Page 1,248«..1020..1,2471,2481,2491,250..1,2601,270..»

Ransomware as a Service (RaaS): Trends, Threats, and Mitigation … – EC-Council

Ransomware is an ever-evolving threat worldwide, affecting not only individuals but organizations, startups, governments, agencies, and high-profile enterprises. It is estimated that over 493.33 million ransomware attacks were launched globally in 2022, accounting for almost 9% of all malware attacks (Petrosyan, 2023a; Petrosyan, 2023b). As new vulnerabilities are being identified, companies are exercising scrutiny and investing more in their cybersecurity solutions.

In this blog, readers are introduced to the current state of the cybersecurity landscape and the impact of ransomware attacks on organizations. It discusses the latest ransomware trends, RaaS business models, and what threat actors are presently doing to evolve and grow sophisticated in their methodologies. Further, this blog covers the historical events associated with ransomware attacks, the top threats organizations face, and the steps that can be taken to combat and mitigate these threats.

The latest ransomware statistics show that attackers gain access to systems and plant ransomware through phishing, exploitation of software vulnerabilities, and stolen remote desktop protocols (RDP) credentials. The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the National Security Agency (NSA) observed that of ransomware events targeted 14 of the 16 critical infrastructure sectors in the United States. Some of these sectors were government facilities, food and agriculture businesses, and the U.S. Defense Industrial Base. Education was one of the top sectors targeted by ransomware threat actors, according to the United Kingdoms National Cyber Security Centre (NCSC-UK), which classified ransomware as the most prominent cyber threat facing the country (CISA, 2022).

The increasing sophistication of ransomware tactics requires cybersecurity authorities to evolve their mitigation, threat identification, and detection strategies. The following is a list of critical incidents that occurred in the 21st century:

1. REvil Attacks on Apple and President Donald Trump

The REvil ransomware group committed several ransomware attacks globally and became notorious for offering customized RaaS subscriptions to cybercriminals. Formed in 2019, REvil became one of the longest-running ransomware groups in history, having operated for nearly three years. They published 169 of U.S. President Donald Trumps Dirty Laundry emails after being branded as cyber terrorists publicly. They demanded 42 million USD in ransom from the involved law firm, Grubman Shire Meiselas & Sacks (Winder, 2020), and were said to be behind the leaking of legal documents of many A-list celebrities (Ilascu, 2020). The Qakbot banking trojan attacks and high-profile hits on Apple, including hacking into the companys schematics before the Apple Macbook Pros official launch, were also among their misdeeds.

2. 2022 Costa Rican Ransomware Attack

Costa Rica declared a national emergency after ransomware attacks plagued the country in 2022. The Russian ransomware gang Conti pressured citizens to force the government to pay a ransom of 20 million USD to aid their cause (Associated Press, 2022). Conti warned that they planned to overthrow the government and demonstrate its strength through a series of cyber attacks. The U.S. Department of State offered a 10 million USD reward to individuals who could pinpoint information about any member with a leadership role in the Conti group that could potentially lead to their arrest (U.S. Department of State, 2022).

Contis next attack targeted the Costa Rican Social Security Fund, which is responsible for managing the countrys health services. Later, the Ministry of Finance is said to have suffered damages, and the government was forced to declare a national emergency (Sharma, 2022).

3. Financial Trading Group ION Gets Hijacked by Ransomware Attacks

ION was hit during the first week of February by a ransomware attack and was forced to clear its derivative platform overnight to protect its clients. Wall Street Journal reported that the attack had far-reaching effects on global financial markets and had impacted them massively. Investors couldnt place bets on commodity prices, and the platform had problems with data submissions. The trading group disconnected its servers completely and restored its operations after the issue was resolved. Traders had to manually match prices during this downtime, and there were delays in financial reporting. This incident proved that even the best banks and financial institutions with cutting-edge technologies could be compromised, no matter how robust their cybersecurity policies or their level of cyber-readiness to face these threats (Toulas, 2023).

4. DarkSide Ransomware

DarkSide Ransomware is a unique ransomware strain that threat actors use to launch multiple large-scale attacks against global organizations. The first incident was seen in August 2020, and the DarkSide group evolved to operate as a RaaS provider. They have a deep history of conducting double extortion attacks, blackmailing victims into sending payments for unlocking systems, and also for retrieving exfiltrated information.

Popular tactics used by the group to target victims include privilege escalations, impairing defenses and exploiting vulnerabilities like CVE-2020-3992 and CVE-2019-5544, exploiting public-facing applications, and customized file notes and random extensions.

Many organizations invested in their cybersecurity efforts to implement effective incident response planning and mitigate their threats (Patil, 2021). Their most notable attack was the 6-day outage in the Colonial Pipeline during early May, which even the U.S. Government noted. The group even became a potential threat to national security.

The average cost of a ransomware invasion was 1.85 million USD in 2020, and attackers are getting bolder by using the latest ransomware strains to launch several threats (Sophos, 2022). Currently, the most prevalent ransomware strains in the world include the following:

Many other strains are impacting victims around the world, like Petya, Ryuk, Wannacry, GoldenEye, Cryptolocker, and NotPetya. Crypto ransomware strains encrypt files and make them inaccessible to victims unless they pay a ransom. More challenging strains are the locker strains, where victims can get locked out of the devices. In both cases, victims lose access to sensitive information and may fail to recover data on time without falling prey to cyber adversaries. It is essential to know how to protect organizations from ransomware attacks and take the steps necessary to prepare to face these threats. (Heinbach, 2020). Finally, evolving ransomware strategies include ransomware strains like HardBit, which includes explanations of how cyber liability insurance works and additional extortion. HardBit 2.0 includes text that that files were also exfiltrated with an explicit threat to release them for sale or onward publishing if contact is not forthcoming (Slaughter, 2023).

Ransomware is a significant issue faced in modern times, and its vital to minimize risks and not fall for these attacks. Some ransomware strains attack the people and not technologies, which means the use of social engineering methodologies is prevalent. Having good software as a service (SaaS) and on-premise backup programs is a start, and organizations must ensure that all their machines are kept up-to-date.

The following are some ways you can stay protected from ransomware attacks:

Conclusion

Ransomware threats have surged dramatically, and with the increased proliferation of the Internet of Things, AI, RPA, VR/AR, and 5G technologies, we can expect numbers to continue increasing in the next few years. Ransomware techniques prey on the victims gullibility and hijack systems in ways they arent even aware of. Universities, hospitals, legal offices, and several firms are facing these risks, and significant fines can be imposed on organizations if they fail to address them. The most common cause of ransomware attacks is a lack of proper data compliance, governance, and cybersecurity policy measures. Its critical to train employees to identify these threats and ensure they dont click or respond to malicious emails or links. Security efforts should also focus on identifying impersonation attempts, and organizations are beginning to take a proactive approach to threat monitoring, analysis, and security.

References

Read the rest here:
Ransomware as a Service (RaaS): Trends, Threats, and Mitigation ... - EC-Council

Read More..

Shadow IT is increasing and so are the associated security risks – CSO Online

Despite years of modernization initiatives, CISOs are still contending with an old-school problem: shadow IT, technology that operates within an enterprise but is not officially sanctioned or on the radar of the IT department. Unvetted software, services, and equipment can be nightmare fuel for a security team, potentially introducing a lurking host of vulnerabilities, entry points for bad actors, and malware.

In fact, it is as big a problem as ever and may even worsen. Consider the figures from research firm Gartner, which found that 41% of employees acquired, modified, or created technology outside of ITs visibility in 2022 and expects that number to climb to 75% by 2027. Meanwhile, the 2023 shadow IT and project management survey from technology review platform Capterra, found that 57% of small and midsize businesses have had high-impact shadow IT efforts occurring outside the purview of their IT departments.

Experts say that a shift in what comprises shadow IT and who is responsible for it is driving such statistics. In the early days, shadow IT might have been an unsanctioned server that a developer set up for skunk works. Later, it was systems implemented by business unit leaders without IT involvement because they favored a particular vendor or application over the one deployed and maintained by IT.

Although those earlier forms of shadow IT created risk, the main worries in such examples were additional work and costs that the extra systems added to the organizations technology bill as well as the inevitable absorption of the shadow systems into the official IT department portfolio.

Today, shadow IT is broader and more pervasive, and its being brought into the organization by a growing number of employees who are capable of quickly and easily launching tech products and services for their workplace needs without consulting IT or the security team.

Shadow IT is back, and its back in a big way. But its different today. Its individual employees creating, acquiring, and adapting technology for work. These people have become technologists, says Chris Mixter, a research vice president with Gartner. Now shadow IT is like 10,000 flowers blooming. And you cant stop it. You cant say to the employees, Stop doing that, because you as security dont even know what theyre doing.

A mix of tech products and services constitutes shadow IT today. IT can still be comprised of a few unauthorized servers tucked away somewhere, but the ease of operation of modern software means its more likely to be made up of more substantial and pervasive technology deployments. Cloud-based and software-as-a-service applications set up by a business unit or even a single employee are common culprits.

Cloud has made shadow IT easier to exist because in the past when you used to have to procure hardware and know how to get a network connection, there was a barrier to entry. Cloud has lowered that barrier, says Joe Nocera, leader of the Cyber & Privacy Innovation Institute at professional services firm PwC.

Of course, the cloud isnt the only factor in todays shadow IT. The ease of deploying internet of things (IoT) components and other endpoint devices also contributes to the problem.

Undocumented, non-tracked third-party application programming interfaces (APIs) are another type of shadow IT that has become common within many organizations. A May 2023 report from tech company Cequence Security found that 68% of the organizations analyzed had exposed shadow APIs.

The ease of accessing cloud resources is certainly a contributing factor to the proliferation of shadow IT today. You have all these things where all you need [to deploy them] is a credit card or not, sometimes theyre just free, says Raffi Jamgotchian, CEO of Triada Networks, an IT and cybersecurity services firm. That ease of access, however, belies the serious risks that shadow IT now presents.

Jamgotchian says workers typically dont know whether or what security layers the applications theyre buying have or whether anything needs to be added to them to make them secure. Then, to make things worse, theyre often putting sensitive data into these applications to get their work done.

As a result, these workers are creating entry points that hackers can use to access the enterprise IT environment to launch all sorts of attacks. Theyre also exposing proprietary data to leaks and possible theft. And theyre possibly violating data security and privacy regulatory requirements in the process.

Jamgotchian worked with one company fined by a regulatory agency because the apps being used by workers did not adequately secure and archive data as required by law; in that case, the companys manager had given workers tacit approval to download and work with apps outside ITs (and, thus, the security departments) view, which resulted in the compliance violation.

Furthermore, experts say shadow IT greatly increases the chances that products and services as well as the vendors selling them are excluded from any due diligence review, as IT and security are excluded from the selection process. This is part of the challenge when people are using these applications without asking if theyre from a trusted vendor, says Joseph Nwankpa, an associate professor of information systems and analytics at Miami Universitys Farmer School of Business.

The resulting cybersecurity risks are significant. Take the findings from a 2022 report by Cequence Security that noted 5 billion of the 16.7 billion malicious requests observed, or 31%, targeted unknown, unmanaged, and unprotected APIs. Capterras 2023 study found that 76% of the responding small and medium-sized businesses reported that shadow IT efforts posed moderate to severe cybersecurity threats to the business.

And Gartner found that business technologists, those business unit employees who create and bring in new technologies, are 1.8 times more likely than other employees to behave insecurely across all behaviors.

Cloud has made it very easy for everyone to get the tools they want but the really bad thing is there is no security review, so its creating an extraordinary risk to most businesses, and many dont even know its happening, says Candy Alexander, CISO at NeuEon and president of Information Systems Security Association (ISSA) International.

To minimize the risks of shadow IT, CISOs need to first understand the scope of the situation within their enterprise. You have to be aware of how much it has spread in your company, says Pierre-Martin Tardif, a cybersecurity professor at Universit de Sherbrooke and a member of the Emerging Trends Working Group with the professional IT governance association ISACA. Technologies such as SaaS management tools, data loss prevention solutions, and scanning capabilities all help identify unsanctioned applications and devices within the enterprise.

Jon France, CISO at (ISC), a nonprofit training and certification organization, says he advises CISOs to also work with their organizations procurement team and finance department to spot spending that could point to shadow IT. He says scanning worker expense reports is particularly useful in uncovering shadow IT because it helps find reimbursement requests for tech spending that is too small to go through the procurement process.

France and others say CISOs also need to educate workers on security risks posed by shadow IT, but temper expectations on how well that awareness training will help prevent it, Mixter says. He says most workers know the security risks theyre creating but move forward with their plans anyway: Gartner research shows that 69% of employees intentionally bypassed cybersecurity guidance in the last 12 months.

Mixter says workers who deploy shadow IT arent malicious in their activities. Rather, they are trying to get their job done more efficiently and looking for tools to help them accomplish that goal. This is why, in addition to awareness training, CISOs should work to empower them by building up their security competence.

CISOs need to shift to competence building, to Let me help you figure out how to do that safely, Mixter says. According to Mixter, that means:

CISOs have to figure out how much security skill they need, understanding that they cant make everyone into a security specialist so they must determine what is the minimum competency they need, Mixter says.

That work pays off, he adds. Gartner has found that those with training targeted to their technology-related activities are more are 2.5 times more likely to avoid introducing additional cyber risk and more than twice as likely to move faster than those business technologists without such training.

View original post here:
Shadow IT is increasing and so are the associated security risks - CSO Online

Read More..

Internet of Things (IoT) Security Market Next Big Thing | Major Giants Symantec, Cisco Systems, IBM, Verizon E – openPR

Internet of Things (IoT) Security Market

Get Free Exclusive PDF Sample Copy of This Research @ https://www.advancemarketanalytics.com/sample-report/71217-global-internet-of-things-iot-security-market#utm_source=OpenPRKavita

Some of the key players profiled in the study are: PTC Inc. (United States), Symantec Corporation (United States), Cisco Systems, Inc. (United States), IBM Corporation (United States), Verizon Enterprises Solutions (United States), Trustwave (United States), Check Point Security Software Technologies Ltd. (Israel), Infineon Technologies (Germany),.

Scope of the Report of Internet of Things (IoT) SecurityInternet of things (IOT) security is the technology concerned with protection connected devices as well as networks in the internet of things (IOT). IOT platform is a multi-layer technology that allows straightforward provisioning, managing and automation of linked devices within the Internet of Things universe. There are various type of IOT security such as network security, endpoint security, application security, cloud Security and others. Growing incidences of cyber-attacks as well as rising dependency on connected devices will help to boost global IOT security market. According to AMA, the market for Internet of Things (IoT) Security is expected to register a CAGR of 33.6% during the forecast period to 2027.

The titled segments and sub-section of the market are illuminated below: by Type (Network Security, Endpoint Security, Application Security, Cloud Security, Others), Application (Healthcare & Life Science, Infrastructure & Cities, Industrial system & Sensors, Smart home & Consumer, Transport & Urban Mobility, Others), Services (Consulting, Maintenance, Training), Solutions (Identity Access Management, Intrusion Detection System/Intrusion Prevention System, Distributed Denial of Service Protection, Security Analytics, Others), End User (Healthcare, Information Technology (IT), Telecom Banking, Financial Services, Insurance (BFSI), Automotive, Others)

Market Drivers:Increasing Incidences of Cyber Attacks Rising Dependency on Connected Devices

Market Trends:Up Surging Demand of IOT Solutions in OrganizationsHigh Adoption of Smart DevicesGrowing Trend Of Bring Your Own Device (BYOD)

Opportunities:Growing IOT Security Expenditure in Developing Countries

Have Any Questions Regarding Global Internet of Things (IoT) Security Market Report, Ask Our Experts@ https://www.advancemarketanalytics.com/enquiry-before-buy/71217-global-internet-of-things-iot-security-market#utm_source=OpenPRKavita

Region Included are: North America, Europe, Asia Pacific, Oceania, South America, Middle East & Africa

Country Level Break-Up: United States, Canada, Mexico, Brazil, Argentina, Colombia, Chile, South Africa, Nigeria, Tunisia, Morocco, Germany, United Kingdom (UK), the Netherlands, Spain, Italy, Belgium, Austria, Turkey, Russia, France, Poland, Israel, United Arab Emirates, Qatar, Saudi Arabia, China, Japan, Taiwan, South Korea, Singapore, India, Australia and New Zealand etc.

Strategic Points Covered in Table of Content of Global Internet of Things (IoT) Security Market:Chapter 1: Introduction, market driving force product Objective of Study and Research Scope the Internet of Things (IoT) Security marketChapter 2: Exclusive Summary - the basic information of the Internet of Things (IoT) Security Market. Chapter 3: Displaying the Market Dynamics- Drivers, Trends and Challenges & Opportunities of the Internet of Things (IoT) SecurityChapter 4: Presenting the Internet of Things (IoT) Security Market Factor Analysis, Porters Five Forces, Supply/Value Chain, PESTEL analysis, Market Entropy, Patent/Trademark Analysis.Chapter 5: Displaying the by Type, End User and Region/Country 2018-2022Chapter 6: Evaluating the leading manufacturers of the Internet of Things (IoT) Security market which consists of its Competitive Landscape, Peer Group Analysis, BCG Matrix & Company ProfileChapter 7: To evaluate the market by segments, by countries and by Manufacturers/Company with revenue share and sales by key countries in these various regions (2023-2028)Chapter 8 & 9: Displaying the Appendix, Methodology and Data Source

finally, Internet of Things (IoT) Security Market is a valuable source of guidance for individuals and companies.

Read Detailed Index of full Research Study at @ https://www.advancemarketanalytics.com/reports/71217-global-internet-of-things-iot-security-market#utm_source=OpenPRKavita

Thanks for reading this article; you can also get individual chapter wise section or region wise report version like North America, Middle East, Africa, Europe or LATAM, Southeast Asia.

Contact Us: Craig Francis (PR & Marketing Manager) AMA Research & Media LLPUnit No. 429, Parsonage Road Edison, NJ New Jersey USA - 08837 Phone: +1(201) 7937323, +1(201) 7937193sales@advancemarketanalytics.com

About Author: Advance Market Analytics is Global leaders of Market Research Industry provides the quantified B2B research to Fortune 500 companies on high growth emerging opportunities which will impact more than 80% of worldwide companies' revenues.Our Analyst is tracking high growth study with detailed statistical and in-depth analysis of market trends & dynamics that provide a complete overview of the industry. We follow an extensive research methodology coupled with critical insights related industry factors and market forces to generate the best value for our clients. We Provides reliable primary and secondary data sources, our analysts and consultants derive informative and usable data suited for our clients business needs. The research study enable clients to meet varied market objectives a from global footprint expansion to supply chain optimization and from competitor profiling to M&As.

This release was published on openPR.

Read the rest here:
Internet of Things (IoT) Security Market Next Big Thing | Major Giants Symantec, Cisco Systems, IBM, Verizon E - openPR

Read More..

US steps up crackdown on crypto with lawsuits against Coinbase, Binance – Reuters

NEW YORK, June 6 (Reuters) - The top U.S. securities regulator sued cryptocurrency platform Coinbase on Tuesday, the second lawsuit in two days against a major crypto exchange, in a dramatic escalation of a crackdown on the industry and one that could dramatically transform a market that has largely operated outside regulation.

The U.S. Securities and Exchange Commission on Monday took aim at Binance, the world's largest cryptocurrency exchange. The SEC accuses Binance and its CEO Changpeng Zhao of operating a "web of deception".

If successful, the lawsuits could transform the crypto market by successfully asserting the SEC's jurisdiction over the industry which for years has argued that tokens do not constitute securities and should not be regulated by the SEC.

"The two cases are different, but overlap and point in the same direction: the SEC's increasingly aggressive campaign to bring cryptocurrencies under the jurisdiction of the federal securities laws," said Kevin OBrien, a partner at Ford OBrien Landy and a former federal prosecutor, adding, however, that the SEC has not previously taken on such major crypto players.

"If the SEC prevails in either case, the cryptocurrency industry will be transformed."

In its complaint filed in Manhattan federal court, the SEC said Coinbase has since at least 2019 made billions of dollars by operating as a middleman on crypto transactions, while evading disclosure requirements meant to protect investors.

The SEC said Coinbase traded at least 13 crypto assets that are securities that should have been registered, including tokens such as Solana, Cardano and Polygon.

Coinbase suffered about $1.28 billion of net customer outflows following the lawsuit, according to initial estimates from data firm Nansen. Shares of Coinbase's parent Coinbase Global Inc closed down $7.10, or 12.1%, at $51.61 after earlier falling as much as 20.9%. They are up 46% this year.

Paul Grewal, Coinbase's general counsel, in a statement said the company will continue operating as usual and has "demonstrated commitment to compliance."

Securities, as opposed to other assets such as commodities, are strictly regulated and require detailed disclosures to inform investors of potential risks. The Securities Act of 1933 outlined a definition of the term security, yet many experts rely on two U.S. Supreme Court cases to determine if an investment product constitutes a security.

SEC Chair Gary Gensler has long said tokens constitute securities and has steadily asserted its authority over the crypto market, focusing initially on the sale of tokens and interest-bearing crypto products. More recently, it has taken aim at unregistered crypto broker dealer, exchange trading and clearing activity.

[1/2] U.S. Securities and Exchange Commission logo and representations of cryptocurrency are seen in this illustration taken June 6, 2023. REUTERS/Dado Ruvic/Illustration

While a few crypto companies are licensed as alternative system trading systems, a type of trading platform used by brokers to trade listed securities, no crypto platform operates as a full-blown stock exchange. The SEC also this year sued Beaxy Digital and Bittrex Global for failing to register as an exchange, clearing house and broker.

"The whole business model is built on a noncompliance with the U.S. securities laws and we're asking them to come into compliance," Gensler told CNBC.

Crypto companies refute that tokens meet the definition of a security, say the SEC's rules are ambiguous, and that it's overstepping its authority in trying to regulate them. Still, many companies have boosted compliance, shelved products and expanded outside the country in response to the crackdown.

Kristin Smith, CEO of the Blockchain Association trade group, rejected Gensler's efforts to oversee the industry.

"We're confident the courts will prove Chair Gensler wrong in due time," she said.

Founded in 2012, Coinbase recently served more than 108 million customers and ended March with $130 billion of customer crypto assets and funds on its balance sheet. Transactions generated 75% of its $3.15 billion of net revenue last year.

Tuesday's SEC lawsuit seeks civil fines, the recouping of ill-gotten gains and injunctive relief.

On Monday, the SEC accused Binance of inflating trading volumes, diverting customer funds, improperly commingling assets, failing to keep wealthy U.S. customers off its platform, and misleading customers about its controls.

Binance pledged to vigorously defend itself against the lawsuit, which it said reflected the SEC's "misguided and conscious refusal" to provide clarity to the crypto industry.

Customers pulled around $790 million from Binance and its U.S. affiliate following the lawsuit, Nansen said.

On Tuesday, the SEC filed a motion to freeze assets belonging to Binance.US.

Reporting by Jonathan Stempel in New York and Hannah Lang and Michelle Price in Washington; Editing by Lisa Shumaker and Leslie Adler

Our Standards: The Thomson Reuters Trust Principles.

Thomson Reuters

Hannah Lang covers financial technology and cryptocurrency, including the businesses that drive the industry and policy developments that govern the sector. Hannah previously worked at American Banker where she covered bank regulation and the Federal Reserve. She graduated from the University of Maryland, College Park and lives in Washington, DC.

Original post:
US steps up crackdown on crypto with lawsuits against Coinbase, Binance - Reuters

Read More..

Artificial intelligence: As explosive, damaging as a nuclear bomb – The Jerusalem Post

Dozens of senior executives in Artificial Intelligence, academics and other famous people have signed a statement warning of global annihilation by AI, stating emphatically that fighting this threat of extinction should be a global priority and calling to reduce the grave risks of AI.

"Reducing the risk of extinction from AI should be a global priority alongside other risks on a societal scale such as epidemics and nuclear war, read a statement that emphasized "wide-ranging concerns about the ultimate danger of uncontrolled AI."

The statement was issued by the Center for AI Safety, or CAIS, a San Francisco-based research and field-building nonprofit, and was signed by leading figures in the industry including OpenAI CEO Sam Altman; the "godfather" of AI, Geoffrey Hinton; managers and senior researchers from Google DeepMind and Anthropic.

Others who signed the statement included Kevin Scott, Chief Technology Officer of Microsoft; Bruce Schneier, internet security and cryptography pioneer; climate advocate and environmentalist Bill McKibben; musician Grimes, among others.

The statement follows the viral success of ChatGPT from OpenAI which helped amplify the tech industry's arms race to develop various AI tools. In response, a growing number of legislators, advocacy groups and tech insiders have warned about the potential of AI-powered chatbots to spread misinformation and eliminate jobs.

Hinton, whose pioneering work helped shape today's AI systems, previously told CNN that he decided to leave his position at Google and "reveal the truth" about this tech after he suddenly realized that these systems are becoming smarter than us.

Dan Hendricks, director of CAIS, said in a tweet that the statement first proposed by David Krueger, Professor of Artificial Intelligence at the University of Cambridge, may also refer to other types of AI risk such as algorithmic bias or misinformation.

Hendricks compared the statement to warnings from atomic scientists who issued warnings about the tech they created. Hendricks stated on Twitter that companies can manage multiple risks at once; it's not 'either/or' but 'both/and' and that from a risk management perspective, just as it would be reckless to exclusively prioritize the current damages, it would also be reckless to ignore them.

See the article here:
Artificial intelligence: As explosive, damaging as a nuclear bomb - The Jerusalem Post

Read More..

Ex-part owner of Minnesota Vikings gets over six years in cryptocurrency scam – MPR News

A former part owner of the Minnesota Vikings who defrauded a short-lived professional football league known as the Alliance of American Football in a $700 million cryptocurrency scam was sentenced Monday to over six years in prison.

Reginald Fowler, 64, of Chandler, Arizona, was sentenced in Manhattan federal court to six years and three months in prison and was ordered to forfeit $740 million and pay restitution of $53 million.

The Alliance of American Football met a speedyend in 2019when it ran out of money.

Prosecutors said Fowler lied to the leagues executives when he claimed to control bank accounts with tens of millions of dollars from real estate investments and government contracts that he could use to support the league.

MPR's budget year comes to a close on June 30. Help us close the gap by becoming a Sustainer today. When you make a recurring monthly gift, your gift will be matched by the MPR Member Fund for a whole year!

In 2005, he tried to buy the NFLs Minnesota Vikings, becoming a minority owner before his involvement in the team ended in 2014.

U.S. Attorney Damian Williams said in a statement that Fowler broke the law by processing hundreds of millions of dollars of unregulated transactions on behalf of cryptocurrency exchanges that were used as a shadow bank.

He did so by lying to legitimate U.S. financial institutions, which exposed the U.S. financial system to serious risk," Williams said. He then victimized a professional football league by lying about his net worth in exchange for a substantial portion of the league.

In a sentencing submission, defense lawyer Edward Sapone wrote that Fowler was heartbroken that he let himself engage in crimes after over six decades of extraordinary contributions to family and community.

Reggie is extremely remorseful, Sapone wrote. The American Football League didnt benefit from the investment that Reggie had planned to make. Reggies bank accounts were frozen, he could not secure the investment money, and he was not able to invest the large sum of money he promised to invest.

Originally posted here:
Ex-part owner of Minnesota Vikings gets over six years in cryptocurrency scam - MPR News

Read More..

Victims of MOVEit SQL injection zero-day mount up – ComputerWeekly.com

Multiple organisations are now coming forward to disclose that they have been affected by cyber attacks originating via a recently disclosed vulnerability in Progress Softwares MOVEit file transfer product, which is being widely exploited, including by ransomware operators.

In the past 24 hours, organisations including the BBC, Boots and British Airways (BA) have all confirmed they have been impacted, with the BBC telling staff that ID numbers, dates of birth, home addresses and National Insurance numbers were compromised in the incident. BA staff have also been told their banking details may have been stolen.

In the case of BA and others, the incident began via the systems of Zellis, a supplier of IT services for payroll and human resources departments. A Zellis spokesperson confirmed a small number of the organisations customers had been affected.

All Zellis-owned software is unaffected and there are no associated incidents or compromises to any other part of our IT estate, said the spokesperson.

Once we became aware of this incident we took immediate action, disconnecting the server that utilises MOVEit software and engaging an expert external security incident response team to assist with forensic analysis and ongoing monitoring, they added.

Zellis said it has notified the relevant authorities in both the UK and Ireland, including the Information Commissioners Office (ICO) and the Irish Data Protection Commission (DPC).

A BA spokesperson said: We have been informed that we are one of the companies impacted by Zellis cyber security incident which occurred via one of their third-party suppliers called MOVEit. Zellis provides payroll support services to hundreds of companies in the UK, of which we are one.

This incident happened because of a new and previously unknown vulnerability in a widely used MOVEit file transfer tool. We have notified those colleagues whose personal information has been compromised to provide support and advice.

BAs parent, IAG, is understood to be working to support those who may be affected, and it has also reported the incident to the ICO of its own accord.

A spokesperson for the UKs National Cyber Security Centre (NCSC) said that the agency was closely monitoring the situation.

We are working to fully understand UK impact following reports of a critical vulnerability affecting MOVEit Transfer software being exploited, they said. The NCSC strongly encourages organisations to take immediate action by following vendor best practice advice and applying the recommended security updates.

The MOVEit managed file transfer (MFT) software product was initially developed and released in the early 2000s by a company called Standard Networks. This firm was subsequently acquired by network software specialist Ipswitch, which was itself bought by Progress in 2019.

On Wednesday 31 May 2023, Progress announced it had discovered and patched a critical vulnerability in MOVEit impacting all users of the MOVEit transfer product.

Tracked as CVE-2023-34362, the bug is a SQL injection vulnerability that could enable an unauthenticated actor to access the users MOVEit Transfer database and depending on whether or not they are using MySQL, Microsoft SQL Server or Azure SQL as their database engine infer information about the contents of the database, and execute SQL statements that alter or delete elements of it.

Multiple security firms have been tracking exploitation of CVE-2023-34362 over the past week, including Microsoft, Mandiant and Rapid7.

Microsoft said it was prepared to attribute attacks exploiting the vulnerability to a threat actor it is now tracking as Lace Tempest, a ransomware operator that is best known for running the Clop (aka Cl0p) operation.

Cl0p is a particularly virulent strain of ransomware and its operators are widely-known to be especially partial to issues affected file transfer processes. Earlier this year, they were behind a spate of attacks that exploited a vulnerability in the Fortra GoAnywhere MFT tool to attack the systems of more than 90 victims, including storage and security firm Rubrik.

Mandiant said it had also observed at least one actor associated with Clop seeking partners to work on SQL injection vulnerabilities, but that it did not have enough evidence to determine a link between activity associated with the MOVEit vulnerability and the ransomware gang. Its analysts said they expected more victims to begin receiving ransom demands in the coming weeks.

Rapid7 said that the behaviour it had observed exploiting CVE-2023-34362 was mostly opportunistic rather than targeted.

Its analysts said: The uniformity of the artifacts were seeing could plausibly be the work of a single threat actor throwing one exploit indiscriminately at exposed targets.

Darktrace head of threat analysis, Toby Lewis, said that although CVE-2023-34362 does not seem to provide sufficient access to directly deploy ransomware, nor allow an attacker to move laterally through the victims network, it was still possible for it to be of use to an operator such as Clop.

If sensitive material is being transferred through MOVEit, this exploit can expose enterprises to extortion with the threat of publication of stolen data, he said.

Zellis is just one customer of MOVEit and there will likely be other organisations affected that have not yet been disclosed. Zellis will likely have been a victim of opportunistic scanning and exploitation; this may have been occurring across a number of weeks, even though it was only publicly disclosed last week. This incident appears to be limited to data theft from customers of the MOVEit platform, he said.

ReliaQuest CISO Rick Holland said the incident was still in its early stages and would take some time to play out.

The number of victims in this current campaign remains to be seen, but any organisation that exposed the vulnerable MOVEit solutions to the internet must assume breach, Holland told Computer Weekly in emailed comments.

As we have seen with other vulnerabilities, there is a feeding frenzy once the vulnerability becomes publicly known; if Clop didnt compromise MOVEit, other threat actors might have. Organisations that have not received a ransom note shouldn't assume they are in the clear.

The threat group has likely compromised so many organisations that it may take them time to work through the victim queue, he added.

Read the original:
Victims of MOVEit SQL injection zero-day mount up - ComputerWeekly.com

Read More..

New Malware Campaign Leveraging Satacom Downloader to Steal Cryptocurrency – The Hacker News

A recent malware campaign has been found to leverage Satacom downloader as a conduit to deploy stealthy malware capable of siphoning cryptocurrency using a rogue extension for Chromium-based browsers.

"The main purpose of the malware that is dropped by the Satacom downloader is to steal BTC from the victim's account by performing web injections into targeted cryptocurrency websites," Kaspersky researchers Haim Zigel and Oleg Kupreev said.

Targets of the campaign include Coinbase, Bybit, KuCoin, Huobi, and Binance users primarily located in Brazil, Algeria, Turkey, Vietnam, Indonesia, India, Egypt, and Mexico.

Satacom downloader, also called Legion Loader, first emerged in 2019 as a dropper for next-stage payloads, including information stealers and cryptocurrency miners.

Infection chains involving the malware begin when users searching for cracked software are redirected to bogus websites that host ZIP archive files containing the malware.

"Various types of websites are used to spread the malware," the researchers explained. "Some of them are malicious websites with a hardcoded download link, while others have the 'Download' button injected through a legitimate ad plugin."

Present within the archive file is an executable called "Setup.exe" that's about 5 MB in size but inflated to roughly 450 MB with null bytes in an attempt to evade analysis and detection.

Launching the binary initiates the malware routine, culminating in the execution of the Satacom downloader that, in turn, uses DNS requests as a command-and-control (C2) method to fetch the URL that hosts the actual malware.

The campaign documented by Kaspersky leads to a PowerShell script, which downloads the browser add-on from a remote third-party server. It also searches for browser shortcut (.LNK) files in the compromised host and modifies the "Target" parameter with the "--load-extension" flag to launch the browser with the downloaded extension.

What's more, the add-on masquerades as a Google Drive extension and employs web injections sent by the C2 server when the victim is visiting one of the targeted cryptocurrency websites to manipulate the content and steal crypto.

The C2 address is concealed within the script and addr fields of the most recent bitcoin transaction associated with an actor-controlled wallet address, employing the same technique as the Glupteba botnet malware to get around domain blockades or takedowns.

"The extension performs various actions on the account in order to remotely control it using the web inject scripts, and eventually the extension tries to withdraw the BTC currency to the threat actors' wallet," the researchers said.

In an additional attempt to conceal its activity, the malicious extension contains scripts to conceal the email confirmation of the fraudulent transaction across Gmail, Hotmail and Yahoo! services by means of an HTML code injection.

A consequence of this injection is that the victim is unaware that an illicit transfer to the threat actors' wallet was made. Another notable aspect of the add-on is its ability to extract system metadata, cookies, browser history, screenshots of opened tabs, and even receive commands from the C2 server.

"The extension can update its functionality due to the technique used to retrieve the C2 server via the last transaction of a specific BTC wallet, which can be modified at any time by making another transaction to this wallet," the researchers said.

"This allows the threat actors to change the domain URL to a different one in case it's banned or blocked by antivirus vendors."

The development comes as several booby-trapped extensions posing as legitimate utilities have been unearthed on the Chrome Web Store with capabilities to spread adware and hijack search results to display sponsored links, paid search results, and potentially malicious links.

The extensions, while offering the promised features, contained obfuscated code that allowed a third-party website to inject arbitrary JavaScript code into all websites that a user visited without their knowledge.

View post:
New Malware Campaign Leveraging Satacom Downloader to Steal Cryptocurrency - The Hacker News

Read More..

Why millions of usable hard drives are being destroyed – BBC

5 June 2023

Image source, Getty Images

Millions of usable hard drives are destroyed every year

Millions of storage devices are being shredded each year, even though they could be reused. "You don't need an engineering degree to understand that's a bad thing," says Jonmichael Hands.

He is the secretary and treasurer of the Circular Drive Initiative (CDI), a partnership of technology companies promoting the secure reuse of storage hardware. He also works at Chia Network, which provides a blockchain technology.

Chia Network could easily reuse storage devices that large data centres have decided they no longer need. In 2021, the company approached IT Asset Disposition (ITAD) firms, who dispose of old technology for businesses that no longer need it. The answer came back: "Sorry, we have to shred old drives."

"What do you mean, you destroy them?" says Mr Hands, relating the story. "Just erase the data, and then sell them! They said the customers wouldn't let them do that. One ITAD provider said they were shredding five million drives for a single customer."

Storage devices are typically sold with a five-year warranty, and large data centres retire them when the warranty expires. Drives that store less sensitive data are spared, but the CDI estimates that 90% of hard drives are destroyed when they are removed.

The reason? "The cloud service providers we spoke to said security, but what they actually meant was risk management," says Mr Hands. "They have a zero-risk policy. It can't be one in a million drives, one in 10 million drives, one in 100 million drives that leaks. It has to be zero."

Shredding a hard drive is not necessarily secure, says Jonmichael Hands

The irony is that shredding devices is relatively risky today. The latest drives have 500,000 tracks of data per square inch. A sophisticated data recovery person could take a piece as small as 3mm and read the data off it, Mr Hands says.

Last year, the IEEE Standards Association approved its Standard for Sanitizing Storage. It describes three methods for removing data from devices, a process known as sanitisation.

The least secure method is "clear". All the data is deleted, but it could be recovered using specialist tools. It's good enough if you want to reuse the drive within your company.

The most extreme method is to destroy the drives through melting or incineration. Data can never be recovered, and nor can the drive or its materials.

Between the two sits a secure option for re-use: purging. When the drive is purged, data recovery is unfeasible using state-of-the-art tools and techniques.

There are several ways a drive can be purged. Hard drives can be overwritten with new patterns of data, for example, which can then be checked to make sure the original data has gone. With today's storage capacities, it can take a day or two.

By comparison a cryptographic erase takes just a couple of seconds. Many modern drives have built-in encryption, so that the data on them can only be read if you have the encryption key. If that key is deleted, all the data is scrambled. It's still there, but it's impossible to read. The drive is safe to resell.

More innovation in materials extraction and recycling is needed, says Seagates Amy Zuckerman

Seagate is a leading provider of data storage solutions, and a founding member of the CDI. "If we can universally, among all of our customers, trust that that we have secure erase, then drives can be returned to use," says Amy Zuckerman, sustainability and transformation director at Seagate. "That is happening, but on a very small scale."

In its 2022 financial year, Seagate refurbished and resold 1.16 million hard drives and solid-state drives (SSDs), avoiding more than 540 tonnes of electronic waste (e-waste). That includes drives that were returned under their warranty and drives that were bought back from customers.

A pilot take-back programme in Taiwan recovered three tonnes of e-waste. The challenge now, Ms Zuckerman says, is to scale the programme up.

Refurbished drives are tested, recertified and sold with a five or seven-year warranty. "We are seeing small data centres and cryptocurrency mining operations pick them up," she says. "Our successes have been on a smaller scale, and I think that's probably true for others engaged in this work too."

There are no projections for how many times each drive can be refurbished and reused. "Right now, we are just looking at that double use," Ms Zuckerman says.

There is huge potential for such schemes. A large proportion of the 375 million hard drives sold by all companies in 2018 are now ending their warranty.

For drives that can't be reused, Seagate looks first at parts extraction and then materials recycling. In the Taiwan pilot programme, 57% of the material was recycled, made up of magnets and aluminium. Innovation is needed across the industry to help recover more of the 61 chemical elements used in the drives, Ms Zuckerman says.

The principle of sanitising and reusing hardware also applies to other devices, including routers. "Just because a company has a policy of replacing something over three years, it doesn't mean it's defunct for the entire world," says Tony Anscombe, the chief security evangelist at IT security company ESET.

"A large internet service provider (ISP) may well be decommissioning some enterprise grade routers that a smaller ISP would dream of having."

It's important to have a decommissioning process that secures the devices, though. ESET bought some second-hand core routers, the type used in corporate networks. Only five out of 18 routers had been wiped properly. The rest contained information about the network, applications or customers that could be valuable to hackers. All had enough data to identify the original owners.

One of the routers had been sent to an e-waste disposal company, who had apparently sold it on without removing the data. ESET contacted the original owner. "They were very shocked," says Mr Anscombe. "Companies should sanitise devices themselves as best as they can, even if they're using a sanitisation and e-waste company."

Mr Anscombe recommends companies test the process of sanitising devices while they're still under support. If anything is unclear, help is available from the manufacturer then. He also suggests saving all documentation needed for the process in case the manufacturer removes it from their website.

Before sanitisation, Mr Anscombe says companies should make and store a back-up of the device. If any data does leak, it's easier to understand then what has been lost.

Finally, companies should make it easy for people to report security leaks. Mr Anscombe says it was hard to notify companies of what they had found on their old routers.

How can companies be sure the data has gone from a device? "Give it to a security researcher and ask them what they can find," says Mr Anscombe. "A lot of cyber-security teams will have someone who understands how to take the lid off and see if the device was fully sanitised."

By knowing how to clean the data from devices, companies can send them for reuse or recycling with confidence. "The days of the 'take-make-waste' linear economy need to be over," says Seagate's Ms Zuckerman.

Go here to see the original:
Why millions of usable hard drives are being destroyed - BBC

Read More..

Seasonal Tokens And The Diamond-Water Paradox In Cryptocurrency – Benzinga

In the volatile world of cryptocurrencies, Seasonal Tokens have emerged as a promising potential avenue for traders to build wealth over time. These unique holdings serve various purposes, all ultimately contributing to their core function as a reliable store of value.

Unlike many cryptocurrencies which are purely fueled by speculation and unviable tokenomics, Seasonal Tokens serve multiple purposes from farming and tipping to hedging all working toward the broader goal of being a beneficial store of value.

The following discussion will delve into the utility of Seasonal Tokens, deriving insights from philosopher Adam Smith's Diamond-Water Paradox. This paradox questions the perception of value and utility in a way that synergizes with the vision of Seasonal Tokens in the otherwise volatile and erratic crypto landscape.

Enter your email and you'll also get Benzinga's ultimate morning update AND a free $30 gift card and more!

The Diamond-Water Paradox introduces a dilemma: water, essential for life, holds little to no exchange value, while diamonds, having almost no utility, command high exchange value. This paradox reflects two key types of value: value in use and value in exchange.

Massive returns are possible within this market! For a limited time, get access to the Benzinga Insider Report, usually $47/month, for just $0.99! Discover extremely undervalued stock picks before they skyrocket! Time is running out! Act fast and secure your future wealth at this unbelievable discount! Claim Your $0.99 Offer NOW!

Advertorial

The takeaway is that necessary assets, like water and oil, often come cheap because society ensures their accessibility, while non-essential ones like diamonds are allowed to maintain high prices.

Despite the highly speculative nature of cryptocurrency, the Diamond-Water Paradox is evident in the industry.

Consider Bitcoin and Ethereum, the two largest cryptocurrencies by market capitalization. Ethereum serves as a global computing platform that enables developers to create robust decentralized applications (dApps). Its native asset, Ether (ETH), fuels this ecosystem by paying transaction fees and securing the network, hence bearing high utility similar to water.

However, with escalating costs due to increased activity, numerous competitive blockchains like Solana or Avalanche surfaced to fulfill rising demand, offering cost-efficient alternatives. This development has gradually chipped away at Ethereum's potential market share over time.

Contrarily, Bitcoin is akin to digital gold a savings technology that's immutable, portable, finite and scarce. Its utility is minimal, primarily serving as a value reservoir similar to diamonds. As a result, it retains its high valuation, without societal pressure to reduce its cost.

Seasonal Tokens represent a new class of digital assets that emulate the seasonal patterns of traditional markets such as agriculture within a decentralized framework. It comprises four unique tokens Spring, Summer, Autumn and Winter with each representing a distinct market phase, potentially offering a solution to the volatile crypto landscape.

Every nine months, one of the four tokens experiences a systematic reduction in production rates, leading to anticipated supply-demand shifts and providing traders opportunities to accumulate these digital assets equitably without resorting to excessive speculation or undue risk.

Like diamonds, Seasonal Tokens retain value despite their limited utility beyond wealth building. These tokens simply serve as a means for users to leverage price seasonality in a decentralized and trustless manner, eliminating information asymmetries and promoting skill over luck.

As they are not essential for daily operations, Seasonal Tokens evade societal pressures to become cheaper, thus retaining their value, akin to diamonds or Bitcoin. This attribute makes Seasonal Tokens an excellent store of value, potentially even superior to Bitcoin, thanks to efficient halving schedules and unique trading opportunities within the ecosystem.

Seasonal Tokens seem to have ample potential as a tool for sustainable and ethical wealth generation. Borrowing insights from the Diamond-Water Paradox, Seasonal Tokens, much like diamonds, derive their value not from extensive utility, but their scarcity and ability to serve as a reliable store of value.

As production decreases over time, their value may increase, reflecting the rarity value of diamonds. With a distinctive value mechanism revolving around price seasonality, Seasonal Tokens seem poised to revolutionize how users perceive wealth accumulation and asset ownership in the digital age.

Featured photo by Gigi on Unsplash.

This post contains sponsored advertising content. This content is for informational purposes only and not intended to be investing advice.

2023 Benzinga.com. Benzinga does not provide investment advice. All rights reserved.

Read the rest here:
Seasonal Tokens And The Diamond-Water Paradox In Cryptocurrency - Benzinga

Read More..