Cyber Security News

NEWS!
Officials with the US Cybersecurity and Infrastructure Security Agency (CISA) said on Monday that they have not seen the exploitation
NEWS!
From the Washington Post Mark Montgomery is senior director of the Center on Cyber and Technology Innovation (CCTI) at the
https://news.sophos.com/en-us/2021/12/20/logjam-log4j-exploit-attempts-continue-in-globally-distributed-scans-attacks/  
NEWS!
Brandon Silverman’s last day at Facebook was Oct. 8, and like many others who have sold their companies to a
The US Cyberspace Solarium Commission’s latest report, entitled Countering Disinformation in the US, is the latest analysis to come from this two-year-old
Security experts in Germany discover similar attacks that lock building engineering management firms out of the BASes they built and
The Log4j cyber threat is being compared to the notorious Equifax hack of 2017, which affected 147 million Americans. However,
The Senate just passed The National Defense Authorization Act, or NDAA, annual defense spending bill – with key cyber provisions,
https://venturebeat.com/2021/12/14/propaganda-as-a-service-may-be-on-the-horizon-if-large-language-models-are-abused/
NEWS!
A new survey of over 1,000 IT security pros, New Research from One Identity Characterizes Zero Trust as a Core

Cyber Security News

Why track cyber security news? Cyber security is a world unto itself. It’s a profession, an IT discipline and now a major industry. Companies, consumers and governments are spending billions of dollars a year on cyber security. Security also pervades many areas of life that have little to do, seemingly, with cyberspace. Thus, to keep up with the world in general, it’s helpful to stay aware of news that relates to cyber security.

For example, the dispute between the US government and Huawei is at once about international trade, national security, telecom industry competition… and cybersecurity. Security is a root issue with Huawei, given the suspicions about the company’s connections to the Chinese Communist Party (CCP). However, the company’s size, reach and technological innovation push the matter to the forefront of US-China relations.

cyber security newsOr, take consumer cyber risks. We cover cyber security news that deals with consumers’ exposure to cybercrime and fraud. Consumers are increasingly at risk for identity theft, credit card and other malfeasance at the hands of cyber criminals. The articles we curate on this subject come from law enforcement publications, mainstream media and specialized blogs.

Public policy is now being influenced (or should be) by cyber security news. Policy makers should be aware of how cyber security affect their jobs and constituents’ lives. For instance, the “smart city” is both an innovation and a threat. Using IoT sensors and advanced data analytics to improve municipal services is a great idea. However, the smart city also exposes government data to breach.

This is particularly urgent given the relatively insecure technologies (e.g. Chinese-made sensors) used for the smart city and the wireless connectivity that make it all possible. Add malicious nation-state actors to the mix, such as the ones currently paralyzing American cities with ransomware, and one can see the potential danger.

 

CISA director: ‘We have not seen significant intrusions’ from Log4j — yet

Officials with the US Cybersecurity and Infrastructure Security Agency (CISA) said on Monday that they have not seen the exploitation of Log4Shell result in significant intrusions since the vulnerability came to light in December.

CISA director Jen Easterly and executive assistant director for cybersecurity Eric Goldstein fielded questions from reporters during a briefing on Monday, telling attendees that outside of an attack on the Belgian Defense Ministry, they have not seen any damaging incidents that resulted directly from the exploitation of the Log4j vulnerability.

https://www.zdnet.com/article/cisa-director-we-have-not-seen-significant-intrusions-from-log4j/

Washington Post: The cybersecurity risk to our water supply is real. We need to prepare.

From the Washington Post

Mark Montgomery is senior director of the Center on Cyber and Technology Innovation (CCTI) at the Foundation for Defense of Democracies and senior adviser to the Cyberspace Solarium Commission. Samantha F. Ravich chairs the CCTI and serves as a commissioner on the Cyberspace Solarium Commission.

It’s rare that four government agencies issue a joint advisory on a potential threat to the basic health and welfare of the entire U.S. population. But that’s what happened in October when the FBI, National Security Agency, Cybersecurity and Infrastructure Security Agency (CISA) and Environmental Protection Agency warned that U.S. water and wastewater systems are being targeted by “known and unknown” malicious actors.

Their warning is not a theoretical one. In February, a hacker or hackers breached the water-treatment system in Oldsmar, Fla., and attempted to raise the level of sodium hydroxide, or lye, in the water more than 100-fold — from 100 parts per million to 11,100 parts per million. Sodium hydroxide, used to control water acidity, is poisonous at high levels.

https://www.washingtonpost.com/opinions/2022/01/03/cybersecurity-risk-water-supply/

 

Logjam: Log4j exploit attempts continue in globally distributed scans, attacks

Logjam: Log4j exploit attempts continue in globally distributed scans, attacks

 

A Former Facebook Executive Pushes to Open Social Media’s ‘Black Boxes’

Brandon Silverman’s last day at Facebook was Oct. 8, and like many others who have sold their companies to a Silicon Valley giant, had their shares vest and departed, he planned to take a year off to spend time with his children and figure out what to do next.

He had been at the social media giant since it acquired his startup, CrowdTangle, in 2016. And he had watched that project, which tracks the content that draws attention on Facebook, emerge as perhaps the single most important window into what was actually happening on the megaplatform. But his project had increasingly become an irritant to his bosses, as it revealed the extent to which Facebook users engaged with hyperpartisan right-wing politics and misleading health information.

https://www.sfgate.com/business/article/A-Former-Facebook-Executive-Pushes-to-Open-Social-16744245.php?utm_campaign=CMS%20Sharing%20Tools%20(Premium)&utm_source=facebook.com&utm_medium=referral&fbclid=IwAR0lrI-i4P4mAL9vGckwzNoQQ_lwzk5TUgv0qyL8aIBdAYmy4we_K1aGi-8

Countering Disinformation Report | Avast

The US Cyberspace Solarium Commission’s latest report, entitled Countering Disinformation in the US, is the latest analysis to come from this two-year-old bipartisan Congressional think tank. The report, which was released in December, takes a closer look at the way is spread across digital networks and proposes a series of policy actions to slow its spread using a layered defense.

As a note concerning context: Back in the 1980s, I worked as an analyst for a bipartisan Congressional institute called the Office of Technology Assessment, which produced similar kinds of reports from 1974, until it was (ironically) eliminated in 1996 in a blaze of partisanship.

Countering Disinformation Report | Avast

Lights Out: Cyberattacks Shut Down Building Automation Systems

Security experts in Germany discover similar attacks that lock building engineering management firms out of the BASes they built and manage — by turning a security feature against them.

A building automation engineering firm experienced a nightmare scenario: It suddenly lost contact with hundreds of its building automation system (BAS) devices — light switches, motion detectors, shutter controllers, and others — after a rare cyberattack locked the company out of the BAS it had constructed for an office building client.

https://www.darkreading.com/attacks-breaches/lights-out-cyberattacks-shut-down-building-automation-systems

News Insights: The Log4j Disaster

The Log4j cyber threat is being compared to the notorious Equifax hack of 2017, which affected 147 million Americans. However, the Log4j exploit has far greater reach due to the software component’s widespread adoption. It was recently recognized as critical with reactive guidance for organizations to follow from CISA, the federal government’s cybersecurity arm.

 

News Insights:

 

Jeff Williams, Co-Founder and CTO at Contrast Security, does not believe that CISA’s reactive recommendations for organizations to protect themselves go far enough. He said, “There are a wide range of methods hackers can use to access personal information through Log4j’s vulnerability. The human effort required to detect and action each event is simply unrealistic. Install a web application firewall (WAF) with rules that automatically update, so that your SOC can concentrate on fewer alerts. Firewalls aren’t going to stop hackers. They still have plenty of other ways to break into organizations’ systems through Log4j, which are undetectable by the firewall. This includes malicious code embedded into JSON, XML, and other common data structures that power nearly every website and application.”

Enumerate any external facing devices that have Log4j installed: “The focus on ‘external facing’ devices is a mistake, as many internal systems also log data that originated from an untrusted source.”

Jeff believes that organizations must take a more proactive approach to truly mitigate the impact Log4j cyberattacks will have on businesses and consumer personal information. This means establishing the technology infrastructure needed to handle the next incident (which is surely coming), with real-time application detection and threat blocking.

 

Yana Blachman, a threat intelligence specialist at Venafi, said “The combination of Log4j being practically everywhere and the fact that it is trivial to exploit, with many exploits and PoCs already available, makes it extremely dangerous and highly lucrative for every type of malicious activity. An unauthenticated RCE vuln in such a popular library is every attacker’s dream. We already see that the vulnerability is massively exploited in the wild by crypto mining and DDoS groups, such as Mirai [trendmicro.com], Muhstik, and Kinsing [twitter.com], and commodity malware like StealthLoader [blog.checkpoint.com] as well as more sophisticated attacks mostly associated with APT groups using Cobalt Strike beacons and web shells.

Microsoft confirmed the vulnerability has been leveraged to gain initial access with intent to sell. This type of initial access can be then leveraged by whoever it is sold to for credential access, using dedicated malware modules for stealing credentials and machine identities from infected Unix and Windows machines to then perform lateral movement within the targeted network for further exploitation, downloading malware or ransomware, or cyberespionage and IP theft purposes, which we’ve seen before.

As of yesterday, Microsoft also reported that sophisticated state-backed actors and ransomware gangs from China, Iran and North Korea are leveraging the vulnerability, which is very worrying. North Korea-backed actors in particular are well-versed in exploiting zero-days and might use it to install ransomware and monetize victims for profit, alongside their cyberespionage activities.

Log4Shell can give all types of cybercrime gangs access to corporate networks. This is extremely worrying since access to sensitive assets may fall in the wrong hands and be used for destructive or damaging purposes – crippling down networks and great financial impact. I recommend companies to use the Log4Shell scanner [log4shell.huntress.com] to assess if they are vulnerable and patch the vuln as soon as possible, before becoming a victim.”

 

Andrew Howard, CEO of Kudelski Security, remarked, “Through the recently discovered Log4Shell vulnerability, organizations can learn a lot about both vulnerability management in general and the need for secure application development more specifically.

The main problem is not that the Log4j library comes from an open source project run by only one or two programmers as a part-time project. In fact, a similar number of zero-day gaps can be found in commercial software as in open source solutions. The real problem is a lack of security awareness on the part of programmers and companies, which is still prevalent in many cases.

The vulnerability highlights that developers often blindly use libraries without carefully considering all available options. A security-conscious developer would probably have disabled the JNDI query when reading the documentation if the software does not use this feature, thus reducing the attack surface.

I recommend that organizations maintain a repository of libraries that are deemed secure as part of a secure DevOps process and as part of the fundamental IT security strategy of the company. The standard for all development processes then includes programmers continuously checking all libraries used in a software development project for acceptability against this repository.”

 

 

Legislative Insights: The National Defense Authorization Act (NDAA)

The Senate just passed The National Defense Authorization Act, or NDAA, annual defense spending bill – with key cyber provisions, but noticeably lacking a cyber incident reporting measure. This followed partisan disagreements.

Highlights include:

  • The NDAA authorizes CISA’s CyberSentry program for securing industrial control systems
  • An amendment would require CISA to update its IRP at least every two years
  • It codifies CISA’s National Cyber Exercise program
  • Requires the DOD to submit a report on how its Cybersecurity Maturity Model Certification program affects small businesses

 

Legislative Insights:

Dave Cundiff, Vice President, Cyvatar:

“The US Federal government took steps to further the ability to respond to the ever-growing threats of the cybersecurity landscape. While there are many aspects of the latest Defense Authorization Act which provide improvements and a commitment to improving the United States Defensive capabilities there are also several missed opportunities. The addition of the apprentice program to expand the available talent, as well as the Veteran training program allows for an increased capability to bring human capital to bear in a highly trained way. (sec. 1531) The prevention of the Department Chief Information Officer from also serving as the Principal Cyber Advisor to the Department properly prevents at least that level of conflict of interest. (sec. 1532) The acknowledgement of the need to review legacy systems, software, and policies to provide improvements, replacements, or decommission represents a proper foundational approach to underlying vulnerabilities and proper hygiene. (sec. 1511)

For all the benefits the passage of this authorization act brings, some of the areas which would have provide greater clarity and capability fall in the continued containment of cybersecurity functions under other divisions. Just as large enterprises suffer from continuing to relegate cybersecurity functions as secondary duties of other officers within the company, so too does the government. The US government authorized the creation of a space force but has yet to create a proper division of defense focused on the largest and I argue the most critical battlefield of the 21st century, cyberspace. Each existing branch within the dept of defense is relegated to its own measures and while all branches will report to a central figure within the DOD, what of other areas of the government? Where is the dedicated focus?

This puts the US at a disadvantage, due to the need to accommodate various regulatory and interdepartmental needs governing information sharing and correlation of data, slowing down the ability to respond or identify trends in the attacks before being able to respond accordingly. The lack of an enforcement to update response plans more than every 2 years (sec. 1538) belies the ever evolving and speed with which attacks, and the attack surface at large, move. We should never let great be the enemy of good, and this legislation moves us significantly forward in the cybersecurity space, but we must continue to focus on additional improvements sooner rather than later, as the speed with which threats emerge dictates a vigilant focus.”

 

Bill Lawrence, CISO, SecurityGate:

“It is always interesting to see what issues make it out of committee and into law, especially one as large as the annual National Defense Authorization Act, over ¾ Trillion dollars this year.  Missing from the bill is the controversial cyber incident reporting measure that would have made companies report breaches or ransomware attacks within 72 hours of discovery, and payments within 24 hours of payout, if memory serves.  Some companies had issues with this, especially smaller ones that do not have a 24/7 security operations center available to them which limits their ability to respond to such incidents, much less tell the US government what is happening during incident response.  Still, DHS/CISA will tell you they are the lead agency for asset response during a significant cyber event, and “operators are standing by” to potentially help companies that voluntarily call for assistance.

Funding for the CyberSentry program made it through to fund engagements with critical infrastructure (CI) partners to place network sensors on their IT and OT systems (Q:  Doesn’t the commercial sector offer this?  A: Yes. Yes, they do.).  “Under the MOA between CISA and the CI partner, CISA may access all network traffic, including the content of communications, as stored within the CyberSentry stack to further analyze the origins of an alert and/or evaluate the state of the network…”  There are valid reasons for CISA to help protect US critical infrastructure just as their are valid reasons for CI owners and operators to not want government sensors on their networks, as well as valid arguments from security providers that the government is giving cyber services away for free (using taxpayer money, of course).  DHS does include a great deal of privacy considerations in the CyberSentry write-up.  It would be helpful to also read about the tactical and strategic objectives of this program and see if rapid information sharing with all CI asset owners and operators is included, and help determine if this juice is worth the squeeze on the commercial providers.  I have my apprehensions.”

Propaganda-as-a-service may be on the horizon if large language models are abused

Propaganda-as-a-service may be on the horizon if large language models are abused

Research Insights: Zero Trust

A new survey of over 1,000 IT security pros, New Research from One Identity Characterizes Zero Trust as a Core Element of a Contemporary Cybersecurity Strategy, Highlights Common Barriers to Success

reveals:

  • 75% of organizations characterize as critically or very important to bolstering their overall cyber maturity
  • Only 14% report they have already implemented a Zero Trust strategy
  • Lack of clarity (32%) remains the top barrier to Zero Trust adoption; only 1 in 5 security stakeholders are confident in their organization’s understanding of Zero Trust

White Paper: ZERO TRUST AND IT SECURITY

 

Research Insights:

Saryu Nayyar, CEO, Gurucul (she/her):

“Zero trust is rapidly emerging as an important strategy in cybersecurity. Zero trust means that everyone and every device attempting to connect to systems must be verified before granting access.  There is no sharing of credentials of systems and access just because someone is logged onto the network. Research from One Identity notes several issues with Zero Trust, the most significant is the lack of a clear understanding of SOC and IT staff as to what it entails and where to begin. While more tools are becoming available for zero trust planning and implementation, more education and training is needed to give staff the confidence to do the job right. Vendors, training firms, and educational institutions can take on this responsibility to make sure enterprises are fully prepared to implement this strategy.”

 

Rajiv Pimplaskar, CRO, Veridium:

“The One Identity research illustrates the continued market confusion with zero trust especially with enterprises struggling to rapidly implement such solutions in response to the executive order from the White House this summer. The foundational pillar of any zero trust strategy is identity and access management. Work from home, remote hiring and onboarding at scale has resulted in significant challenges from a digital identity perspective for employees, contractors and business partners. These challenges span security, risk, user experience / well being and productivity, as well as privacy and consent. The adoption of passwordless authentication methods provides an immediately actionable solution to shore up the “first mile” of digital identity verification by establishing an unphishable connection between the user and the IT system or application. Such connections are resistant to MITM attacks as well as reducing OPEX by eliminating unnecessary overhead and risk with password resets and account recovery. Passwordless solutions are increasingly ubiquitous with the proliferation of W3C‘s WebAuthN web standard and FIDO Alliance certified solutions. Furthermore, passwordless authentication can be adopted independently from the Identity Provider (IDP) to manage the user experience and provide improved customer choice.”

 

Garret Grajek, CEO, YouAttest:  

“There is no doubt that Zero Trust is a key IT Security component going forward to secure enterprises against cyber attacks. The concept that every IT component must re-establish trust when requesting resources is needed to secure against these threats. The key point is – it’s not just a network concept. The concept must be extended to identity – where a risk value is associated with every identity and the resource can decide whether that there is enough trust for that identity to honor the resource request – if not, a step up in identity veracity is needed. In addition, identity governance is needed to ensure that identities are not overprivileged, allowing access beyond the trust they should be granted.