Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 12729

Checks for new stories every ~15 minutes

Title Summary
ROWS
2024-06-04 18:47:21 theregister DATA BREACH Senators Question Pentagon's Increased Dependence on Microsoft Post-Hack
The Pentagon continues to heavily invest in Microsoft products despite past security failures that compromised U.S. national security. U.S. Senators Ron Wyden and Eric Schmitt expressed profound concerns over the DoD's cybersecurity strategy in a letter to DoD CIO John Sherman. The Cyber Safety Review Board identified "avoidable errors" by Microsoft that enabled Chinese spies to access thousands of U.S officials' emails. Despite identified security lapses, the U.S government has consistently increased spending on Microsoft services, raising concerns among some lawmakers. Upcoming legislation may mandate DoD offices to upgrade to Microsoft's expensive E5 software license, enhancing cybersecurity but limiting vendor diversity. Lawmakers urged the DoD to adopt a multi-vendor strategy to foster competition, reduce costs, and improve cybersecurity outcomes. Senators are seeking clarity on the DoD's commitment to supporting secure open source software, as outlined in its 2018 Cyber Strategy. Microsoft has pledged to provide free cloud security logs, a promise under scrutiny by Senators questioning its implementation by the Pentagon.
Details
2024-06-04 17:30:19 bleepingcomputer MALWARE Zyxel Releases Emergency Patch for End-of-Life NAS Devices
Zyxel Networks issued an emergency patch for three critical vulnerabilities in their older NAS devices. The affected models, NAS326 and NAS542, are no longer supported as they reached end-of-life on December 31, 2023. The vulnerabilities allow for command injection and remote code execution but do not address privilege escalation and information disclosure issues. Security researcher Timothy Hjort from Outpost24 identified all five vulnerabilities and has published a detailed write-up along with proof-of-concept exploits. Zyxel has remediated three of the issues with firmware updates despite the models being out of the support period. While there are no known exploits of these vulnerabilities in the wild, the availability of public PoCs necessitates urgent patching by device owners.
Details
2024-06-04 16:23:52 bleepingcomputer RANSOMWARE Major Ransomware Disruption at London NHS Hospitals Impacting Services
A ransomware attack on Synnovis has severely impacted major NHS hospitals in London, compromising pathology and diagnostic services. Major facilities affected include King's College Hospital, Guy's Hospital, and St Thomas' Hospital among others. Healthcare procedures, including some surgeries and blood transfusions, have been canceled or redirected to ensure patient safety. Hospitals advise patients to continue attending appointments unless instructed otherwise, while emergency services remain operational. The attack has disrupted IT systems, rendering urgent and emergency care challenging due to unavailable quick-turnaround blood tests. UK's National Cyber Security Centre and hospital Cyber Operations teams are collaborating to mitigate the impact and understand the full extent of the breach. Synnovis, affected by the attack, is part of a partnership network that includes SYNLAB UK & Ireland and several NHS trusts.
Details
2024-06-04 16:08:17 bleepingcomputer CYBERCRIME Major London Hospitals Disrupted by Synnovis Ransomware Attack
Synnovis, a key provider of pathology and diagnostic services, suffered a cyberattack on June 3, significantly impacting NHS hospitals in London. The incident disrupted IT and clinical services across several hospitals including King’s College Hospital and Guy’s and St Thomas’ NHS Foundation Trust. Blood transfusion services were particularly affected, causing cancellations and redirections of some medical procedures to other providers. Urgent and emergency care services are compromised due to unavailable timely blood test results. The hospitals’ leadership has described the situation as an "ongoing critical incident" with a major impact on healthcare service delivery. It was confirmed that the cyberattack involved ransomware, complicating the recovery of pathology results, expected to take weeks. Synnovis had previously changed names and is part of a larger network that also experienced similar ransomware attacks in other regions.
Details
2024-06-04 15:47:28 theregister CYBERCRIME Ransomware Attack Disrupts London Hospital Services
London hospitals are facing major disruptions in pathology services due to a ransomware attack targeting their service partner, Synnovis. Synnovis, a partnership between Synlab, Guy's and St Thomas' NHS Foundation Trust, and King's College Hospital NHS Foundation Trust, is critical in providing pathology and testing across multiple labs. The ransomware has significantly impacted blood transfusions and elective surgeries, leading to cancellations and redirections to alternative providers. NHS England's London region is working with the National Cyber Security Centre and their Cyber Operations team to assess and mitigate the impact. Emergency care remains operational; patients are advised to attend scheduled appointments unless informed otherwise. This incident is isolated to London and is not directly connected to the recent ransomware attack on Synlab Italia by the Black Basta group. NHS officials and Synnovis are part of a task force striving to restore services and communicate regularly with patients and the public about updates. Synnovis acknowledges the severity of the cyberattack and confirms ongoing efforts to bolster cybersecurity measures.
Details
2024-06-04 15:47:28 bleepingcomputer MISCELLANEOUS Microsoft Deprecates NTLM for Enhanced Security Protocols
Microsoft has officially announced the deprecation of the NTLM authentication protocol in Windows, encouraging a shift to more secure alternatives like Kerberos and Negotiation. NTLM, launched in 1993, has been vulnerable to cyberattacks, including NTLM Relay attacks where attackers force authentication against malicious servers. Despite measures like SMB security signing to combat these vulnerabilities, NTLM's weaker encryption and lack of single sign-on support make it outdated by 2024 standards. Microsoft emphasizes the transition to Negotiate, which prefers Kerberos and reverts to NTLC only if necessary, to enhance security and performance. The company advises system administrators to use auditing tools to assess NTLM usage and develop a comprehensive transition strategy. For most applications, migrating from NTLM to Negotiate requires minimal modification, potentially as simple as a one-line code change. Microsoft provides resources such as a Kerberos troubleshooting guide to assist administrators during this transition period.
Details
2024-06-04 15:42:01 bleepingcomputer MISCELLANEOUS Microsoft Announces Deprecation of Outdated NTLM Authentication
Microsoft has officially deprecated the NTLM authentication protocol, urging a transition to more secure methods such as Kerberos or Negotiation authentication. NTLM, first introduced in 1993 with Windows NT 3.1, is criticized for its outdated security measures and susceptibility to various cyberattacks, including NTLM Relay attacks. Despite enhancements like SMB security signing, NTLM remains vulnerable to attacks where attackers can capture and utilize password hashes. The protocol's encryption is weaker compared to modern standards, and it lacks efficiency and support for single sign-on (SSO) technologies. Microsoft recommends that developers and system administrators audit their use of NTLM and plan for migration to the Negotiate protocol, which uses Kerberos as its primary method and NTLM as a fallback. NTLM will still function in the upcoming Windows Server release and next Windows annual release, but further support will gradually decrease. Transitioning from NTLM to Negotiate can typically be managed with minor coding changes, although some scenarios might require more substantial modifications.
Details
2024-06-04 15:36:41 thehackernews NATION STATE ACTIVITY Decoy Dog Trojan Used in Cyber Attacks on Russian Entities
Russian power companies, IT firms, and government agencies have been targeted by a malicious cyber campaign delivering a malware known as Decock Dog. The malware campaign, dubbed Operation Lahat, is attributed to an APT group called HellHounds, which has been active since at least 2021. Positive Technologies has documented significant breaches, including 48 compromised entities in Russia, involving critical industries such as space and telecommunications. Decoy Dog, initially targeting Linux systems, now confirmed to possess a Windows variant enabling attackers to efficiently maintain covert communications with infected hosts. The malware features capabilities of DNS tunneling for remote control and covert movement between different control servers to evade detection. HellHounds exploited vulnerabilities in web services and relationships, as well as compromised SSH credentials of contractors, for gaining initial access. Positive Technologies highlights that the attackers have efficiently modified open-source tools to craft their malware, ensuring persistence and avoidance of detection mechanisms.
Details
2024-06-04 14:50:39 thehackernews CYBERCRIME Critical Flaw in Telerik Report Server Allows Admin Account Creation
Progress Software has issued updates for a critical vulnerability in Telerik Report Server, which could let attackers bypass authentication. Tracked as CVE-2024-4358, this flaw has a high severity score of 9.8 and affects versions up to 2024 Q1 (10.0.24.305). The vulnerability enables remote, unauthenticated attackers to create rogue administrator accounts and access restricted server functionalities. The updated version, Report Server 2024 Q2 (10.1.24.514), addresses this vulnerability. Progress Software advises customers to check their servers for unauthorized local users and update their systems immediately. As a part of the mitigation efforts, Progress Software recommends implementing a URL Rewrite technique on IIS servers to reduce vulnerability. This flaw was discovered a little over a month after another significant vulnerability in Telerik Report Server was patched. Given past exploits targeting Telerik servers, updating to secured versions and continuous monitoring are crucial for preventing potential breaches.
Details
2024-06-04 14:35:11 theregister DATA BREACH Christie's Data Auctioned Post-Breach by Cybercrime Group RansomHub
Christie's experienced a cyberattack, leading to unauthorized access to certain client data but not financial or transactional records. The attackers, known as RansomHub, initially demanded a ransom, then claimed to have auction-attributed the data to an anonymous buyer. Details exposed included client names and personal identity information from ID documents like passports and driving licenses. RansomHub failed to secure a ransom by the imposed deadline and opted to auction the data as a strategic pivot. Experts believe the actual success of this auction tactic in generating payouts is minimal and often serves more as a symbolic gesture or face-saving measure. There is skepticism about the scale of the breach and the effectiveness of auctioning off stolen data in the cybercrime community.
Details
2024-06-04 14:03:41 theregister DATA BREACH Microsoft Accused of GDPR Violations in Education Software
A privacy group has lodged a complaint with the Austrian data protection authority against Microsoft 365 Education for potential GDPR breaches. Noyb, the privacy organization, alleges that Microsoft imposes data protection responsibilities on schools while shirking its own obligations. The complaint emphasizes that Microsoft’s system lacks transparency in processing children’s data and does not comply adequately with the data access rights of individuals. It is claimed that schools are powerless in negotiating or altering how Microsoft processes user data, resulting in most decision-making and profit going to Microsoft. Additionally, noyb has filed a second complaint stating that Microsoft 365 Education installs cookies without consent, using them for behavioral analysis and advertising purposes. Noyb's actions follow historical successes by its honorary chairman, Max Schrems, in challenging inadequate data protection agreements between the EU and the US. The group is pressing for the Austrian data protection authority to enforce more stringent checks and penalties if GDPR violations are confirmed.
Details
2024-06-04 14:03:41 bleepingcomputer MISCELLANEOUS How to Secure Microsoft Copilot in Corporate Environments
Microsoft Copilot boosts employee productivity by integrating with Microsoft 365 tools like Word, PowerPoint, and Excel, acting as an analyst, copywriter, notetaker, and designer. While enhancing efficiency, there is a significant risk that Copilot could access and share sensitive corporate information unintentionally. Copilot generates content based on the data it can access within the Microsoft suite, potentially exposing sensitive data if not properly controlled. Organizations must implement stringent access controls and label sensitive data to prevent unwanted data exposure through Copilot. Employees with Copilot access should receive training on the risks of inadvertent data sharing and the importance of reviewing materials before sharing externally. Admins need to rigorously define user access and roles concerning file access on corporate drives to mitigate the risk of data leaks through GenAI use. Enterprises should take careful measures to establish security around GenAI tools like Microsoft Copilot to maintain confidentiality and data integrity in their operations.
Details
2024-06-04 12:05:41 theregister MALWARE Cybercriminals Utilize BoxedApp to Evade Detection and Analysis
Malware creators are increasingly leveraging BoxedApp, a legitimate commercial packer, to avoid detection by security systems. Jiří Vinopal from Check Point Research highlights a significant rise in malware using BoxedApp, most commonly with remote access trojans like Agent Tesla, AsyncRAT, and QuasarRat, as well as ransomware and infostealers. The use of BoxedApp allows malicious software to bypass static analysis and stay undetected longer, giving attackers more time to access sensitive data. Despite a spike in usage since March 2023, antivirus solutions show a high false positive rate when scanning applications packed with BoxedApp, sometimes leading to decreased alertness in security operations centers. Check Point Research's analysis of 1,200 malicious samples on VirusTotal revealed that 25% were flagged, indicating that while detections occur, they may not be consistently reliable. Security expert Sean Wright suggests limiting the use of BoxedApp applications and recommends signing applications to reduce false positives. Majority of the malicious samples submitted from Turkey, the US, and Germany were primarily targeting financial institutions and government sectors, exploiting advanced features like Virtual Storage offered by BoxedApp SDK. Check Point Research has developed Yara signatures to improve the detection of malicious use of BoxedApp, aiding in the identification and analysis of packed malware.
Details
2024-06-04 11:19:37 thehackernews MISCELLANEOUS Evolving Cybersecurity: From Browser Isolation to Secure Extensions
Traditional browser isolation has been foundational in protecting against malware and browser exploits but falls short against modern web threats like phishing. Limitations of traditional browser isolation include significant performance degradation, impacting business productivity. The necessity for more advanced solutions has led to the development of Secure Browser Extensions, enhancing both security and user experience. Secure Browser Extensions use machine learning to analyze web components in real-time, identifying threats such as malicious downloads and credential theft. These extensions integrate seamlessly into browsers, require minimal CPU resources, and do not impact browser performance. Easy deployment of Secure Browser Extensions on both managed and unmanaged devices caters to a variety of workplace environments. The shift towards these extensions represents an evolution in cybersecurity strategies, addressing both legacy and emerging threats effectively.
Details
2024-06-04 11:09:11 thehackernews MALWARE Sophisticated Multi-Stage Malware Attack Targets Ukraine via Excel
Sophisticated cyber attack in Ukraine using a Microsoft Excel file with a malicious VBA macro to deploy Cobalt Strike. Attack begins with the victim being urged to enable macros in an Excel document, which then triggers malware deployment. The malware, hidden within macro-enabled documents, downloads additional payloads if the system geo-location is confirmed as Ukraine. Malware includes evasion techniques such as process checking for security applications and conditional execution based on geographic location. Final payload involves a Cobalt Strike Beacon, establishing a remote command-and-control channel for further malicious activities. Attackers use encoded and obfuscated files to bypass security measures and ensure persistent presence on the infected systems. Microsoft has taken steps like blocking macros by default to mitigate such threats, impacting how the malware operates post-July 2022.
Details