4

Zack Whittaker (@[email protected]) - Mastodon

 1 year ago
source link: https://mastodon.social/@zackwhittaker
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
neoserver,ios ssh client
8d9baf4a241c8286.jpg

Zack Whittaker@[email protected]

Good morning from this happy one.

my cat Theo making a happy face with a head-scritch.

NEW: Belorussian hackers have targeted foreign diplomats in the country since Feb. 2022, at the start of the invasion of Ukraine.

Group targets them by intercepting traffic at the telecom provider level, suggesting government collaboration, per ESET.

Once ESET researchers spotted the hackers in 2022, they have been able to trace back their activities all the way back to 2014.

https://techcrunch.com/2023/08/10/belarus-hackers-target-foreign-diplomats/

c5b45322f5b55c02.png

The CSRB has released its second ever report on cyber safety, a study of a loosely affiliated hacker group that compromised dozens of well-defended companies with low-complexity attacks. https://www.cisa.gov/resources-tools/resources/review-attacks-associated-lapsus-and-related-threat-groups-report

New, by @carlypage: NCC Group confirms it is laying off more employees, months after cutting 7% of its workforce.

More: https://techcrunch.com/2023/08/10/ncc-group-layoffs/

NCC Group's logo on a red, pixelated and jittered background

NEW: Researchers set up a network of honeypot computers and watched more than 100 hours of hackers taking them over and using them.

The research gives insight into various types of hackers, their goals and levels of sophistication.

https://techcrunch.com/2023/08/09/researchers-watched-100-hours-of-hackers-hacking-honeypot-computers/

aee7038038634dca.png

Captured a rare blep sighting. (Yes, those are his leaves. Theo is a cat who likes to nest.)

my grey Russian blue cat Theo half asleep in a box with his tongue sticking out. there are dried leaves in shot.

More from @GossiTheDog on the U.K. voter register hack:

At the time of the cyberattack, the Electoral Commission was running an on-premise Exchange Server vulnerable to ProxyNotShell, a then-unpatched zero-day vulnerability. If exploited, ProxyNotShell can be used to gain "complete compromise" of a victim's network.

https://doublepulsar.com/uk-electoral-commission-had-an-unpatched-microsoft-exchange-server-vulnerability-5436f3f5ec2c

a screenshot from a Shodan listing of the Electoral Commission's public-facing on-premise Exchange server in late September 2022. While the server was up-to-date with patches from Microsoft, it was still vulnerable to a then-unpatched zero-day called ProxyNotShell.

#ProxyNotShell in Exchange Server fingered in UK Electoral Commission hack.

TechCrunch found Electoral Commission were using on prem Exchange.

I had a look via @shodan history feature - their Exchange Server, with OWA enabled, was online until later in 2022 (when the incident began) - and didn't have ProxyNotShell patches installed, as Microsoft hadn't released them.

The mitigations MS released were bypassable, as seen in the Rackspace Hosted Exchange hack.

https://techcrunch.com/2023/08/09/parsing-uk-electoral-commission-cyberattack/

New: A massive cyberattack targeting the U.K. voter register is one of the U.K.’s largest ever hacks, with more than 40 million voters affected.

TechCrunch has marked up 🖍️ the Electoral Commission's cyberattack notice to dissect what was said about the hack, and what was left out.

More: https://techcrunch.com/2023/08/09/parsing-uk-electoral-commission-cyberattack/

Union flag bunting is seen outside Canford Cliffs Library Polling station, as people go to the polls in the local elections in 2023

Yesterday I published a lengthy story for WIRED about the mystery around radiation spikes that occurred at Chernobyl during Russia's invasion of Ukraine. I've just posted a new edition of my Zero Day publication with additional information, analysis and images.

https://zetter.substack.com/p/radiation-spikes-at-chernobyl-a-mystery

8a628bbc38a27b66.jpg

Questions we've asked the U.K. Electoral Commission about the breach of ~40 million voter records:

• Why was there a year-long delay in publicly disclosing the breach from the known point of intrusion?

• Does the EC have the technical ability, such as logs, to determine what, if any, data was exfiltrated from its systems?

• The hackers accessed the EC's email system. Was this an on-premise server or hosted by a third-party? Was this the point of compromise?

More: https://techcrunch.com/2023/08/08/electoral-commission-hack-40-million-uk-voters/

a screenshot of the Electoral Commission's website with a notice about the cyberattack

The Electoral Commission has confirmed that as many as 40 million UK voters may be impacted after it fell victim to a "complex cyberattack". The attack was discovered in October (!), but the watchdog says hackers first accessed its systems in August 2021 https://techcrunch.com/2023/08/08/electoral-commission-hack-40-million-uk-voters/

887de2770baf378f.webp

Exclusive: After Russian troops seized control of the Chernobyl nuclear power plant last year, radiation sensors in the region started recording alarming spikes. The official Ukrainian explanation was that the spikes were caused by Russian military vehicles stirring up radioactive dust in the area. But that explanation has been disputed. Now the mystery deepens. Security researcher Ruben Santamarta has discovered suspicious patterns in the sensor data that suggest the data was possibly manipulated to fabricate the radiation spikes. Experts agree with him that it seems the most likely explanation. The question is if the data was manipulated, who did it and why?

Ruben will be presenting his findings on Thursday at the BlackHat security conference and will release a 100-page paper showing his research.

But you can read my detailed story about the findings and mystery surrounding the spikes here:

https://www.wired.com/story/chernobyl-radiation-spike-mystery/

one of the best genres of cyber news story is when someone sees an arXiv preprint paper about an incredible side channel attack via the acoustics of farts

A new, packed ~this week in security~ just went out, with:

• Cloud host assisted APT hackers
• FBI investigating multi-state hospital ransomware attack
• US warns of 'critical compromise' to Air Force comms
• Senate votes to allow weed users to get security clearance
• CISA says 2022's most exploited bug is...
• And a brand new cyber cat.

Sign up/RSS: https://this.weekinsecurity.com

Read online: https://mailchi.mp/zackwhittaker/this-week-in-security-august-6-2023-edition

9149d6b6c41e3347.jpg

New, by me: LetMeSpy, a spyware maker based in Poland, said it will shut down and cease operations after a hacker broke in and wiped out its servers.

Radeal CEO Rafal Lidwin, who develops the spyware, did not respond to a request for comment.

More: https://techcrunch.com/2023/08/05/letmespy-spyware-shuts-down-wiped-server/

a screenshot of a world map showing the victims' location data points in clusters around the U.S., India and parts of Africa.

About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK