CyberSecurity updates
Updated: 2024-11-23 13:03:53 Pacfic

computerworld.com
Chinese Researchers Break RSA Encryption Using Quantum Annealing - 5d

In a significant development for global cybersecurity, Chinese researchers have unveiled a method using D-Wave’s quantum annealing systems to crack classic encryption, potentially accelerating the timeline for when quantum computers could pose a real threat to widely used cryptographic systems. The research team, led by Wang Chao from Shanghai University, found that quantum annealing can optimize problem-solving in a way that makes it possible to attack encryption methods such as RSA. They successfully factored a 22-bit RSA integer, demonstrating the potential for quantum machines to tackle cryptographic problems. This raises serious questions about the future of cybersecurity and the need for robust quantum-safe or post-quantum cryptographic solutions to protect sensitive information.

do son @ Cyber Security Archives
ChatGPT Usage for Planning Cyberattacks - 12d

OpenAI has recently reported the disruption of over 20 cyber and influence operations in 2023, involving Iranian and Chinese state-sponsored hackers. The company uncovered the activities of three threat actors abusing ChatGPT to launch cyberattacks. One of these actors used ChatGPT to plan ICS attacks, highlighting the evolving threat landscape where AI tools are being leveraged by malicious actors. This indicates the potential for more sophisticated attacks in the future, emphasizing the need for robust security measures to counter these emerging threats. OpenAI has been proactive in detecting and mitigating these malicious activities, highlighting the importance of collaboration between technology companies and cybersecurity researchers in combating these threats. The company is actively working to enhance its security measures to prevent future exploitation of its platforms by malicious actors.

Cybereason Team @ Blog
AI in Cybersecurity: Benefits and Risks - 29d

The use of AI in cybersecurity is a rapidly evolving field, offering both potential benefits and risks. AI can be a powerful tool in the fight against cyber threats, automating tasks, analyzing data, and identifying patterns that humans might miss. AI-powered security solutions can improve the speed and accuracy of threat detection, allowing organizations to respond more quickly to incidents and mitigate damage. However, AI also poses certain risks. AI systems can be susceptible to adversarial attacks, where attackers manipulate the training data or exploit vulnerabilities in the AI model to cause it to make incorrect decisions or even turn against its intended purpose. Furthermore, the use of AI raises ethical and societal concerns, such as the potential for bias in AI decision-making, the impact on privacy and civil liberties, and the possibility of AI being used for malicious purposes. Organizations must carefully consider the risks and benefits of using AI in cybersecurity, ensuring they have robust safeguards in place to mitigate potential threats and ensure responsible and ethical use of the technology.

office365itpros.com
Mandatory MFA for Microsoft 365 Admin Center - 5d

Microsoft will enforce mandatory multi-factor authentication (MFA) for the Microsoft 365 admin center starting February 2025. All logins must pass an MFA challenge to enhance account security and prevent unauthorized access. This is a significant security enhancement aimed at mitigating the risk of account hijacking. The enforcement of MFA is a crucial step in bolstering the security posture of Microsoft 365 environments. It addresses the growing threat of credential theft and unauthorized access to sensitive administrative functions. By requiring MFA, Microsoft significantly raises the bar for attackers, making it harder for them to gain control of admin accounts.

Over Security
Malicious QR Codes Distributed via Email and Snail Mail - 6d

Malicious actors are distributing malicious QR codes through various channels, including email attachments and physical mail. These QR codes lead to malicious applications designed to steal login credentials and other sensitive information. Security analysts are struggling to counter these attacks, while some email security vendors are employing overly aggressive flagging mechanisms that hinder legitimate communications.

justice.gov
US Gov’t Sentences Bitfinex Hacker for Laundering Billions - 8d

Ilya Lichtenstein, the individual behind the 2016 Bitfinex cryptocurrency exchange hack, was sentenced to five years in prison for money laundering by the US Department of Justice. Lichtenstein and his wife, Heather Morgan, stole over 119,000 Bitcoin, worth approximately $10.5 billion at the time of the theft. The stolen cryptocurrency was laundered through a complex network of transactions, using various techniques to obfuscate the origins of the funds. The investigation by the DOJ involved tracing the movement of the stolen Bitcoin through various exchanges and wallets, ultimately recovering a substantial portion of the stolen assets. This case highlights the evolving tactics of cybercriminals and the need for improved security measures within the cryptocurrency industry.

Over Security
Chinese Hackers Breach US Telecom Companies, Compromising Communications - 9d

The FBI and CISA have confirmed that Chinese hackers successfully infiltrated multiple US telecommunication companies, compromising the private communications of US officials and stealing sensitive customer call data. This sophisticated hacking campaign targeted a limited number of US officials, and the scope and nature of the stolen data remain under investigation. The Chinese hacking group responsible for the breach is yet to be identified. The attack highlights the growing vulnerability of critical infrastructure and the need for increased security measures to protect sensitive information. This event is of high severity due to the sensitive nature of the data compromised and the potential for significant damage to national security. The hackers gained access to confidential communications and personal data, posing a serious threat to individuals and institutions alike. The impact of this attack is likely to be felt in the long term, as authorities work to assess the damage and mitigate the risks.

Infoblox Threat Intel @ Infoblox Blog
Infoblox Warns of 'Sitting Ducks' DNS Hijacking Attacks - 8d

Infoblox has issued a warning about a critical attack vector called the ‘Sitting Ducks attack’ that allows threat actors to gain complete control over a domain by hijacking its DNS configurations. This attack exploits misconfigurations in DNS settings, specifically when the domain server incorrectly points to the wrong authoritative name server. The attack leverages ‘lame delegation,’ a technique where a domain’s authoritative name server is misconfigured, allowing attackers to redirect traffic to their controlled servers. Infoblox has identified over 1 million registered domains vulnerable to this attack. The company has published a detailed report with indicators of compromise to assist organizations in mitigating this threat.

Ingrid Lunden @ TechCrunch
Bitsight Acquires Cybersixgill for $115 Million - 6d

Bitsight, a cybersecurity risk management solutions provider, has acquired Cybersixgill, a threat intelligence firm, for $115 million. This acquisition is a significant move for Bitsight, as Cybersixgill specializes in gathering threat intelligence data from the dark web, which is a valuable asset for companies looking to protect themselves from cyberattacks. This acquisition allows Bitsight to offer a more comprehensive suite of cybersecurity solutions to its customers, combining its own risk management capabilities with Cybersixgill’s threat intelligence expertise.

Over Security
US Telecom Infrastructure Targeted by China - 6d

The FBI and CISA have jointly issued a warning about a significant cyber espionage campaign targeting US telecommunications infrastructure, allegedly orchestrated by Chinese-backed hackers. The campaign, which commenced in late October, has compromised the private communications of individuals, particularly those involved in government affairs. The extent of the breach and the specific methods employed by the attackers remain unclear, but the impact on US national security is substantial. This campaign underscores the growing threat posed by state-sponsored actors who leverage sophisticated cyber techniques to gather intelligence and influence political affairs. The compromised communications could be used to gain insights into government policies, strategies, and internal discussions, potentially giving the Chinese government a strategic advantage.

Cynthia B Brumfield @ Metacurity
T-Mobile Data Breach Linked to Chinese Hackers - 5d

T-Mobile experienced another data breach, this time linked to the Chinese state-sponsored hacking group known as Salt Typhoon. The breach highlights the ongoing threat posed by sophisticated nation-state actors targeting telecommunications companies and the critical infrastructure they support. This represents a significant risk to sensitive customer data and national security. The attack underscores the need for enhanced cybersecurity defenses within the telecommunications sector. Robust threat intelligence, advanced threat detection technologies, and proactive security measures are essential to prevent future breaches and protect against the increasingly sophisticated tactics of state-sponsored hacking groups.

microsoft.com
Adversary-in-the-Middle Attacks on Microsoft Networks - 9d

Attackers are leveraging adversary-in-the-middle (AiTM) attacks to gain unauthorized access to Microsoft networks. This advanced form of business email compromise (BEC) targets user credentials and authentication tokens to bypass multi-factor authentication (MFA). AiTM attacks occur when an attacker intercepts communication between a user and a legitimate service, allowing them to steal credentials and access sensitive information. Once inside, attackers can impersonate legitimate users, access email conversations and documents in the cloud, and divert specific emails. Preventing these attacks requires a layered approach including security defaults, conditional access policies, advanced anti-phishing solutions, and constant monitoring for suspicious activity. Detecting and cleaning up after AiTM attacks requires reviewing logs, interviewing users, and disabling compromised accounts.

support.citrix.com
Citrix StoreFront Vulnerability - 10d

A critical vulnerability, tracked as CVE-2024-8068 and CVE-2024-8069, has been discovered in Citrix StoreFront, also known as Citrix StoreWeb. This vulnerability could allow attackers to execute remote code if the StoreFront application is directly exposed to the internet and session recording is enabled. The vulnerability has been actively scanned for, but no signs of exploitation have been reported yet. Citrix has released patches to address the vulnerability. Organizations using Citrix StoreFront should prioritize applying the patches to mitigate the risk. The vulnerability highlights the importance of securing web applications and ensuring that they are properly configured, especially if they are exposed to the public internet.

csrc.nist.gov
NIST Publishes Quantum-Resistant Cryptography Timeline - 6d

The National Institute of Standards and Technology (NIST) has released a timeline for the transition to quantum-resistant cryptography, aiming to move government agencies away from current encryption techniques by 2035. Analysts are urging enterprises to accelerate their transition, considering the potential threat of quantum computing to current encryption methods. State actors are expected to achieve quantum computing at scale by 2028, posing a significant risk to organizations relying on current encryption. While NIST has provided a timeline for the transition, experts believe enterprises should not wait until 2035 to adopt quantum-resistant cryptography and should start planning immediately. The ‘harvest now, decrypt later’ threat model emphasizes the importance of proactive measures to prevent future breaches. By upgrading to lattice algorithms, organizations can enhance their security posture and even unlock additional functionalities like encrypted searches.


This site is an experimental news aggregator using feeds I personally follow. You can reach me at Bluesky if you have feedback or comments.