Cyber (In)Securities – Issue 131

CyAN

Information Security News

EU Looks to Tech Sovereignty with EuroStack Amid Trade War

Biometric Update by Masha Borak
The European Union is making significant strides towards tech sovereignty with the development of EuroStack, a comprehensive technology initiative aimed at reducing dependence on foreign tech giants amid ongoing trade tensions. This ambitious project seeks to bolster the EU’s capabilities in digital services and infrastructure, promoting a self-reliant approach to technology that aligns with its strategic economic and security interests.
EuroStack is poised to enhance data protection, cloud computing, and overall digital autonomy for the EU, marking a pivotal shift in the global tech landscape as Europe navigates the complexities of international trade and tech dominance.
Read more

Trump Coins Used as Lure in Malware Campaign

SecurityWeek by Kevin Townsend
In a novel cyberattack, malicious actors are exploiting the popularity of Trump-themed commemorative coins to distribute malware. This campaign targets supporters through phishing emails that offer a chance to purchase these coins, only to infect their systems with malicious software when they attempt to engage.
The deceptive emails are crafted with convincing details and a call to action that redirects users to compromised websites. This strategy highlights a growing trend of using political memorabilia and current events as bait, reflecting an evolution in social engineering tactics aimed at specific demographic groups.
Read more

Experts Warn of Mass Exploitation of Critical PHP Flaw CVE-2024-4577

Security Affairs by Pierluigi Paganini
Cybersecurity experts are raising alarms about a critical vulnerability in PHP, identified as CVE-2024-4577, which is being exploited on a massive scale. This severe flaw allows attackers to execute arbitrary code on servers running vulnerable versions of PHP, potentially compromising millions of websites and web applications.
The widespread use of PHP in server-side scripting for web development makes this vulnerability particularly dangerous. Security professionals urge immediate patching and updates, as exploiting this flaw can give attackers control over web servers, leading to data theft, site defacement, and further network compromise.
Read more

‘SideWinder’ Intensifies Attacks on Maritime Sector

Dark Reading by Jai Vijayan
The cyber threat group known as SideWinder is intensifying its targeted attacks on the maritime sector, deploying sophisticated tactics to infiltrate networks and steal sensitive information. This group’s activities have raised significant security concerns within the maritime industry, which is crucial for global trade and logistics.
SideWinder’s methods include using advanced malware and phishing attacks to gain access to ship management systems and port authority databases, aiming to disrupt operations and gather strategic data. The escalation of these attacks underscores the need for enhanced cybersecurity measures in critical infrastructure sectors to protect against increasingly adept and persistent threat actors.
Read more

X Outages Reportedly Caused by Massive Cyberattack

ZDNet by Lance Whitney
A significant cyberattack is reported to be the cause behind recent widespread outages of the social media platform X. This attack highlights the vulnerabilities in digital platforms that are increasingly becoming targets for sophisticated cyber threats.
The cyberattack not only disrupted service for millions of users worldwide but also raised concerns about data security and the robustness of infrastructure against such incursions. The incident has prompted urgent calls for stronger cybersecurity protocols and resilience strategies to shield against future disruptions and potential data breaches.
Read more

Multiple Vulnerabilities Found in ICONICS Industrial SCADA Software

Cyberscoop by Derek B. Johnson
Recent findings have revealed multiple vulnerabilities in ICONICS industrial SCADA software, posing significant risks to critical infrastructure systems that depend on this technology for operational control and monitoring. These vulnerabilities could allow cyber attackers to manipulate controls, alter configurations, or even shut down operations, potentially leading to severe consequences in sectors like energy, manufacturing, and water treatment.
The discovery underscores the critical need for continuous vulnerability assessments and prompt patching within industrial systems to safeguard them from potential cyber threats and ensure the continuity of essential services.
Read more

Swiss Critical Sector Faces New 24-Hour Cyberattack Reporting Rule

BleepingComputer by Bill Toulas
Switzerland has introduced a stringent new regulation requiring critical sector organizations to report cyberattacks within 24 hours of detection. This rule aims to enhance national cybersecurity resilience by ensuring swift and coordinated response efforts to digital threats.
The legislation covers entities in essential services such as healthcare, transportation, finance, and utilities, emphasizing the importance of transparency and prompt communication in mitigating the impacts of cyber incidents. The move reflects a growing global trend toward tighter cyber regulations as governments seek to fortify defenses against the increasing frequency and sophistication of cyberattacks.
Read more

Researchers Expose New Polymorphic Attack That Clones Browser Extensions to Steal Credentials

The Hacker News by Ravie Lakshmanan
Security researchers have uncovered a new polymorphic attack technique that clones legitimate browser extensions to stealthily steal user credentials. This sophisticated method involves altering the code of popular extensions, turning them into trojans that can capture sensitive information such as passwords and banking details without alerting users or security systems.
The findings highlight a significant escalation in browser-based threats, emphasizing the need for users to verify the authenticity of extensions and maintain updated anti-malware solutions. The report calls for heightened awareness and stricter security practices to counteract these deceptive strategies that exploit the trust in commonly used digital tools.
Read more

Rhysida Pwns Two US Healthcare Orgs, Extracts Over 300K Patients’ Data

The Register by Connor Jones
The cyber threat group Rhysida has successfully breached two US healthcare organizations, compromising the personal and medical information of over 300,000 patients. This sophisticated attack highlights the increasing vulnerability of the healthcare sector to cyber incursions, which can have devastating consequences for patient privacy and institutional integrity.
The hackers utilized advanced tactics to infiltrate network defenses and exfiltrate a significant amount of sensitive data, underscoring the critical need for healthcare entities to enhance their cybersecurity measures. This incident serves as a stark reminder of the importance of robust security protocols and continuous monitoring to protect patient information against such malicious activities.
Read more

Former NSA Cyber Director Warns Drastic Job Cuts Threaten National Security

Cybersecurity Dive by David Jones
The former director of NSA’s cyber division has issued a stark warning that significant job cuts within the agency pose a serious threat to national security. These reductions in cybersecurity personnel come at a time when cyber threats are becoming more frequent and sophisticated.
The former director emphasizes that decreasing the number of skilled cybersecurity professionals undermines the country’s ability to defend against and respond to cyber incidents effectively. This alert calls for urgent reconsideration of budget and staffing decisions to ensure the NSA and other critical security agencies are well-equipped to safeguard national interests in the digital age.
Read more

SilentCryptoMiner Infects 2,000 Russian Users via Fake VPN and DPI Bypass Tools

The Hacker News by Ravie Lakshmanan
A new malware known as SilentCryptoMiner is targeting Russian users by masquerading as legitimate VPN and DPI (Deep Packet Inspection) bypass tools. The malware has already infected approximately 2,000 individuals, covertly mining cryptocurrency using the resources of compromised systems.
This campaign highlights the dangers of downloading software from unverified sources, as attackers capitalize on the demand for privacy tools in regions with strict internet regulations. The incident underscores the need for heightened vigilance and the importance of using trusted channels for software downloads to prevent such deceptive and harmful intrusions.
Read more

US Cities Warn of Wave of Unpaid Parking Phishing Texts

BleepingComputer by Lawrence Abrams
Several US cities are issuing warnings about a new phishing scam involving unpaid parking tickets. The scam sends text messages to individuals, falsely claiming they have unpaid parking fines and directing them to a fraudulent website.
Once on the site, victims are prompted to enter personal information, which the scammers can then use for identity theft or financial fraud. This wave of phishing attacks highlights the increasingly cunning tactics used by cybercriminals to exploit everyday situations. Authorities are urging the public to verify any such claims through official municipal channels and to be cautious about providing personal information online.
Read more

NCSA Ordered to Step Up Preparations Against Cyber Warfare

The Nation
The Thai National Cyber Security Authority (NCSA) has been ordered to intensify its preparations against potential cyber warfare threats. This directive comes in response to escalating global cyber tensions and the increasing sophistication of potential cyber-attacks that could target critical national infrastructure.
The NCSA’s enhanced focus aims to bolster the country’s defenses by developing more advanced cyber response strategies, conducting regular security drills, and strengthening collaborations with international cybersecurity entities. This proactive approach is designed to ensure the nation remains resilient in the face of growing cyber threats and can effectively mitigate the impact of any cyber-attacks.
Read more

Internet Shutdowns at Record High in Africa as Access ‘Weaponized’

The Guardian by Eromo Egbejule
Internet shutdowns have reached a record high across Africa, with governments increasingly ‘weaponizing’ access to control information and suppress dissent. This trend is alarming advocates for freedom of expression and digital rights, as shutdowns not only curtail civil liberties but also impact economies and disrupt everyday life.
The use of internet blackouts as a political tool is particularly prevalent during protests, elections, and civil unrest, raising serious concerns about the erosion of democratic norms. This pattern underscores the urgent need for international dialogue and policy interventions to protect internet access as a fundamental right and to prevent its use as a tool for political manipulation.
Read more

Stalked: How a Relentless Campaign of Online Abuse Derailed One Woman’s Life

The Observer by Carole Cadwalladr
This in-depth article chronicles the harrowing experience of a woman whose life was dramatically affected by a relentless campaign of online abuse. It explores the devastating impact of cyberstalking, which included constant harassment, the spreading of personal information, and threats that extended beyond the digital realm into her physical life.
The case study sheds light on the psychological and social repercussions of such targeted attacks, highlighting the insufficient legal protections and the often inadequate response from law enforcement agencies. This story calls for stronger regulatory measures and more robust support systems to protect individuals from cyber harassment and to hold perpetrators accountable.
Read more

White House Cyber Director’s Office Set for More Power Under Trump, Experts Say

The Record by Suzanne Smalley
According to experts, the office of the White House cyber director is poised to receive expanded powers under the Trump administration. This move aims to enhance the national cybersecurity strategy by centralizing authority and improving coordination among various federal agencies involved in cyber defense.
The bolstering of the cyber director’s office reflects an acknowledgment of the growing cyber threats facing the United States and the need for a more unified government response. Experts suggest that this restructuring will enable more effective policy-making and operational decisions in cybersecurity, potentially leading to stronger protections against cyberattacks on national infrastructure.
Read more

Undocumented Commands Found in Bluetooth Chip Used by a Billion Devices

BleepingComputer by Bill Toulas
Recent discoveries have revealed undocumented commands in a widely used Bluetooth chip, present in over a billion devices, raising significant security concerns. These hidden commands, if exploited, could potentially allow attackers to execute arbitrary actions on affected devices without the user’s knowledge.
This vulnerability underscores the critical importance of hardware security and the potential risks associated with overlooked or hidden functionalities in common technology components. The exposure of such commands highlights the need for manufacturers to conduct thorough security audits and for users to ensure their devices are regularly updated to mitigate any potential threats arising from such vulnerabilities.
Read more

Japanese Telecom Giant NTT Suffered a Data Breach That Impacted 18,000 Companies

Security Affairs by Pierluigi Paganini
The Japanese telecommunications giant NTT disclosed a significant data breach impacting approximately 18,000 corporate clients. This breach involved unauthorized access to a wide range of sensitive data, potentially exposing business secrets and personal information.
The incident highlights vulnerabilities in telecommunications networks that can have far-reaching consequences for both the service provider and its extensive client base. NTT has initiated a comprehensive security overhaul and is collaborating with law enforcement to investigate the breach. This event underscores the need for enhanced cybersecurity measures and continuous vigilance to protect against sophisticated cyber threats in an increasingly interconnected world.
Read more

Cyberattacks Targeting IT Vendors Intensify, Causing Bigger Losses

Cybersecurity Dive by Alexei Alexis
The frequency and severity of cyberattacks targeting IT vendors have dramatically intensified, resulting in substantial financial and operational losses. This trend is particularly alarming as IT vendors often serve as gateways to broader networks, making them attractive targets for cybercriminals looking to exploit multiple victims through a single entry point.
These attacks not only disrupt IT operations but also compromise the security of their clients’ data and systems. The article highlights the growing need for IT vendors to implement robust cybersecurity strategies, including multi-factor authentication, regular security audits, and employee training, to mitigate the risks and protect both their assets and those of their clients.
Read more

YouTubers Extorted via Copyright Strikes to Spread Malware

BleepingComputer by Bill Toulas
An emerging cyber threat involves extortion of YouTubers through the manipulation of copyright strike processes to distribute malware. Cybercriminals are targeting content creators by threatening them with copyright strikes, which can severely impact their channel and revenue unless they comply with demands that often include downloading malware-laden software.
This strategy not only exploits the legal copyright mechanisms but also turns them into a tool for cyber extortion. The practice highlights a new form of cybercrime that blends traditional copyright abuse with digital extortion, significantly complicating the security landscape for online content creators. It underscores the importance of vigilance and legal awareness among YouTubers to protect against such sophisticated and damaging attacks.
Read more

Developer Sabotaged Ex-Employer with Kill Switch Activated When He Was Let Go

The Register by Iain Thomson
A developer orchestrated a sabotage attack against his former employer by implementing a kill switch that activated upon his dismissal. This deliberate act caused significant disruption to the company’s operations, as critical systems were disabled, leading to downtime and financial losses.
The incident underscores the potential risks associated with insider threats and the importance of maintaining stringent security protocols, especially regarding access control and monitoring of sensitive systems. The company has since taken steps to bolster its security measures and review its policies to prevent such occurrences in the future, highlighting the need for continuous vigilance and robust security practices in the workplace.
Read more

ANALYSIS

Cybersecurity is a ‘Continual Battle,’ but Industry Can’t Be ‘Complacent,’ Experts Say

Security Systems News by Cory Harris
Experts in cybersecurity are emphasizing that the fight against cyber threats is an ongoing battle that requires constant vigilance and adaptation. This article discusses the ever-evolving nature of cyber threats and the critical importance of staying proactive in cybersecurity practices.
Industry leaders warn against complacency, highlighting that as technology advances, so do the tactics of cybercriminals. Harris, editor of Security Systems News, advocates for continuous investment in cybersecurity infrastructure, regular updates to defensive strategies, and ongoing training for all staff. The message is clear: the cybersecurity landscape is dynamic and requires perpetual effort and innovation to keep data and systems safe.
Read more

Rapid7’s Chief Scientist Warns Australian Businesses to Prioritize Their Ransomware Policies

itWire by Grant Titmus
Rapid7’s Chief Scientist, Raj Samani, has issued a stark warning to Australian businesses regarding the escalating threat of ransomware attacks. Samani is urging companies to prioritize their ransomware response policies and strengthen their cybersecurity defenses to combat this pervasive threat.
His call to action comes amid rising incidents of ransomware across Australia, which are increasingly sophisticated and disruptive. The article highlights the necessity for businesses to implement comprehensive security measures, including regular data backups, employee training on phishing awareness, and robust incident response plans. The emphasis is on preparation and resilience, aiming to mitigate potential impacts and ensure business continuity in the face of these cyber challenges.
Read more

CyAN Members: Op Eds, Articles, etc:

Copy of FY2024 IT and Cybersecurity Spending Analysis (Selected ASX 200 Companies)

CyAN Member Nick Kelly
CyAN Member Nick Kelly provides a detailed analysis of the FY2024 IT and cybersecurity spending across selected ASX 200 companies, revealing significant trends and investment patterns. This report underscores the growing emphasis on cybersecurity in the corporate sector, reflecting increased allocations toward enhancing digital defenses.
Kelly’s analysis points out that despite economic pressures, companies are prioritizing investments in cybersecurity to address the escalating threat landscape. The document serves as a crucial resource for understanding how top Australian companies are strategically positioning their resources to combat cyber threats, offering valuable insights into the prioritization of IT and cybersecurity expenditures in response to evolving challenges.
Read more

Upcoming CyAN (and CyAN Partner) Global Events:

CyAN APAC: The Geopolitical Impacts of Cyber Threats: From Espionage to Influence

Keynote by Dan Elliot
📅 Date: March 12
📍 Location: Peoplebank, Sydney
🔗 Event details


Trust & Safety Forum at Forum INCYBER Europe (FIC)

📅 Date: April 1-2
📍 Location: Lille, France
🔗 Event details


CyAN Quarterly Online Members Meeting (CyAN Members Only)

📅 Date: March 19
📍 Location: Online
📩 See emails for details


GITEX AFRICA 2025

📅 Date: April 14-16
📍 Location: Marrakesh, Morocco
🔗 Event details


GITEX ASIA 2025

📅 Date: April 23-25
📍 Location: Marina Bay Sands, Singapore
🔗 Event details


GISEC Global 2025

📅 Date: May 6-8
📍 Location: Dubai World Trade Center, UAE
🔗 Event details


The Cyber Outstanding Security Performance Awards (Cyber OSPAs)

📅 Date: May 8
📍 Location: London, UK
🔗 Event details


World AI Technology Expo UAE

📅 Date: May 14-15, 2025
📍 Location: Dubai, UAE
🔗 Event details


MaTeCC: North Africa Cybersecurity Event

📅 Date: June 7-9, 2025
📍 Location: Rabat, Morocco
🔗 Event details