, or to induce someone to do so willingly in exchange for something else (unless maybe you work for a federal agency). But I wonder how many of the companies listed on all these payroll connect sites will respond to knowing their brands and logos are associated with a site that asks their employees to give away passwords. KrebsOnSecurity contacted multiple high-level sources at major companies whose login pages are shown in these payroll connect programs running on Argyle’s platform. None of those sources were authorized to talk to the media, but all seemed fairly horrified at what they were seeing, and each said their employer’s legal departments were launching their own investigations. Beaumont said he’s worried that in some companies, an employee’s payroll credentials may work to gain access to other parts of the organization — meaning some employees may be giving away more than they realize. “My concern is some companies use single sign-on for payroll,” Beaumont said. “That’s a lot of access for a data harvesting company.”

 Trends, Reports, Analysis

More scams were taken down by the UK's cybersecurity agency in the last year compared to the previous three years combined. Coronavirus swindles are fueling the increase.

 Breaches and Incidents

The city of Tulsa, Oklahoma, one of the largest cities in the US, has been hit by a ransomware attack over the weekend that affected the city government’s network and brought down official websites.

 Incident Response, Learnings

The FBI has confirmed that the criminal ransomware gang DarkSide is responsible for the cyberattack on the Colonial Pipeline network. The FBI also said that it was continuing its investigations into the hack that disrupted a major pipeline company.

 Malware and Vulnerabilities

Iranian hackers recently compromised the networks of H&M Israel and other Israeli firms. It has threatened to leak 110GB of customer data if the ransom requirement of 3BTC isn’t met. N3TW0RM has not been attributed to any group at present.

 Feed

Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference. This is the current stable release.

 Feed

testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws, and much more. It is written in (pure) bash, makes only use of standard Unix utilities, openssl and last but not least bash sockets.

 Feed

Ubuntu Security Notice 4939-1 - A large number of security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution.

 Feed

Ubuntu Security Notice 4940-1 - It was discovered that PyYAML incorrectly handled untrusted YAML files with the FullLoader loader. A remote attacker could possibly use this issue to execute arbitrary code.

 Feed

Four Eastern European nationals face 20 years in prison for Racketeer Influenced Corrupt Organization (RICO) charges after pleading guilty to providing bulletproof hosting services between 2008 and 2015, which were used by cybercriminals to distribute malware to financial entities across the U.S. The individuals, Aleksandr Grichishkin, 34, and Andrei Skvortsov, 34, of Russia; Aleksandr

 Feed

An unknown threat actor managed to control more than 27% of the entire Tor network exit capacity in early February 2021, a new study on the dark web infrastructure revealed. "The entity attacking Tor users is actively exploiting tor users since over a year and expanded the scale of their attacks to a new record level," an independent security researcher who goes by the name nusenu said in a

 Feed

For as long as corporate IT has been in existence, users have been required to change their passwords periodically. In fact, the need for scheduled password changes may be one of the most long-standing of all IT best practices. Recently, however, things have started to change. Microsoft has reversed course on the best practices that it has had in place for decades and no longer recommends that

 Guest blog

Tulsa, Oklahoma, is reportedly the latest in a long line of American cities to have fallen victim to a ransomware attack. The attack, which occurred on Friday evening, caused the city's IT security teams to shut down many of Tula's internal systems over the weekend "out of an abundance of caution"   show more ...

while they worked around the clock at the weekend in an attempt to restore operations from backups. Read more in my article on the Hot for Security blog.

 Application Security

Application security has become a complex, distributed problem.  During the days of waterfall development and monolithic applications, application security was pretty straight forward – statically scan your source code, dynamically test your business logic, and deploy a web application firewall to protect layer 7   show more ...

traffic.  But with agile development, DevOps processes, and containerized applications, application […] The post Delivering on the Promise of Application Security in the Cloud appeared first on Security Weekly.

2021-05
SAT
SUN
MON
TUE
WED
THU
FRI
MayJuneJuly