Page 1,200«..1020..1,1991,2001,2011,202..1,2101,220..»

What is Encryption? – The Tech Edvocate

In todays digital age, where information is transmitted across networks and stored on servers, encryption has become a fundamental technique to ensure the confidentiality, integrity, and authenticity of data. Encryption is the process of converting plaintext, i.e., a piece of data that is readable and understandable, into ciphertext, i.e., a piece of data that is unreadable and incomprehensible, using a cryptographic algorithm.

An encryption system uses two essential components a key and an algorithm. The key is a piece of information that the encryption algorithm uses to transform the plaintext into ciphertext, and without the key, it is virtually impossible to decrypt the ciphertext back into plaintext. The algorithm, on the other hand, takes in the plaintext and the key as input and transforms the plaintext into ciphertext, which can only be decrypted back into plaintext using the same key and algorithm.

Encryption is used in various applications, such as online banking, e-commerce, email, and secure messaging applications. In online banking, the users account information is encrypted before being transmitted over the internet to prevent unauthorized access by hackers. Similarly, e-commerce websites encrypt the credit card information of their customers to protect it from cybercriminals who attempt to steal sensitive data.

Encryption also plays a significant role in securing communication channels. For example, email services such as Gmail and Outlook use encryption to protect the messages sent and received over their platforms. Secure messaging platforms such as WhatsApp, Telegram, and Signal use end-to-end encryption, which means that the messages are encrypted on the users device and can only be decrypted on the recipients device, ensuring complete privacy and security.

In addition to securing data, encryption is also used for digital signatures and certificates. Digital signatures verify the authenticity of a digital document or message and ensure that it has not been tampered with. Digital certificates, on the other hand, are used to authenticate the identity of users or devices and are issued by trusted certificate authorities.

In conclusion, encryption is an essential technique to ensure the security and privacy of digital data. In the era of increasing cyber-attacks and data breaches, encryption plays a vital role in protecting sensitive information and maintaining trust in digital communication and transactions. While there are debates about the use of encryption by governments and law enforcement agencies, it is undeniable that encryption is essential in maintaining the security and privacy of digital data.

The rest is here:
What is Encryption? - The Tech Edvocate

Read More..

Data at Rest Why Data Encryption, Data Security and Beneficial to … – CXOToday.com

Data at restmay be a known term to technology enthusiasts, but not for many others. So what does data at rest mean? It refers to data that is not actively being transferred, processed, or accessed by users or applications. This data is typically stored in databases, file systems, or other storage devices, such as hard drives, flash drives, or tape backup systems. Data at rest can include a variety of types of data, including personal information, financial data, intellectual property, and other sensitive or confidential information.

This data may be encrypted or protected by other security measures to prevent unauthorized access or theft. Ensuring the security of data at rest is an important aspect of information security, as it can be vulnerable to theft, hacking, or other unauthorized access if not properly protected. Organizations may use a range of security measures to protect data at rest, including access controls, encryption, and physical security measures such as locked data centers or storage rooms.

How is it beneficial to the IT teams?

Data at rest plays a critical role in IT as it allows organizations to protect, manage, and leverage their data assets effectively. In IT, data at rest is used for various purposes, including:

Data at rest needs security to protect sensitive information, comply with regulations, maintain reputation and protect intellectual property. Data encryption is an effective way to protect data at rest and helps to ensure that sensitive information remains confidential and secure. It helps protect data at rest by converting it into an unreadable form, making it difficult for unauthorized parties to access and read the data even if they gain physical access to the storage device where the data is stored. Here are some ways data encryption helps the data at rest:

But why is security necessary for data at rest considering it is actively being transferred, processed, or accessed by users or applications?

(The author is Prashanth GJ, CEO, TechnoBind Solutions, and the views expressed in this article are his own)

Read the original post:
Data at Rest Why Data Encryption, Data Security and Beneficial to ... - CXOToday.com

Read More..

Tor Project, LGBTQ groups and CDT sound alarm over efforts to … – SC Media

A group of more than 40 media and digital rights organizations are calling on Five Eyes nations and democratic governments around the world to reject efforts to weaken encryption and support a global vision of a free and open internet.

In recent years, governments around the world have been making (another) major push to pass laws that would force companies to give law enforcement access to encrypted communications built into their products, something encryption advocates say would amount to a dangerous backdoor.

In an open letter published Tuesday and sent to policymakers in the U.S., the European Union, Canada, the UK and India, dozens of organizations expressed alarm over a series of new laws that have either passed or are being considered by democratic countries, saying many would weaken privacy protections for activists, dissidents, journalists and citizens around the world who must operate in secrecy to stay safe.

Encrypted services are at the forefront of the battle for online privacy, freedom of the press, freedom of opinion and expression. Many journalists, whistleblowers and activists depend on secure, encrypted solutions to protect their data as well as their identity, the groups wrote. Access to these tools can be literally life or death for those who rely on them.

Signatories on the letter include the Tor Project, encrypted apps Threema and Tutanota, Proton AG (the Swiss makers of ProtonMail), digital rights nonprofits the Center for Democracy & Technology and Fight for the Future, the E-Governance and Internet Governance Foundation for Africa, and the Surveillance Technology Oversight Project (STOP).

The letter calls out nations from the Five Eyes alliance in particular, highlighting proposed legislation like the Eliminating Abusive and Rampant Neglect of Interactive Technologies Act of 2023 (EARN IT Act) in the U.S., the Online Safety Act in the UK and legislation under consideration in the Canadian Parliament as examples of a worrying trend that threatens privacy and security in some of the worlds foremost democracies. The term Five Eyes refers to an alliance intelligence agencies that include the United States and Australia, Canada, New Zealand and the United Kingdom.

Government attacks on encrypted services threaten privacy and puts users at risk. This might seem like a distant problem primarily faced in authoritarian countries but the threat is just as real and knocking at the doors of democratic nations, the groups write.

A group of 132 human rights and LGBTQ organizations sent a separate open letter to U.S. Congressional leaders Tuesday urging them not to pass the EARN IT Act.

The call for changing encryption laws has been an ongoing debate in many of these countries for decades, as technology and the internet has made phones and other devices critical to modern communication and a key source of evidence for law enforcement. The U.S. Department of Justice has waged multiple lobbying efforts since the 1990s to convince Congress to pass legislation requiring access to encrypted communications during investigations or when there is a warrant.

Service providers, device manufacturers, and application developers are deploying products and services with encryption that can only be decrypted by the end user or customer. Because of warrant-proof encryption,the government often cannot obtain the electronic evidence and intelligence necessary to investigate and prosecute threats to public safety and national security, even with a warrant or court order, the departments Office of Legal Policy wrote last year.

Tech companies have said there is no way to create that kind of access for legitimate criminal and national security investigations without watering down security protocols or placing encryption keys in the hands of the government or a third-party, where they could be abused, hacked or stolen.

The letter calls on nations to ensure legislatures arent engaging in overreach when they write laws around encryption, ensure encrypted communications arent being blocked or throttled to reduce access and revisit any bills, laws and policies that legitimize undermining encryption or blocking access to services offering encrypted communication.

See the rest here:
Tor Project, LGBTQ groups and CDT sound alarm over efforts to ... - SC Media

Read More..

Threatening Encryption, Senate Democrats Aid GOP War on Abortion – Tech Policy Press

Why are supposedly pro-choice Senators supporting bills that would make it harder for abortion seekers to communicate privately? asks Riana Pfefferkorn, a research scholar at the Stanford Internet Observatory.

Senate Judiciary Committee chair Dick Durbin (D-IL) recently highlighted the crucial role of digital privacy in Americans access to abortion care. During an April 26 hearing about the devastating impact on Americans reproductive rights of the Supreme Courts June 2022 decision to overturn Roe v. Wade, Sen. Durbin rightly noted that without robust privacy protections, abortion seekers leave a digital trail that can be used against them in states that have criminalized abortion.

So why are he and his fellow committee Democrats aiding the GOPs assault on abortion by supporting bills that threaten Americans ability to communicate privately about abortion care?

Two bills introduced last month would expand online services potential liability for child safety offenses by their users: the EARN IT Act, co-sponsored by Sen. Richard Blumenthal (D-CT) and Sen. Lindsey Graham (R-SC), and Sen. Durbins own STOP CSAM Act. Its already a federal crime if a service knowingly hosts child sex abuse material (CSAM, also known as child pornography). Under these new bills, when certain crimes against children occur on their services, tech companies could also be sued civilly by victims or charged by prosecutors at the state level.

These bills threaten Americans communication privacy by using the specter of potentially ruinous liability to disincentivize online services from offering end-to-end encryption, a widely-used technology that protects our digital communications. In encrypted apps like WhatsApp, iMessage, and FaceTime, messages and calls are encoded so that theyre decipherable only by the intended participants in a conversation. This makes encryption a vital tool for safeguarding sensitive communications including financial transactions, national security correspondence, attorney-client conversations, and so on.

However, because encrypted services cant read their users conversations or wiretap them for law enforcement, some members of Congress are concerned that criminals use encryption to hide their conversations. To that end, while neither bill overtly bans encryption, EARN IT and STOP CSAM both contain language that could let courts hold encrypted services liable for their users child safety offenses, which can be harder to detect in encrypted environments than unencrypted ones.

The bills potential to penalize encrypted services is no accident, as their sponsors have made clear: Sen. Blumenthal previously refused to amend EARN IT to avoid negatively impacting encryption, claiming he didnt want encryption to be a get-out-of-jail-free card for tech companies. More recently, Sen. Durbins comments at a February hearing framed end-to-end encryption as an impediment to protecting childrens safety.

The thing is, theres no way to make an end-to-end encrypted service that allows the detection only of malicious communications while keeping innocuous ones unreadable by outside eyes. Thats been the consensus of computer security experts for the last quarter-century. If Congress passes a law that induces encrypted services to remove or weaken their end-to-end encryption for fear of liability, that will affect everyone who uses these apps.

That includes someone trying to get an abortion in post-Roe America. For abortion providers, abortion seekers, and those who want to offer a helping hand, the ability to communicate privately and securely has never been more crucial. And using encryption is the best way to do that.

Encryption helps everyone involved in abortion care protect themselves. From law enforcement and prosecutors in states that have criminalized abortion. From anti-abortion activists motivated to hack into the communications of reproductive health clinics. From tech company employees whod like to sift through users messages, looking for someone they can turn in for a bounty.

To show that Democratic lawmakers really care about Americans abortion rights, they should embrace encrypted apps and encourage people to use them when discussing abortion care. Instead, its two Democrats who are leading the offensive against encryption in the Senate. Having just discussed digital privacys importance to post-Roe abortion access last Wednesday, Sen. Durbins committee is now considering bills that would harm digital privacy unless significant amendments are made.

The last time the committee voted on EARN IT, before the Supreme Court overturned Roe, every single Democrat voted yes. Now its 2023 and Roe has fallen and yet at todays hearing, they all voted yes again. Encouragingly, though, several members (including one Republican) raised the need to amend the bill to better protect encryption, with Sen. Alex Padilla (D-CA) noting encryptions importance to abortion access and recalling last weeks hearing on that topic. What remains to be seen is whether todays supportive comments about encryption will be translated into effective language in future versions of the EARN IT and STOP CSAM bills.

Abortion shouldnt be a crime. Neither should protecting users digital privacy. By pushing to make it easier for criminal investigators to access Americans private communications, Sens. Durbin and Blumenthal and every Democrat who joined them while staying silent about privacy are carrying water for the GOPs war on Americans reproductive rights. Lawmakers cant have it both ways: You simply cannot be both pro-choice and anti-encryption.

Riana Pfefferkorn is a Research Scholar at the Stanford Internet Observatory. She investigates the U.S. and other governments policies and practices for forcing decryption and/or influencing the security design of online platforms and services, devices, and products, both via technical means and through the courts and legislatures. Riana also studies novel forms of electronic surveillance and data access by U.S. law enforcement and their impact on civil liberties. Previously, Riana was the Associate Director of Surveillance and Cybersecurity at the Stanford Center for Internet and Society, where she remains an affiliate. Prior to joining Stanford, she was an associate in the Internet Strategy & Litigation group at the law firm of Wilson Sonsini Goodrich & Rosati, and a law clerk to the Honorable Bruce J. McGiverin of the U.S. District Court for the District of Puerto Rico. During law school, she interned for the Honorable Stephen Reinhardt of the U.S. Court of Appeals for the Ninth Circuit. Rianahas spoken at various legal and security conferences, including Black Hat and DEF CONs Crypto & Privacy Village. She is frequently quoted in the press, including the New York Times, the Washington Post, and NPR.Rianais a graduate of the University of Washington School of Law and Whitman College.

Related

Continue reading here:
Threatening Encryption, Senate Democrats Aid GOP War on Abortion - Tech Policy Press

Read More..

New EARN IT Act Has Old Issues – Duo Security

The latest version of the highly controversial EARN IT Act that is in committee in the Senate right now may be a more serious threat to strong encryption than the previous versions and could force platform providers into the decision not to even offer encrypted services, lawmakers, civil liberties and technology policy advocates say.

The current iteration of the EARN IT Act is the third one and like the others, its main focus is on identifying and eliminating child exploitation material online. But as in the other versions, the current bill has language that would increase the liability for platform operators that use end-to-end encryption on their services. The bill currently is in the Senate Judiciary Committee, and experts worry that if it passes it will have a severe impact on the security of the services platform owners such as Google, Meta, and others can offer.

The crux of the issue is whether platform operators should know and be responsible for all of the content that passes through their systems.

As introduced, EARN IT dramatically increases the risk of liability for any service that offers end-to-end encryption. Under EARN IT, the use of encryption (or the failure to weaken that encryption) cannot serve as an independent basis for liability. But EARN IT expressly permits courts to consider the use of encryption as evidence to support other claims including under state laws with a lower mens rea requirement, TechFreedom officials said in a letter to Judiciary Committee leaders.

In other words, under the terms of the proposed bill, platform owners would almost certainly have to know whats on the platforms, which would essentially eliminate the use of strong encryption. A separate bill called the STOP CSAM Act has similar language,

Current law does not immunize platforms for criminal conduct. The new bills would drastically drop that requirement so that theyre liable for negligence in civil suits. Platforms would likely have to know whats on the platforms, so they might set up automated content analysis, which is bad, and undermine encryption, said Cody Venzke, senior policy counsel at the ACLU.

Wyden, one of the strongest advocates for encryption and privacy on Capitol Hill, said hes concerned that lawmakers are putting their efforts in the wrong place.

CSAM is a problem and this bill is not the answer. The focus ought to be to help prevent kids from becoming victims in the first place, not on undermining security and privacy, said Sen. Ron Wyden (D-Ore.), during an online event Wednesday.

We need to pass comprehensive privacy legislation in this country. This fight has been the longest running battle since the Trojan War. The root cause of so much bad corporate behavior really is the privacy issue. Tech companies hoover up so much private data and then they misuse it.

Other organizations worry that the EARN IT Acts language could lead to the use of client-side scanning, which allows services to scan users devices for illegal material rather than doing so on the platform side.

Notably, the bill leaves room to impose forms of client- side scanning, which violates user privacy by sending data to law enforcement straight from user devices, before a message is encrypted. EFF has long held that client-side scanning violates the privacy promise of end-to-end encryption, even though it allows the encryption process to proceed in a narrow, limited sense, the Electronic Frontier Foundation said in a letter to the Judiciary Committee leaders.

Read more:
New EARN IT Act Has Old Issues - Duo Security

Read More..

Apricorn releases its first offering to feature NVME SSD – SecurityBrief New Zealand

Apricorn has released the USB 10Gbps Aegis NVX, the first encrypted device the company has offered to feature an NVME SSD inside.

Apricorn makes software-free, 256-bit AES XTS hardware-encrypted USB drives, and its latest offering uses proprietary architecture.

The companys new offering has been designed to address the immediate protection of raw data delivered directly from its source at high speeds.

In fact, the NVX was created to meet demands and product requirements such as those necessary for using a USB with high-definition video cameras, which need an offering capable of writing to an external SSD through a USB C or HDMI.

The NVX can read/write at 1000 megabytes per second, a high-speed capability that is sought after in military intelligence, digital forensics, filmmaking, and healthcare, where write speeds over 600 megabytes per second are crucial.

With the advent of NVMe technology, Apricorn saw an opportunity to develop encrypted storage for users who are operating ultra-fast devices, but have had to settle for awkward, multi-step means of securing data, says Kurt Markley, U.S. Managing Director at Apricorn.

We built the NVX with NVMe speeds and took it a step further with our own unique approach based on Apricorns 40-year legacy as pioneers in secure device innovation.

We patented our design, which takes high-speed output and simultaneously writes and encrypts on the fly. It can keep up with whatever machine its hooked up to, with speed to spare.

The Aegis NVX is Apricorns first device to use the companys new design patented NVME architecture.

However, the offering still functions the same as all Apricorn secure devices: it shares no CSPs with its host and employs no software component in its authentication and encryption processes.

The Aegis NVX also has a keyboard built in that provides the ability to authenticate a user without needing them to interact with a host computer, as is the way for other software-encrypted devices.

Further, the product comes with an internal encryption module that platforms all encryption and decryption processes.

Apricorn notes this is vital to the offerings compatibility with virtually any operating system, as well as equipment with no operating system or keyboard.

For most applications, the speeds of our encrypted HDDs and SSDs continue to do a great job of covering the performance needs of our users, Markley adds.

But teams who are working with technology such as HD video cameras, medical imaging and forensic tools are going to be excited about the speed and rugged security of this device.

They can take the NVX in any environment and its going to protect their data in real-time with USB 10Gbps, a superspeed transfer rate that is not limited by the traditional USB type. Plus, it doesnt require software.

Apricorns Aegis NVX is approximately 75% the size of a smartphone, and its enclosure is milled from a solid block of 6061 aluminium alloy and assembled using breakaway headless fasteners and epoxy threadlock.

In addition, each USB has a wear-resistant membrane keypad that has been tested to 10,000 presses.

The Aegis NVX comes standard with AegisWare, Apricorns proprietary firmware and feature set, which the company developed to address constantly evolving security threats and business needs for highly regulated sectors such as government, defence, finance, manufacturing and healthcare.

Further security advantages of Apricorns USB 10Gbps hardware-encrypted Secure Keys include:

Initial capacity offerings will be 500 gigabytes and two terabytes, with a price range of 280.00 - 600.00 MSRP.

See the original post:
Apricorn releases its first offering to feature NVME SSD - SecurityBrief New Zealand

Read More..

EU lawyers say plan to scan private messages for child abuse may be unlawful – The Guardian

European Union

Under proposed chat controls regulation, any encrypted service provider could be forced to screen for identifiers

An EU plan under which all WhatsApp, iMessage and Snapchat accounts could be screened for child abuse content has hit a significant obstacle after internal legal advice said it would probably be annulled by the courts for breaching users rights.

Under the proposed chat controls regulation, any encrypted service provider could be forced to survey billions of messages, videos and photos for identifiers of certain types of content where it was suspected a service was being used to disseminate harmful material.

The providers issued with a so-called detection order by national bodies would have to alert police if they found evidence of suspected harmful content being shared or the grooming of children.

Privacy campaigners and the service providers have already warned that the proposed EU regulation and a similar online safety bill in the UK risk end-to-end encryption services such as WhatsApp disappearing from Europe.

Now leaked internal EU legal advice, which was presented to diplomats from the blocs member states on 27 April and has been seen by the Guardian, raises significant doubts about the lawfulness of the regulation unveiled by the European Commission in May last year.

The legal service of the council of the EU, the decision-making body led by national ministers, has advised the proposed regulation poses a particularly serious limitation to the rights to privacy and personal data and that there is a serious risk of it falling foul of a judicial review on multiple grounds.

The EU lawyers write that the draft regulation would require the general and indiscriminate screening of the data processed by a specific service provider, and apply without distinction to all the persons using that specific service, without those persons being, even indirectly, in a situation liable to give rise to criminal prosecution.

The legal service goes on to warn that the European court of justice has previously judged the screening of communications metadata is proportionate only for the purpose of safeguarding national security and therefore it is rather unlikely that similar screening of content of communications for the purpose of combating crime of child sexual abuse would be found proportionate, let alone with regard to the conduct not constituting criminal offences.

The lawyers conclude the proposed regulation is at serious risk of exceeding the limits of what is appropriate and necessary in order to meet the legitimate objectives pursued, and therefore of failing to comply with the principle of proportionality.

The legal service also raises concerns that by seeking to clamp down on the solicitation of children, the providers would have to introduce age verification technology and processes to popular encrypted services.

The lawyers write that this would necessarily involve the mass profiling of users, or the biometric analysis of the users face or voice, or alternatively the use of a digital certification system they note would necessarily add another layer of interference with the rights and freedoms of the users.

Despite the advice, it is understood that 10 EU member states Belgium, Bulgaria, Cyprus, Hungary, Ireland, Italy, Latvia, Lithuania, Romania and Spain back continuing with the regulation without amendment.

Patrick Breyer, a German MEP who sits on the European parliaments civil liberties committee, said the EU should drop the plans, which he labelled as dystopian and claimed would tie up law enforcement and tech companies in chasing down false reports of harmful content.

He said: The council of the EUs services now confirm in crystal clear words what other legal experts, human rights defenders, law enforcement officials, abuse victims and child protection organisations have been warning about for a long time: obliging email, messaging and chat providers to search all private messages for allegedly illegal material and report to the police destroys and violates the right to confidentiality of correspondence.

{{topLeft}}

{{bottomLeft}}

{{topRight}}

{{bottomRight}}

{{.}}

Read the original:
EU lawyers say plan to scan private messages for child abuse may be unlawful - The Guardian

Read More..

Hardware Encryption Devices Market is anticipated to reach USD 805.5 billion by the end of 2026 – openPR

Hardware Encryption Devices Market

Study uses 2022 as a base year while forecast data between 2023 to 2028 is considered as forecast data. The research report includes Macro & Micro economic factors insight to understand industry dynamics. Research furthermore consolidates the impact of government regulations and standards on the market. The percentage splits, market shares, growth rate and breakdowns of the product markets are determined by using secondary sources and verified through primary sources. The study also provides key market indicators affecting the growth of the market.Access Full Report @https://www.profsharemarketresearch.com/hardware-encryption-devices-market-report/

Major players in the market are identified through secondary research and their market revenues are determined through various research techniques. Secondary research included the research of the annual and financial reports of the top manufacturers. The wide spectrum of the analytical methods used to prepare the research study helps to achieve a higher precision level. Research study on Hardware Encryption Devices Market helps clients to make precise decisions to expand their market share globally. Precise insight into the segments and sub-segments of the market has been delivered from the research study.Analytical data presented in the form of Tables & Figures makes it easier for the user to understand the complex market insight. The research report is prepared by using various analytical methodologies and models. Some of the important methodologies are SWOT analysis, PESTEL, PORTERS and various others. A wide spectrum of analytical methods used to prepare the research study helps to achieve a higher precision level. The study focuses on industry chain analysis, upstream and downstream aspects, key players, process analysis, cost analysis, market distribution channels, and major downstream buyers.

Access sample report @https://www.profsharemarketresearch.com/enquiry/hardware-encryption-devices-market-report-enquiry/

The Hardware Encryption Devices Market report is segmented based on below parameters:Hardware Encryption Devices types:

Encrypted Hard Disk DrivesEncrypted Solid-State DrivesHardware Security Module

Competitive analysis:

Western Digital CorpSeagate Technology PLCSamsung ElectronicsThalesMicron Technology IncNetAppKingston Technology CorpToshibaGemaltoCertes Networks Inc.Kanguru SolutionsApplication analysis:

IT & TelecomBFSIGovernment & Public UtilitiesManufacturing Enterprise

Research study on Hardware Encryption Devices Market is based on the following regions and countries:North America U.S.A CanadaEurope France Germany Spain UK Rest of EuropeAsia Pacific China Japan India South East AsiaLatin America BrazilMiddle East and AfricaHardware Encryption Devices Market Report delivers a comprehensive analysis of : Challenges and Opportunities Emerging and Current market trends Market player Capacity, Production, Revenue (Value) Market Forecast for 2023-29 Market growth drivers Supply (Production), Consumption, Export, and Import analysis End user/application Analysis

Contact :Jes JSales ManagerProfshare Market ResearchUS : +1 917 7225960jesj@profsharemarketresearch.com

About Us:Profshare Market Research is a full-service market research company that delivers in-depth market research globally. We operate within consumer and business-to-business markets offering both qualitative and quantitative research services. We work for private sector clients, along with public sector and voluntary organizations. Profshare Market Research publishes high-quality, in-depth market research studies, to help clients obtain granular level clarity on current business trends and expected future developments. We are committed to our client's needs, providing custom solutions best fit for strategy development and implementation to extract tangible results.

This release was published on openPR.

Read the original:
Hardware Encryption Devices Market is anticipated to reach USD 805.5 billion by the end of 2026 - openPR

Read More..

Meet Akira A new ransomware operation targeting the enterprise – BleepingComputer

The new Akira ransomware operation has slowly been building a list of victims as they breach corporate networks worldwide, encrypt files, and then demand million-dollar ransoms.

Launched in March 2023, Akira claims to have already conducted attacks on sixteen companies. These companies are in various industries, including education, finance, real estate, manufacturing, and consulting.

While another ransomware named Akira wasreleased in 2017, it is not believed that these operations are related.

A sample of the Akira ransomware was discovered byMalwareHunterTeam, who shared a sample with BleepingComputer so we could analyze it.

When executed, Akira will delete Windows Shadow Volume Copies on the device by running the following PowerShell command:

The ransomware will then proceed to encrypt files that contain the following file extensions:

While encrypting, the encryptor will skip files found in the Recycle Bin, System Volume Information, Boot, ProgramData, and Windows folders. It will also avoid encrypting the Windows system files with.exe, .lnk, .dll, .msi, and .sys file extensions.

When encrypting files, the ransomware encrypts files and appends the.akiraextension will be appended to the file's name.

For example, a file named 1.doc would be encrypted and renamed to 1.doc.akira, as shown in the encrypted folder below.

Akira also uses theWindows Restart ManagerAPI to close processes or shut down Windows services that may be keeping a file open and preventing encryption.

Each computer folder will contain a ransom note namedakira_readme.txtthat includes information on what happened to a victim's files and links to the Akira data leak site and negotiation site.

"As for your data, if we fail to agree, we will try to sell personal information/trade secrets/databases/source codes - generally speaking, everything that has a value on the darkmarket - to multiple threat actors at ones. Then all of this will be published in our blog," threatens the Akira ransom note.

Each victim has a unique negotiation password that is entered into the threat actor's Tor site. Unlike many other ransomware operations, this negotiation site just includes a chat system that the victim can use to negotiate with the ransomware gang.

Like other ransomware operations, Akira will breach a corporate network and spread laterally to other devices. Once the threat actors gain Windows domain admin credentials, they will deploy the ransomware throughout the network.

However, before encrypting files, the threat actors will steal corporate data for leverage in their extortion attempts, warning victims that it will be publicly released if a ransom is not paid.

The Akira gang put a lot of effort into their data leak site, giving it a retro look where visitors can navigate it by typing in commands, as shown below.

At the time of this writing, Akira has leaked the data for four victims on their data leak site, with the size of the leaked data ranging from5.9 GB for one companyto259 GB for another.

From negotiations seen by BleepingComputer, the ransomware gang demands ransoms ranging from a $200,000 to millions of dollars.

They are also willing to lower ransom demands for companies who do not need a decryptor, and just want to prevent the leaking of stolen data.

The ransomware is currently being analyzed for weaknesses, and BleepingComputer does not advise victims to pay the ransom until its determined if a free decryptor can recover files for free.

Read more from the original source:
Meet Akira A new ransomware operation targeting the enterprise - BleepingComputer

Read More..

6 Reasons Why Supply Chain Attacks Are on the Rise – MUO – MakeUseOf

As supply chain attacks become an increasingly common type of cyberattack, cybersecurity professionals are pressured to come up with new, more powerful solutions to combat this ongoing threat to individuals and organizations across the world.

However, before being able to develop efficient defenses against cyberattacks, we must figure out why supply chain attacks are on the rise and learn from our past mistakes.

A supply chain attack is a type of cyberattack that targets organizations by seeking weak links in their supply chain, such as third-party software, hardware, and services. Even if an organization itself has strong cybersecurity, there are usually insecure software suppliers or other third parties that can be used as a backdoor to bypass an organization's security systems.

In short, an attacker finds an easy target and takes advantage of the trusted relationship between parties inside a supply chain. Usually, they infect the suppliers software with malware to get unauthorized access to the supply chain, and then they spread malware across the network. As you suspect, this can cause large-scale data breaches.

Unfortunately, since the compromised components in a successful supply chain attack spread like wildfire, these types of cyberattacks are hard to detect. If you suspect your sensitive data has been compromised, there are ways you can protect yourself after a data breach, but youll have to act swiftly.

What makes supply chain attacks particularly perilous is the fact that even the slightest crack in security or the smallest change could have serious consequences. For instance, if a single piece of code gets compromised, the entire supply chain could suffer. Even trusted software isnt safe from these types of attacks since even the most trusted software has its weaknesses, and attackers are more than willing to exploit them.

Now, lets look at some of the primary reasons why supply chain attacks are on the rise.

While open source software comes with superb benefits to organizations (from flexibility and transparency to cost-cutting), its vulnerabilities pose serious risks to app security. Since anyone can inspect, improve, or otherwise modify open source software, this makes it open to supply chain attacks.

Cybercriminals could easily exploit its vulnerabilities to gain unauthorized access to the organizations systems, where they could steal sensitive data or sabotage software or the entire system.

As you can already guess, reliance on third-party apps can raise the risk of network cyberattacks and network-level security threats. If a third-party app gets hacked, cybercriminals could get their hands on sensitive data from all those who are currently using it.

Plus, the app may not have the same privacy protections the organization has, which means the user data could be shared with third parties without their consentor worse, it could be sold to advertisers for a quick buck.

Whether were talking about ransomware, spyware, or control-and-command attack, malicious software (aka malware) is becoming more sophisticatedeven ChatGPT is being used for malware creation.

As malware evolves, its getting harder to detect it within a supply chain as it can disguise itself as a secure app or a legitimate software update.

With supply chain attacks, insider threats dont stop at the organizations employees but also include all third parties the organization cooperates with. To counter this type of threat, its critical to apply strict access control and user activity monitoring. Although these attacks are relatively rare, their consequences could be catastrophic for an organization.

The human error factor cant be completely eliminated, but it can be minimized with proper security practices, such as promoting awareness about supply chain issues and providing training for the employees. After all, a human error can be something as simple as clicking on a wrong link in an email and unknowingly downloading malware to spy on you and steal your data.

While trusting business partners, third-party providers, employees, and end-users is a pretty polite thing to do, it wont do much for the security of the organization. For sensitive data within an organization to be secure, end-to-end encryption is a must-have.

With strong encryption at your side, cybercriminals will have trouble establishing the backdoor for data exfiltration during a supply chain attack. In short, all your private data will stay private.

A zero-trust model does not assume that users and apps are trustworthy by default, but requires authentication before allowing access to data and other IT assets. By blocking unauthorized activities within a network, a zero-trust framework can reduce supply chain attacks.

However, another thing the zero-trust framework could reduce is productivity, which is why many organizations are slow to adopt it. Moreover, there is also a problem of compliance with existing security systems, as well as time and costs that could set small organizations back.

Yes, we can, although its not as simple as it may seem. In most cases, supply chain attacks are far-reaching, well-researched, and well-resourced operations. They also exploit the trust between business partners and third-party software providers, which makes these types of attacks difficult to prevent and detect before damage is done.

But we can start by applying the zero-trust model (involving multi-factor authentication and end-to-end encryption) as well as strengthening security systems and conducting regular security audits. Also, never underestimate what employee training can do for the overall security of an organization.

Visit link:
6 Reasons Why Supply Chain Attacks Are on the Rise - MUO - MakeUseOf

Read More..