Cyber Security News

Photo by Victoria Borodinova from Pexels
by Simon Kenin MuddyWater, also known as Static Kitten and Mercury, is a cyber espionage group that’s most likely a
Photo by Andrea Piacquadio from Pexels
Synopsys-sponsored CISQ report finds existing vulnerabilities, software supply chain complexities and growing impact of technical debt as key drivers of
Very interesting article by Louis Anslow in Dailybeast suggests the Russian cyberwarfare on the American political system, which I discuss
Photo by Andrea Piacquadio from Pexels
Jeffrey Fuchs of Avanan just published an attack brief. In it, researchers at Avanan, a Check Point Software Company, discuss
Photo by Victoria Borodinova from Pexels
Few thought to disagree that in the event of an invasion, Moscow was sure to order a furious online assault
Photo by Victoria Borodinova from Pexels
Here is something I didn’t know when I purchased Amazon Ring cameras and Amazon Echo Dots: there is a webpage where law
Photo by Andrea Piacquadio from Pexels
In the frantic first weeks of Russia’s invasion of Ukraine, the U.S. tech companies that control the world’s largest information
Photo by Victoria Borodinova from Pexels
Washington (CNN)A former CIA employee charged with carrying out the largest leak of classified data in the agency's history was convicted on
Photo by Andrea Piacquadio from Pexels
It’s practically a holiday at this point: Amazon Prime Day. Two days of ridiculous deals and savings. Here’s what else
Photo by Andrea Piacquadio from Pexels
A quiet partnership of the world’s biggest technology companies, U.S. and NATO intelligence agencies, and Ukraine’s own nimble army of

Cyber Security News

Why track cyber security news? Cyber security is a world unto itself. It’s a profession, an IT discipline and now a major industry. Companies, consumers and governments are spending billions of dollars a year on cyber security. Security also pervades many areas of life that have little to do, seemingly, with cyberspace. Thus, to keep up with the world in general, it’s helpful to stay aware of news that relates to cyber security.

For example, the dispute between the US government and Huawei is at once about international trade, national security, telecom industry competition… and cybersecurity. Security is a root issue with Huawei, given the suspicions about the company’s connections to the Chinese Communist Party (CCP). However, the company’s size, reach and technological innovation push the matter to the forefront of US-China relations.

cyber security newsOr, take consumer cyber risks. We cover cyber security news that deals with consumers’ exposure to cybercrime and fraud. Consumers are increasingly at risk for identity theft, credit card and other malfeasance at the hands of cyber criminals. The articles we curate on this subject come from law enforcement publications, mainstream media and specialized blogs.

Public policy is now being influenced (or should be) by cyber security news. Policy makers should be aware of how cyber security affect their jobs and constituents’ lives. For instance, the “smart city” is both an innovation and a threat. Using IoT sensors and advanced data analytics to improve municipal services is a great idea. However, the smart city also exposes government data to breach.

This is particularly urgent given the relatively insecure technologies (e.g. Chinese-made sensors) used for the smart city and the wireless connectivity that make it all possible. Add malicious nation-state actors to the mix, such as the ones currently paralyzing American cities with ransomware, and one can see the potential danger.

 

From Deep Instinct: New MuddyWater Threat: Old Kitten; New Tricks

by Simon Kenin

MuddyWater, also known as Static Kitten and Mercury, is a cyber espionage group that’s most likely a subordinate element within Iran’s Ministry of Intelligence and Security (MOIS).

Since at least 2017 MuddyWater has targeted a range of government and private organizations across sectors, including telecommunications, local government, defense, and oil and natural gas organizations, in the Middle East, Asia, Africa, Europe, and North America.

MuddyWater has various campaigns that are entirely different from each other. In this post we will focus on the most recent changes and observations of their campaign which utilizes spearphishing with legitimate remote administration tools.

Read full article: https://www.deepinstinct.com/blog/new-muddywater-threat-old-kitten-new-tricks

 

Software Quality Issues in the U.S. Cost an Estimated $2.41 Trillion in 2022

Synopsys-sponsored CISQ report finds existing vulnerabilities, software supply chain complexities and growing impact of technical debt as key drivers of increased cyberattacks, cost

 

MOUNTAIN VIEW, Calif., December 6, 2022 – Synopsys, Inc. (Nasdaq: SNPS) today revealed that software quality issues may have held the U.S. economy back to the tune of $2.41 trillion in 2022. This statistic is unearthed in ‘The Cost of Poor Software Quality in the US: A 2022 Report’. The report’s findings reflect that as of 2022, the cost of poor software quality in the U.S.—which includes cyber-attacks due to existing vulnerabilities, complex issues involving the software supply chain, and the growing impact of rapidly accumulating technical debt—have led to a build-up of historic software deficiencies.

Co-sponsored by Synopsys, the report was produced by the Consortium for Information & Software Quality (CISQ), an organization developing international standards to automate software quality measurement and promoting the development and maintenance of secure, reliable, and trustworthy software.

“Cybercrime is predicted to cost the world $7 trillion in 2022,” said report author, Herb Krasner, retired Professor of Software Engineering, University of Texas at Austin,. “With that top of mind, The Cost of Poor Software Quality in the US: A 2022 Report offers practical advice and specific guidance for software engineers, project teams, and organizational leaders to proactively improve the quality of the software they use and build. Now is the time to turn our attention to recent developments and emerging solutions to help improve the poor software quality situation as it now exists and stabilize and reduce the growth rate of CPSQ in the near future.”

The report highlights several key areas of CPSQ growth, including:

  • Cybercrime losses due to a rising number of software vulnerabilities. Losses rose 64% from 2020 to 2021, and are on track for a further 42% increase from 2021 to 2022. The quantity and cost of cybercrime incidents have been on the rise for over a decade, and now account for a sum equivalent to the world’s third largest economy after the U.S. and China.
  • Software supply chain problems with underlying third-party components are up significantly. This year’s report shows that the number of failures due to weaknesses in open source software components accelerated by an alarming 650% from 2020 to 2021.
  • Technical debt has become the largest obstacle to making changes in existing code bases. Technical debt refers to software development rework costs from the accumulation of deficiencies leaving data and systems potentially vulnerable. This year’s report illustrates that deficiencies aren’t being resolved, leading technical debt to increase to approximately $1.52 trillion.

“In today’s complex software supply chain, just because a newly-added open source component is secure today, does not mean that it will be secure tomorrow,” said Dr. Anita D’Amico, Synopsys Software Integrity Group VP of Cross-Portfolio Solutions and Strategy and CISQ Board Member. “Creating a software Bill of Materials (SBOM) allows organizations to proactively gather a comprehensive inventory of the components used to make up a piece of software. That means when a new vulnerability is identified in an existing component, organizations can quickly identify where it is in their software and take action to remedy it.”

The report also found that operational failures, primarily due to cyber-attacks and open source deficiencies, have risen alongside technical debt as deficiencies aren’t being resolved at a comparable rate. With these rises, developments in technologies and practices to remediate issues have also matured considerably in recent years. Using software quality standards in association with related tooling solutions, assessing and monitoring third party and open source components, and applying patches in a timely manner are all key strategies in reducing CPSQ.

To learn more, download a copy of The Cost of Poor Software Quality in the US: A 2022 Report or read our blog post highlighting the report’s key takeaways.

 

About the Synopsys Software Integrity Group

Synopsys Software Integrity Group provides integrated solutions that transform the way development teams build and deliver software, accelerating innovation while addressing business risk. Our industry-leading portfolio of software security products and services is the most comprehensive in the world and interoperates with third-party and open source tools, allowing organizations to leverage existing investments to build the security program that’s best for them. Only Synopsys offers everything you need to build trust in your software. Learn more at www.synopsys.com/software.

About Synopsys

Synopsys, Inc. (Nasdaq: SNPS) is the Silicon to Software™ partner for innovative companies developing the electronic products and software applications we rely on every day. As an S&P 500 company, Synopsys has a long history of being a global leader in electronic design automation (EDA) and semiconductor IP and offers the industry’s broadest portfolio of application security testing tools and services. Whether you’re a system-on-chip (SoC) designer creating advanced semiconductors, or a software developer writing more secure, high-quality code, Synopsys has the solutions needed to deliver innovative products. Learn more at www.synopsys.com.

###

 

__

Dailybeast: Did Putin Astroturf the Libertarian Ron Paul Revolution?

Very interesting article by Louis Anslow in Dailybeast suggests the Russian cyberwarfare on the American political system, which I discuss in Digital Downfall, started much earlier than most people suspect – in 2007.

Did Putin Astroturf the Libertarian Ron Paul Revolution?

On March 12, 2007, an obscure congressman from Texas announced his run for the Presidency of the United States. He was a fringe candidate running on the Republican ticket with little hope of winning a primary, let alone the nomination.

Then—suddenly—Ron Paul was everywhere.

Within a few months, Paul landed a spot on Real Time with Bill Maher, thanks to unprecedented online momentum that would capture the attention of the mainstream press.

Wired magazine detailed how Paul was taking over the web. The Washington Post ran the numbers, noting he was more popular on Facebook than his GOP primary rival John McCain, had more friends on MySpace than Mitt Romney, and garnered almost as many views on YouTube as Barack Obama (while also noting Paul’s low polling numbers.) Other outlets also highlighted the mismatch between real world and online popularity—such as the NBC News story, “An also-ran in GOP polls, Paul is huge on Web.”

Read full article

 

 

Photo: Eric Thayer/Getty Images

From Avanan: How Hackers Target Nations

Jeffrey Fuchs of Avanan just published an attack brief. In it, researchers at Avanan, a Check Point Software Company, discuss how hackers target the government sector in a small nation located in the Western Hemisphere.

Read the article: https://www.avanan.com/blog/how-hackers-target-nations

 

From InfoRisk Today – Major Takeaways: Cyber Operations During Russia-Ukraine War

Few thought to disagree that in the event of an invasion, Moscow was sure to order a furious online assault taking power plants offline, scrambling defenders’ communications and sowing mass chaos.

As Russia’s invasion of Ukraine nears its half-year mark, experts find themselves reevaluating long-held assumptions and grappling with surprising developments that few saw coming. Russia’s constant probing of Ukrainian networks – leading to some government sites getting knocked offline – has yet to cause massive disruptions.

Read full article: https://www.inforisktoday.com/major-takeaways-cyber-operations-during-russia-ukraine-war-a-19592?utm_source=LinkedIn&utm_medium=ISMGSM&utm_campaign=Editorial

The Verge: Today I learned Amazon has a form so police can get my data without permission or a warrant

Here is something I didn’t know when I purchased Amazon Ring cameras and Amazon Echo Dots: there is a webpage where law enforcement can fill out a form, say there’s a life-threatening emergency, and get access to your data without your consent, a court order, or any kind of warrant. There’s nothing in the Terms of Service about this, and the company has maintained for years that it helps police get consent first, but it’s happening anyhow.

Over the past seven months alone, Amazon has provided private Ring videos to law enforcement 11 times, the company told Senator Ed Markey (D-MA) in a letter dated July 1st and provided to press this week.

https://www.theverge.com/2022/7/14/23219419/amazon-ring-law-enforcement-no-warrant-no-consent

Wapo: Ukraine says Big Tech has dropped the ball on Russian propaganda

In the frantic first weeks of Russia’s invasion of Ukraine, the U.S. tech companies that control the world’s largest information hubs sprang into action. Responding to pressure from Western governments, social media apps like Facebook, Instagram and YouTube banned or throttled Russian state media accounts, beefed up their fact-checking operationscurtailed ad sales in Russia and opened direct lines to Ukrainian officials, inviting them to flag Russian disinformation and propaganda to be taken down.

Full article

 

CNN – Former CIA employee convicted for carrying out largest data leak in agency’s history

Washington (CNN)A former CIA employee charged with carrying out the largest leak of classified data in the agency’s history was convicted on all counts in federal court Wednesday.

Joshua Schulte — who was accused of handing over reams of classified data to WikiLeaks in 2016 — was convicted of illegally gathering and transmitting national defense information and obstructing a criminal investigation and grand jury proceeding, among other charges.
He had worked as a computer engineer within the CIA’s Center for Cyber Intelligence, and created cyber tools that could grab data undetected from computers. Schulte defended himself at trial. An earlier trial ended in a hung jury in 2020.

Full article: https://www.cnn.com/2022/07/13/politics/cia-employee-convicted-joshua-schulte-data-leak/index.html

From Avanan: With Prime Day Around the Corner, Be on the Lookout for These Amazon Scams

It’s practically a holiday at this point: Amazon Prime Day. Two days of ridiculous deals and savings.

Here’s what else is associated with the day: Phishing.

Amazon is already a popular phishing target. We’ve written about it in the past, herehere, and here.

Amazon is one of the most impersonated brands out there. Now, with a major spending holiday around the corner, phishers are at it again, trying to steal credentials and money.

Starting in June 2022, Avanan researchers have seen an uptick in spoofed Amazon attacks, whereby hackers are trying to steal credentials in the hopes that users will think it’s the actual Amazon brand emailing. In this attack brief, Avanan will analyze how hackers are spoofing Amazon to steal credentials.

Read full article: https://www.avanan.com/blog/with-prime-day-around-the-corner-be-on-the-lookout-for-these-amazon-scams

From WaPo: How Russia’s vaunted cyber capabilities were frustrated in Ukraine

A quiet partnership of the world’s biggest technology companies, U.S. and NATO intelligence agencies, and Ukraine’s own nimble army of hackers has pulled off one of the surprises of the war with Russia, largely foiling the Kremlin’s brazen internet hacking operations.

Read full article: https://www.washingtonpost.com/opinions/2022/06/21/russia-ukraine-cyberwar-intelligence-agencies-tech-companies/