Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Scammers pretend to  ...

 Threats

Online fraud knows no bounds. Cybercriminals are adapting — not always successfully — their usual schemes for new countries. To wheedle out victims personal and banking data, they send e-mails purporting to be from, among others, online marketplaces, video streaming services and, of course, government agencies.   show more ...

Today we look at two separate scams in which cybercriminals impersonate financial regulators investigating, you guessed it, fraud. Under this pretext, they extract an array of personal information from their hapless victims. A German tragedy in two parts The first scam targets German residents. It starts with an e-mail in which an organization calling itself Finanzmarktaufsicht (the name suggests it has something to do with with financial regulation) states that Osnabrück police has supposedly arrested some criminals and confiscated their hard drives, which were found to contain citizens decrypted personal data — including the recipients. E-mail seemingly from German financial regulator Finanzmarktaufsicht The e-mail goes on to state that, given the large number of victims, Finanzmarktaufsicht suspects organized crime to be at work. Hinting that the recipient of the e-mail could be one of the victims, the scammers ask them to assist in the investigation. Nothing complicated is required for this: simply follow the link to fill out a special online form, or call the number given in the e-mail. The message itself resembles an official e-mail: it contains the the logo of the sender government agency, the actual address of a Berlin business center (home to several financial organizations, but none bearing the name Finanzmarktaufsicht), and contact details. At the end, the scammers have gone to the trouble of adding a perfectly genuine link to an article about a real investigation published on the website of one of Germanys most popular TV news shows. One of the links in the e-mail points to a real article about a financial fraud investigation on the genuine website of a popular German TV news show Although at first glance the e-mail comes across very well, upon closer inspection certain tell-tale signs can be found showing its bogus. First of all, the senders address is suspicious. It has nothing to do with the government agency that allegedly sent it. And the agency itself looks dubious: A quick search online reveals that Finanzmarktaufsicht is in fact an Austrian, not German, agency. The German equivalent goes by an even more officious-sounding name: Bundesanstalt für Finanzdienstleistungsaufsicht. A user who fails to spot the deception and clicks the link is taken to an online form on the website of the bogus Finanzmarktaufsicht. And to receive expert assistance, they need to enter the following details: Surname First name E-mail address Contact phone number Name of the organization they recently invested in Deposit date, amount and purpose of the investment Form for entering personal data on the fake Finanzmarktaufsicht site Further down the page the cybercriminals promise to help return the funds stolen by the scammers, for which reason they allegedly need information to prepare documents, including past correspondence, details of bank transactions, etc. Its most likely that later the victim will be asked for their bank card number (supposedly to reimburse the damage), be required to pay a bogus fee, or part with their money in some other way. The bogus Finanzmarktaufsicht site itself looks as though it belongs to a bona fide government agency. The user sees several menu sections, plus detailed information about the agency including its activities, history, opening hours, contact details, and a lot more besides. Even the logo of the Austrian government agency is there on display. However the e-mail address given there is wholly unlike the one from which the message came; it looks more like the real deal, and at least contains the abbreviated name of the agency. But its fake too, of course. As already mentioned, theres no organization with that name in Germany, so anyone could register such a .de domain name. Which is precisely what the scammers did. Information about the organization on the fake Finanzmarktaufsicht website Swiss letter The second scam focuses on Switzerland. This time, the e-mail reminds the recipient that back in 2015–2017 they supposedly invested in a company called SolidCFD. Too bad, since now its been closed down due to some illegal activity. And the recovery and resolution manager of the independent financial regulator wants to help return the investment. The pseudo-employee, alas, could not reach the recipient by phone, so the latter is asked to reply by e-mail to discuss the fate of their investment. In this instance, the cybercriminals have chosen a financial regulator that does exist in the target country. The e-mail makes reference to FINMA, an independent financial regulator operating in Switzerland. The company mentioned in the e-mail — SolidCFD — was also real, and did have a dubious reputation (but more in the UK than in Switzerland). As for a website, the attackers in this second scam dont even bother with one. Most likely theyre hoping theyll just get lucky and the user will agree to discuss their investments first by e-mail, then possibly by phone or messenger app. At that stage, employing various social engineering techniques, theyll be able to squeeze personal information, and likely money, out of the victim. How to protect yourself To avoid unpleasantness and the loss of personal data and/or money, we recommend as follows: Paying attention to the e-mail address of the sender. If it has nothing to do with the company it purportedly comes from, or consists of random letters and numbers, you can be sure its a scam. If the e-mail mentions a law, regulation, or high-profile case, do an online search for information about it. Cant find anything, or what you found doesnt match the content of the e-mail? Again, its no doubt fraudsters at work. To learn how to spot scams, read our post on ways to detect online scam. Even if youre confident in your abilities to unmask scammers, its better to play it safe just in case. With that in mind, use a reliable security solution that automatically recognizes danger and warns you when visiting a suspicious website.

image for Transatlantic Cable  ...

 News

Episode 275 of the Transatlantic Cable kicks off with a 26-year-old Ukrainian man awaiting extradition from the Netherlands to the United States on charges that he acted as a core developer for Raccoon malware. Then, bad news from Dropbox as it disclosed a security breach after threat actors stole 130 code   show more ...

repositories after gaining access to one of its GitHub accounts using employee credentials stolen in a phishing attack. Moving on, Liz Truss is on her fourth new mobile phone number since July as security services battle to protect her from being further compromised by foreign powers. We wrap up with a notorious Instagram influencer from Nigeria who has been jailed for more than 11 years in the U.S. for his role in an international fraud syndicate. If you liked what you heard, please consider subscribing. Accused Raccoon Malware Developer Fled Ukraine After Russian Invasion. Dropbox discloses breach after hacker stole 130 GitHub repositories Liz Truss is on her FOURTH new mobile phone number since July after she was allegedly hacked by Russian agents Hushpuppi: Notorious Nigerian fraudster jailed for 11 years in US

image for Lawsuit Seeks Food B ...

 A Little Sunshine

A nonprofit organization is suing the state of Massachusetts on behalf of thousands of low-income families who were collectively robbed of more than a $1 million in food assistance benefits by card skimming devices secretly installed at cash machines and grocery store checkout lanes across the state. Federal law bars   show more ...

states from replacing these benefits using federal funds, and a recent rash of skimming incidents nationwide has disproportionately affected those receiving food assistance via state-issued prepaid debit cards. The Massachusetts SNAP benefits card looks more like a library card than a payment card. On Nov. 4, The Massachusetts Law Reform Institute (MLRI) filed a class action lawsuit on behalf of low-income families whose Supplemental Nutrition and Assistance Program (SNAP) benefits were stolen from their accounts. The SNAP program serves over a million people in Massachusetts, and 41 million people nationally. “Over the past few months, thieves have stolen over a million SNAP dollars from thousands of Massachusetts families – putting their nutrition and economic stability at risk,” the MLRI said in a statement on the lawsuit. “The criminals attach a skimming device on a POS (point of sale) terminal to capture the household’s account information and PIN. The criminals then use that information to make a fake card and steal the SNAP benefits.” In announcing the lawsuit, the MRLI linked to a story KrebsOnSecurity published last month that examined how skimming thieves increasingly are targeting SNAP payment card holders nationwide. The story looked at how the vast majority of SNAP benefit cards issued by the states do not include the latest chip technology that makes it more difficult and expensive for thieves to clone them. The story also highlighted how SNAP cardholders usually have little recourse to recover any stolen funds — even in unlikely cases where the victim has gathered mountains of proof to show state and federal officials that the fraudulent withdrawals were not theirs. Deborah Harris is a staff attorney at the MLRI. Harris said the goal of the lawsuit is to force Massachusetts to reimburse SNAP skimming victims using state funds, and to convince The U.S. Department of Agriculture (USDA) — which funds the program that states draw from — to change its policies and allow states to replace stolen benefits with federal funds. “Ultimately we think it’s the USDA that needs to step up and tell states they have a duty to restore the stolen benefits, and that USDA will cover the cost at least until there is better security in place, such as chip cards,” Harris told KrebsOnSecurity. “The losses we’re talking about are relatively small in the scheme of total SNAP expenditures which are billions,” she said. “But if you are a family that can’t pay for food because you suddenly don’t have money in your account, it’s devastating for the family.” The USDA has not said it will help states restore the stolen funds. But on Oct. 31, 2022, the agency released guidance (PDF) whose primary instructions were included in an appendix titled, Card Security Options Available to Households. Notably, the USDA did not mention the idea of shifting to chip-based SNAP benefits cards. The recently issued USDA guidance. “The guidance generally continues to make households responsible for preventing the theft of their benefits as well as for suffering the loss when benefits are stolen through no fault of the household,” Harris said. “Many of the recommendations are not practical for households who don’t have a smartphone to receive text messages and aren’t able to change their PIN after each transaction and keep track of the new PIN.” Harris said three of the four recommendations are not currently available in Massachusetts, and they are very likely not currently available in other states. For example, she said, Massachusetts households do not have the option of freezing or locking their cards between transactions. Nor do they receive alerts about transactions. And they most certainly don’t have any way to block out-of-state transactions. “Perhaps these are options that [card] processors and states could provide, but they are not available now as far as we know,” Harris said. “Most likely they would take time to implement.” The Center for Law and Social Policy (CLASP) recently published Five Ways State Agencies Can Support EBT Users at Risk of Skimming. CLASP says while it is true states can’t use federal funds to replace benefits unless the loss was due to a “system error,” states could use their own funds. “Doing so will ensure families don’t have to go without food, gas money, or their rent for the month,” CLASP wrote. That would help address the symptoms of card skimming, but not a root cause. Hardly anyone is suggesting the obvious, which is to equip SNAP benefit cards with the same security technology afforded to practically everyone else participating in the U.S. banking system. There are several reasons most state-issued SNAP benefit cards do not include chips. For starters, nobody says they have to. Also, it’s a fair bit more expensive to produce chip cards versus plain old magnetic stripe cards, and many state assistance programs are chronically under-funded. Finally, there is no vocal (or at least well-heeled) constituency advocating for change. A copy of the class action complaint filed by the MLRI is available here.

 Identity Theft, Fraud, Scams

A new malicious campaign has been abusing Microsoft Dynamics 365 customer voice to send phishing links and pilfer credentials from the victims, warned Avanan. Hackers are using the Static Expressway technique to leverage legitimate sites to get past security scanners. Ideally, organizations cannot afford to block   show more ...

genuine websites such as Microsoft Dynamics, and therefore such attacks provide a better avenue for hackers to pentrate the target network.

 Malware and Vulnerabilities

Experts observed attack campaigns against banking customers. One of the phishing campaigns includes five banking malware families against Indian customers. Meanwhile, Vultur is another banking trojan that has attained 100,000 downloads on the Google Play Store. One common thing among these attacks is that the malware developers are aggressive in developing more capabilities and adding evasion techniques. 

 Trends, Reports, Analysis

To properly protect data, security teams need to know where it is and who can access it. If sensitive files, archives, and analytics are spread across different cloud platforms, visibility can be nearly impossible.

 Trends, Reports, Analysis

Not surprisingly, ransomware attacks remain a serious threat to organizations, as there are currently 17 leaked databases operated by threat actors who are leveraging the data for attacks on third-party companies.

 Govt., Critical Infrastructure

No instances of digital interference are known to have affected the counting of the midterm vote after a tense Election Day in which officials were closely monitoring domestic and foreign threats.

 Breaches and Incidents

Several Mississippi state websites were knocked offline during Tuesday’s midterm election in what was the most significant digital disruption of the day, though a federal official warned that more could be on the way as ballots are counted.

 Malware and Vulnerabilities

The threat ecosystem of Conti is growing stronger day by day. And, it can be evidenced by the recent findings about how it is drifting away from U.S. targets to target NATO-affiliated countries in Europe. Conti is forming new allies, developing new tools and techniques, and actively hacking critical organizations. 

 Malware and Vulnerabilities

Threat actors are using a malicious Android installation package and the Spymax RAT variant to target Indian defense personnel. The RAT imitates the Adobe Reader app. The campaign has been going on for more than a year and researchers have still not been able to attribute it to any threat actor. Thus, indicating that this elusive campaign is conducted by a pretty advanced nation state threat actor. 

 Malware and Vulnerabilities

The high-risk vulnerability (tracked CVE-2022-0902) has a CVSS v3 of 8.1 and affected several ABB G5 products. It has been discovered by security experts at Team82, Claroty’s research arm.

 Feed

PC maker Lenovo has addressed yet another set of three shortcomings in the Unified Extensible Firmware Interface (UEFI) firmware affecting several Yoga, IdeaPad, and ThinkBook devices. "The vulnerabilities allow disabling UEFI Secure Boot or restoring factory default Secure Boot databases (incl. dbx): all simply from an OS," Slovak cybersecurity firm ESET explained in a series of tweets. UEFI

 Feed

Cybersecurity researchers have disclosed details of a new vulnerability in a system used across oil and gas organizations that could be exploited by an attacker to inject and execute arbitrary code. The vulnerability, tracked as CVE-2022-0902 (CVSS score: 8.1), is a path-traversal vulnerability in ABB Totalflow flow computers and remote controllers. "Attackers can exploit this flaw to gain root

 Feed

The rise in the costs of data breaches, ransomware, and other cyber attacks leads to rising cyber insurance premiums and more limited cyber insurance coverage. This cyber insurance situation increases risks for organizations struggling to find coverage or facing steep increases. Some Akin Gump Strauss Hauer & Feld LLP's law firm clients, for example, reported a three-fold increase in insurance

 Feed

A malicious package discovered on the Python Package Index (PyPI) has been found employing a steganographic trick to conceal malicious code within image files. The package in question, named "apicolor," was uploaded to the Python third-party repository on October 31, 2022, and described as a "Core lib for REST API," according to Israeli cybersecurity firm Check Point. It has since been taken

 Feed

Cybersecurity Awareness Month has been going on since 2004. This year, Cybersecurity Awareness Month urged the public, professionals, and industry partners to "see themselves in cyber" in the following ways:  The public, by taking action to stay safe online. Professionals, by joining the cyber workforce. Cyber industry partners, as part of the cybersecurity solution. CISA outlined four "things

 Feed

Citrix has released security updates to address a critical authentication bypass flaw in the application delivery controller (ADC) and Gateway products that could be exploited to take control of affected systems. Successful exploitation of the issues could enable an adversary to gain authorized access, perform remote desktop takeover, and even circumvent defenses against login brute-force

 Feed

Cybersecurity researchers are warning of "massive phishing campaigns" that distribute five different malware targeting banking users in India. "The bank customers targeted include account subscribers of seven banks, including some of the most well-known banks located in the country and potentially affecting millions of customers," Trend Micro said in a report published this week. Some of the

 Feed

Google has resolved a high-severity security issue affecting all Pixel smartphones that could be trivially exploited to unlock the devices. The vulnerability, tracked as CVE-2022-20465 and reported by security researcher David Schütz in June 2022, was remediated as part of the search giant's monthly Android update for November 2022. "The issue allowed an attacker with physical access to bypass

 Business email compromise

Graham offers some security and privacy advice for those exodusing Twitter to Mastodon, and Carole slams the door shut on a notorious scammer with a huge Instagram following. All this and more is discussed in the latest edition of the award-winning "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault.

 Guest blog

PC manufacturer Lenovo has been forced to push out a security update to more than two dozen of its laptop models, following the discovery of high severity vulnerabilities that could be exploited by malicious hackers. Security researchers at ESET discovered flaws in 25 of its laptop models - including IdeaPads, Slims,   show more ...

and ThinkBooks - that could be used to disable the UEFI Secure Boot process. Read more in my article on the Tripwire State of Security blog.

2022-11
Aggregator history
Thursday, November 10
TUE
WED
THU
FRI
SAT
SUN
MON
NovemberDecemberJanuary