Tuesday, July 30, 2024
Interesting: AI Can Reveal What’s on Your Screen (sort of)
Federico Larroca at the University of the Republic in Montevideo, Uruguay, and his colleagues have developed an AI model that can reconstruct an image from digital signals that were intercepted a few metres away from an HDMI cable...
Around 30 per cent of characters were misinterpreted by the eavesdropping process, but that is low enough that humans can read most of the text accurately, the team says. This error rate is about 60 per cent lower than the previous state-of-the-art attack, the researchers add. more
Saturday, July 20, 2024
One Way Corporate Espionage Spies Cover Their Tracks
From the IP vendor's ad...
"In the fiercely competitive business battlefield, information is power, and how to obtain and use this information has become a problem that every company needs to face. In this spy war without gunpowder, residential proxy IP is like an invisible cloak, providing strong protection and support for enterprises.
Residential proxy IP, as the name suggests, is to use the IP address of an ordinary home network environment for network access. Because these IP addresses come from real home users, they are difficult to identify and track. By using residential proxy IP, enterprises can hide their real IP address and avoid being discovered by competitors or network monitoring agencies. In this way, enterprises can access target websites, crawl data, analyze competitors' strategies, etc. more freely without worrying about being blocked by anti-crawler mechanisms or IP being blocked." more
Wednesday, November 30, 2022
Under Appreciated Espionage Attach Vector - Computer Repair Shops
Researchers at University of Guelph in Ontario, Canada, recovered logs from laptops after receiving overnight repairs from 12 commercial shops. The logs showed that technicians from six of the locations had accessed personal data and that two of those shops also copied data onto a personal device. Devices belonging to females were more likely to be snooped on, and that snooping tended to seek more sensitive data, including both sexually revealing and non-sexual pictures, documents, and financial information. more
Friday, July 30, 2021
Better Not Lose Your Laptop - A Cautionary Tale
via Dolos Group, LLC
What can you do with a stolen laptop?
Can you get access to our internal network?
That was the question a client wanted answered recently. Spoiler alert: Yes, yes you can. This post will walk you through how we took a “stolen” corporate laptop and chained several exploits together to get inside the client’s corporate network.
Thursday, February 11, 2021
People need InfoSec tips. People want TikTok-style Sea Shanties...
So Rachel Tobac of Social Proof Security gave the people what they want:
a TikTok-style sea shanty about infosec. more sing-a-long
Thursday, January 7, 2021
Spy Chip Detector to Thwart Spy Chip Semiconductors
Toshiba and Japan's Waseda University have teamed up to develop a system that can detect so-called spy chips, tiny intruders in servers that are barely visible to the naked eye or are even incorporated in circuitry.
Spy chips made headlines about two years ago when China allegedly planted the devices into servers, which reportedly reached 30 American companies. The tool, called HTfinder, determines if a semiconductor contains spy chips based on the makeup of the circuits...Spy chips can be hidden
in semiconductors and circuit boards by resembling part of the circuit.
The chips can receive signals so that third parties can take control or
cause a device to malfunction at any given time. more
Tuesday, December 22, 2020
Yet Another Air-Gapped Computer Hack
Academics from an Israeli university have published new research today detailing a technique to convert a RAM card into an impromptu wireless emitter and transmit sensitive data from inside a non-networked air-gapped computer that has no Wi-Fi card.
Named AIR-FI, the technique is the work of Mordechai Guri, the head of R&D at the Ben-Gurion University of the Negev, in Israel.
Over the last half-decade, Guri has led tens of research projects that investigated stealing data through unconventional methods from air-gapped systems.
These types of techniques are what security researchers call "covert data exfiltration channels." They are not techniques to break into computers, but techniques that can be used to steal data in ways defenders aren't expecting. more
Saturday, July 25, 2020
DHS Gives Federal Agencies 24 hours to Patch Critical Microsoft Windows Vulnerability
Thanks, Mike.
--------------------
Wednesday, May 27, 2020
Data Breach Report: 28% Involved Small Businesses
Currently, in its 13th year, the DBIR is an industry-standard when it comes to gauging the state of cybersecurity around the world...
Click to Enlarge |
Friday, May 15, 2020
NJCCIC Publishes: Tips for Teleworkers, Remote Access Security
For those organizations, policies, educational programs, technologies, and support services for the remote workforce are well established. For organizations engaging in telework for the first time, defining expectations is a good starting point.
First, create a telework policy that addresses the following:
- The scope of the telework program, roles and responsibilities, eligibility to telework (not all jobs can be performed remotely),
- work hours and paid time-off,
- the suitability of the alternate workplace and its related safety requirements,
- responsibility for equipment and supplies,
- operating costs and expenses,
- and requirements for physical and information security. more
Tuesday, May 5, 2020
Air-Gapped PC Power Supplies Spills the Screens
In February this year, it was reported that hackers can steal data from air-gapped PC using screen brightness and now the same can be done through their power supply.
Mordechai Guri, a cybersecurity researcher from the Israeli Ben Gurion of the Negev University has conducted an experiment that shows how power supply units (PSUs) can be exploited to extract information from both an air-gapped & audio-gapped computer.
Termed as POWER-SUPPLaY; the malware exploits the PSU using it as an “out-of-band, secondary speaker with limited capabilities”. The data that can be extracted includes different files & information of the user’s keystrokes transmittable up to 1 meters away along with passwords and encryption keys that the attacker could receive with a device that is five meters away from such as a smartphone...
The research does not deal with the question of how the malware will be implemented in the first place. The technique is very clever nonetheless. more
Sunday, April 19, 2020
Office Printers: The Ticking IT Time Bomb
Office printers don’t have to be security threats: with foresight and maintenance they’re very easily threat-proofed. The problem is that system administrators rarely give the humble printer (or scanner, or multifunction printer) much attention.
Hackers haven’t forgotten about printers – not by a long shot. Last summer, a Russian hacker group penetrated numerous organizations by first infiltrating unprotected printers, which were connected to the same network as every other device, and then laddering up to exploit increasingly sensitive areas.
Furthermore, according to a recent report, foreign governments can also easily conduct industrial espionage by targeting this under-the-radar beachhead into the organizational networks...
Using third parties to continually help identify security risks is a smart course of action for enterprises that are truly serious about security measures. more
Managers: Don’t Rush to Workplace Spyware during Pandemic
With millions of employees working remotely due to the coronavirus pandemic, managers—likely new to virtual management—are scrambling to find the best ways to oversee them online.
Computer performance monitoring may interest those looking for “an extra set of eyes,” but workplace surveillance is not that simple, according to John Aiello, an expert in organizational psychology at Rutgers School of Arts and Sciences.“While spy software may relieve the manager’s anxieties, organizations will see an increase in stress on employees and it could decrease productivity,” said Aiello, who has researched the electronic monitoring of workers over the last three decades.
Topics addressed...
How does monitoring software affect productivity?
How does implementing this surveillance affect managers?
Can electronic monitoring be used for “the greater good?”
If employers are thinking about implementing this surveillance, what might be done first?
more
Tuesday, April 14, 2020
500,000 Hacked Zoom Accounts Given Away - Free On The Dark Web
The cyber risk assessment experts at Cyble recently discovered a hacker selling stolen Zoom credentials at dirt-cheap prices — and in some cases giving them away for free.
Cyble purchased more than 530,000 on an underground hacking forum for next to nothing. Several of the company’s clients were among the stolen credentials, which also included personal meeting URLs and Zoom host keys. Cyble reached out and confirmed that the credentials were indeed valid.
Password re-use remains a huge security issue for the general public. Fatigued users feel like they can’t remember yet another password so they set up new accounts using an old stand-by.
The problem is that by now all of those old stand-by passwords have been filed away in databases by criminal hackers. They’re actively using them to break into accounts using brute force attacks.
Usernames, email addresses, and passwords have been exposed by the billions over the past several years. Creating a new account on Zoom — or any service, for that matter — is simply not a good idea.
Hackers will come knocking. It’s not a question of if. It’s a question of when. more
Spybuster Tip # 053 - Upgrade all your passwords.
Spybuster Tip # 054 - Don't worry about having to remember all your passwords. Use a password vault.
Tuesday, April 7, 2020
Taiwan Joins Canada & More in Banning Zoom
Malaysia - The National Security Council (NSC) has warned that hackers could be listening to their conversations amid increasing use of video conferencing applications during the movement control order (MCO) period. more
New York City's education department is directing teachers and staff to “move away from using Zoom as soon as possible” for virtual instruction purposes due to cybersecurity concerns, department spokesperson Danielle Filson said on Saturday. more
Google has banned Zoom from its staffers' devices. Google told its employees last week that it would block Zoom from working on their Google-provided computers and smartphones. This move comes after Taiwan tolds government employees not to use Zoom. Earlier, New York schools told its teachers to "gradually transition" from Zoom to another video-conferencing service. more
New iPad Pro Prevents Eavesdropping or Spying
Apple introduced a feature with the 2018 MacBook lineup, allowing the microphone to be disabled whenever the display lid was closed. This measure was put in place to prevent eavesdropping, preventing malicious apps to tap into the microphone to gather extra data about you.
Fast forward to 2020 and the feature has come to the new iPad Pro lineup. The way it works is pretty simple - just close the lid of the case on the iPad Pro, which has to be MFi compliant, and the microphone is physically disconnected to prevent any sort of eavesdropping or malicious code from running if iPadOS is compromised in some way. more
Friday, April 3, 2020
Zoom’s Encryption Is “Not Suited for Secrets” and Has Surprising Links To China, Researchers Discover
Zoom could not be reached for comment. more
4/15/2020 UPDATE - More top companies ban Zoom following security fears. more
Wednesday, April 1, 2020
Guest Wi-Fi Access Comes with Risks for Organizations
In this case, a stolen access code was used to gain access. In many organizations the same guest code is given out to all guests. Sometimes it is even posted. Often it is never changed. Once the password is out, there is no telling who will access the system, or when, or for what purpose.
Downloading illegal images is only one of many guest access risks.
While hiding behind a reputable IP address unauthorized and anonymous "guests" can also conduct: drug transactions, video voyeurism, blackmail, financial scams, hacking, and more. The finger points at the organization's network. They might be legally held responsible. And, these are just the outward facing threats. Guest access can also be a pivot point to internal information theft.
Take this 15 second assessment.
Does your organization...
- Provide guest Wi-Fi access?
- Does guest access use the organization's network?
- Is access unencrypted?
- Do all guests use the same password?
- Is the password posted anywhere, as in a conference room?
- If posted, can it be seen from outside with binoculars or a drone?
- Has the password remained the same for over a month?
Legal defense is expensive. Reputational damage is hard to quantify. A proactive professsional analysis is easy. Reduce risk and keep profits where they belong, in the bottom line.
Monday, March 30, 2020
Being Zoom'ed on Zoom has Organizations Worried, or they should be...
Mysterious Hacker Group Eavesdropping on Corporate Email & FTP traffic
Instead of abusing the device to launch DDoS attacks or re-route traffic as part of a proxy network, the hackers turned into a spy-box...
...researchers didn't speculate why hackers were collecting FTP and email traffic. But speaking to ZDNet over the phone, a security researcher pointed out that this looked like a classic reconnaissance operation...
"It's obvious they're logging traffic to collect login credentials for FTP and email accounts," the researcher told ZDNet. "Those creds are flying unencrypted over the network. They're easy pickings." more