Episode 282 kicks off with new research from Which? Showing that smart technology might not be as smart as weve been led to believe – their research shows that most devices stop receiving updates from 2 years, even thought the device has a suggested life of 10 – it seems more work needs to be done. From there show more ...
the team look at two stories around A.I, the first on the media sensation, ChatGPT and how some people are looking to use it for malware creation, and the second looking at a chat A.I program that has become (and Ill quote from the article here) too horny. In the middle of all this, I sat down with Evgeny Goncharov, head of ICS CERT at Kaspersky to talk to him about upcoming ICS APT predictions for 2023. Following that, the team discuss news that Norton LifeLocker password manager has been breached, those affected are being urged to update and change their passwords as quickly as possible. If you liked what you heard, please do consider subscribing. ICS cyberthreats in 2023 – what to expect ICS cyberthreats in 2023 – what to expect Securelist report Smart appliances could stop working after two years, says Which? Armed With ChatGPT, Cybercriminals Build Malware And Plot Fake Girl Bots Replika Users Say the Chatbot Has Gotten Way Too Horny NortonLifeLock warns that hackers breached Password Manager accounts
Telegrams developers position their product as safe and protected. But in practice thats not entirely true: the reality is that Telegram has a number of quirks that make protecting your messages a little tricky, and its got nothing to do with the complexities of cryptography, but with much more prosaic stuff. Lets show more ...
take a look at some rather dubious features in both the messengers interface and general logic that make it less secure than is commonly believed. Shades of secure messaging To start with, lets figure out how a secure messenger works. The first thing to realize is that almost all modern messengers long ago switched to encrypted data exchange between user devices and servers. Thats the absolute minimum that any messenger should provide. However, thats not enough to consider a system secure, since it does not guarantee total message security. Heres why: if not only messaging participants but also the service has access to chats, then that creates additional risks. For example, the owners of the service themselves may turn out to be overly curious or greedy. Or, even if we assume theyre honest to the core and have no desire to stick their noses into users data, wheres the guarantee that, if the service is one day sold, the next owners would be as honest? And then of course the service could get hacked, in which case the hackers themselves would gain access to correspondence. However, theres a very effective way to avoid all these dangers and answer the question of whether the service can be trusted once and for all: end-to-end encryption. This ensures that information is encrypted on the senders device and decrypted only on the recipients device. As such, the service sends back and forth only encrypted messages and does not have access to the content. This automatically protects correspondence from nosy owners (current or future) and from the other troubles that might occur. So, we arrive at a very simple formula: a secure messenger is one that uses end-to-end encryption. Now lets see how Telegram handles all this. 1. Not all Telegram chats are equally secure Lets go straight to the root of the problem: Telegram is a unique messenger with two types of chats: regular and secret. Regular chats are not end-to-end encrypted. Only secret ones are. No other messenger does this: even the notorious WhatsApp, part of Mark Zuckerbergs data-hungry empire, uses end-to-end encryption by default. The user doesnt need to do anything at all, there are no special checkboxes or anything: messages are protected from all outsiders (including the service owners) right out of the box. As for messengers that explicitly position themselves as secure and protected, no one at Signal or Threema would ever think of having two types of correspondence: one end-to-end encrypted, one not. Why bother if you can make all chats equally safe without discombobulating the user? But Telegram is one of a kind. 2. About those defaults By default, Telegram chats do not use end-to-end encryption, and nor does the messenger inform users about the secure chat option. Who could have thought that a user who just installed a messenger precisely because it was advertised as secure wanted to keep correspondence private? Answers on a postcard, please. The upshot is that when a user creates a new chat, Telegram neither offers to secure it nor even hints at the existence of an option other than the default chat. Im willing to bet there are thousands, if not millions, of folks who entrust important secrets to Telegram chats in the full confidence that theyre securely protected by default, yet use regular chats with no end-to-end encryption. Whats especially interesting is that the secret chat button is hidden as deep as possible. Its not in the chat interface itself. Its not available at the next level either: even if you tap the name of your chat partner and go to their profile, you wont find the coveted button there. You need to dig a bit deeper: tap the three dots menu, rummage around in the secondary features, and there it is — the secret chat option with end-to-end encryption. 3. Why all the secrecy anyway? Another complaint arises regarding the name Telegram has given to its end-to-end encrypted chats. The developers could have called them something neutral like secure, protected, or private. But no: they went for secret — and this word has a very interesting effect on peoples perception. Many a time, after creating a secret chat in Telegram, I receive a sarcastic quip from the other end something like: Wow James – For My Eyes Only, eh?!? Others apprehensively enquire as to what could possibly be so important – or naughty or something else – for its needing to be secret. Sure, its doesnt happen every time: some people dont make such comments – or stop making them after a few times. But the fact remains that when you switch to Secret Chat mode, it provokes a certain emotional reaction. You immediately feel like a spy, or a hardcore gossip-monger, or part of some other cloak-and-dagger operation. This simple and seemingly innocuous word triggers a very biased response in peoples mind. And, I want to emphasize that it happens for no objective reason at all. When you start a chat on WhatsApp or Signal, no one ever asks or cares why youre using end-to-end encryption. Thats because all WhatsApp and Signal chats use it without asking! In Telegram, however, the natural desire to protect a chat turns into a part of the chat itself, making participants feel at least uncomfortable, if not downright idiotic. 4. Missing bells and whistles The situation is further complicated by the fact that secret chats lack some features available in regular, unencrypted chats. And although the list isnt long — no emoji reactions or pinned messages — their absence may well put some people off using secure chats. And thats understandable: the lack of total privacy feels abstract, while the discomfort of not being able to give a thumbs-up is more concrete. Again, theres no objective reason for this. In WhatsApp, emoji reactions work perfectly — end-to-end encryption doesnt interfere in the slightest. I can only surmise that secret chats have long become such a fringe concern for Telegrams developers that the implementation of new features in them gets kicked not into the long grass but off the cliff. 5. Twos company, threes a crowd Lets say you manage to persuade your fellow chatters that theres nothing strange about Secret Chat mode and its worth losing a couple of features for the sake of privacy. That in itself is no small achievement — and not everyone can pull it off. But dont get too comfortable just yet: sooner or later therell come a moment when you need to discuss something as a group. And naturally you want to do it in a secure chat. Here Telegram has another surprise for you: it isnt possible. Telegram group chats cannot be end-to-end encrypted. Period. Theres no such option. To talk in a group of three or more, you have to either sacrifice security or drag everyone into a secure chat in another messenger. If your chat partners are used to Telegram, the first scenario is the most likely outcome since it takes only one stubborn person to ruin the effort. Admittedly, from a technical point of view, implementing end-to-end encryption of group chats is no easy task. That said, the aforementioned WhatsApp, Signal, and Threema all provide end-to-end encryption of group chats by default the same way as for dialogs. The problem has even been solved for video conferencing. 6. More isnt always better Theres one other thing in Telegram that makes the lives of its users harder: the ability to create as many secret chats with the same person as you like. Its clear why this is so: encrypted chats are tied to an encryption key thats stored on the device and cannot be transmitted anywhere. Evidently, Telegrams developers wanted to make it possible to use the messenger on several devices simultaneously. Hence the multiplicity of encrypted dialogs: for each new device you need to create a new secret chat (although WhatsApp somehow managed to solve this problem without multiplying chats). And since such an option exists anyway, why stop there? Lets allow users to spawn as many secret chats as they wish (on top of regular ones). I admit that in some exotic circumstances it may be useful to have several separate chats with the same person. But in most cases its highly inconvenient and adds unnecessary confusion. Its especially challenging to try to recall on which device and in which chats someone sent you a phone number or other information (link, e-mail, account number, address) thats needed right now. For some, this confusion is a convincing argument against the use of Secret Chat mode. 7. Another take please? Regular, non-encrypted chats are stored on Telegrams servers and automatically appear on all devices after you sign in to the messenger. As mentioned above, this is not the case with encrypted secret chats: these remain on the device. What should you do if you bought a new phone and want to migrate all your data to it, including encrypted Telegram dialogs? Theres nothing to do: Telegram doesnt let you transfer secret chats to a new device. There are folk remedy solutions for Android, but theyre neither simple nor safe to use. And for iPhone users such dubious methods dont exist at all. So, if you do switch to a new phone, all Telegram messages in secret chats will be lost forever. A couple more nuances: first, youd have to set up all your secret chats again, remembering whom you chatted with on your old device. Second, youd need to explain to all of your contacts that you have a new phone and that they need to write to a new chat because you no longer have access to the old chats. Dont think that Telegram will do it for you. Your friends will still have the old chats on their devices. Theyll even be able to send something in them, but you wont ever see it. No secrets To sum up, although in theory its possible to communicate securely in Telegram through secret chats, in practice things arent so straightforward. Since most folks always prefer the path of least resistance, they end up using regular chats without end-to-end encryption. Many probably dont even realize theyre using an unprotected channel. But even if they do, they most likely dont see the point of suffering for the sake of privacy, and treat attempts toward secure communication with skepticism. One more time: protecting all your Telegram communication is no easy task. It requires plenty of effort on your part and with no guarantee of success. And even if, through blood, sweat, and tears, you do manage to make your dialogs secret, your group chats will remain unencrypted no matter what.
The "BoldMove" backdoor demonstrates a high level of knowledge of FortiOS, according to Mandiant researchers, who said the attacker appears to be based out of China.
There's a fine line between a hacker and an attacker, but it pays to be proactive. Consider tests by ethical hackers, a red team, or pen testers, and then bolster your company's defenses against malicious attacks.
The bug is described as an OS command injection vulnerability that allows remote attackers to execute commands via shell metacharacters in the login parameter. The vulnerability has a CVSS score of 9.8/10 and is considered trivial to exploit.
Abacus Group acquired two boutique cybersecurity consulting companies, Gotham Security and its parent company, GoVanguard, both of which have unparalleled track records of excellence in the cyber arena.
Vendors and agencies are actively bypassing the security patch that Adobe released in February 2022 to address CVE-2022-24086, a critical mail template vulnerability in Adobe Commerce and Magento stores, ecommerce security firm Sansec warns.
In essence, Payzero is a fraudulent scheme where the attackers typically pay nothing to the victim for their digital assets and simply trick them into allowing the transfer of token ownership.
The lack of the most basic security precaution is especially alarming in critical infrastructure. These organizations operate chemical plants, pipelines, utilities, hospitals, and other industries that support essential functions of daily life.
CERT-U says the cyberattack was likely carried out by the Sandworm group based on the threat actors' tactics, which was previously linked to the Main Directorate of the General Staff of the Armed Forces of the Russian Federation (GRU).
Federal authorities on Wednesday arrested the founder of Bitzlato, a cryptocurrency exchange they said has been a financial haven for Russia-aligned criminals engaged in ransomware and illicit drug sales on the dark web.
Group-IB Hi-Tech Crime Trends 2022/2023 report found that the number of instances of corporate access being sold on the dark web by Initial Access Brokers (IABs) has doubled in the past year. IABs primarily targeted U.S. companies, with manufacturing (5.8%), financial services (5.1%), real estate (4.6%), and education (4.2%) sectors being the most affected.
Email marketing and newsletter giant Mailchimp says it was hacked and that dozens of customers’ data was exposed. It’s the second time the company was hacked in the past six months.
Forter acquires Immue to not only strengthen the company’s existing fraud management capabilities but add Immue’s domain-specific bot expertise to Forter’s fraud prevention solution stack.
Once the initial IcedID infection is done, an interactive command line session is started, which downloads additional files on the infected system. Seven minutes after the initial infection, a Cobalt Strike beacon is used on the infected computer.
Two new investors, Link Ventures and Harel Insurance & Finance, took a significant part in the round and were joined by existing nsKnox investors, including M12 – Microsoft’s Venture Fund, Viola Ventures, and Alon Cohen, the company’s CEO.
Hackers are setting up fake websites for popular free and open-source software, including 7-Zip, Blender 3D, Capcut, CCleaner, Notepad++, OBS, Rufus, VirtualBox, VLC Media Player, WinRAR, and Putty, to promote malicious downloads through Google ads.
A web-based Git repository manager, Kudu is the engine behind several Azure App Service features, supporting the deployment and management of code in Azure. The service is used by Functions, App Service, Logic Apps, and other Azure services.
The Solaris marketplace emerged a few months ago, following the seizure of Hydra, attempting to capture a portion of the then-disturbed market. The new marketplace quickly captured about 25% of the market and processed roughly $150M in illegal sales.
Proprietors of these so-called “booter” or “stresser” services — designed to knock websites and users offline — have long operated in a legally murky area of cybercrime law.
Cisco on Wednesday announced patches for a high-severity SQL injection vulnerability in Unified Communications Manager (CM) and Unified Communications Manager Session Management Edition (CM SME).
In 2022, there were about 2,800 known new ransomware victims, based on successful attacks that came to light publicly, including via ransomware groups listing victims on their dedicated data leak sites, reports threat intelligence firm Kela.
One of the many spectacular tricks ChatGPT has been able to pull off is writing highly advanced malware that actually contains no malicious code at all, making it difficult to detect and mitigate, researchers at CyberArk explained.
BackdoorDiplomacy is continuously evolving its TTPs during cyberespionage campaigns. Unit 42 spotted the new campaign by the group that targeted Iranian government entities between July and December 2022. Historically, it has targeted government and diplomatic entities in the Middle East and Africa, as well as in the U.S.
Trevor Osagie, a 31-year-old man from the Bronx, admitted to playing a key role in the operation of a credit card conspiracy group that caused over $1,500,000 in damages to 4,000 account holders.
Roaming Mantis (aka Shaoye) is well-known campaign that uses malicious APK files to control infected Android devices and steal device information; it also uses phishing pages to steal user credentials, with a strong financial motivation.
Social media giant Meta has been fined an additional 5.5 million euros ($5.9 million) for violating EU data protection regulations with its instant messaging platform WhatsApp, Ireland's regulator announced Thursday.
PayPal explains that the credential stuffing attack occurred between December 6 and December 8, 2022. The company detected and mitigated it at the time but also started an internal investigation to find out how the hackers obtained access.
Trend Micro laid bare details of Batloader malware in a report that has anti-sandboxing capabilities and can fingerprint hosts for legitimacy. The modular malware abuses legitimate tools such as NirCmd.exe and Nsudo.exe to escalate privileges. First observed in the last quarter of 2022, it was found dropping several show more ...
malware payloads, including Ursnif, RedLine Stealer, Vidar, Bumbleloader, ZLoader, Cobalt Strike, and SmokeLoader.
In the ransomware section of its 2023 crypto crime report, Chainalysis found that ransomware attackers extorted $456.8m from victims in 2022. This represents a significant drop from $765.6m in 2021 and $765m in 2020.
A recent study has shown that it is possible to identify relationships between different threat actors by analyzing the metadata of malicious LNK files, uncovering information such as the specific tools and techniques used by different groups.
Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.
Ubuntu Security Notice 5812-1 - It was discovered that urllib3 incorrectly handled certain characters in URLs. A remote attacker could possibly use this issue to cause urllib3 to consume resources, leading to a denial of service.
Ubuntu Security Notice 5811-2 - USN-5811-1 fixed a vulnerability in Sudo. This update provides the corresponding update for Ubuntu 16.04 ESM. Matthieu Barjole and Victor Cutillas discovered that Sudo incorrectly handled user-specified editors when using the sudoedit command. A local attacker that has permission to use the sudoedit command could possibly use this issue to edit arbitrary files.
Debian Linux Security Advisory 5322-1 - Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code, information disclosure or spoofing.
Ubuntu Security Notice 5811-1 - Matthieu Barjole and Victor Cutillas discovered that Sudo incorrectly handled user-specified editors when using the sudoedit command. A local attacker that has permission to use the sudoedit command could possibly use this issue to edit arbitrary files. It was discovered that the show more ...
Protobuf-c library, used by Sudo, incorrectly handled certain arithmetic shifts. An attacker could possibly use this issue to cause Sudo to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS.
Open architecture, non-standalone roaming, nation-state attacks, ransomware, and the need for more industry collaboration are among the major 5G security challenges that operators must address in the year ahead.
New program enables students and early career professionals to learn critical skills required in today's entry-level cybersecurity field, helping address urgent cyber workforce jobs gap.
Research shows that over 50% of organizations performing software development struggle with fully integrating security into their software development lifecycle.
Traditional compliance and IAM are insufficient to secure the modern enterprise. We must shift left with modern access controls to avoid costly data breaches.
Popular email marketing and newsletter service Mailchimp has disclosed yet another security breach that enabled threat actors to access an internal support and account admin tool to obtain information about 133 customers. "The unauthorized actor conducted a social engineering attack on Mailchimp employees and contractors, and obtained access to select Mailchimp accounts using employee
A new critical remote code execution (RCE) flaw discovered impacting multiple services related to Microsoft Azure could be exploited by a malicious actor to completely take control of a targeted application. "The vulnerability is achieved through CSRF (cross-site request forgery) on the ubiquitous SCM service Kudu," Ermetic researcher Liv Matan said in a report shared with The Hacker News. "By
The threat actor behind the BlackRock and ERMAC Android banking trojans has unleashed yet another malware for rent called Hook that introduces new capabilities to access files stored in the devices and create a remote interactive session. ThreatFabric, in a report shared with The Hacker News, characterized Hook as a novel ERMAC fork that's advertised for sale for $7,000 per month while featuring
Cybercriminals are increasingly leveraging malicious LNK files as an initial access method to download and execute payloads such as Bumblebee, IcedID, and Qakbot. A recent study by cybersecurity experts has shown that it is possible to identify relationships between different threat actors by analyzing the metadata of malicious LNK files, uncovering information such as the specific tools and
An organization’s sensitive information is under constant threat. Identifying those security risks is critical to protecting that information. But some risks are bigger than others. Some mitigation options are more expensive than others. How do you make the right decision? Adopting a formal risk assessment process gives you the information you need to set priorities. There are many ways to
The U.S. Department of Justice (DoJ) on Wednesday announced the arrest of Anatoly Legkodymov (aka Gandalf and Tolik), the cofounder of Hong Kong-registered cryptocurrency exchange Bitzlato, for allegedly processing $700 million in illicit funds. The 40-year-old Russian national, who was arrested in Miami, was charged in a U.S. federal court with "conducting a money transmitting business that
Carole's in her sick bed, which leaves Graham in charge of the good ship "Smashing Security" as it navigates the choppy seas of credential stuffing and avoids the swirling waters of apps being sloppy with sensitive information. Find out more in this latest edition of the "Smashing Security" podcast, hosted by Graham Cluley with special guest BJ Mendelson.
It is the world's most active ransomware group - responsible for an estimated 40% of all ransomware infections worldwide. Find out what you need to know about LockBit in my article on the Tripwire State of Security blog.
For the second time in less than a year, email newsletter service Mailchimp has found itself in the embarrassing position of admitting it has suffered a data breach, putting its customers' subscribers at risk.
The Bitzlato cryptocurrency exchange has had its website seized by the authorities, after its Russian founder was charged with processing more than US $700m worth of "dirty money" on behalf of criminals.