Trend Micro’s Robert McArdle says cybercriminals use of AI is far more limited than many realize, and pales in comparison to defenders’ use of the technology
Category Archives: News
Smashing Security podcast #392: Pasta spies and private eyes, and are you applying for a ghost job?
A Facebook friend request leads to arrest, Twitter scams ride again via promoted ads, and adult websites expose their members. Oh, and Graham finds out what Rule 34 is.
All this and more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault.
Cyber-Attack on Microlise Disrupts DHL and Serco Tracking Services
A cyber-attack targeting telematics provider Microlise has disrupted tracking services for key clients like DHL and Serco
IRISSCON: Organizations Still Falling Victim to Predictable Cyber-Attacks
Organizations remain unprepared to defend against known and predictable attacks like ransomware
Winos4.0 Malware Found in Game Apps, Targets Windows Users
Winos4.0 malware, derived from Gh0strat, targets Windows users via game-related applications, enabling remote control of affected systems
Massive Nigerian Cybercrime Bust Sees 130 Arrested
The Nigerian police have arrested 113 foreign individuals and their 17 Nigerian collaborators for their alleged involvement in high-level cybercrimes
IoT Devices in Password-Spraying Botnet
Microsoft is warning Azure cloud users that a Chinese controlled botnet is engaging in “highly evasive” password spraying. Not sure about the “highly evasive” part; the techniques seem basically what you get in a distributed password-guessing attack:
“Any threat actor using the CovertNetwork-1658 infrastructure could conduct password spraying campaigns at a larger scale and greatly increase the likelihood of successful credential compromise and initial access to multiple organizations in a short amount of time,” Microsoft officials wrote. “This scale, combined with quick operational turnover of compromised credentials between CovertNetwork-1658 and Chinese threat actors, allows for the potential of account compromises across multiple sectors and geographic regions.”
Some of the characteristics that make detection difficult are:
The use of compromised SOHO IP addresses
The use of a rotating set of IP addresses at any given time. The threat actors had thousands of available IP addresses at their disposal. The average uptime for a CovertNetwork-1658 node is approximately 90 days.
The low-volume password spray process; for example, monitoring for multiple failed sign-in attempts from one IP address or to one account will not detect this activity.
Google Cloud to Mandate Multifactor Authentication by 2025
Google wants to ensure a smooth transition towards required MFA across all Google Cloud accounts with a phased rollout running throughout 2025
Snowflake Hacking Suspect Arrested in Canada
A man suspected of breaching hundreds of Snowflake accounts has been arrested
Global Operation Takes Down 22,000 Malicious IPs
Interpol claims an international policing operation has shuttered 22,000 IPs connected with cybercrime