<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[!!! Do not subscribe! We have moved!!]]></title><description><![CDATA[This newsletter is now hosted at https://news.risky.biz/]]></description><link>https://srslyriskybiz.substack.com</link><image><url>https://substackcdn.com/image/fetch/$s_!UjnI!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F721ad53e-e059-42d5-81ce-18388dce3b3c_256x256.png</url><title>!!! Do not subscribe! We have moved!!</title><link>https://srslyriskybiz.substack.com</link></image><generator>Substack</generator><lastBuildDate>Mon, 13 Apr 2026 05:15:16 GMT</lastBuildDate><atom:link href="https://srslyriskybiz.substack.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Seriously Risky Business]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[srslyriskybiz@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[srslyriskybiz@substack.com]]></itunes:email><itunes:name><![CDATA[Tom Uren]]></itunes:name></itunes:owner><itunes:author><![CDATA[Tom Uren]]></itunes:author><googleplay:owner><![CDATA[srslyriskybiz@substack.com]]></googleplay:owner><googleplay:email><![CDATA[srslyriskybiz@substack.com]]></googleplay:email><googleplay:author><![CDATA[Tom Uren]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Volt Typhoon: Keep Calm and Carry On]]></title><description><![CDATA[PLUS: VPNs Sliced in Cyber Knife Fight]]></description><link>https://srslyriskybiz.substack.com/p/volt-typhoon-keep-calm-and-carry</link><guid isPermaLink="false">https://srslyriskybiz.substack.com/p/volt-typhoon-keep-calm-and-carry</guid><dc:creator><![CDATA[Tom Uren]]></dc:creator><pubDate>Thu, 08 Feb 2024 04:33:45 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1046b819-810f-41c3-ad0a-762d6939b2a7_1344x768.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Your weekly dose of Seriously Risky Business news is written by <a href="https://twitter.com/tomatospy">Tom Uren</a> and edited by <a href="https://twitter.com/riskybusiness">Patrick Gray</a>. It's supported by <a href="https://www.lawfaremedia.org/">Lawfare</a> with help from the William and Flora Hewlett Foundation. This week's edition is sponsored by <a href="https://thinkst.com/">Thinkst</a>.</em></p><p><em>You can hear a podcast discussion of this newsletter by searching for "Risky Business News" in your podcatcher or subscribing via <a href="https://risky.biz/feeds/risky-business-news/">this RSS feed</a>.</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/srsly-risky-biz-beating-back-volt-typhoon/id1621305970?i=1000644580007&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000644580007.jpg&quot;,&quot;title&quot;:&quot;Srsly Risky Biz: Beating back Volt Typhoon&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/srsly-risky-biz-beating-back-volt-typhoon/id1621305970?i=1000644580007&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2024-02-08T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/srsly-risky-biz-beating-back-volt-typhoon/id1621305970?i=1000644580007" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0_na!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1046b819-810f-41c3-ad0a-762d6939b2a7_1344x768.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0_na!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1046b819-810f-41c3-ad0a-762d6939b2a7_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!0_na!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1046b819-810f-41c3-ad0a-762d6939b2a7_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!0_na!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1046b819-810f-41c3-ad0a-762d6939b2a7_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!0_na!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1046b819-810f-41c3-ad0a-762d6939b2a7_1344x768.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0_na!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1046b819-810f-41c3-ad0a-762d6939b2a7_1344x768.png" width="1344" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1046b819-810f-41c3-ad0a-762d6939b2a7_1344x768.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1344,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0_na!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1046b819-810f-41c3-ad0a-762d6939b2a7_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!0_na!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1046b819-810f-41c3-ad0a-762d6939b2a7_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!0_na!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1046b819-810f-41c3-ad0a-762d6939b2a7_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!0_na!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1046b819-810f-41c3-ad0a-762d6939b2a7_1344x768.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Chinese Volt Typhoon, Stable Diffusion</figcaption></figure></div><p>The US is grappling with Chinese cyber actors who appear to be building the capability to disrupt critical infrastructure during a potential military conflict.&nbsp;</p><p>In late-breaking news, the US agencies responsible for cyber security and critical infrastructure have <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-038a">released an advisory</a> about the group known as Volt Typhoon.&nbsp;</p><p>The advisory states [emphasis added]:</p><blockquote><p>The U.S. authoring agencies have confirmed that Volt Typhoon has compromised the IT environments of multiple critical infrastructure organisations&#8212;primarily in Communications, Energy, Transportation Systems, and Water and Wastewater Systems Sectors&#8212;in the continental and non-continental United States and its territories, including Guam. Volt Typhoon&#8217;s choice of targets and <strong>pattern of behaviour is not consistent with traditional cyber espionage</strong> or intelligence gathering operations, and the U.S. authoring agencies assess with high confidence that Volt Typhoon actors are pre-positioning themselves on IT networks to enable lateral movement to OT assets to disrupt functions. The U.S. authoring agencies are concerned about the potential for these actors to use their network access for <strong>disruptive effects in the event of potential geopolitical tensions and/or military conflicts</strong>.</p></blockquote><p>Volt Typhoon was a major topic of discussion at a <a href="https://www.youtube.com/watch?v=MJOX3cpHfUI">US House Committee hearing</a> last week.&nbsp;</p><p>CISA director Jen Easterly told the hearing "we've seen Chinese cyber actors, including those known as Volt Typhoon, burrowing deep into our critical infrastructure to enable destructive attacks in the event of a major crisis or conflict".&nbsp;</p><p>She emphasised that this threat was "not theoretical" and that "CISA teams have found and eradicated Chinese intrusions in multiple critical infrastructure sectors, including aviation, water, energy, [and] transportation".&nbsp;</p><p>Easterly described these confirmed discoveries as "likely just the tip of the iceberg".&nbsp;</p><p>The US government has already started taking practical steps to deal with the threat. On 31 January, the day before the hearing, the US Department of Justice <a href="https://www.justice.gov/opa/pr/us-government-disrupts-botnet-peoples-republic-china-used-conceal-hacking-critical">announced</a> it had disrupted what is known as the 'KV botnet'. This botnet, which <a href="https://srslyriskybiz.substack.com/p/prc-not-stealthy-just-annoying">we wrote about</a> last month, comprises end-of-life small office/home office (SOHO) routers and was being used by Volt Typhoon for command and control.</p><p>This operation was limited to the US-based parts of the botnet, and the Justice Department's press release also states its actions were "temporary in nature". An owner restarting a router would make it vulnerable to reinfection.&nbsp;</p><p>But despite these limitations, this operation&#8212;coupled with private sector action&#8212;appears to have had a real impact. Lumen Technologies also sinkholed the IP addresses used by the KV botnet's infrastructure, and the company's Black Lotus Labs <a href="https://blog.lumen.com/kv-botnet-dont-call-it-a-comeback/">thinks</a> that the KV portion of the botnet is "no longer effectively active". (The botnet has two clusters, 'KV' and 'JDY': the JDY cluster is degraded but still operating.)</p><p>Beyond disrupting this botnet, there are, at least in theory, many actions an organisation like Cyber Command could take in response to PRC groups targeting US critical infrastructure. These could include compromising Volt Typhoon itself; targeting Chinese military systems for potential disruption; or even responding in kind by compromising Chinese critical infrastructure to be able to disrupt it in a time of crisis.</p><p><a href="https://www.rand.org/about/people/m/mazarr_michael_j.html#overview">Dr Michael Mazarr</a>, a deterrence expert at RAND, told <em>Seriously Risky Business</em> that, if you intended to deter the PRC, these types of cyber operations were subject to a "reveal/conceal dynamic".&nbsp;</p><p>The question here, he said, was "you may have a certain capability, but when do you let them [the PRC] know that you have that capability?"</p><p>"You'd want them to know to deter them, but obviously in the cyber realm, by conveying certain things, you tip them off so they go looking for it and now you don't have it [that capability] anymore."&nbsp;</p><p>"So that's just a constant dilemma."</p><p>Many of the options we've listed would seem to be useful should conflict occur, but not in preventing conflict in the first place.&nbsp;</p><p>In his testimony to the hearing, General Paul Nakasone, the Director of NSA and US Cyber Command, was not focused so much on deterring PRC cyber actors as on "persistently engaging them". This involves using the "full spectrum of our capabilities to impose costs, deny benefits, and encourage restraint on the part of the adversary", he said.&nbsp;</p><p>It's important to keep in mind this is <a href="https://www.cfr.org/backgrounder/china-taiwan-relations-tension-us-policy-biden">all about Taiwan</a> and that disrupting US critical infrastructure isn't an end in itself for the PRC. It is a supporting capability for potential military action against Taiwan.</p><p>And there are <a href="https://www.foreignaffairs.com/china/right-way-deter-china-attacking-taiwan">many</a> <a href="https://www.brookings.edu/articles/taiwan-and-the-dangerous-illogic-of-deterrence-by-denial/">ways</a>, including diplomatic, military and economic measures, <a href="https://www.cfr.org/news-releases/us-must-do-more-deter-china-and-support-taiwan-urges-new-cfr-task-force-report">that</a> the US <a href="https://press.armywarcollege.edu/parameters/vol51/iss4/4/">could try</a> to <a href="https://www.defense.gov/News/News-Stories/Article/Article/3566970/us-focuses-on-deterrence-as-china-raises-stakes-in-indo-pacific/">deter Chinese military action</a> in the Taiwan Strait. If these types of deterrence are successful, Volt Typhoon's presence in US critical infrastructure is likely moot.&nbsp;</p><p>Despite that, there is still a cyber-related element to deterring Chinese action.&nbsp;</p><p>Mazarr told us "deterrence often fails when one side, one leader, one military thinks it has a scheme to avoid escalation, bigger costs, long wars".&nbsp;</p><p>This meant making sure China did not think "it has some sort of magical off switch that can prevent the US from marshalling large numbers of forces for, say [hypothetically], four weeks".</p><p>To that end, the KV botnet disruption operation and this week's cyber security advisory covering Volt Typhoon are huge wins. And there are certainly many ways Cyber Command could make Volt Typhoon's life difficult and undermine the PRC&#8217;s confidence that the group could effectively disrupt US critical infrastructure.&nbsp;</p><p>When it comes to communicating the risk to the public, however, the dynamic Mazarr describes poses a bit of a dilemma.</p><p>For language aimed at critical infrastructure operators and lawmakers, officials need to emphasise the threat to generate urgency and encourage action. But at the same time, you'd ideally like the PRC to think that threats to US critical infrastructure are no big deal.&nbsp;</p><p>In the hearing Easterly was clearly speaking to the domestic audience. She mentioned the potential for "disruption of our pipelines, the severing of our telecommunications, the pollution of our water facilities, the crippling of our transportation modes all to ensure that they can incite societal panic and chaos and to deter our ability to marshal military might and civilian will".&nbsp;</p><p>Fortunately, Mazarr is sceptical that foreign governments pay all that much attention to the language used in congressional testimony.</p><p>"I don't think they would put much store in those kinds of public comments at all".&nbsp;</p><h2>VPNs Wounded in Cyber Knife Fight</h2><p>On Wednesday last week, the US Cybersecurity and Infrastructure Agency (CISA) <a href="https://www.cisa.gov/news-events/directives/supplemental-direction-v1-ed-24-01-mitigate-ivanti-connect-secure-and-ivanti-policy-secure">issued an emergency directive</a> for federal agencies to "disconnect all instances of Ivanti Connect Secure and Ivanti Policy Secure" products from their networks.</p><p>This is a CISA first, but we suspect it will not be the last time the agency directs network defenders to take what once would have been considered drastic and expensive remediation work.</p><p>In mid-January <a href="https://srslyriskybiz.substack.com/p/prc-not-stealthy-just-annoying">we covered</a> the discovery of two 0days that could be used in concert to remotely compromise Ivanti Connect Secure VPN devices. After the publication of security advisories and information about the compromise, the actor responsible (called UTA0178 by security firm Volexity, <a href="https://www.volexity.com/blog/2024/01/10/active-exploitation-of-two-zero-day-vulnerabilities-in-ivanti-connect-secure-vpn/">which thinks it is</a> likely a PRC cyber espionage group) shifted from quiet and relatively slow operations to widespread exploitation.</p><p>Since then, Ivanti and UTA0178 have been in a 'cyber knife fight', in which a series of defensive steps from Ivanti have been countered by the attacker. Ivanti's actions included the release of mitigations, integrity checking tools and patches. UTA0178 countered with&nbsp; bypasses for Ivanti's mitigations and integrity checking tools, and also with a variety of webshells and backdoors.&nbsp;</p><p>Other groups <a href="https://www.greynoise.io/blog/ivanti-connect-secure-exploited-to-install-cryptominers">also joined</a> in <a href="https://www.volexity.com/blog/2024/01/18/ivanti-connect-secure-vpn-exploitation-new-observations/">the fun</a> after proof-of-concept code was published. <em>Risky Business News</em> has a <a href="https://riskybiznews.substack.com/p/lets-revisit-the-ivanti-zero-days-clusterf">good blow-by-blow</a> of these events, including the discovery of two more vulnerabilities by Ivanti, one of which was being exploited.</p><p>On <a href="https://risky.biz/RB735">this week's</a> <em>Risky Business</em> podcast, Eric Goldstein, CISA's Executive Assistant Director for Cybersecurity, expanded on the reasons the organisation directed agencies to disconnect the devices.</p><p>"This was necessary given the degree of targeting and compromise around the world of the now three exploited vulnerabilities affecting these appliances", he said.&nbsp;</p><p>"Every organisation running these devices absolutely needs to assume targeting and assume compromise."</p><p>After disconnecting the devices, <a href="https://www.cisa.gov/news-events/directives/supplemental-direction-v1-ed-24-01-mitigate-ivanti-connect-secure-and-ivanti-policy-secure">CISA's directive</a> says that to return them to service, agencies must factory reset and rebuild the devices, upgrade them to a supported version and revoke and reissue certificates, keys and passwords.&nbsp;</p><p>Even worse, however, CISA says that "agencies running the affected products must assume domain accounts associated with the affected products have been compromised". CISA tells agencies to reset passwords, revoke Kerberos tickets and revoke cloud tokens.&nbsp;&nbsp;</p><p>Goldstein also indicated these kinds of robust directives would be used again if necessary.&nbsp;</p><p>"It is certainly the new normal that these sorts of edge devices are being targeted to extraordinary extent by APT actors... And so where we see targeting of this kind of device to this degree, this is absolutely the sort of action that we will direct where needed to drive the right level of urgency and response"</p><p>Goldstein is right when he talks about a "new normal". This is not the first time PRC-linked actors have operated so aggressively that defenders have been told to decommission devices.&nbsp;</p><p>In mid-2023, a group compromising Barracuda Email Security Gateways <a href="https://srslyriskybiz.substack.com/p/chinas-barracuda-hacks-were-just">deployed additional persistence</a> mechanisms once its activities were discovered. These actions aimed to make eviction difficult, and Barracuda ultimately recommended that its devices be replaced because it could not guarantee permanent removal of the group&#8217;s malware.&nbsp;</p><p>This also reminds us of the 2021 espionage campaign targeting Microsoft Exchange servers. The campaign was initially quiet but, <a href="https://srslyriskybiz.substack.com/i/33436727/web-shells-everywhere-so-many-web-shells-there-are-a-lot-of-web-shells">we wrote at the time</a>, "exploded into a frenzy of indiscriminate exploitation" in the days <em>prior</em> to Microsoft releasing a patch.&nbsp;</p><p>Aggressive exploitation is bad news, but we wonder if it will ultimately encourage vendors to make more secure products? After all, who is going to buy products that regularly get compromised and require time consuming remediation work?</p><h2>Three Reasons to Be Cheerful This Week:</h2><ol><li><p><strong>FTC actions against data brokers on firmer ground:</strong> A US federal judge <a href="https://therecord.media/judge-allows-ftc-case-against-kochava-data-broker-to-proceed">has ruled</a> that the Federal Trade Commission's enforcement action against data broker Kochava could proceed. The <a href="https://www.documentcloud.org/documents/24408423-ftc-v-kochava-22-377-opinion-mtd-020324">judge's opinion</a> says Kochava selling "highly granular" personal information could invade consumers&#8217; privacy and expose them to significant risks of secondary harm. This means that the actual practice of selling people's geolocation data will be examined in court to see if it is unfair to consumers.&nbsp;&nbsp;</p></li><li><p><strong>US law firm Dechert pays to settle hacking claim:</strong> a US aviation executive, Farhad Azima, <a href="https://therecord.media/american-businessman-settles-hacking-case-against-law-firm-uk">will receive more than &#163;3m</a> from Dechert to settle allegations that the firm hired Indian hack-for-hire firms to steal information from Azima for use in a lawsuit against him.&nbsp;</p></li><li><p><strong>Visa restrictions for commercial spyware peeps:</strong> The US government <a href="https://www.state.gov/announcement-of-a-visa-restriction-policy-to-promote-accountability-for-the-misuse-of-commercial-spyware/">has announced</a> that it will place visa restrictions on people involved with the misuse of commercial spyware. It is a relatively broad policy and could apply to developers at these companies and also covers immediate family such as spouses and children. <em>Risky Business News</em> has <a href="https://riskybiznews.substack.com/p/us-imposes-visa-ban-commercial-spyware">more coverage</a>.&nbsp;&nbsp;&nbsp;</p></li></ol><h2>Sponsor Section</h2><p><em>In this Risky Business News sponsor interview Tom Uren talks to Haroon Meer of Thinkst Canary. They discuss how network attackers win, how their tactics have changed over time and what this means for network defenders.</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/sponsored-haroon-meer-of-thinkst-canary-on-how/id1621305970?i=1000644127936&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000644127936.jpg&quot;,&quot;title&quot;:&quot;Sponsored: Haroon Meer of Thinkst Canary on how attackers own networks&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/sponsored-haroon-meer-of-thinkst-canary-on-how/id1621305970?i=1000644127936&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2024-02-04T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/sponsored-haroon-meer-of-thinkst-canary-on-how/id1621305970?i=1000644127936" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><h2>Shorts</h2><h3>The Hack-for-Hire Streisand Effect</h3><p><em>Wired's</em> Andy Greenberg <a href="https://www.wired.com/story/appin-training-centers-lawsuits-censorship/">describes the backlash</a> against a legal campaign to get articles about the Indian hack-for-hire industry taken down.&nbsp;</p><p>In November last year, <em>Reuters </em>published an article about India's hack-for-hire industry. Legal action in India resulted in the <a href="https://www.reuters.com/investigates/special-report/usa-hackers-appin/">piece being 'temporarily removed'</a>, in <em>Reuters'</em> words, and it is fighting the injunction in the Indian courts.&nbsp;</p><p>This injunction was then leveraged in legal threats to get <a href="https://www.muckrock.com/news/archives/2024/feb/01/global-censorship-appin-reuters/">other publications to remove references</a> to the <em>Reuters</em> article.&nbsp;</p><p>An array of organisations, however, are fighting back against this legal strategy. Despite legal threats, investigative news non-profit MuckRock is still hosting the source documents used by <em>Reuters' </em>reporters and tech blog TechDirt has resisted demands to take down its articles. An anti-secrecy non-profit has also republished <em>Reuters'</em> original article.</p><h3>Midnight Blizzard Attack Path</h3><p>Andy Robbins at SpecterOps has <a href="https://posts.specterops.io/microsoft-breach-what-happened-what-should-azure-admins-do-da2b7e674ebc">published a reconstruction</a> of the method Russian hackers known as Midnight Blizzard used to compromise Microsoft email accounts recently (disclosure: SpecterOps are a <em>Risky Business</em> sponsor).&nbsp;</p><p>Patrick Gray and Adam Boileau discuss this in <a href="https://risky.biz/RB735">this week's</a> <em>Risky Business</em> podcast at 11:40.&nbsp;</p><h3>Ransomware Again a Growing Problem</h3><p>Blockchain analysis company Chainalysis <a href="https://www.chainalysis.com/blog/ransomware-2024/">has reported</a> that cryptocurrency ransomware payments exceed USD$1bn in 2023. This is a new high, after 2022 saw 'only' USD$567m in payments.</p><p>This is partly attributable to the Russian invasion of Ukraine, but the Chainalysis report also examines the impact of the <a href="https://srslyriskybiz.substack.com/i/100356397/what-hive-and-alphabay-hopefully-have-in-common">FBI's Hive disruption operation and takedown</a>. In this operation the FBI gained access to Hive's IT infrastructure and, for months, provided decryption keys to victims affected by the ransomware. This directly prevented USD$130m in payments, but Chainalysis reckons it might also have had broader systemic effects that saw about USD$200m of payments averted.&nbsp;&nbsp;&nbsp;</p><h2>Risky Biz Talks</h2><p><em>You can find the audio edition of this newsletter and other fine podcasts and interviews in the Risky Biz News feed (<a href="https://risky.biz/feeds/risky-business-news">RSS</a>, <a href="https://podcasts.apple.com/au/podcast/risky-business-news/id1621305970">iTunes</a> or <a href="https://open.spotify.com/show/0BdExoUZqbGsBYjt6QZl4Q">Spotify</a>).&nbsp;&nbsp;</em></p><p><em>In <a href="https://risky.biz/BTN39/">our last</a> "Between Two Nerds" discussion Tom Uren and <a href="https://twitter.com/thegrugq">The Grugq</a> talk about what up and coming countries should expect from a cyber command and whether they should invest in them.&nbsp;</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/between-two-nerds-what-to-expect-when-you-are-expecting/id1621305970?i=1000644271387&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000644271387.jpg&quot;,&quot;title&quot;:&quot;Between Two Nerds: What to expect when you are expecting to cyber&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/between-two-nerds-what-to-expect-when-you-are-expecting/id1621305970?i=1000644271387&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2024-02-06T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/between-two-nerds-what-to-expect-when-you-are-expecting/id1621305970?i=1000644271387" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><h2>From <a href="https://riskybiznews.substack.com/">Risky Biz News</a>:</h2><p><strong>Two Iranian cyber groups get doxed in a week: </strong>The identities of two Iranian cyber groups have been exposed over the course of seven days last week.</p><p>The US government <a href="https://home.treasury.gov/news/press-releases/jy2072">linked</a> the Cyber Av3ngers group to six individuals working for the Iranian Islamic Revolutionary Guard Corps Cyber-Electronic Command (IRGC-CEC), while a report from Iran International <a href="https://www.iranintl.com/en/202401267648">linked</a> the Black Shadow group to an Iranian IT company named "Raahkarha-ye Fanavari-e Etela'at-e Jahatpardaz" (or Jahatpardaz Information Technology Solutions).</p><p>The "doxing" events come as Iranian cyber activity entered a new and more aggressive stage after Iran-backed Hezbollah attacked Israeli territories on October 7 last year.</p><p>[<a href="https://riskybiznews.substack.com/p/two-iranian-cyber-groups-doxed-in-a-week">more</a> on <em>Risky Business News</em>]</p><p><strong>EU commits to not pay ransoms:</strong> During a visit to Washington this week, EU Commissioner Thierry Breton <a href="https://digital-strategy.ec.europa.eu/en/news/eu-and-united-states-enhance-cooperation-cybersecurity">formally committed</a> the EU and its 27 member states to the <a href="https://www.whitehouse.gov/briefing-room/statements-releases/2023/11/01/international-counter-ransomware-initiative-2023-joint-statement/">Counter Ransomware Initiative</a>. As part of this project, member states have pledged not to pay ransoms to cyber criminals. More than 50 countries across the world pledged to support the project, although none have passed laws officially banning ransom payments yet.</p><p><strong>Pig-butchering leaders arrested:</strong> Chinese officials have <a href="https://mp.weixin.qq.com/s/qsvOU4BU0Qmj1c8IT72K4A">arrested</a> ten Myanmar nationals who allegedly operated large-scale cyber scam centres in Myanmar's northern Kokang region. The suspects were detained after China <a href="https://www.irrawaddy.com/news/burma/china-arrest-warrant-names-kokang-bgf-founder-as-top-suspect-in-myanmar-cyber-scam.html">issued</a> an international arrest warrant in their names at the start of December last year. All ten are believed to have had leadership roles in running the scam centres, and some were also members of the Kokang Border Guard Force. The suspects were <a href="https://twitter.com/johnwSEAP/status/1752357527004889118">handed over</a> to Chinese authorities on January 30.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6FWq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8ae60ec-e17d-4836-a6f7-0cf26f10bf11_1000x506.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6FWq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8ae60ec-e17d-4836-a6f7-0cf26f10bf11_1000x506.jpeg 424w, https://substackcdn.com/image/fetch/$s_!6FWq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8ae60ec-e17d-4836-a6f7-0cf26f10bf11_1000x506.jpeg 848w, https://substackcdn.com/image/fetch/$s_!6FWq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8ae60ec-e17d-4836-a6f7-0cf26f10bf11_1000x506.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!6FWq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8ae60ec-e17d-4836-a6f7-0cf26f10bf11_1000x506.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6FWq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8ae60ec-e17d-4836-a6f7-0cf26f10bf11_1000x506.jpeg" width="1000" height="506" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e8ae60ec-e17d-4836-a6f7-0cf26f10bf11_1000x506.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:506,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Headshots for the ten suspects&quot;,&quot;title&quot;:&quot;Headshots for the ten suspects&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Headshots for the ten suspects" title="Headshots for the ten suspects" srcset="https://substackcdn.com/image/fetch/$s_!6FWq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8ae60ec-e17d-4836-a6f7-0cf26f10bf11_1000x506.jpeg 424w, https://substackcdn.com/image/fetch/$s_!6FWq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8ae60ec-e17d-4836-a6f7-0cf26f10bf11_1000x506.jpeg 848w, https://substackcdn.com/image/fetch/$s_!6FWq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8ae60ec-e17d-4836-a6f7-0cf26f10bf11_1000x506.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!6FWq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8ae60ec-e17d-4836-a6f7-0cf26f10bf11_1000x506.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Image via Irrawaddy</p>]]></content:encoded></item><item><title><![CDATA[US Data Dumpster Fire Singes NSA ]]></title><description><![CDATA[PLUS: The Evolution of Election Disinformation]]></description><link>https://srslyriskybiz.substack.com/p/us-data-dumpster-fire-singes-nsa</link><guid isPermaLink="false">https://srslyriskybiz.substack.com/p/us-data-dumpster-fire-singes-nsa</guid><dc:creator><![CDATA[Tom Uren]]></dc:creator><pubDate>Thu, 01 Feb 2024 04:51:48 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb54559a-7b9c-497e-91fe-5e1423d9ccf0_1344x768.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Your weekly dose of Seriously Risky Business news is written by <a href="https://twitter.com/tomatospy">Tom Uren</a> and edited by <a href="https://twitter.com/riskybusiness">Patrick Gray</a>. It's supported by <a href="https://www.lawfaremedia.org/">Lawfare</a> with help from the William and Flora Hewlett Foundation. This week's edition is sponsored by <a href="https://www.island.io/">Island</a>.</em></p><p><em>You can hear a podcast discussion of this newsletter by searching for "Risky Business News" in your podcatcher or subscribing via <a href="https://risky.biz/feeds/risky-business-news/">this RSS feed</a>.</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/srsly-risky-biz-us-data-dumpster-fire-singes-nsa/id1621305970?i=1000643745262&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000643745262.jpg&quot;,&quot;title&quot;:&quot;Srsly Risky Biz: US data dumpster fire singes NSA&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/srsly-risky-biz-us-data-dumpster-fire-singes-nsa/id1621305970?i=1000643745262&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2024-02-01T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/srsly-risky-biz-us-data-dumpster-fire-singes-nsa/id1621305970?i=1000643745262" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!L6H7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb54559a-7b9c-497e-91fe-5e1423d9ccf0_1344x768.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!L6H7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb54559a-7b9c-497e-91fe-5e1423d9ccf0_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!L6H7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb54559a-7b9c-497e-91fe-5e1423d9ccf0_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!L6H7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb54559a-7b9c-497e-91fe-5e1423d9ccf0_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!L6H7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb54559a-7b9c-497e-91fe-5e1423d9ccf0_1344x768.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!L6H7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb54559a-7b9c-497e-91fe-5e1423d9ccf0_1344x768.png" width="1344" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bb54559a-7b9c-497e-91fe-5e1423d9ccf0_1344x768.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1344,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!L6H7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb54559a-7b9c-497e-91fe-5e1423d9ccf0_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!L6H7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb54559a-7b9c-497e-91fe-5e1423d9ccf0_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!L6H7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb54559a-7b9c-497e-91fe-5e1423d9ccf0_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!L6H7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb54559a-7b9c-497e-91fe-5e1423d9ccf0_1344x768.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">A beautiful American dumpster fire, Stable Diffusion</figcaption></figure></div><p>The National Security Agency (NSA) has been embroiled in a US Senator's campaign against intelligence agencies' purchase and use of data obtained illegally by data brokers.</p><p>US Senator Ron Wyden, a member of the US Senate Select Committee on Intelligence, is pushing to stop US intelligence agencies buying Americans' personal data obtained illegally by data brokers.</p><p>Wyden announced the push in a <a href="https://www.wyden.senate.gov/news/press-releases/wyden-releases-documents-confirming-the-nsa-buys-americans-internet-browsing-records-calls-on-intelligence-community-to-stop-buying-us-data-obtained-unlawfully-from-data-brokers-violating-recent-ftc-order">recent press release</a> in which he announced the release of letters saying the NSA was buying 'internet records' that could reveal what websites Americans visited and the apps they used.&nbsp;</p><p>It then segues into a call for the administration to stop agencies buying personal data obtained illegally by brokers. <a href="https://srslyriskybiz.substack.com/i/140790357/ftc-geolocation-win-masks-shaky-legal-foundations">Recent Federal Trade Commission (FTC) actions</a> indicate that data brokers are sometimes not obtaining informed consent from people whose data they capture, implying that their products are illegal.&nbsp;&nbsp;&nbsp;</p><p>General Paul Nakasone, Director of the NSA, explained the NSA&#8217;s data purchase regime in a letter to Wyden, <a href="https://www.wyden.senate.gov/imo/media/doc/signed_wyden_letter_to_dni_re_nsa_purchase_of_domestic_metadata_and_ftc_order_on_data_brokers_with_attachments.pdf">linked to</a> from the Senator&#8217;s press release.</p><p>In our view, the NSA's regime is defensible and Wyden would be better off focusing on other targets.&nbsp;&nbsp;</p><p>Nakasone admits that the NSA buys what he referred to as &#8216;CAI&#8217; or commercially available information. However, he details the steps that NSA takes to make sure that the CAI it buys is valuable to its intelligence and/or cyber security missions, is lawfully acquired, that information about US persons is minimised, and that purchase of CAI is regularly reassessed for value rather than purchased on autopilot.</p><p>The NSA is also buying data that is filtered to focus on malicious activity, rather than providing a full picture of Americans' movements and actions. That data is aggregated from network operators and ISPs, rather than collected directly from individuals under potentially misleading terms and conditions.&nbsp;</p><p>Nakasone was at pains to make it clear that NSA did not purchase the types of location data that have been the subject of the recent FTC actions. He wrote:</p><blockquote><p>NSA does not buy and use location data collected from phones known to be used in the United States either with or without a court order. Similarly, NSA does not buy and use location data collected from automobile telematics systems from vehicles known to be located in the United States.</p></blockquote><p>This is good news, because the sale of people's location data is an extremely concerning practice. Geolocation data brokers claim their data is anonymous, but they typically use device identifiers that are stable over time. This means that devices can be correlated to individuals by looking at travel patterns, such as journeys between home and work addresses, for example.&nbsp;</p><p>Once a link between a device and a person is established, this identifier can then be used to unravel a person's location history, including sites they might consider sensitive. We've previously covered the use of this type of data to <a href="https://srslyriskybiz.substack.com/i/39287247/let-he-who-is-without-sin">harass a person before</a> and government purchases of this kind of data are problematic.</p><p>The NSA does, Nakasone explains, "buy and use commercially available netflow (i.e. non-content) data related to wholly domestic internet communications and internet communications where one side of the communication is a U.S. Internet Protocol address and the other is located abroad."&nbsp;</p><p>Netflow is comprehensive summary data that captures how traffic flows across the internet and can hint at the type of data being sent.&nbsp;</p><p>We have previously covered the <a href="https://srslyriskybiz.substack.com/p/north-koreas-vibes-based-targeting">steps commercial vendors of netflow take</a> to mitigate privacy risks. Unlike 'protections' applied by geolocation data brokers, these are meaningful mitigations. For example, the data involved isn't comprehensive, but is instead filtered when it is ingested for flows that are known or suspected to be malicious.</p><p>Netflow records have legitimate <a href="https://srslyriskybiz.substack.com/i/40802210/netflow-sharing-is-not-a-privacy-disaster">cyber security uses</a> too:</p><blockquote><p>If the aggregated data covers a particular cyber security incident, researchers can drill down to see what traffic was occurring at a particular point in time. Joe Slowik, Principal Security Engineer at Gigamon <em>[Ed: now at Mitre]</em>, says netflow "can be exceptionally valuable in monitoring [command and control] C2 channels to go from victim-facing C2 nodes to actual adversary infrastructure. It can also serve as ground-truth data for exfiltration activity."</p></blockquote><p>We would be surprised if some US government agencies had not purchased and used data obtained illegally by data brokers. But we don&#8217;t believe the NSA&#8217;s use of netflow falls into this category.&nbsp;</p><h2>Microsoft's Dark Winter Gets Colder</h2><p>Microsoft's Midnight Blizzard breach just keeps getting worse. The compromise, which we <a href="https://srslyriskybiz.substack.com/i/141022744/microsofts-midnight-blizzard-cold-dark-and-insecure">wrote about last week</a>, took advantage of a string of security failures from Microsoft, but at the time, the attack appeared to be restricted to Microsoft itself.&nbsp;</p><p>The <a href="https://msrc.microsoft.com/blog/2024/01/microsoft-actions-following-attack-by-nation-state-actor-midnight-blizzard/">company's post</a> announcing the incident said the Russian hackers had "access[ed] a very small percentage of Microsoft corporate email accounts, including members of our senior leadership team and employees in our cybersecurity, legal, and other functions".&nbsp;</p><p>However, last Thursday, a <a href="https://www.microsoft.com/en-us/security/blog/2024/01/25/midnight-blizzard-guidance-for-responders-on-nation-state-attack/">follow-up announcement</a> said that the vendor had since learnt that "the same actor has been targeting other organisations and, as part of our usual notification processes, we have begun notifying these targeted organisations".</p><p>In the same announcement, Microsoft also provided more information about the techniques used in the attack. This included more detail about initial access using a password spray (attempting to access a large number of accounts with a small number of popular passwords), creating a highly privileged OAuth application, and the use of residential proxies to obfuscate connections to command and control servers.&nbsp;</p><p>There is some careful wording here. The post doesn't <em>necessarily</em> imply Midnight Blizzard had been successful attacking other organisations, or that it was able to take advantage of the same Microsoft <a href="https://en.wikipedia.org/wiki/SNAFU">SNAFU</a> in these other attacks. However, on <a href="https://risky.biz/RB734">yesterday's</a> <em>Risky Business</em> podcast Patrick Gray said that multiple sources were saying that the "number of victims of this particular set of TTPs was in the triple digits".&nbsp; (<a href="https://www.washingtonpost.com/technology/2024/01/26/russia-hacks-sec-disclosures/">Other journalists</a> are hearing the same thing.)</p><p>One organisation has already fessed up to being impacted by the same actor. Last week, Hewlett Packard Enterprise (HPE) filed its own <a href="https://www.sec.gov/ixviewer/ix.html?doc=/Archives/edgar/data/1645590/000164559024000009/hpe-20240119.htm">SEC disclosure statement</a> saying Midnight Blizzard had popped its cloud-based email environment (<a href="https://www.crn.com/news/security/2024/hpe-hit-by-midnight-blizzard-attack-5-things-you-need-to-know">Microsoft Office 365</a>) beginning around May last year.&nbsp;</p><p>In its <a href="https://www.microsoft.com/en-us/security/blog/2024/01/25/midnight-blizzard-guidance-for-responders-on-nation-state-attack/">latest post</a> on the incident, Microsoft says these were all mistakes of the past and that its security has improved since then:</p><blockquote><p>If the same team were to deploy the legacy tenant today [Ed: a legacy tenant was patient zero in this attack], mandatory Microsoft policy and workflows would ensure MFA and our active protections are enabled to comply with current policies and guidance, resulting in better protection against these sorts of attacks.</p></blockquote><p>That's so good! It's only all of Microsoft's previous customers that have to worry. What a relief!</p><h2>Election Disinformation Continues to Evolve</h2><p><a href="https://www.aspistrategist.org.au/as-taiwan-voted-beijing-spammed-ai-avatars-faked-paternity-tests-and-leaked-fake-documents/">A report from the Australian Strategic Policy Institute</a>, released shortly after the Taiwan election, provides a first glimpse at the PRC's evolving cyber-enabled interference tactics.&nbsp;</p><p>This newsletter's <a href="https://srslyriskybiz.substack.com/p/interference-free-elections-how-quaint">last edition of 2023</a> examined election interference and pointed to the Taiwanese election as one to watch. The PRC has a <a href="https://www.cfr.org/backgrounder/china-taiwan-relations-tension-us-policy-biden">strong preference</a> for the opposition Kuomintang Party, which favours closer ties with the mainland, as compared to the incumbent pro-independence Democratic Progressive Party (DPP). It also feels free to engage in various different types of election interference.&nbsp;</p><p>Prior to the election, for example, the PRC had used 'friendship tours' to <a href="https://www.reuters.com/world/asia-pacific/china-lures-hundreds-taiwan-politicians-with-cheap-trips-before-election-sources-2023-12-01/">cultivate Taiwanese politicians</a>, used <a href="https://thechinaproject.com/2023/05/18/can-beijing-influence-taiwans-presidential-election-through-economic-coercion/">economic coercion</a> and even <a href="https://www.chinadaily.com.cn/a/202311/24/WS656092e8a31090682a5effcb.html">threatened military action</a>. Cyber-enabled interference is just one arrow in the quiver.</p><p>The election was held on January 13 and was a win for the incumbent DPP. The report was released just five days later and &#8212; beyond now-standard <a href="https://edition.cnn.com/2023/11/13/us/china-online-disinformation-invs/index.html">spammy inauthentic social networks</a> &#8212; shows increasing use of both AI technologies and 'leaking' of falsified information.&nbsp;</p><p>The report notes that generative AI technologies were used to create avatars and also content, including what appears to be a virtual presenter or <a href="https://www.d-id.com/speaking-portrait/">'speaking portrait'</a> the report says was created by US-based company D-ID.&nbsp;</p><p>There are also attempts to provide what look to be forged documents with authenticity by distributing them as 'leaks' on sites such as BreachForums. The report documents both an alleged leak of Taiwanese government documents and also a fake DNA test that purported to show that the Taiwanese Vice-President had an illegitimate child were both posted to BreachForums. These posts were then amplified by inauthentic looking accounts on X, Facebook, YouTube and on other online forums.&nbsp;</p><p>This contrasts with the US 2016 Presidential election. In that election, Russian operatives stole genuine emails from various parts of the Democratic party, and the impact of subsequent leaks of this material were amplified by the reporting of mainstream media.</p><p>In this Taiwanese election, the leaks weren't genuine and the mainstream media didn't amplify them. Perhaps, to some degree, Taiwanese society is even inoculated to this kind of interference. The government has <a href="https://www.reuters.com/world/asia-pacific/taiwan-alert-chinese-funded-election-interference-2023-06-21/">raised awareness</a> of the problem and there are <a href="https://www.codastory.com/authoritarian-tech/taiwan-election-disinformation-china/">many civil society organisations</a> that counter disinformation.&nbsp;&nbsp;</p><p>So, despite the PRC's evolving efforts, the report assesses that these efforts had "minimal impact on the integrity of election results".&nbsp;</p><h2>Three Reasons to Be Cheerful This Week:</h2><ol><li><p><strong>Prolific swatter arrested:</strong> US law enforcement officers have <a href="https://www.wired.com/story/torswats-swatting-arrest/">reportedly arrested</a> the country's most prolific swatter, a 17-year-old from California known as 'Torswats'.&nbsp;&nbsp;</p></li><li><p><strong>Scattered Spider Arrest: </strong><em>Krebs on Security</em> <a href="https://krebsonsecurity.com/2024/01/fla-man-charged-in-sim-swapping-spree-is-key-suspect-in-hacker-groups-oktapus-scattered-spider/">reports</a> that a Florida man arrested for SIM-swapping and related crimes, Noah Michael Urban, is a key suspect in the string of Scattered Spider aka Oktapus hacks. These incidents affected a swathe of high profile US technology companies during 2022.</p></li><li><p><strong>US disables Chinese hacking infrastructure:</strong> The US has launched an operation to disable a botnet used by Chinese espionage groups, <a href="https://www.reuters.com/world/us/us-disabled-chinese-hacking-network-targeting-critical-infrastructure-sources-2024-01-29/">according to</a> <em>Reuters</em>. Per <em>Reuters</em>, the government&nbsp; "sought and received legal authorization to remotely disable aspects of the Chinese hacking campaign". We wonder if this is a lot of disabling, or just a little? Just a few weeks ago <a href="https://srslyriskybiz.substack.com/p/prc-not-stealthy-just-annoying">we wrote about</a> the 'KV botnet', a botnet made up mostly of end-of-life devices and used by PRC cyber actors, including <a href="https://www.reuters.com/world/us/us-disabled-chinese-hacking-network-targeting-critical-infrastructure-sources-2024-01-29/">Volt Typhoon</a>, a group that is worrying because of its apparent intentions to disrupt critical infrastructure in the event of military conflict.&nbsp;</p></li></ol><h2>Sponsor Section</h2><p><em>In this Risky Business News sponsor interview, Catalin Cimpanu talks with Bradon Rogers, Chief Customer Officer at enterprise browser Island, on how a modern enterprise browser solution like Island can be used to replace, complement, or enhance some enterprise security tools or technology stacks.</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/reposted-sponsored-talking-with-island-on-how/id1621305970?i=1000643303822&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000643303822.jpg&quot;,&quot;title&quot;:&quot;REPOSTED: Sponsored: Talking with Island on how enterprise browsers could replace some technology stacks&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/reposted-sponsored-talking-with-island-on-how/id1621305970?i=1000643303822&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2024-01-29T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/reposted-sponsored-talking-with-island-on-how/id1621305970?i=1000643303822" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><h2>Shorts</h2><h3>SolarWinds Hits Back Against the SEC</h3><p>US company SolarWinds has filed a motion to dismiss the Securities and Exchange Commission's (SEC) complaint against the company and its CISO, Tim Brown.&nbsp;</p><p>SolarWinds and some of its customers were compromised in a <a href="https://www.theregister.com/2020/12/14/solarwinds_fireeye_cozybear_us_government/">2020 supply chain breach</a> by Russian state-backed hackers.</p><p>The <a href="https://srslyriskybiz.substack.com/i/138510536/secs-disclosure-demands-a-halloween-horror-for-cisos">crux of the SEC's case</a> is that SolarWinds and Brown defrauded investors by "overstating SolarWinds' cyber security practices and understating or failing to disclose known risks". In its <a href="https://news.bloomberglaw.com/privacy-and-data-security/solarwinds-seeks-dismissal-of-unfounded-sec-cybersecurity-suit">dismissal motion</a>, SolarWinds argues it made "repeated warnings" about its vulnerability to "the pervasive risk of cybersecurity attacks". And it also says that after it discovered it had been compromised it promptly disclosed the attack.</p><p>We have some sympathy for SolarWinds position here, and sincerely doubt that investors care all that much about cyber security risk. It can cause serious disruption, but most of the time these ructions are short-term and don't seem to much affect the long-term value of a company.&nbsp;</p><p>However, part of the SEC's argument was that SolarWinds' disclosures were "boilerplate" and only contained "generic and hypothetical risks that most companies face". So although SolarWinds repeatedly warned of cyber security risks, those warnings were effectively meaningless.&nbsp;</p><p>Companies may as well just say "we are a modern company, cyber security in general is difficult and we could get massively pwned and rekt at any time" and be just as accurate. That can't be right either.</p><h3>More on Ermakov</h3><p><em>Krebs on Security</em> <a href="https://krebsonsecurity.com/2024/01/who-is-alleged-medibank-hacker-aleksandr-ermakov/">wraps up</a> what is known about Aleksander Ermakov, the alleged Russian cyber criminal who was sanctioned by the Australian, US and UK governments last week.&nbsp;</p><h3>NSO Still Not Dead</h3><p>NSO appears to be trying to rehabilitate its image and has issued a <a href="https://www.nsogroup.com/wp-content/uploads/2023/12/2023-Transparency-and-Responsibility-Report.pdf">new transparency report</a>. <em>Wired</em> <a href="https://www.wired.com/story/nso-group-lobbying-israel-hamas-war/">wraps up</a> the various lobbying efforts the firm is making including providing help to Israeli security services in the Israel-Hamas war.&nbsp;</p><h2>Risky Biz Talks</h2><p><em>You can find the audio edition of this newsletter and other fine podcasts and interviews in the Risky Biz News feed (<a href="https://risky.biz/feeds/risky-business-news">RSS</a>, <a href="https://podcasts.apple.com/au/podcast/risky-business-news/id1621305970">iTunes</a> or <a href="https://open.spotify.com/show/0BdExoUZqbGsBYjt6QZl4Q">Spotify</a>).&nbsp;&nbsp;</em></p><p><em>In <a href="https://risky.biz/BTN39/">our last</a> "Between Two Nerds" discussion Tom Uren and <a href="https://twitter.com/thegrugq">The Grugq</a> talk about how the war in Ukraine is showing how useful mobile devices are in war. Using them is risky, but those risks need to be managed. This episode refers to <a href="https://www.enea.com/insights/location-tracking-on-battlefield/">this report</a> on location tracking of phones on the battlefield..</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/between-two-nerds-rethinking-mobile-phones-on-the/id1621305970?i=1000643438651&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000643438651.jpg&quot;,&quot;title&quot;:&quot;Between Two Nerds: Rethinking mobile phones on the battlefield&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/between-two-nerds-rethinking-mobile-phones-on-the/id1621305970?i=1000643438651&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2024-01-30T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/between-two-nerds-rethinking-mobile-phones-on-the/id1621305970?i=1000643438651" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><h2>From <a href="https://riskybiznews.substack.com/">Risky Biz News</a>:</h2><p><strong>GUR hack in Russia:</strong> One of Ukraine's military intelligence agencies says it hacked and wiped servers at IPL Consulting, a Russian company that provides IT services for Russia's industrial sector. Officials from Ukraine's Defence Intelligence Main Directorate (GUR) <a href="https://gur.gov.ua/content/kiberfakhivtsi-hur-zavdaly-cherhovoho-potuzhnoho-udaru-po-vorohu.html">say</a> they wiped more than 60TB of data from dozens of servers and databases. GUR officials say they also <a href="https://gur.gov.ua/content/u-moskvi-zlamavsia-provaider-iakyi-zabezpechuvav-internetom-derzhstruktury-rf.html">worked</a> with a group of "unknown cyber volunteers in Russia" to cripple the infrastructure of Akado-Telekom, an ISP used by the Putin administration, the FSB, the FSO, the Moscow local administration, and Sberbank.</p><p><strong>DOJ and FTC tell companies to stop deleting chats: </strong>Federal investigators are warning companies not to delete chats and preserve conversations that have taken place via business collaboration and ephemeral messaging platforms.</p><p>In press releases on Friday, the <a href="https://www.justice.gov/opa/pr/justice-department-and-ftc-update-guidance-reinforces-parties-preservation-obligations">US Department of Justice</a> and the <a href="https://www.ftc.gov/news-events/news/press-releases/2024/01/ftc-doj-update-guidance-reinforces-parties-preservation-obligations-collaboration-tools-ephemeral">US Federal Trade Commission</a> announced that they updated the language in their preservation letters and specifications&#8212;documents they send to companies under federal investigations.</p><p>The new language updates evidence preservation procedures to cover modern tech stacks such as Slack, Microsoft Teams, and Signal.</p><p>[<a href="https://riskybiznews.substack.com/p/doj-ftc-tell-companies-to-stop-deleting-chats">more</a> on <em>Risky Business News</em>, including reports of Amazon and Google executives using auto-deleting messages when faced with anti-trust lawsuits]</p><p><strong>Brazil spyware scandal:</strong> Brazilian authorities have started an investigation against the country's former intelligence chief for organizing a mass surveillance campaign against the political rivals of former president Jair Bolsonaro. Brazilian Federal Police say they raided several homes owned by Alexandre Ramagen, the former head of ABIN, the country's intelligence agency. Officials say Ramagen created a "parallel structure" inside ABIN that targeted state governors, lawmakers, judges, and journalists. The ABIN unit allegedly used a spying tool named FirstMile, developed by Israeli company Cognyte. [Additional coverage in <em><a href="https://english.elpais.com/international/2024-01-26/police-investigate-brazils-intelligence-chief-under-bolsonaro-over-claims-of-political-spying.html">El Pais</a></em>]</p>]]></content:encoded></item><item><title><![CDATA[Smile! You've Been Sanctioned]]></title><description><![CDATA[PLUS: Microsoft's Midnight Blizzard Is Cold, Dark and Insecure]]></description><link>https://srslyriskybiz.substack.com/p/smile-youve-been-sanctioned</link><guid isPermaLink="false">https://srslyriskybiz.substack.com/p/smile-youve-been-sanctioned</guid><dc:creator><![CDATA[Tom Uren]]></dc:creator><pubDate>Thu, 25 Jan 2024 04:54:39 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!uNms!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fpodcast-episode_1000642954125.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Your weekly dose of Seriously Risky Business news is written by <a href="https://twitter.com/tomatospy">Tom Uren</a> and edited by <a href="https://twitter.com/riskybusiness">Patrick Gray</a>. It's supported by <a href="https://www.lawfaremedia.org/">Lawfare</a> with help from the William and Flora Hewlett Foundation. This week's edition is sponsored by <a href="https://material.security/">Material Security</a>.</em></p><p><em>You can hear a podcast discussion of this newsletter by searching for "Risky Business News" in your podcatcher or subscribing via <a href="https://risky.biz/feeds/risky-business-news/">this RSS feed</a>.</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/nz/podcast/risky-business-news/id1621305970?i=1000642954125&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000642954125.jpg&quot;,&quot;title&quot;:&quot;Srsly Risky Biz: How the SEC's new cyber disclosure rules are shaking out&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/nz/podcast/srsly-risky-biz-how-the-secs-new-cyber-disclosure/id1621305970?i=1000642954125&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2024-01-26T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/nz/podcast/risky-business-news/id1621305970?i=1000642954125" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!izxl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8d7a49d-a4ec-47bd-97cc-5a6efba488e4_1344x768.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!izxl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8d7a49d-a4ec-47bd-97cc-5a6efba488e4_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!izxl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8d7a49d-a4ec-47bd-97cc-5a6efba488e4_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!izxl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8d7a49d-a4ec-47bd-97cc-5a6efba488e4_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!izxl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8d7a49d-a4ec-47bd-97cc-5a6efba488e4_1344x768.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!izxl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8d7a49d-a4ec-47bd-97cc-5a6efba488e4_1344x768.png" width="1344" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d8d7a49d-a4ec-47bd-97cc-5a6efba488e4_1344x768.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1344,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1496573,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!izxl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8d7a49d-a4ec-47bd-97cc-5a6efba488e4_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!izxl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8d7a49d-a4ec-47bd-97cc-5a6efba488e4_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!izxl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8d7a49d-a4ec-47bd-97cc-5a6efba488e4_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!izxl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd8d7a49d-a4ec-47bd-97cc-5a6efba488e4_1344x768.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Office worker with a computer trapped in a web, Stable Diffusion</p><p>The Australian, US and UK governments have upped the ante against cybercriminals by launching coordinated sanctions against a single individual involved in a significant extortion attack.</p><p>On Tuesday this week, the Australian government <a href="https://www.foreignminister.gov.au/minister/penny-wong/media-release/cyber-sanctions-response-medibank-private-cyber-attack?">announced</a> financial and travel sanctions targeting <a href="https://www.abc.net.au/news/2024-01-23/aleksandr-ermakov-medibank-private-data-breach-cyber-attack/103378142">Aleksandr Gennadievich Ermakov</a>, a Russian national, for his role in the hack of Medibank Private, an Australian health insurance company.&nbsp;</p><p>Australia employed its <a href="https://www.dfat.gov.au/sites/default/files/snapshot-significant-cyber-incidents-sanctions-regime.pdf">cyber sanctions regime</a> for the first time in this case. On the same day, <a href="https://home.treasury.gov/news/press-releases/jy2041">the US</a> and <a href="https://www.gov.uk/government/news/uk-and-allies-sanctions-russian-cyber-hacker">UK governments</a> sanctioned Ermakov.&nbsp;</p><p>This was a nationally significant hack that affected a meaningful proportion of the Australian population, and was made worse by the hackers' attempts to apply extra pressure by releasing sensitive information to the dark web. The more appalling releases included a file 'abortions.csv' that contained more than 300 claims made by policyholders in relation to pregnancy terminations and miscarriages, and another called 'boozy.csv' containing details of alcoholism-related treatment. Ultimately, all the stolen data was published.</p><p>The Australian government <a href="https://srslyriskybiz.substack.com/i/80898120/australian-health-insurance-breach-gets-whole-of-government-response">mounted a whole-of-government response</a> that included the Australian Federal Police (AFP) and the Australian Signals Directorate (ASD), as well as the health and service delivery departments.&nbsp;</p><p>At the time, Clare O'Neil, Australia's Minister for Cyber Security, <a href="https://twitter.com/ClareONeilMP/status/1584777664597880832">thanked the AFP and ASD</a> for the "intensive work that is underway to hunt down the attacker".&nbsp;</p><p>It looks like that work paid off, and we love that the Department of Foreign Affairs and Trade <a href="https://www.abc.net.au/news/2024-01-23/aleksandr-ermakov-medibank-private-data-breach-cyber-attack/103378142">released to the media</a> a webcam photo of Ermakov.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NyDJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87cb54ea-8fdf-4481-bb2d-cde123cc6e5a_411x231.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NyDJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87cb54ea-8fdf-4481-bb2d-cde123cc6e5a_411x231.jpeg 424w, https://substackcdn.com/image/fetch/$s_!NyDJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87cb54ea-8fdf-4481-bb2d-cde123cc6e5a_411x231.jpeg 848w, https://substackcdn.com/image/fetch/$s_!NyDJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87cb54ea-8fdf-4481-bb2d-cde123cc6e5a_411x231.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!NyDJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87cb54ea-8fdf-4481-bb2d-cde123cc6e5a_411x231.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NyDJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87cb54ea-8fdf-4481-bb2d-cde123cc6e5a_411x231.jpeg" width="411" height="231" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/87cb54ea-8fdf-4481-bb2d-cde123cc6e5a_411x231.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:231,&quot;width&quot;:411,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NyDJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87cb54ea-8fdf-4481-bb2d-cde123cc6e5a_411x231.jpeg 424w, https://substackcdn.com/image/fetch/$s_!NyDJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87cb54ea-8fdf-4481-bb2d-cde123cc6e5a_411x231.jpeg 848w, https://substackcdn.com/image/fetch/$s_!NyDJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87cb54ea-8fdf-4481-bb2d-cde123cc6e5a_411x231.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!NyDJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87cb54ea-8fdf-4481-bb2d-cde123cc6e5a_411x231.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Aleksandr Ermakov (Supplied by the Department of Foreign Affairs and Trade to media outlets)&nbsp;</figcaption></figure></div><p>Russian law enforcement action against cyber criminals in these types of cases just doesn't happen, so coordinated sanctions are one of Western governments&#8217; better options.&nbsp;</p><p>In 2019, the US <a href="https://home.treasury.gov/news/press-releases/sm845">sanctioned Evil Corp</a> and, in 2023, the US and UK <a href="https://riskybiznews.substack.com/p/us-and-uk-dox-sanction-trickbot-conti-member">sanctioned</a> 18 members of the TrickBot gang in two different tranches over the course of the year.</p><p>In addition to the direct effects of sanctions on individuals, such as curtailing financial options and travel destinations, sanctions also appear to <a href="https://srslyriskybiz.substack.com/i/58654002/evil-corps-sanctions-evasion-attempts-fall-flat">affect cybercrime business prospects</a>. Victims are reluctant to pay sanctioned individuals or groups and as a result other criminals avoid being associated with these entities.</p><p>At the Australian press conference announcing the sanctions, Abigail Bradshaw, head of the Australian Cyber Security Centre, pointed out that "cybercriminals trade in anonymity".</p><p>"It is a selling quality, and so naming and identifying with the confidence that we have from our technical analysis will most certainly do harm to Mr Ermakov's cyber business", she continued.</p><p>We don't think sanctions against criminals will 'solve' cybercrime, but should be applied to deter the worst behaviour. But given there is really a lot of unacceptably bad behaviour going around, more sanctions is good news.&nbsp;&nbsp;&nbsp;</p><h2></h2><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://srslyriskybiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://srslyriskybiz.substack.com/subscribe?"><span>Subscribe now</span></a></p><h2>Microsoft's Midnight Blizzard: Cold, Dark and Insecure</h2><p>Microsoft's latest security clanger is, well, unbelievable.</p><p>Late last Friday Microsoft <a href="https://msrc.microsoft.com/blog/2024/01/microsoft-actions-following-attack-by-nation-state-actor-midnight-blizzard/">revealed</a> that it had been successfully compromised by a group it calls Midnight Blizzard. This group has <a href="https://attack.mitre.org/versions/v10/groups/G0016/">been attributed</a> by the US and UK governments to Russia's Foreign Intelligence service, the SVR.</p><p>A single paragraph from Microsoft's announcement contains all the important details:</p><blockquote><p>Beginning in late November 2023, the threat actor used a password spray attack to compromise a legacy non-production test tenant account and gain a foothold, and then used the account&#8217;s permissions to access a very small percentage of Microsoft corporate email accounts, including members of our senior leadership team and employees in our cybersecurity, legal, and other functions, and exfiltrated some emails and attached documents. The investigation indicates they were initially targeting email accounts for information related to Midnight Blizzard itself. We are in the process of notifying employees whose email was accessed.&nbsp;&nbsp;</p></blockquote><p>The company then had the cojones to write "the attack was not the result of a vulnerability in Microsoft products or services". This is <em>technically</em> correct, in that none of Microsoft's systems had a <a href="https://nvd.nist.gov/#">formal cyber security vulnerability or CVE</a>. But it only makes sense if you only speak cyber jargon and not English and think that 'absence of security' is not a vulnerability.&nbsp;</p><p>In this incident Midnight Blizzard took advantage of a string of Microsoft security failures to achieve their apparent goals &#8212; a test account was given extensive permissions that weren't removed after testing was completed; the account was not protected from basic password spraying attacks; and the account was not deactivated when testing was finished.</p><p>US Senator Ron Wyden <a href="https://cyberscoop.com/microsoft-critics-accuse-the-firm-of-negligence-in-latest-breach/">told </a><em><a href="https://cyberscoop.com/microsoft-critics-accuse-the-firm-of-negligence-in-latest-breach/">CyberScoop</a></em> that "this is yet another wholly avoidable hack that was caused by Microsoft&#8217;s negligence".</p><p>We've written before about Microsoft's <a href="https://srslyriskybiz.substack.com/p/microsofts-security-culture-just">subpar security culture</a>. In announcing this incident, the company wrote:</p><blockquote><p>For Microsoft, this incident has highlighted the urgent need to move even faster. We will act immediately to apply our current security standards to Microsoft-owned legacy systems and internal business processes, even when these changes might cause disruption to existing business processes.</p><p>This will likely cause some level of disruption while we adapt to this new reality, but this is a necessary step, and only the first of several we will be taking to embrace this philosophy.&nbsp;&nbsp;</p></blockquote><p>Well, duh. Microsoft finally seems to be realising that to improve its own security it might need to prioritise it over some of its other efforts. When it <a href="https://blogs.microsoft.com/on-the-issues/2023/11/02/secure-future-initiative-sfi-cybersecurity-cyberattacks/">announced its Secure Future Initiative</a> late last year this kind of language that elevated security was entirely missing and was the key reason we <a href="https://srslyriskybiz.substack.com/p/microsoft-should-look-to-the-past">were underwhelmed</a> by the launch of Microsoft's 'security reset'.</p><p>These paragraphs contain the right message, but it's disappointing that this message is coming from the relative backwater of the Microsoft Security Response Center rather than, say, CEO Satya Nadella, President Brad Smith, or even Security Vice President <a href="https://srslyriskybiz.substack.com/i/41991621/the-first-step-is-realising-you-have-a-problem">Charlie Bell</a>. Microsoft is being dragged kicking and screaming to actually reprioritising security, one awful breach at a time.</p><h2>SEC Disclosure: How Much is Too Much?</h2><p>Microsoft&#8217;s decision to disclose the Midnight Blizzard breach to the US Securities and Exchange Commission (SEC), without determining the incident&#8217;s material impact, may prompt a surge of non-material cybersecurity disclosures. Whether this is actually an issue depends on the perspectives of stakeholders in this process.&nbsp;&nbsp;&nbsp;</p><p>While some company cyber security leaders argue Microsoft&#8217;s decision will clutter the SEC channel and increase the burden on companies of preparing disclosure announcements, the SEC and industry observers believe more cyber security incident disclosure is vital.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p>On December 18 last year a new US Securities and Exchange (SEC) rule on the <a href="https://www.sec.gov/news/statement/gerding-cybersecurity-disclosure-20231214#:~:text=To%20help%20investors%20evaluate%20this,cybersecurity%20risk%20management%2C%20strategy%2C%20and">disclosure of material cyber security incidents</a> came into effect. This rule requires that companies inform the market within four days once they've determined that a cyber security incident is material. In <a href="https://www.sec.gov/files/rules/final/2023/33-11216.pdf">this rule</a>, the SEC says information is material:</p><blockquote><p>if "there is a substantial likelihood that a reasonable shareholder would consider it important" in making an investment decision, or if it would have "significantly altered the 'total mix' of information made available." "Doubts as to the critical nature" of the relevant information should be "resolved in favour of those the statute is designed to protect," namely investors. <em>[Ed: quotes here reference various court cases]</em></p></blockquote><p>In <a href="https://www.sec.gov/Archives/edgar/data/789019/000119312524011295/d708866d8k.htm">its SEC disclosure</a>, filed on January 19, Microsoft writes that "the incident has not had a material impact on the Company&#8217;s operations" and it "has not yet determined whether the incident is reasonably likely to materially impact" the company's financial results or operations.&nbsp;</p><p>One CISO we spoke to said "I guess Microsoft is acting the way we&#8217;d expect but it&#8217;s just confirming the bummer of a new world we&#8217;re in".&nbsp;&nbsp;</p><p>"Companies will be filing 8-Ks all over the place and cluttering up the SEC channel with non investor-relevant crap", he added. <em>(Ed: <a href="https://en.wikipedia.org/wiki/Form_8-K">8-K's are the SEC form</a> used to disclose significant events)</em></p><p>"The burden to get an 8-K out is enormous and has a long tail of cost and follow up headache so makes the burden of transparency very expensive. And now that Microsoft went first we&#8217;re even more committed as an industry to the emerging precedent."</p><p>However, Microsoft is not the only company erring on the side of transparency. Even before Microsoft's disclosure, on December 29 last year, First American Financial Corporation <a href="https://www.sec.gov/Archives/edgar/data/1472787/000095017023073848/faf-20231220.htm">disclosed a cyber security incident</a> despite not knowing yet having determined that it would be material.&nbsp;</p><p>In its disclosure the company wrote that it "continues to assess whether the incident will have a material impact on the Company&#8217;s financial condition or results of operations, which at this point cannot be determined".</p><p>For the SEC, the underlying drivers that require stronger disclosure requirements are that, in the words of Erik Gerding, its director of Corporation Finance, "disclosure practices have remained inconsistent", while "cyber security risks have increased alongside the ever-increasing share of economic activity that depends on electronic systems".&nbsp;</p><p>That seems fair enough. Of course, we'd rather see companies spend money getting security right rather than on disclosure statements that jump the gun.</p><h2>Flying High: What Critics of the CSRB Get Wrong</h2><p>As US lawmakers consider whether to permanently establish the Cyber Safety Review Board (CSRB), a US Senate hearing has raised questions about how it operates.</p><p><a href="https://www.theregister.com/2024/01/18/cyber_safety_review_board_rethink/">Some criticism</a> has focussed on the extensive private sector involvement in the board and the potential for conflicts of interest to arise. The <a href="https://www.cisa.gov/cyber-safety-review-board-csrb-members">current board</a> is half senior federal government cyber security officials and half cyber security luminaries from the private sector and academia. Another point of criticism is the fact all CSRB members have full time day jobs.&nbsp;</p><p>In our view, the CSRB's mixed public-private composition is absolutely necessary to have any impact in today's cyber security environment.&nbsp;</p><p>The CSRB has so far produced two excellent reports that have examined systemic issues and are unique because they try to identify root causes and develop recommendations that directly address them.&nbsp;</p><p>Its first review looked at the <a href="https://srslyriskybiz.substack.com/i/45562749/logshell-yes-its-that-bad">Log4Shell vulnerability</a> and supply chain security more generally, and, based on our <em>Seriously Risky Business</em> high-level summary, found "supply chain security is massively underdone". The second report looked at the outrageous success of Lapsus$-style hackers with <a href="https://srslyriskybiz.substack.com/i/136390816/advanced-persistent-teenagers">our summary</a> being that "current cyber security practices are ineffective against a new breed of hackers".</p><p>The CSRB is often compared with the <a href="https://ntsb.gov/">National Transportation Safety Board</a> (NTSB), the US agency that investigates transport accidents and issues safety recommendations aimed at preventing future disasters.&nbsp;</p><p>There are, however, massive differences between how NTSB accident investigations flow through to action in the transportation sector and how recommendations from the CSRB are converted into action.</p><p>In a recent Boeing 737 incident, for example, NTSB discoveries <a href="https://www.faa.gov/newsroom/updates-grounding-boeing-737-9-max-aircraft">resulted</a> in the Federal Aviation Administration grounding aircraft and <a href="https://drs.faa.gov/browse/excelExternalWindow/DRSDOCID122693486620240106201913.0001?modalOpened=true">ordering operators</a> to inspect specific bolts. The problem is discrete, there are a relatively small number of stakeholders and regulators have authorities that ensure compliance.</p><p>None of that exists in the cyber security space. The problems are broad, there are usually large numbers of stakeholders and regulators have limited clout.&nbsp;</p><p>In our view, <em><strong>without the private sector involvement, </strong></em>a newly constructed independent government body simply wouldn't get the traction it needs to make a dent in the cyber security problems that currently exist. The CSRB really needs <em>a lot</em> of credibility and reach to have any kind of impact in the current environment.&nbsp;</p><p>In an interview with Patrick Gray and Adam Boileau on <a href="https://risky.biz/RB733/">this week's edition</a> of the <em>Risky Business</em> podcast, CSRB Chair Rob Silvers said the board's composition "gives the board a lot of credibility to drive change".&nbsp;</p><p>"And when those people come together and speak as to what needs to happen out there, what CISOs need to do, what network defenders need to do, what regulators need to do, what legislatures need to do, that speaks with incredible force and cannot be replicated by a government only enterprise," he continued.</p><p>Given that, other issues that critics raise such as potential conflicts of interests, recusal processes and the careful application of subpoena powers need to be managed. Silvers discusses how these processes are either already in place or have been thought through in potential legislation. They are also examined here in <em><a href="https://www.politico.com/newsletters/weekly-cybersecurity/2024/01/22/microsoft-under-the-microscope-00136888">Politico</a></em>.</p><h2></h2><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://srslyriskybiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Seriously Risky Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Three Reasons to Be Cheerful This Week:</h2><ol><li><p><strong>iPhone Stolen Device Protection:</strong> Apple rolled out what it is calling <a href="https://support.apple.com/en-us/HT212510">'Stolen Device Protection'</a> in its iOS 17.3 release this week. It's a measure that <a href="https://www.wired.com/story/apple-ios-17-3-iphone-stolen-device-protection/">adds extra protections</a> to help stop thieves from capturing the entirety of your digital life if they steal your phone and learn your passcode. This will occur to only a minority of people, but it is good that Apple is still improving protections for what could be considered edge cases.&nbsp;&nbsp;&nbsp;&nbsp;</p></li><li><p><strong>CISA's ransomware warnings: In its <a href="https://www.cisa.gov/news-events/news/cisa-releases-2023-year-review-showcasing-efforts-protect-critical-infrastructure">2023 Year in Review</a> CISA says it issued 1,200 'pre-ransomware' warnings that alert organisations of early-stage ransomware activity on their networks. This potentially enables the affected organisation to head off a full-on ransomware attack. <a href="https://www.cybersecuritydive.com/news/cisa-pre-ransomware-alerts/705046/">More coverage</a> at </strong><em><strong>Cybersecurity Dive</strong></em><strong>.</strong></p></li><li><p><strong>Second FTC geolocation data broker win: The Federal Trade Commission <a href="https://therecord.media/ftc-settles-data-broker-case-geolocation">announced its second settlement</a> with a geolocation data broker this week. As with its <a href="https://srslyriskybiz.substack.com/i/140790357/ftc-geolocation-win-masks-shaky-legal-foundations">win last week</a>, the FTC's complaint relies on the data broker, InMarket, not properly getting informed consent from consumers.&nbsp;&nbsp;</strong></p></li></ol><h2>Sponsor Section</h2><p><em>In this Risky Business News sponsor interview, Tom Uren talks to Ivan Dwyer of Material Security about how it makes sense to view office productivity suites as an organisation's critical infrastructure.</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/sponsored-why-finding-and-responding-threats-isnt/id1621305970?i=1000642407760&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000642407760.jpg&quot;,&quot;title&quot;:&quot;Sponsored: Why finding and responding threats isn't enough and we need to contain them as well&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/sponsored-why-finding-and-responding-threats-isnt/id1621305970?i=1000642407760&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2024-01-22T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/sponsored-why-finding-and-responding-threats-isnt/id1621305970?i=1000642407760" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><h2>Shorts</h2><h3>Using Facial Recognition on Faces Predicted from DNA is a Disaster</h3><p>This <em>Wired</em> <a href="https://www.wired.com/story/parabon-nanolabs-dna-face-models-police-facial-recognition/">article</a> recounts one police department's attempt to use facial recognition technology on a virtual face as imagined from DNA information collected at a crime scene.</p><p>This newsletter supports use of facial recognition technology when it makes sense and with appropriate checks and balances. But this is disastrous.&nbsp;</p><h3>UK Post Office&#8217;s Tragic Horizon Failure</h3><p><a href="https://arstechnica.com/tech-policy/2024/01/fujitsu-bugs-that-sent-innocent-people-to-prison-were-known-from-the-start/">This </a><em><a href="https://arstechnica.com/tech-policy/2024/01/fujitsu-bugs-that-sent-innocent-people-to-prison-were-known-from-the-start/">Ars Technica</a></em><a href="https://arstechnica.com/tech-policy/2024/01/fujitsu-bugs-that-sent-innocent-people-to-prison-were-known-from-the-start/"> article</a> covers the tragic tale of bugs in the Horizon software system that was installed in UK post offices from 1999 to 2015. These bugs resulted in faulty accounts that were then used to justify the prosecution and conviction of more than 900 UK Post Office employees.&nbsp;</p><h3>Stablecoins the Sanction Evasion Crypto of Choice</h3><p>Blockchain analysis company Chainalysis <a href="https://www.wired.com/story/stablecoin-sanctions-violations-crypto-crime/">has found</a> that stablecoins, cryptocurrencies pegged to something stable like the US dollar, are the vehicle of choice for crypto scammers and entities trying to avoid sanctions.</p><p>Makes sense. Why add currency valuation risk to your problems when you are just trying to make a dishonest living?</p><h2>Risky Biz Talks</h2><p><em>You can find the audio edition of this newsletter and other fine podcasts and interviews in the Risky Biz News feed (<a href="https://risky.biz/feeds/risky-business-news">RSS</a>, <a href="https://podcasts.apple.com/au/podcast/risky-business-news/id1621305970">iTunes</a> or <a href="https://open.spotify.com/show/0BdExoUZqbGsBYjt6QZl4Q">Spotify</a>).&nbsp;&nbsp;</em></p><p><em>In <a href="https://risky.biz/BTN64">our last</a> "Between Two Nerds" discussion Tom Uren and <a href="https://twitter.com/thegrugq">The Grugq</a> talk about data brokers and how having so much data available about Americans feels creepy, yet there is little visible harm to individuals. But there are still reasons to be worried.</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/between-two-nerds-why-data-brokers-arent-causing-widespread/id1621305970?i=1000642825844&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000642825844.jpg&quot;,&quot;title&quot;:&quot;Between Two Nerds: Why data brokers aren't causing widespread harms&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/between-two-nerds-why-data-brokers-arent-causing-widespread/id1621305970?i=1000642825844&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2024-01-25T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/between-two-nerds-why-data-brokers-arent-causing-widespread/id1621305970?i=1000642825844" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><h2>From <a href="https://riskybiznews.substack.com/">Risky Biz News</a>:</h2><p><strong>CISA Director swatted:</strong> CISA Director Jen Easterly was the target of a swatting attempt, according to a report from <em><a href="https://therecord.media/cisa-jen-easterly-swatting-incident">The Record</a></em>, citing sources inside CISA. The attacker claimed gunfire was heard from Easterly's house on the night of December 30, last year. The CISA official was unharmed after Arlington County Police arrived on scene and determined no shooting had occurred. The incident comes as a large number of US officials have been swatted over the past weeks, with <a href="https://www.fox19.com/2024/01/09/white-house-bomb-threat-part-clermont-county-swatting-investigation/">two</a> <a href="https://www.nbcnews.com/politics/white-house/person-called-911-falsely-reporting-fire-white-house-apparent-swatting-rcna133964">incidents</a> targeting the White House itself.</p><p><strong>GVSU hack:</strong> A Ukrainian hacker group named BlackJack has breached and wiped more than 150 systems belonging to the Main Military Construction Directorate for Special Facilities (GVSU), a state-owned company that builds military facilities for the Russian military. The group claims it also downloaded more than 1.2TB of information from the company's servers containing information on more than 500 military objectives. The BlackJack group has been informally linked to the Security Service of Ukraine. Ukraine's Main Directorate of Intelligence, or GUR, praised the attack <a href="https://t.me/DIUkraine/3314">on Telegram</a> as a major success. [Additional coverage in<em> <a href="https://www.ukrinform.net/rubric-ato/3815353-ukrainian-hackers-steal-secret-documents-on-500-facilities-of-russian-defense-ministry-sources.html">UkrInform</a></em>/English coverage in <em><a href="https://www.businessinsider.com/ukraines-blackjack-hackers-breach-500-russian-military-sites-cause-chaos-2024-1">BusinessInsider</a></em>]</p><p><strong>UNC3886:</strong> Google's Mandiant division says that a VMWare vulnerability patched in October of last year was secretly exploited in the wild by Chinese hackers since late 2021. Mandiant linked the attacks to a group it tracks as <a href="https://www.mandiant.com/resources/blog/chinese-vmware-exploitation-since-2021">UNC3886</a>. The group has a long history of going after devices that cannot run EDR security products, allowing their attacks to go undetected for longer. When it patched the vulnerability (<a href="https://www.vmware.com/security/advisories/VMSA-2023-0023.html">CVE-2023-34048</a>) in October, VMWare wasn't aware of active exploitation but released patches even for end-of-life devices.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vai-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bba56fb-9e51-4edb-a5c7-3d0a63e3640b_654x930.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vai-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bba56fb-9e51-4edb-a5c7-3d0a63e3640b_654x930.jpeg 424w, https://substackcdn.com/image/fetch/$s_!vai-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bba56fb-9e51-4edb-a5c7-3d0a63e3640b_654x930.jpeg 848w, https://substackcdn.com/image/fetch/$s_!vai-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bba56fb-9e51-4edb-a5c7-3d0a63e3640b_654x930.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!vai-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bba56fb-9e51-4edb-a5c7-3d0a63e3640b_654x930.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vai-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bba56fb-9e51-4edb-a5c7-3d0a63e3640b_654x930.jpeg" width="654" height="930" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6bba56fb-9e51-4edb-a5c7-3d0a63e3640b_654x930.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:930,&quot;width&quot;:654,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Chart showing the stages of an UNC3886 attack using the recent VMWare bugs&quot;,&quot;title&quot;:&quot;Chart showing the stages of an UNC3886 attack using the recent VMWare bugs&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Chart showing the stages of an UNC3886 attack using the recent VMWare bugs" title="Chart showing the stages of an UNC3886 attack using the recent VMWare bugs" srcset="https://substackcdn.com/image/fetch/$s_!vai-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bba56fb-9e51-4edb-a5c7-3d0a63e3640b_654x930.jpeg 424w, https://substackcdn.com/image/fetch/$s_!vai-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bba56fb-9e51-4edb-a5c7-3d0a63e3640b_654x930.jpeg 848w, https://substackcdn.com/image/fetch/$s_!vai-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bba56fb-9e51-4edb-a5c7-3d0a63e3640b_654x930.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!vai-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6bba56fb-9e51-4edb-a5c7-3d0a63e3640b_654x930.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div>]]></content:encoded></item><item><title><![CDATA[PRC: Not Stealthy, Just Annoying ]]></title><description><![CDATA[PLUS: FTC Geolocation Win Masks Shaky Legal Foundations]]></description><link>https://srslyriskybiz.substack.com/p/prc-not-stealthy-just-annoying</link><guid isPermaLink="false">https://srslyriskybiz.substack.com/p/prc-not-stealthy-just-annoying</guid><dc:creator><![CDATA[Tom Uren]]></dc:creator><pubDate>Thu, 18 Jan 2024 03:55:10 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ef3b17b-6a53-4918-8209-6da8a98b57a4_1344x768.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Your weekly dose of Seriously Risky Business news is written by <a href="https://twitter.com/tomatospy">Tom Uren</a> and edited by <a href="https://twitter.com/riskybusiness">Patrick Gray</a>. It's supported by <a href="https://www.lawfaremedia.org/">Lawfare</a> with help from the William and Flora Hewlett Foundation. This week's edition is sponsored by <a href="https://panther.com/">Panther</a>.</em></p><p><em>You can hear a podcast discussion of this newsletter by searching for "Risky Business News" in your podcatcher or subscribing via <a href="https://risky.biz/feeds/risky-business-news/">this RSS feed</a>.</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/srsly-risky-biz-the-prc-doesnt-care-about-stealth/id1621305970?i=1000642046446&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000642046446.jpg&quot;,&quot;title&quot;:&quot;Srsly Risky Biz: The PRC doesn't care about stealth, just access&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/srsly-risky-biz-the-prc-doesnt-care-about-stealth/id1621305970?i=1000642046446&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2024-01-18T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/srsly-risky-biz-the-prc-doesnt-care-about-stealth/id1621305970?i=1000642046446" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!u1Mx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ef3b17b-6a53-4918-8209-6da8a98b57a4_1344x768.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!u1Mx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ef3b17b-6a53-4918-8209-6da8a98b57a4_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!u1Mx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ef3b17b-6a53-4918-8209-6da8a98b57a4_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!u1Mx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ef3b17b-6a53-4918-8209-6da8a98b57a4_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!u1Mx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ef3b17b-6a53-4918-8209-6da8a98b57a4_1344x768.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!u1Mx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ef3b17b-6a53-4918-8209-6da8a98b57a4_1344x768.png" width="1344" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8ef3b17b-6a53-4918-8209-6da8a98b57a4_1344x768.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1344,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1418944,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!u1Mx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ef3b17b-6a53-4918-8209-6da8a98b57a4_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!u1Mx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ef3b17b-6a53-4918-8209-6da8a98b57a4_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!u1Mx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ef3b17b-6a53-4918-8209-6da8a98b57a4_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!u1Mx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ef3b17b-6a53-4918-8209-6da8a98b57a4_1344x768.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">IT equipment graveyard, Stable Diffusion</figcaption></figure></div><p>Not only are cyber espionage groups likely based in China using <a href="https://srslyriskybiz.substack.com/p/living-off-the-land-is-the-new-normal">living-off-the-land techniques</a> to operate stealthily, they are adopting techniques that make post-discovery eviction more difficult.&nbsp;</p><p>Two separate campaigns reported in recent weeks illustrate the different techniques actors believed to be associated with the PRC are using. In one campaign, a group that had been operating slowly and discreetly switched to large-scale device exploitation and used various persistence mechanisms to 'dig in' once it was discovered.&nbsp;</p><p>In the second campaign, the actor concerned used compromised end-of-life devices in a botnet to relay command and control communications.&nbsp;</p><p>The first campaign appears to have kicked off in early December last year, and targets Ivanti Connect Secure VPN devices. Cyber security firm Volexity <a href="https://www.volexity.com/blog/2024/01/10/active-exploitation-of-two-zero-day-vulnerabilities-in-ivanti-connect-secure-vpn/">reported </a>details of this campaign, including the two 0days used, on 10 January.&nbsp;</p><p>Volexity appears to have become aware of the campaign from its very beginning. The firm discovered suspicious activity on a customer's network and was able to trace it back to Ivanti's internet-facing VPN appliance.&nbsp;</p><p>Volexity was able to determine that two 0days (an authentication bypass and command injection vulnerability) were used in concert to compromise the device to get network access.&nbsp;</p><p>Hackers then used this access to deploy a webshell and keylogger, gather credentials and ultimately pivot into the internal network. Volexity wrote in its report that it "has reason to believe that UTA0178 (Ed: its name for the group responsible) is a Chinese nation-state-level threat actor", but did not expand on these reasons.&nbsp;</p><p>Mandiant <a href="https://www.mandiant.com/resources/blog/suspected-apt-targets-ivanti-zero-day">also reported</a> on the activity and described the group responsible as a "suspected espionage threat actor", but did not assign the activity to any particular state.&nbsp;</p><p>Both reports note that the group used compromised out-of-support Cyberoam VPN devices to proxy communications. Targeting end-of-life devices is also a feature of the second campaign we discuss.</p><p>Ivanti <a href="https://forums.ivanti.com/s/article/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways">published a mitigation</a> on the same day Volexity released its report. By the day of publication, Volexity and Ivanti had found only a single compromised organisation.</p><p>However, the day after publication, on 11 January, what Volexity describes as "<a href="https://www.volexity.com/blog/2024/01/15/ivanti-connect-secure-vpn-exploitation-goes-global/">widespread exploitation</a>" kicked off. Much of this activity occurred quite quickly after publication and used essentially the same webshell as was deployed in the first hack Volexity detected, indicating the same actor was probably at work.</p><p>The company says that "appliances appear to have been indiscriminately targeted, with victims all over the world" and that by 14 January, 1,700 Connect Secure devices had been compromised. It appears other threat actors also attempted to exploit Connect Secure devices, but it is not clear whether their efforts were related to the initial group&#8217;s actions.&nbsp;</p><p>We have seen Chinese actors accelerate operations after they have been pinged before. In June last year, a PRC espionage group rapidly deployed different persistence mechanisms at scale after its campaign exploiting Barracuda Email Security Gateways was <a href="https://www.mandiant.com/resources/blog/barracuda-esg-exploited-globally">detected and publicised</a>. This 'digging in' was so extensive that Barracuda could not guarantee the affected gateways could be made secure again and recommended they be fully replaced.</p><p><a href="https://securityscorecard.com/blog/threat-intelligence-research-volt-typhoon/">Another report</a>, released last week by SecurityScorecard's STRIKE team, says that a botnet used by China's Volt Typhoon group now controls about 30% of all the visible Cisco RV320 and RV325 WAN routers across the internet.&nbsp;</p><p>Volt Typhoon is a <a href="https://srslyriskybiz.substack.com/p/why-chinas-latest-apt-campaign-is">genuinely worrying</a> group because it appears to be "pursuing development of capabilities that could disrupt critical communications infrastructure between the United States and Asia region during future crises", according to a <a href="https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/">Microsoft report</a>.</p><p>The hacked Cisco routers are incorporated into what Black Lotus Labs at Lumen Technologies calls the 'KV-botnet', a botnet made up of compromised small office/home office routers.</p><p>This botnet is made up of two 'clusters'. One cluster, called the "JDY cluster" by Black Lotus Labs, is used for target scanning. Targets identified by JDY are then passed to the "KV cluster", which "appears to be reserved for manual operations against higher value targets".</p><p>The JDY or scanning portion of the network is made up exclusively of Cisco RV320 and RV325 routers, whereas the composition of the KV portion varies and has over time included Cisco RV320s, DrayTek Vigor routers, NETGEAR ProSAFEs and Axis IP cameras.&nbsp;</p><p>Except for the Axis IP cameras, all these devices are end-of-life and manufacturers have absolved themself of responsibility for security patching.</p><p>Targeting end-of-life devices for these botnets just makes sense. Manufacturers have already washed their hands of responsibility, so are not likely to issue patches without some sort of public pressure. And how would an owner know if their device had been assimilated into a Chinese spy botnet anyway?</p><p>There have been several US government efforts to take down botnets used by foreign cyber espionage actors, notably Russian botnets such as <a href="https://arstechnica.com/information-technology/2018/05/fbi-tells-router-users-to-reboot-now-to-kill-malware-infecting-500k-devices/">VPNfilter</a>, <a href="https://arstechnica.com/information-technology/2022/04/fbi-accesses-us-servers-to-dismantle-botnet-malware-installed-by-russian-spies/">Cyclops Blink</a> and <a href="https://srslyriskybiz.substack.com/p/why-the-snake-takedown-will-hurt">Snake</a>. However, these kinds of operations take a huge amount of time and effort and are also sometimes constrained in scope because of jurisdictional issues. We can't help wondering if prevention would be better than cure.&nbsp;</p><p><strong>Targeting of EOL devices highlights deficiencies in patching obligations</strong></p><p>One theme of the <a href="https://srslyriskybiz.substack.com/p/grandpa-biden-cyber-president">US cyber security strategy</a> is shifting the costs of poor product security back on the companies that sold those products in the first place. We think it is time to look at how long companies should be required to provide software patches to mitigate security issues.&nbsp;</p><p>No doubt it is painful for companies to issue security updates and patches for old products. We can understand why companies would like to turn a blind eye and wash their hands of them. But who then becomes responsible for vulnerabilities in these products? And should it be up to governments to effectively subsidise these manufacturers by applying band aid solutions once they become a national security problem?&nbsp;</p><p>And a reminder that compromised devices aren't 'just' used to steal information &#8212; as mentioned earlier, there is deep concern that Volt Typhoon is preparing disruptive capabilities for use in a military conflict with the US.&nbsp;&nbsp;</p><h2></h2><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://srslyriskybiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Seriously Risky Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>FTC Geolocation Win Masks Shaky Legal Foundations</h2><p>Last week the Federal Trade Commission (FTC) <a href="https://www.ftc.gov/news-events/news/press-releases/2024/01/ftc-order-prohibits-data-broker-x-mode-social-outlogic-selling-sensitive-location-data">announced its first ever settlement</a> with a data broker over the sale of sensitive location data.</p><p>That the FTC has pursued this action is great as the US needs far more rigorous data privacy standards. But the basis for the settlement is pretty thin and underscores the terrible state of American privacy law.</p><p>In its <a href="https://www.ftc.gov/system/files/ftc_gov/pdf/X-Mode-Complaint.pdf">original complaint</a> from 2022, (when the data broker concerned, Outlogic, was known as X-Mode), the commission said X-Mode sold "raw location data tied to unique persistent identifiers" and advertised that its location data "is 70% accurate within 20 meters or less".</p><p>Fine-grained geolocation data linked to a persistent identifier is, from a surveillance and intelligence perspective, wonderful! Combined with offline information available about people, this data is essentially all someone needs to figure out who people are and where they go (we covered a real-world example of use of this data involving a Catholic priest <a href="https://srslyriskybiz.substack.com/i/39287247/let-he-who-is-without-sin">back in 2021</a>).</p><p>The complaint continues:</p><blockquote><p>X-Mode does not restrict the collection of location data from sensitive locations such as healthcare facilities, churches, and schools. X-Mode contractually restricts how its customers may use location data. For example, one such restriction is that its customers cannot:&nbsp;</p><p><em>use X-Mode Data (alone or combined with other data) to associate any user, device or individual with any venue that is related to healthcare, addiction, pregnancy or pregnancy termination, or sexual orientation, or to otherwise infer an interest or characteristic related to any of the foregoing;</em></p></blockquote><p>So&#8230; X-Mode's made its customers pinky promise not to do anything bad. The FTC didn't think that was sufficient.&nbsp;&nbsp;</p><p>X-Mode mostly obtained location data through third-party apps that incorporated its Software Development Kit (SDK). The developers of these third-party apps were paid to facilitate X-Mode's data collection and its SDK was incorporated into over 300 apps including games, fitness trackers and religious apps.</p><p><a href="https://www.rstreet.org/people/brandon-pugh/">Brandon Pugh</a>, Cybersecurity Director at the R Street Institute, told <em>Seriously Risky Business</em>, that the FTC "is no stranger to taking action directed at data brokers" and "it's clear that the FTC hopes this will be a signal to data brokers".&nbsp;</p><p>He thought, however, that it would be better if Congress passed comprehensive federal data privacy and security laws.&nbsp;</p><p>"That would allow Congress to take the lead on privacy policy instead of a federal agency acting by way of ad hoc actions or expansive rulemaking", he said.</p><p>The strongest part of the FTC's complaint is that X-Mode did not properly tell mobile device users how their data would be used, did not honour consumer's privacy choices and did not get informed consent from users of these third-party apps. That's pretty cut and dried.</p><p>The logical response from other companies in this segment is to list how geolocation data is collected and used in the terms and conditions of apps that act as data sources. That would greatly reduce the sting of any possible FTC action. (This <em>Wired</em> <a href="https://www.wired.com/story/ftc-xmode-outlogic-location-data-settlement/">article</a> examines the Outlogic settlement and the ineffectiveness of terms and conditions in more detail).</p><p>The geolocation data of an entire nation just shouldn't be for sale. The FTC is trying to fix this problem, but it would be much better if its actions were supported by reasonable laws.&nbsp;</p><h2>Three Reasons to Be Cheerful This Week:</h2><ol><li><p><strong>More disruption operations on the way:</strong> A Department of Justice official has told attendees at an international cyber security conference that he <a href="https://therecord.media/doj-to-increase-cybercrime-efforts">expects more</a> US government cyber threat disruption operations in 2024. That is the right approach and we look forward to hearing about them over the coming year.</p></li><li><p><strong>Removing barriers for cyber hires:</strong> The US government <a href="https://cyberscoop.com/harry-coker-education-requirements-federal-cybersecurity-jobs/">is working</a> to remove the requirement for four-year degrees for some federal cyber security contracting jobs.&nbsp;&nbsp;</p></li><li><p><strong>Positive scorecard for US cyber diplomats:</strong> The US Government Accountability Office has reviewed the State Department's new Bureau of Cyberspace and Digital Policy and on the whole, given it a passing grade. <em>NextGov</em> has <a href="https://www.nextgov.com/cybersecurity/2024/01/states-cyber-bureau-has-raised-us-profile-cyber-globally-watchdog-says/393336/">further coverage</a>.&nbsp;</p></li></ol><h2>Sponsor Section</h2><p><em>In this Risky Business News sponsor interview Tom Uren talks to Ken Westin, Field CISO at Panther about how the rise of cloud and hybrid IT architectures requires a new type of SIEM.</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/sponsored-how-the-rise-of-cloud-has-changed-the-siem-game/id1621305970?i=1000641622533&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000641622533.jpg&quot;,&quot;title&quot;:&quot;Sponsored: How the rise of cloud has changed the SIEM game&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/sponsored-how-the-rise-of-cloud-has-changed-the-siem-game/id1621305970?i=1000641622533&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2024-01-14T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/sponsored-how-the-rise-of-cloud-has-changed-the-siem-game/id1621305970?i=1000641622533" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><p><em>A short demo on how to use Panther's Detections-as-Code (DaC) platform for cryptominer investigations.</em></p><div id="youtube2-ywAJY5Zk_RY" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;ywAJY5Zk_RY&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/ywAJY5Zk_RY?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h2>Shorts</h2><h3>Insurers Settle in Merck NotPetya Case</h3><p>Pharmaceutical giant Merck <a href="https://news.bloomberglaw.com/">reached a settlement</a> with its insurance providers in a case over USD$1.4bn in claims stemming from the <a href="https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/">2017 NotPetya attack</a>. In this attack a Russian military intelligence unit launched a wiper attack on Ukrainian firms that propagated globally. Merck's insurers were trying to avoid making payments, claiming NotPetya fell under the insurance policy's war exclusions.&nbsp;</p><p>The settlement is not public, but it means that the previous appeals court opinion in favour of Merck still stands.&nbsp;</p><h3>The Varying Impact of Takedowns</h3><p>Threat intelligence firm Recorded Future compares three different takedowns in its <a href="https://www.recordedfuture.com/2023-adversary-infrastructure-report">recently released</a> 2023 Adversary Infrastructure Report. Action against the Emotet and Qakbot botnets have been relatively effective, although in both cases the criminals behind the botnets appear to have moved on to other efforts such as propagating different types of malware. A <a href="https://cyberscoop.com/microsoft-cobalt-strike-hacking-tool/">takedown of unlicensed Cobalt Strike servers</a>, by contrast, didn't have much impact at all. (Cobalt Strike is a legitimate security testing command and control tool that is popular amongst cyber criminals and state actors).&nbsp;&nbsp;</p><h2></h2><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://srslyriskybiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://srslyriskybiz.substack.com/subscribe?"><span>Subscribe now</span></a></p><h2>Risky Biz Talks</h2><p><em>You can find the audio edition of this newsletter and other fine podcasts and interviews in the Risky Biz News feed (<a href="https://risky.biz/feeds/risky-business-news">RSS</a>, <a href="https://podcasts.apple.com/au/podcast/risky-business-news/id1621305970">iTunes</a> or <a href="https://open.spotify.com/show/0BdExoUZqbGsBYjt6QZl4Q">Spotify</a>).&nbsp;&nbsp;</em></p><p><em>In <a href="https://risky.biz/BTN39/">our last</a> "Between Two Nerds" discussion Tom Uren and <a href="https://twitter.com/thegrugq">The Grugq</a> look at the legacy of Stuxnet, how it was an 'inevitable gamechanger' and how much the Dutch government knew (or should have known) at the time.&nbsp;</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/between-two-nerds-stuxnet-the-inevitable-game-changer/id1621305970?i=1000641759462&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000641759462.jpg&quot;,&quot;title&quot;:&quot;Between Two Nerds: Stuxnet, the inevitable game changer&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/between-two-nerds-stuxnet-the-inevitable-game-changer/id1621305970?i=1000641759462&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2024-01-16T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/between-two-nerds-stuxnet-the-inevitable-game-changer/id1621305970?i=1000641759462" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><h2>From <a href="https://riskybiznews.substack.com/">Risky Biz News</a>:</h2><p><strong>eBay fined in 2019 harassment case:</strong> eBay has agreed to pay a <a href="https://www.justice.gov/usao-ma/pr/ebay-inc-pay-3-million-connection-corporate-cyberstalking-campaign-targeting">$3 million fine</a> to settle a DOJ lawsuit accusing the company of orchestrating a harassment and intimidation campaign. The company admitted that its security team harassed a US couple who ran a newsletter that negatively reviewed eBay products. eBay's former Senior Director of Safety and Security and six members of the company's security team posted negative comments on the newsletter's articles and a bunch of way way waaaaaaay more creepy stuff&#8212;see below.</p><blockquote><p>The campaign included sending anonymous and disturbing deliveries to the victims' home, including a book on surviving the death of a spouse, a bloody pig mask, a fetal pig and a funeral wreath and live insects; sending private Twitter messages and public tweets criticizing the newsletter&#8217;s content and threatening to visit the victims in Natick; and traveling to Natick to surveil the victims and install a GPS tracking device on their car. The harassment also featured Craigslist posts inviting the public for sexual encounters at the victims' home.</p></blockquote><p><strong>Sandworm</strong>: Forescout has a deep dive [<a href="https://www.forescout.com/resources/clearing-the-fog-of-war/">PDF</a>] into the Sandworm attacks against Denmark's critical sector that were <a href="https://riskybiznews.substack.com/p/russia-hacked-22-danish-critical-infra-companies">spotted last year</a> by local authorities. The surprising main conclusion is below.</p><blockquote><p>Evidence suggests that the two waves of attacks on Danish infrastructure reported by SektorCERT were unrelated. It also suggests that the second wave was simply part of a mass exploitation campaign against unpatched firewalls, not part of a targeted attack by Sandworm or another state-sponsored actor.</p></blockquote><p><strong>Cybercrime crew infects 172,000 smart TVs and set-top boxes:</strong> A cybercrime operation is believed to have infected at least 172,000 smart TVs and set-top boxes with malware that carries out DDoS attacks.</p><p>Named <strong>Bigpanzi</strong>, the group has been active since at least 2015 and appears to target Spanish and Portuguese-speaking users across Latin America.</p><p>According to Chinese security firm <a href="https://blog.xlab.qianxin.com/bigpanzi-exposed-hidden-cyber-threat-behind-your-stb/">QiAnXin</a>, Bigpanzi built its botnet through social-engineering tactics, such as spreading apps to view pirated content, apps to enhance TV viewing experiences, and backdoored firmware updates.</p><p>Once installed, the apps and firmware updates would ensnare infected devices into the Bigpanzi botnet and carry out attacks at the operator's behest.</p>]]></content:encoded></item><item><title><![CDATA[Russia's Cyber War Gets Smarter… And Dumber]]></title><description><![CDATA[PLUS: Predatory Sparrow Won't Move the Needle in the Middle East]]></description><link>https://srslyriskybiz.substack.com/p/russias-cyber-war-gets-smarter-and</link><guid isPermaLink="false">https://srslyriskybiz.substack.com/p/russias-cyber-war-gets-smarter-and</guid><dc:creator><![CDATA[Tom Uren]]></dc:creator><pubDate>Thu, 11 Jan 2024 04:11:38 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54f6518f-3243-4719-927a-1220b0fc5706_1344x768.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Your weekly dose of Seriously Risky Business news is written by <a href="https://twitter.com/tomatospy">Tom Uren</a> and edited by <a href="https://twitter.com/riskybusiness">Patrick Gray</a>. It's supported by <a href="https://www.lawfaremedia.org/">Lawfare</a> with help from the William and Flora Hewlett Foundation. This week's edition is sponsored by <a href="https://stairwell.com/">Stairwell</a>.</em></p><p><em>You can hear a podcast discussion of this newsletter by searching for "Risky Business News" in your podcatcher or subscribing via <a href="https://risky.biz/feeds/risky-business-news/">this RSS feed</a>.</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/srsly-risky-biz-russias-cyber-war-fantasy/id1621305970?i=1000641250468&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000641250468.jpg&quot;,&quot;title&quot;:&quot;Srsly Risky Biz: Russia's cyber war fantasy&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/srsly-risky-biz-russias-cyber-war-fantasy/id1621305970?i=1000641250468&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2024-01-11T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/srsly-risky-biz-russias-cyber-war-fantasy/id1621305970?i=1000641250468" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ysO2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54f6518f-3243-4719-927a-1220b0fc5706_1344x768.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ysO2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54f6518f-3243-4719-927a-1220b0fc5706_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!ysO2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54f6518f-3243-4719-927a-1220b0fc5706_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!ysO2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54f6518f-3243-4719-927a-1220b0fc5706_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!ysO2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54f6518f-3243-4719-927a-1220b0fc5706_1344x768.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ysO2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54f6518f-3243-4719-927a-1220b0fc5706_1344x768.png" width="1344" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/54f6518f-3243-4719-927a-1220b0fc5706_1344x768.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1344,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1578800,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ysO2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54f6518f-3243-4719-927a-1220b0fc5706_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!ysO2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54f6518f-3243-4719-927a-1220b0fc5706_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!ysO2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54f6518f-3243-4719-927a-1220b0fc5706_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!ysO2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54f6518f-3243-4719-927a-1220b0fc5706_1344x768.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">City security camera, Stable Diffusion</figcaption></figure></div><p>Russia's cyber activities in the Ukraine conflict are increasingly smart, but the country&#8217;s cyber leaders apparently still can't resist destructive operations that are flashy, but ultimately counterproductive.&nbsp;</p><p>In the smart category, Russia has compromised internet-connected webcams in Ukraine to conduct remote surveillance. On January 2, Ukraine's security service, the SBU, <a href="https://ssu.gov.ua/novyny/sbu-zablokuvala-vebkamery-yaki-zasvityly-robotu-ppo-pid-chas-raketnoi-ataky-rf-na-kyiv-2-sichnia-video">issued a public warning</a> that Russian intelligence services were hacking these devices for espionage purposes. The SBU provided examples of two particular devices that were compromised to redirect viewing angles to show more of the environment, with the footage streamed to YouTube. The SBU believed this surveillance video was used to provide information on targets for long-range strikes, and for damage assessment.&nbsp;</p><p>At first glance this type of cyber operation appears modest, as it is not technically sophisticated, the direct impact is low, and the report only mentions two cameras.&nbsp;</p><p><a href="https://www.radiosvoboda.org/a/skhemy-kamery-sposterezhennya-trassir-kreml/32718775.html">It turns out</a>, however, that many of the video surveillance cameras sold in Ukraine prior to the war were managed with a system known as Trassir, that had been developed by a Russian company. Trassir software was used by individuals and enterprises and was even installed at critical infrastructure facilities such as the Chernobyl nuclear power plant. Worse yet, the video feeds from these cameras were routed via Russian servers.</p><p>So although the SBU mentioned just two cameras in this case, Russian efforts to compromise cameras could be very widespread. Early in 2022 the SBU blocked a large number of Russian IP addresses, including those of Trassir servers. Presumably, this explains why the hacked devices the SBU reported on were altered to stream video via YouTube rather than directly to a Russia-based IP address. In this month&#8217;s announcement, the SBU said it had stopped the operation of 10,000 IP cameras since the start of the invasion and appealed for Ukrainian citizens to report online camera streams to its official chatbot.</p><p>Hijacking surveillance cameras to provide targeting support is also a fairly sensible use of cyber operations, because it complements conventional military capabilities with the intent of making them more effective. It's quiet, but potentially deadly.</p><p>By contrast, a December 12 <a href="https://www.reuters.com/technology/cybersecurity/ukraines-biggest-mobile-operator-suffers-massive-hacker-attack-statement-2023-12-12/">attack on Kyivstar</a>, Ukraine's largest mobile operator, is the stuff of cyberwar fantasies. However, the attack feels like a squandered opportunity as Russia does not appear to have taken significant advantage of it.</p><p>The Kyivstar attack left over half of Ukraine's population without mobile and home internet services for two days. It also disrupted some banks and ATM services, point-of-sale terminals and air-raid sirens.</p><p>Illia Vitiuk, the SBU's cyber security chief, <a href="https://www.reuters.com/world/europe/russian-hackers-were-inside-ukraine-telecoms-giant-months-cyber-spy-chief-2024-01-04/">told </a><em><a href="https://www.reuters.com/world/europe/russian-hackers-were-inside-ukraine-telecoms-giant-months-cyber-spy-chief-2024-01-04/">Reuters</a></em> this was a long-term operation and that the hackers had been in Kyivstar's networks since at least May 2023. Vitiuk said they&nbsp; had probably had "full access" since at least November.</p><p>He described the attack as wiping "almost everything" including thousands of virtual servers and said it "completely destroyed the core of a telecoms operator".</p><p>Despite what sounds like pretty comprehensive destruction, the disruption was relatively short-lived. Kyivstar services were back up within a matter of days and the company's CEO said services were fully restored just eight days after the attack.&nbsp;</p><p>The attack was not combined with any other significant Russian military action, such as a major drone or missile attack. And, <a href="https://therecord.media/hackers-damaged-kyivstar-functions-ukraine-telecom-cyberattack">according to Ukrainian government sources</a>, there was relatively little impact on Ukrainian military communications.</p><p>When it comes to assessing the impact of this attack, timing is everything. If this type of attack had been executed in February 2022, at the beginning of Russia's invasion and combined with <a href="https://srslyriskybiz.substack.com/i/75499400/any-way-you-slice-it-the-viasat-hack-is-a-big-deal">Russia's attack on Viasat's KA-SAT satellite service</a>, it could have measurably improved the chances of Russian military success.&nbsp;</p><p>In December 2023, however, we think this attack is actually a net <em>negative</em> for Russia's military prospects, because maintaining enduring access into Kyivstar would have been tremendously valuable. Vitiuk told <em>Reuters</em> the SBU assessed:</p><blockquote><p>&#8230;the hackers would have been able to steal personal information, understand the locations of phones, intercept SMS-messages and perhaps steal Telegram accounts with the level of access they gained.</p></blockquote><p>These capabilities would have been an intelligence goldmine that could have enabled many more impactful military actions over the longer term.&nbsp;</p><p>Destroying Kyivstar results in a short-term sugar rush, but pretty much guaranteed that the Russians lost access. This cuts against the trend in Russian operations towards intelligence gathering that <a href="https://srslyriskybiz.substack.com/i/137471088/russia-drops-the-cyber-hammer-for-the-sickle">we wrote about last September</a>, so we are left wondering what the motivation for this particular operation was.&nbsp;</p><p>The SBU's Vitiuk <a href="https://ssu.gov.ua/en/novyny/sbu-dopomohla-vidbyty-novi-kiberataky-rf-na-kyivstar-illia-vitiuk">attributed the attack</a> to Russia's Sandworm group (<a href="https://en.wikipedia.org/wiki/GRU_(Russian_Federation)">the GRU</a>, Russian military intelligence) and regarding the timing of the operation said "maybe some colonel wanted to become a general". We don't have a better explanation.&nbsp;</p><h2></h2><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://srslyriskybiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://srslyriskybiz.substack.com/subscribe?"><span>Subscribe now</span></a></p><h2>Predatory Sparrow Won't Move the Needle in the Middle East</h2><p>Israel is trying to use cyber operations to warn off regional foes, but the current conflict is just too hot for this strategy to work.&nbsp;</p><p>In mid-December, Predatory Sparrow, a purported hacktivist group believed to be a persona of the Israeli military, <a href="https://www.france24.com/en/live-news/20231218-iran-fuel-supplies-cut-in-cyber-attack-minister">disrupted petrol supply systems</a> in Iran. In a <a href="https://t.me/GonjeshkeDarandeOfficial/3">statement on Telegram</a>, the group claimed to have disrupted "a majority of the gas pumps throughout Iran&#8230; in response to the aggression of the Islamic Republic and its proxies in the region".</p><p>Although we don't know yet if the technical details are the same, this appears to be a repeat of an <a href="https://therecord.media/suspected-cyberattack-temporarily-disrupts-gas-stations-across-iran">October 2021 attack</a> that Predatory Sparrow launched against Iran's fuel subsidy system. In that attack, petrol stations shut down because they were unable to charge customers for fuel.</p><p><a href="https://srslyriskybiz.substack.com/i/61819123/israels-implausible-deniability">As in that attack</a>, Predatory Sparrow took steps to show that it was operating responsibly. In a <a href="https://t.me/GonjeshkeDarandeOfficial/11">recent Telegram statement</a> it wrote:</p><blockquote><p>As in our previous operations, this cyberattack was conducted in a controlled manner while taking measures to limit potential damage to emergency services.</p><p>We delivered warnings to emergency services across the country before the operation began, and ensured a portion of the gas stations across the country were left unharmed for the same reason, despite our access and capability to completely disrupt their operation.</p></blockquote><p>In this case, the operation is all about sending a message to Iranian leadership. In its Telegram posts, Predatory Sparrow directly warned <a href="https://en.wikipedia.org/wiki/Ali_Khamenei">Iran's supreme leader</a>, saying "Khamenei, playing with fire has a price" and a few days later said "Khamenei! Playing with proxies a girl can get burned".</p><p>Previous Predatory Sparrow attacks took place in the context of a series of tit-for-tat destructive operations between Iran and Israel that appear to have been kickstarted by an Iranian cyber attack on Israeli water infrastructure. At the time, <a href="https://srslyriskybiz.substack.com/i/39626757/uk-should-not-barge-into-israel-iran-cyber-conflict">we wrote</a>:</p><blockquote><p>Following reports of cyber <a href="https://www.zdnet.com/article/two-more-cyber-attacks-hit-israels-water-system/">attacks against Israeli water infrastructure</a> in 2020, a suspiciously large number of things have caught fire or gone boom in Iran since, including the <a href="https://www.theguardian.com/world/2021/apr/11/israel-appears-confirm-cyberattack-iran-nuclear-facility">Natanz uranium enrichment facility</a>, a <a href="https://www.nytimes.com/2020/06/29/world/middleeast/iran-missile-explosion.html">missile production facility</a>, an <a href="https://www.timesofisrael.com/in-latest-in-series-of-blasts-explosion-reported-at-iranian-oil-pipeline/">oil pipeline</a>, a <a href="https://www.nytimes.com/2020/07/15/world/middleeast/iran-ships-fire-explosions.html">shipyard</a> in the Iranian port of Bushehr, Iran's <a href="https://apnews.com/article/iran-largest-warship-catches-fire-sinks-gulf-oman-f3e8126a8603326e1abc4705c6629fcd">largest warship</a>, and an <a href="https://apnews.com/article/tehran-fires-middle-east-iran-business-ba9925e4df84bacd5036b18e7f3e1d0b">oil refinery</a>.&nbsp;</p><p>Other less physically destructive incidents have involved cyber attacks on the <a href="https://www.washingtonpost.com/national-security/officials-israel-linked-to-a-disruptive-cyberattack-on-iranian-port-facility/2020/05/18/9d1da866-9942-11ea-89fd-28fb313d1886_story.html">port of Bandar Abbas</a> and a wiper attack on <a href="https://therecord.media/cyber-attack-on-iranian-railway-was-a-wiper-incident-not-ransomware/">Iran's national rail system</a>. Some of these incidents could be the result of deliberate state-backed actions; others may simply be accidents.&nbsp;</p><p>This one wasn't an accident, though: In November last year, Iran's top nuclear scientist was assassinated with a <a href="https://www.reuters.com/article/us-iran-nuclear-scientist-idUSKBN2AA2RC">self-destructing remotely-controlled machine-gun</a>.&nbsp;</p></blockquote><p>At one level, using precisely executed cyber operations to send a warning is clearly better than using operations that cause a lot of collateral damage and therefore escalate conflict.</p><p>Having said that, however, we are not sure that signalling via cyber operations has actually worked for Predatory Sparrow. Its previous petrol station hack occurred in October 2021 and by June 2022 it was carrying out <a href="https://twitter.com/GonjeshkeDarand/status/1541288345183158272">spectacular destructive attacks</a> on three Iranian steel mills. If its signalling had worked, would it have needed to carry out further operations?</p><p>The geopolitical situation is also vastly different today. Israel is involved in a <a href="https://apnews.com/hub/israel-hamas-war">war against Hamas</a>, Israel and Hezbollah are <a href="https://apnews.com/article/israel-hamas-war-news-01-08-2024-18fbc9af50000c94fed59017fe82481e">exchanging strikes</a> <a href="https://apnews.com/article/israel-hamas-war-news-01-07-2024-2122c6290d059b0bb6aaefddcf43baf4">back and forth</a> across Lebanon, and Iranian-backed Houthi rebels are <a href="https://apnews.com/article/yemen-houthis-red-sea-shipping-centcom-us-bb70acea5062a9952a5b983ecc047863">attacking cargo ships</a> in the Red Sea. There's <a href="https://www.washingtonpost.com/national-security/2024/01/07/israel-hezbollah-lebanon-blinken/">genuine diplomatic concern</a> that the Israel-Hamas war could <a href="https://apnews.com/article/israel-hamas-war-iran-hezbollah-yemen-0373be2e21b5a832d71f5bf828f67959">expand to encompass</a> Hezbollah in Lebanon.&nbsp;</p><p>Given the situation, will the repeat of a two-year-old fuel supply disruption operation move the needle at all? We don't think so.&nbsp;</p><h2>Three Reasons to Be Cheerful This Week:</h2><ol><li><p><strong>ALPHV Disruption:</strong> In mid-December the US Department of Justice <a href="https://www.justice.gov/opa/pr/justice-department-disrupts-prolific-alphvblackcat-ransomware-variant">announced</a> that it had disrupted the ALPHV (aka BlackCat) ransomware gang, which it described as the second most prolific ransomware-as-a-service brand. The DoJ also revealed the FBI had developed a decryption tool that it had offered to 500 affected victims. That's the good news, but the weird addendum is that although the FBI was able to get credentials for the site it wasn't able to prevent ALPHV from 'unseizing' it. This 'tug of tor' is <a href="https://arstechnica.com/security/2023/12/alphv-ransomware-site-is-seized-by-the-fbi-then-its-unseized-and-so-on/">well described</a> at <em>Ars Technica</em>.&nbsp;&nbsp;</p></li><li><p><strong>Scam city seized by Myanmar rebels:</strong> A city that is a hub for online scams known as <a href="https://srslyriskybiz.substack.com/p/pig-butchering-is-even-worse-than">'pig butchering'</a> has been ceded by Myanmar's military government to rebel forces that claim to be focused on cleaning up scam centres. The change in control ultimately seems to be driven by the PRC's frustration with the pig butchering epidemic that has affected thousands of Chinese nationals. <a href="https://www.abc.net.au/news/2024-01-09/myanmar-junta-surrenders-kokang-laukkai-hub-online-scams/103292738">This </a><em><a href="https://www.abc.net.au/news/2024-01-09/myanmar-junta-surrenders-kokang-laukkai-hub-online-scams/103292738">ABC</a></em><a href="https://www.abc.net.au/news/2024-01-09/myanmar-junta-surrenders-kokang-laukkai-hub-online-scams/103292738"> report</a> has good coverage of the broader issues.&nbsp;</p></li><li><p><strong>More cyber-focussed FBI agents overseas: </strong>The FBI <a href="https://cyberscoop.com/the-fbi-is-adding-more-cyber-focused-agents-to-u-s-embassies/">told </a><em><a href="https://cyberscoop.com/the-fbi-is-adding-more-cyber-focused-agents-to-u-s-embassies/">CyberScoop</a></em> that it is increasing the number of cyber-focussed FBI assistant legal attach&#233;s at American embassies overseas by six people to 22. Given the international nature of cybercrime, we are actually surprised that there are so few.</p></li></ol><h2>Sponsor Section</h2><p><em>In this Risky Business News sponsor interview Tom Uren talks to Chris St Myers, Stairwell&#8217;s head of threat research, about managing the risk from software you absolutely must use.</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/sponsored-when-you-have-to-run-that-chinese-government/id1621305970?i=1000640838821&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000640838821.jpg&quot;,&quot;title&quot;:&quot;Sponsored: When you have to run that Chinese government tax software&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/sponsored-when-you-have-to-run-that-chinese-government/id1621305970?i=1000640838821&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2024-01-08T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/sponsored-when-you-have-to-run-that-chinese-government/id1621305970?i=1000640838821" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><h2></h2><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://srslyriskybiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Seriously Risky Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Shorts</h2><h3>Russia Hates Democrats, China Loves China</h3><p>Last edition we talked about the <a href="https://srslyriskybiz.substack.com/p/interference-free-elections-how-quaint">inevitability of election interference</a>. Since then, both <a href="https://www.dni.gov/index.php/newsroom/reports-publications/reports-publications-2023/3744-intelligence-community-assessment-of-foreign-threats-to-the-2022-u-s-elections">the US</a> and <a href="https://www.gov.uk/government/news/uk-exposes-attempted-russian-cyber-interference-in-politics-and-democratic-processes">the UK</a> governments have released reports describing attempted interference. The Taiwanese government has <a href="https://therecord.media/taiwan-elections-china-interference">also committed</a> to releasing a report on PRC interference after its election is completed on January 13.</p><p>The report from the US intelligence community, assesses that Russian interference is mostly about denigrating the Democratic Party, PRC interference is about promoting pro-China interests without favouring any particular party, and a number of other foreign parties interfere more narrowly. It expects interference to peak during Presidential election years and the report says:</p><blockquote><p>The involvement of more foreign actors probably reflects shifting geopolitical risk calculus, perceptions that election influence activity has been normalised, the low cost but potentially high reward of such activities, and a greater emphasis on election security in IC collection and analysis.</p></blockquote><h3>Extradition Tug-of-War Ends Up with Russian Victory</h3><p>Russian cyber security executive Nikita Kislitsin, who was the subject of an extradition tug-of-war between the US and Russia after his arrest in Kazakhstan, will ultimately <a href="https://therecord.media/nikita-kislitsin-extradition-kazakhstan-russia">end up in Russia</a>.&nbsp;</p><p>We examined this case <a href="https://srslyriskybiz.substack.com/p/russias-extradition-wars-are-not">in July last year</a> when we looked at the underlying drivers behind these diplomatic contests that occur whenever a Russian citizen is arrested internationally on cybercrime charges.&nbsp;</p><h3>SEC Twitter Hack Moves Bitcoin</h3><p>On Tuesday the @SECGov X (formerly Twitter) account <a href="https://therecord.media/sec-x-account-compromised-bitcoin">was hacked</a> and used to release a message stating that the commission had granted approval for a Bitcoin exchange-traded fund (ETF). This briefly moved the market for Bitcoin from $46,700 to $48,000 before the false tweet was exposed.</p><p>On Wednesday, however, the SEC <a href="https://www.coindesk.com/business/2024/01/10/bitcoin-etfs-win-sec-approval-bringing-easier-access-to-biggest-cryptocurrency/?_gl=1*cbgetb*_up*MQ..*_ga*ODE2NTgyNzQzLjE3MDQ5MjgyNDQ.*_ga_VM3STRYVN8*MTcwNDkyODI0NC4xLjEuMTcwNDkyODQyMC4wLjAuMA.">really did approve</a>&nbsp; Bitcoin ETFs. Rather than a clever hack to make money by manipulating markets, the hacker appears to have just posted a draft tweet.</p><h2>Risky Biz Talks</h2><p><em>You can find the audio edition of this newsletter and other fine podcasts and interviews in the Risky Biz News feed (<a href="https://risky.biz/feeds/risky-business-news">RSS</a>, <a href="https://podcasts.apple.com/au/podcast/risky-business-news/id1621305970">iTunes</a> or <a href="https://open.spotify.com/show/0BdExoUZqbGsBYjt6QZl4Q">Spotify</a>).&nbsp;&nbsp;</em></p><p><em>In <a href="https://risky.biz/BTN62/">our last</a> "Between Two Nerds" discussion Tom Uren and <a href="https://twitter.com/thegrugq">The Grugq</a> talk with infosec and anti-virus veteran Martijn Grooten about how the infosec industry has changed over the years.</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/between-three-nerds-martijn-grooten-on-how-infosec/id1621305970?i=1000640973095&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000640973095.jpg&quot;,&quot;title&quot;:&quot;Between Three Nerds: Martijn Grooten on how Infosec has changed&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/between-three-nerds-martijn-grooten-on-how-infosec/id1621305970?i=1000640973095&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2024-01-09T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/between-three-nerds-martijn-grooten-on-how-infosec/id1621305970?i=1000640973095" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><h2>From <a href="https://riskybiznews.substack.com/">Risky Biz News</a>:</h2><p><strong>Turkish APT group Sea Turtle returns:</strong> Hackers associated with the Turkish government are conducting new cyber-espionage operations across Europe and the Middle East, according to recent reports from <a href="https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/tortoise-and-malwahare.html">PwC</a>, <a href="https://blog.strikeready.com/blog/pivoting-through-a-sea-of-indicators-to-spot-turtles/?s=08">StrikeReady</a>, and <a href="https://www.huntandhackett.com/blog/turkish-espionage-campaigns">Hunt &amp; Hackett</a>.</p><p>Tracked as Sea Turtle (Teal Kurma, Silicon, UNC1326, Cosmic Wolf), the group rose to fame between 2018 and 2020 when it conducted a <a href="https://www.reuters.com/article/us-cyber-attack-hijack-exclusive/exclusive-hackers-acting-in-turkeys-interests-believed-to-be-behind-recent-cyberattacks-sources-idUSKBN1ZQ10X/">series</a> of <a href="https://blog.talosintelligence.com/sea-turtle-keeps-on-swimming/">DNS hijacking</a> <a href="https://threatintel.eu/2020/02/25/on-sea-turtle-campaign-targeting-greek-governmental-organisations-timeline/">campaigns</a> that intercepted traffic for Cypriot, Greek, and Iraqi government systems.</p><p>Ever since its public ousting in late 2020, the group wound down its DNS hijacking infrastructure, and very little activity has been linked to its operations. In recent reports, the three security firms claim the group has now re-tooled and changed its modus operandi, although some connections to its old infrastructure remained.</p><p>[<a href="https://riskybiznews.substack.com/p/turkish-apt-group-sea-turtle-returns">more</a> on <em>Risky Business News</em>]</p><p><strong>Ransomware wrecks Paraguay's largest telco:</strong> A ransomware attack has wreaked havoc inside the network of Tigo, the largest mobile operator and internet service provider in Paraguay.</p><p>The incident took place last Thursday, January 4, and impacted the telco's business branch.</p><p>Around 300 servers in Tigo's data centre were encrypted, according to <a href="https://www.ultimahora.com/paraguay-ciberseguro-confirma-ataque-de-ransomware-a-telefonia">Miguel &#193;ngel Gaspar</a>, director of the Paraguay Ciberseguro Foundation.</p><p>At least <a href="https://www.ruetir.com/2024/01/08/paraguay-on-alert-after-cyber-attack-at-least-300-companies-affected/">300 companies</a> were impacted downstream. The companies lost phone service and files hosted on Tigo servers.</p><p>[<a href="https://riskybiznews.substack.com/p/ransomware-wrecks-paraguay-largest-telco">more</a> on <em>Risky Business News</em>]</p><p><strong>Ukraine repels attack on state payment system:</strong> Ukraine <a href="https://t.me/getmantsevdanil/6069">says</a> it repelled Russian cyberattacks against its state payment system for the second week in a row. Officials say Russian hackers tried to destroy vital systems used for budget payments. The operation comes after Russian hackers successfully wiped servers inside Kyivstar, the country's largest mobile operator.</p>]]></content:encoded></item><item><title><![CDATA[Interference-Free Elections? How Quaint!]]></title><description><![CDATA[PLUS: Iran Attacks Our Precious Fluids]]></description><link>https://srslyriskybiz.substack.com/p/interference-free-elections-how-quaint</link><guid isPermaLink="false">https://srslyriskybiz.substack.com/p/interference-free-elections-how-quaint</guid><dc:creator><![CDATA[Tom Uren]]></dc:creator><pubDate>Thu, 07 Dec 2023 05:48:58 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc07551a-574c-48b1-a688-76c1b3ffcea3_1344x768.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Your weekly dose of Seriously Risky Business news is written by <a href="https://twitter.com/tomatospy">Tom Uren</a> and edited by <a href="https://twitter.com/riskybusiness">Patrick Gray</a>. It's supported by <a href="https://www.lawfaremedia.org/">Lawfare</a> with help from the William and Flora Hewlett Foundation.&nbsp;</em></p><p><em>You can <a href="https://risky.biz/SRB60">hear a podcast discussion</a> of this newsletter by searching for "Risky Business News" in your podcatcher or subscribing via <a href="https://risky.biz/feeds/risky-business-news/">this RSS feed</a>. This is the last edition for 2023 and we will be back in early January. Stay safe out there!</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/srsly-risky-biz-why-election-interference-is-inevitable/id1621305970?i=1000637758889&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000637758889.jpg&quot;,&quot;title&quot;:&quot;Srsly Risky Biz: Why election interference is inevitable&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/srsly-risky-biz-why-election-interference-is-inevitable/id1621305970?i=1000637758889&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2023-12-07T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/srsly-risky-biz-why-election-interference-is-inevitable/id1621305970?i=1000637758889" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lnRm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc07551a-574c-48b1-a688-76c1b3ffcea3_1344x768.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lnRm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc07551a-574c-48b1-a688-76c1b3ffcea3_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!lnRm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc07551a-574c-48b1-a688-76c1b3ffcea3_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!lnRm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc07551a-574c-48b1-a688-76c1b3ffcea3_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!lnRm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc07551a-574c-48b1-a688-76c1b3ffcea3_1344x768.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lnRm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc07551a-574c-48b1-a688-76c1b3ffcea3_1344x768.png" width="1344" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fc07551a-574c-48b1-a688-76c1b3ffcea3_1344x768.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1344,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1643600,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!lnRm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc07551a-574c-48b1-a688-76c1b3ffcea3_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!lnRm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc07551a-574c-48b1-a688-76c1b3ffcea3_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!lnRm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc07551a-574c-48b1-a688-76c1b3ffcea3_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!lnRm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffc07551a-574c-48b1-a688-76c1b3ffcea3_1344x768.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Democracy manifest, Stable Diffusion</figcaption></figure></div><h2>Interference-Free Elections? How Quaint!</h2><p>There are three major elections taking place in 2024: in Taiwan, the United States and Russia. So, what are the chances that we'll see cyber-enabled disruption campaigns targeting each of these polls? In the case of the upcoming US election it seems inevitable.</p><p>Election interference techniques take many forms. At the 'lowest' level are information operations on social media that spread disinformation and propaganda. In the context of an election, these types of operations tend to get lost in the noise.</p><p>At the 'highest' level of severity there is the possibility of direct interference in the electoral process: messing with the actual votes. In theory, this could shape the outcome of an election, and even unsuccessful attempts undermine the perceived legitimacy of election outcomes.</p><p>Somewhere in the middle are tactics such as hack and leak operations that were used by Russia in the 2016 US Presidential election. These had an impact on that election because they were picked up and amplified by the mainstream media.</p><p>The Taiwanese presidential election is scheduled for 13 January and the PRC, with its opposition to Taiwanese independence, obviously has a <a href="https://www.cfr.org/backgrounder/china-taiwan-relations-tension-us-policy-biden">strong interest</a> in how Taiwan is governed. This may motivate the PRC to interfere on behalf of the opposition Kuomintang (KMT) party, which favours closer ties to Beijing than the incumbent pro-independence Democratic Progressive Party.&nbsp;</p><p>If the PRC undertakes cyber-enabled interference, it is likely to complement measures that include 'friendship tours' (a recent <em>Reuters</em> report, <a href="https://www.reuters.com/world/asia-pacific/china-lures-hundreds-taiwan-politicians-with-cheap-trips-before-election-sources-2023-12-01/">describes</a> a Chinese effort to engage hundreds of Taiwanese politicians with subsidised trips to the mainland), <a href="https://thechinaproject.com/2023/05/18/can-beijing-influence-taiwans-presidential-election-through-economic-coercion/">economic coercion</a> and even threats of military action. A spokesperson for the PRC&#8217;s Taiwan affairs authority, for example, <a href="https://www.chinadaily.com.cn/a/202311/24/WS656092e8a31090682a5effcb.html">recently described</a> the upcoming election as "a choice between peace and war". In this context, cyber-enabled interference is just one of many concerns for Taiwan.&nbsp;</p><p>The US Presidential election is a different can of worms. Neither the PRC nor Russia are in a position economically or militarily to undertake the kind of no-holds-barred interference the PRC may opt for against Taiwan. Because these other options <em>aren't</em> available cyber-enabled interference is likely to become the tool of choice.</p><p><a href="https://carnegieendowment.org/experts/2183">Gavin Wilde</a>, a Russia and information warfare expert at the Carnegie Endowment, told <em>Seriously Risky Business</em> he thought cyber-enabled interference in the 2024 US election was "inevitable". He said Russia would view that kind of interference "less as <em>transgressing</em> a norm than as rigid <em>adherence</em> to one".</p><p>Wilde stated that although electoral system manipulation would be very difficult to pull off successfully in the US due to the highly federated nature of its elections, the potential negative impact on the public's confidence in election outcomes resulting from this type of interference -- be it attempted or successful -- was very high. He said this threat required an "all hands on deck" approach from national and election security officials.&nbsp;</p><p>Wilde also considered hack and leak and online influence operations to be "almost a certainty". Here, he thought solutions lay not so much in foreign and security policy but instead needed to be more domestically focused. These types of operations were sometimes a "convenient distraction from conversations we need to have about the responsibility of journalists, the role of opaque money in politics, the quality of our elites, the responsiveness of government to the concerns of ordinary citizens, etc".</p><p>Wilde also mentioned <a href="https://www.presidency.ucsb.edu/documents/executive-order-13848-imposing-certain-sanctions-the-event-foreign-interference-united">Executive Order 13848</a>, a Trump-era directive that attempted to define ahead of time how the administration would respond to specific threats against election integrity. If clear thresholds were set out beforehand, government officials might be better equipped to respond to interference.&nbsp;</p><p>If those triggers are not pre-established, officials face the unenviable task of responding to cyber-enabled interference during the heat of an election campaign.</p><p>In the 2016 US presidential election, for example, the Obama administration was aware of Russian efforts to influence the election in favour of Trump but did not call them out publicly. <a href="https://www.washingtonpost.com/politics/clinton-blames-putins-personal-grudge-against-her-for-election-interference/2016/12/16/12f36250-c3be-11e6-8422-eac61c0ef74d_story.html">At the time</a>, President Obama said publicising Russia's efforts would have created "just one more political scrum" and would "raise more questions about the integrity of the election".</p><p>What about tit-for-tat American interference in next year's Russian election? Wilde doesn't think it makes any sense.</p><p>"In addition to being extremely provocative, escalatory, and hypocritical &#8212; any attempt to meddle in their sham electoral process is fruitless any way you slice it. Putin isn't a candidate at this point. He's a system. Neither information ops nor hacks can alter such a resilient system."&nbsp;</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://srslyriskybiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://srslyriskybiz.substack.com/subscribe?"><span>Subscribe now</span></a></p><h2>Iran Attacks Our Precious Fluids</h2><p>Attacks on US water infrastructure by Iranian hackers are, ahem, making waves.&nbsp;</p><p><em>Risky Business News</em> <a href="https://riskybiznews.substack.com/i/139393864/breaches-hacks-and-security-incidents">reports</a>:</p><blockquote><p>The US government has <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-335a">confirmed</a> that an Iranian hacking group named Cyber Av3ngers has gained access to equipment at water facilities across multiple US states. CISA, the FBI, the NSA, and other agencies say the attacks began as far back as November 22 and exploited PLCs (programmable logic controllers) manufactured by Israeli company Unitronics. The group targeted Unitronics PLCs that were still using the default password "1111". <a href="https://www.cisa.gov/news-events/alerts/2023/11/28/exploitation-unitronics-plcs-used-water-and-wastewater-systems">CISA asked</a> US organisations last week to change the default password, enable MFA, and remove the devices from the internet. US officials say the Cyber Av3ngers group is affiliated with <a href="https://en.wikipedia.org/wiki/Islamic_Revolutionary_Guard_Corps">the IRGC</a>, an Iranian military and intelligence organisation.</p></blockquote><p>This campaign appears to have been launched in reaction to the Israel-Hamas conflict. <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-335a">CISA's advisory</a> states the hackers left a defacement image on the devices that says "You have been hacked, down with Israel. Every equipment 'made in Israel' is CyberAv3ngers legal target."</p><p>As of 1 December, according to <a href="https://edition.cnn.com/2023/12/01/politics/us-water-utilities-hack/index.html">reporting from </a><em><a href="https://edition.cnn.com/2023/12/01/politics/us-water-utilities-hack/index.html">CNN</a></em>, CISA believed that "less than 10" water facilities across the country had been affected by these attacks.&nbsp;</p><p>Fortunately, these incidents have been annoying rather than disastrous. The general manager of one of the water utilities affected, Robert J. Bible, told <em>CNN</em> that water quality was not at risk but the hack meant the utility had to manually control water pumps. He described the incident as "a pain" and "a big inconvenience".&nbsp;</p><p>"Somebody's got to wake up at 3 in the morning and go turn on or turn off those pump stations," he said.</p><p>Bible runs a water authority that serves around 15,000 people near Pittsburgh, and he said that being caught up in politically-motivated attacks "was maybe the furthest thing from my mind".</p><p>The outcomes could have been far worse. <a href="https://www.cisa.gov/news-events/alerts/2023/11/28/exploitation-unitronics-plcs-used-water-and-wastewater-systems">CISA writes</a> that the water and wastewater sector uses PLCs in many different scenarios:&nbsp;</p><blockquote><p>&#8230;to control and monitor various stages and processes of water and wastewater treatment, including turning on and off pumps at a pump station to fill tanks and reservoirs, flow pacing chemicals to meet regulations, gathering compliance data for monthly regulation reports, and announcing critical alarms to operations</p></blockquote><p>Unitronics devices are also used in other industries, including energy, food and beverage manufacturing, and healthcare. A brewery <a href="https://cyberscoop.com/cyber-av3ngers-israel-iran/">was also affected</a> by the Cyber Av3ngers <a href="https://twitter.com/fullpintbeerpgh/status/1729568323455594998?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1729568323455594998%7Ctwgr%5E4d5a0e0027b4486fe3f2453162fc49b0501797b4%7Ctwcon%5Es1_&amp;ref_url=https%3A%2F%2Fcyberscoop.com%2Fcyber-av3ngers-israel-iran%2F">hacking</a>.</p><p>The incident underscores the vulnerability of the US water sector and some of the reasons&nbsp; will be difficult to quickly improve security. The sector is <a href="https://www.cdc.gov/healthywater/drinking/public/index.html">highly decentralised</a> with over 50,000 'community water systems' providing tap water to Americans. Most of these systems provide water to <a href="https://www.cfr.org/backgrounder/how-us-water-infrastructure-works#chapter-title-0-3">small communities</a> of 10,000 people or less.&nbsp;</p><p>There is an argument here that a robust response is needed to try to deter hackers from meddling with US critical infrastructure. In this case, however, the hacking is akin to digital graffiti and is not reported to have had any serious impacts.&nbsp;</p><p>A proportionate response to an irritating cyber attack would be&#8230; just irritating and probably not much of a deterrent. And why mount a disproportionately robust response to a low-impact hack when there are plenty of other damaging incidents whose perpetrators really do deserve their own slice of deterrence pie? In just the last few weeks ransomware incidents have caused serious disruptions in <a href="https://edition.cnn.com/2023/11/27/politics/cyberattack-hospital-diverts-ambulances/index.html">hospitals</a>, <a href="https://therecord.media/credit-unions-facing-outages-due-to-ransomware">credit unions</a>, <a href="https://srslyriskybiz.substack.com/p/lockbits-disastrous-success">banks</a> and in a <a href="https://therecord.media/north-texas-water-utility-cyberattack">separate water utility incident</a>.&nbsp;</p><h2>ChatGPT 'Just Asking Questions'</h2><p>The <a href="http://isdglobal.org/">Institute for Strategic Dialogue</a>, a non-profit organisation that counters extremism and polarisation, <a href="https://www.isdglobal.org/digital_dispatches/hey-fellow-humans-what-can-a-chatgpt-campaign-targeting-pro-ukraine-americans-tell-us-about-the-future-of-generative-ai-and-disinformation/">has discovered</a> a ChatGPT-enabled social media harassment campaign on X (formerly Twitter).</p><p>Although the ChatGPT content appeared authentic at first glance, one reply in the campaign was a giveaway: "I cannot fulfil this request as it goes against OpenAI&#8217;s use case policy by promoting hate speech or targeted harassment".</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8feX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5ca30cb-d2d7-4181-8ad8-da88966bf91b_805x518.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8feX!,w_424,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5ca30cb-d2d7-4181-8ad8-da88966bf91b_805x518.gif 424w, https://substackcdn.com/image/fetch/$s_!8feX!,w_848,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5ca30cb-d2d7-4181-8ad8-da88966bf91b_805x518.gif 848w, https://substackcdn.com/image/fetch/$s_!8feX!,w_1272,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5ca30cb-d2d7-4181-8ad8-da88966bf91b_805x518.gif 1272w, https://substackcdn.com/image/fetch/$s_!8feX!,w_1456,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5ca30cb-d2d7-4181-8ad8-da88966bf91b_805x518.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8feX!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5ca30cb-d2d7-4181-8ad8-da88966bf91b_805x518.gif" width="805" height="518" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c5ca30cb-d2d7-4181-8ad8-da88966bf91b_805x518.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:518,&quot;width&quot;:805,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Fig 2: Screenshot of @navalny tweet and @planmolimo1982 response.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Fig 2: Screenshot of @navalny tweet and @planmolimo1982 response." title="Fig 2: Screenshot of @navalny tweet and @planmolimo1982 response." srcset="https://substackcdn.com/image/fetch/$s_!8feX!,w_424,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5ca30cb-d2d7-4181-8ad8-da88966bf91b_805x518.gif 424w, https://substackcdn.com/image/fetch/$s_!8feX!,w_848,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5ca30cb-d2d7-4181-8ad8-da88966bf91b_805x518.gif 848w, https://substackcdn.com/image/fetch/$s_!8feX!,w_1272,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5ca30cb-d2d7-4181-8ad8-da88966bf91b_805x518.gif 1272w, https://substackcdn.com/image/fetch/$s_!8feX!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc5ca30cb-d2d7-4181-8ad8-da88966bf91b_805x518.gif 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The campaign targeted imprisoned Russian opposition figure Alexey Navalny and his non-profit <a href="https://en.wikipedia.org/wiki/Anti-Corruption_Foundation">Anti-Corruption Foundation</a>. Regarding the quality of ChatGPT-generated content, ISD writes:</p><blockquote><p>The ChatGPT content, overall, is very good. It has some quirks and some oddities &#8211; weird metaphors, unwieldy hashtags, a predilection for melodrama, a peculiar fixation on food. Seen as a whole, the corpus of content does feel oddly robotic. When you already know to look for signs of AI use, there are reasons to be suspicious.</p></blockquote><p>However, ISD finds that when viewed in isolation, the ChatGPT-generated tweets are&nbsp; "strikingly authentic-looking".&nbsp; It also finds, that in some respects, ChatGPT is surprisingly capable:</p><blockquote><p>In particular, it is impressively and somewhat surprisingly proficient at presenting a message through inference and implication &#8211; the "just asking questions" strategy so commonly used by conspiracy theorists, extremists and disinformation actors alike. This is a more subtle approach than some more direct methods of spreading distrust and it might have been expected that the AI might struggle with it, but this does not appear to be the case.</p></blockquote><p>In this case, the operators were sloppy so the campaign was detectable, but ISD thinks that AI-generated campaigns will not be discoverable by standard researcher tradecraft, such as looking for posts or phrases copy-pasted across a network of linked accounts.&nbsp;</p><p>The report doesn't hazard a guess as to whether the use of ChatGPT will increase the effectiveness of these kinds of campaigns. It does suggest, however, that generative AI campaigns will be used against real people and movements expressing genuine opinions online, and therefore deepen polarisation and increase distrust on social media. So even if they don't work, they'll still be bad news.</p><h2>Three Reasons to Be Cheerful This Week:</h2><ol><li><p><strong>Better, faster and cheaper spam detection:</strong> Google <a href="https://security.googleblog.com/2023/11/improving-text-classification.html">has announced</a> improved text classification technology that it says is "highly effective for security and anti-abuse applications." It improves the spam detection rate by 38%, while reducing false positives and using less computing resources.</p></li><li><p><strong>UK's Online Fraud Charter is a start:</strong> The UK government and 12 large tech companies <a href="https://www.gov.uk/government/news/world-first-agreement-to-tackle-online-fraud">have signed</a> a voluntary <a href="https://assets.publishing.service.gov.uk/media/65688713cc1ec5000d8eef96/Online_Fraud_Charter_2023.pdf">'Online Fraud Charter'</a>. Signatories include Amazon, eBay, Facebook, Google, Instagram, LinkedIn, the Match Group, Microsoft, Snapchat, TikTok, Twitter, and YouTube. We are cynical about 'voluntary commitments', but fully implementing the ideas in the charter would make a difference. It's a start.&nbsp;</p></li><li><p><strong>Fewer US clandestine info ops:</strong> Military information operations using clandestine accounts (i.e. not attributable to the US military) <a href="https://www.washingtonpost.com/politics/2023/12/05/clandestine-online-operations-now-require-sign-off-by-senior-officials/">now require</a> the approval of senior Pentagon officials, the CIA and the State Department, and the number of these operations has been drastically reduced. We class this as good news because these operations don't seem to have been all that effective &#8212; researchers who examined previous US military clandestine operations found that overt accounts attracted more followers &#8212; and when these types of operations were unmasked they eroded the credibility of the US abroad. In other words, most of the time they are just not worth it.&nbsp;</p></li></ol><h2></h2><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://srslyriskybiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Seriously Risky Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Shorts</h2><h3>US Gov Squeeeeezes Cryptocurrency Laundering&nbsp;&nbsp;</h3><p>The Sinbad cryptocurrency mixer was <a href="https://techcrunch.com/2023/11/29/feds-seize-sinbad-crypto-mixer-allegedly-used-by-north-korean-hackers/">sanctioned and its websites seized</a> last week by the US government. The US Treasury said that Sinbad was a "key money-laundering tool" for North Korean hackers involved in cryptocurrency theft.</p><p>The US government has also negotiated very strict reporting requirements with cryptocurrency exchange Binance, which recently <a href="https://www.justice.gov/opa/pr/binance-and-ceo-plead-guilty-federal-charges-4b-resolution">pleaded guilty</a> to money laundering and sanctions violations in late November and was fined USD$4.3bn. <a href="https://www.wired.com/story/binance-settlement-transaction-histories/">These requirements</a> include historical transactions going back as far as 2018, and a former US SEC attorney told <em>Wired</em> these were the equivalent of a "financial colonoscopy".&nbsp;</p><p>A few days after the Sinbad takedown, the State Department's Rewards for Justice program <a href="https://twitter.com/RFJ_USA/status/1730768845156090220">issued a reward</a> for information about North Korean hackers using cryptocurrency mixers.</p><p>A Recorded Future <a href="https://go.recordedfuture.com/hubfs/reports/cta-2023-1130.pdf">report</a> on North Korea's cryptocurrency endeavours was also released last week. The report found that, since 2017, the country's hackers have stolen USD$3bn worth of cryptocurrency. USD$1.7bn of this was in 2022, "a sum equivalent to approximately 5% of North Korea&#8217;s economy or 45% of its military", according to the report.</p><h3>CISA: We Can't Patch Fast Enough</h3><p>Senior CISA official Eric Goldstein has described the current infosec paradigm of "patch faster, fix faster" as a "failed model".</p><p>He's got a point. In just this week alone there are media reports of: Russian state-sponsored actors <a href="https://www.bleepingcomputer.com/news/microsoft/russian-hackers-exploiting-outlook-bug-to-hijack-exchange-accounts/">actively exploiting</a> an Outlook flaw patched in March this year; Citrix Netscaler vulnerabilities <a href="https://therecord.media/hhs-warns-of-citrix-bleed-bug">being used in ransomware attacks</a> despite a patch being issued in October; and <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-339a">CISA warned</a> of exploitation of an Adobe ColdFusion bug that was patched in March.</p><h2>Risky Biz Talks</h2><p><em>You can find the audio edition of this newsletter and other fine podcasts and interviews in the Risky Biz News feed (<a href="https://risky.biz/feeds/risky-business-news">RSS</a>, <a href="https://podcasts.apple.com/au/podcast/risky-business-news/id1621305970">iTunes</a> or <a href="https://open.spotify.com/show/0BdExoUZqbGsBYjt6QZl4Q">Spotify</a>).&nbsp;&nbsp;</em></p><p><em>In <a href="https://risky.biz/BTN61">our last</a> "Between Two Nerds" discussion Tom Uren and <a href="https://twitter.com/thegrugq">The Grugq</a> revisit Ukraine's IT Army and examine how the country's government has been making use of the hacktivist force.&nbsp;</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/between-two-nerds-revisiting-ukraines-it-army/id1621305970?i=1000637482756&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000637482756.jpg&quot;,&quot;title&quot;:&quot;Between Two Nerds: Revisiting Ukraine's IT Army&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/between-two-nerds-revisiting-ukraines-it-army/id1621305970?i=1000637482756&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2023-12-05T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/between-two-nerds-revisiting-ukraines-it-army/id1621305970?i=1000637482756" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><h2>From <a href="https://riskybiznews.substack.com/">Risky Biz News</a>:</h2><p><strong>Black Basta group made $107 million from ransom payments</strong></p><p>The Black Basta ransomware gang is believed to have made more than $107 million in ransom payments since the group began operations in early 2022.</p><p>The number represents payments made by more than 90 victims of the 329 organisations known to have been hit by the gang.</p><p>The largest payment was $9 million, while the average ransom payment was $1.2 million, according to joint research published by blockchain tracking company <a href="https://www.elliptic.co/blog/black-basta-ransomware-victims-have-paid-over-100-million">Elliptic</a> and cyber insurance provider <a href="https://www.corvusinsurance.com/blog/black-basta-ransomware-has-extracted-over-100-million-from-its-victims">Corvus Insurance</a>.</p><p>[<a href="https://riskybiznews.substack.com/p/black-basta-ransomware-made-107-million">more</a> on <em>Risky Business News</em>, including how this puts Black Basta amongst the highest-earning ransomware groups over the last few years.]</p><p><strong>US government agencies lag on logging compliance:</strong> An audit of 23 of the largest US federal agencies found that most have failed to implement proper event logging and may be unprepared to respond to cybersecurity incidents, especially during the investigation and remediation phase.</p><p>Conducted by the US Government and Accountability Office, the <a href="https://www.gao.gov/products/gao-24-105658">report</a> found that 20 of the 23 agencies did not meet a White House executive order mandating they reach a logging level of EL3 by August 2023.</p><p>GAO says that only three agencies reached the proper requirement, while 17 were still at EL0 and had not made any headway toward compliance.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mxHe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ceb589f-b33f-4f41-ac60-2324ed58db4e_795x220.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mxHe!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ceb589f-b33f-4f41-ac60-2324ed58db4e_795x220.png 424w, https://substackcdn.com/image/fetch/$s_!mxHe!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ceb589f-b33f-4f41-ac60-2324ed58db4e_795x220.png 848w, https://substackcdn.com/image/fetch/$s_!mxHe!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ceb589f-b33f-4f41-ac60-2324ed58db4e_795x220.png 1272w, https://substackcdn.com/image/fetch/$s_!mxHe!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ceb589f-b33f-4f41-ac60-2324ed58db4e_795x220.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mxHe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ceb589f-b33f-4f41-ac60-2324ed58db4e_795x220.png" width="795" height="220" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6ceb589f-b33f-4f41-ac60-2324ed58db4e_795x220.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:220,&quot;width&quot;:795,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mxHe!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ceb589f-b33f-4f41-ac60-2324ed58db4e_795x220.png 424w, https://substackcdn.com/image/fetch/$s_!mxHe!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ceb589f-b33f-4f41-ac60-2324ed58db4e_795x220.png 848w, https://substackcdn.com/image/fetch/$s_!mxHe!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ceb589f-b33f-4f41-ac60-2324ed58db4e_795x220.png 1272w, https://substackcdn.com/image/fetch/$s_!mxHe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ceb589f-b33f-4f41-ac60-2324ed58db4e_795x220.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>[<a href="https://riskybiznews.substack.com/p/us-government-agencies-lag-on-logging">more</a> on <em>Risky Business News</em>]</p><p><strong>Plex privacy disaster:</strong> Plex media server users are receiving "week in review" reports with what their friends have been watching on their devices. The reports have stirred quite a controversy, as it exposes some users' porn preferences. [Additional coverage in <em><a href="https://www.404media.co/plex-users-fear-discover-together-week-in-review-feature-will-leak-porn-habits-to-their-friends-and-family/">404 Media</a></em>]</p><h4>Reuters Article Removal</h4><p>Reuters has <a href="https://www.reuters.com/investigates/special-report/usa-hackers-appin/">issued</a> an editors' note announcing what it describes as the temporary removal of an article 'how an Indian startup hacked the world', to comply with a preliminary court order issued on 4 December in a district court in India. The news agency said it stood by its reporting and planned to appeal the decision.</p>]]></content:encoded></item><item><title><![CDATA[Living off the Land Is the New Normal]]></title><description><![CDATA[PLUS: When Hacks Upset Housing Markets]]></description><link>https://srslyriskybiz.substack.com/p/living-off-the-land-is-the-new-normal</link><guid isPermaLink="false">https://srslyriskybiz.substack.com/p/living-off-the-land-is-the-new-normal</guid><dc:creator><![CDATA[Tom Uren]]></dc:creator><pubDate>Thu, 30 Nov 2023 06:36:47 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb204bf56-d933-4d45-bae4-4cb42b5b9d59_1344x768.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Your weekly dose of Seriously Risky Business news is written by <a href="https://twitter.com/tomatospy">Tom Uren</a> and edited by <a href="https://twitter.com/riskybusiness">Patrick Gray</a>. It's supported by <a href="https://www.lawfaremedia.org/">Lawfare</a> with help from the William and Flora Hewlett Foundation. This week's edition is sponsored by <a href="https://corelight.com/">Corelight</a>.</em></p><p><em>You can hear a <a href="https://risky.biz/SRB59">podcast discussion</a> of this newsletter by searching for "Risky Business News" in your podcatcher or subscribing via <a href="https://risky.biz/feeds/risky-business-news/">this RSS feed</a>.</em></p><iframe class="spotify-wrap podcast" data-attrs="{&quot;image&quot;:&quot;https://i.scdn.co/image/ab6765630000ba8aff2258f005c4c2a1b48d6904&quot;,&quot;title&quot;:&quot;Srsly Risky Biz: Living off the land is the new normal&quot;,&quot;subtitle&quot;:&quot;risky.biz&quot;,&quot;description&quot;:&quot;Episode&quot;,&quot;url&quot;:&quot;https://open.spotify.com/episode/6y0fO32DPIlyL83t57MVm6&quot;,&quot;belowTheFold&quot;:false,&quot;noScroll&quot;:false}" src="https://open.spotify.com/embed/episode/6y0fO32DPIlyL83t57MVm6" frameborder="0" gesture="media" allowfullscreen="true" allow="encrypted-media" data-component-name="Spotify2ToDOM"></iframe><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wflQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb204bf56-d933-4d45-bae4-4cb42b5b9d59_1344x768.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wflQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb204bf56-d933-4d45-bae4-4cb42b5b9d59_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!wflQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb204bf56-d933-4d45-bae4-4cb42b5b9d59_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!wflQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb204bf56-d933-4d45-bae4-4cb42b5b9d59_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!wflQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb204bf56-d933-4d45-bae4-4cb42b5b9d59_1344x768.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wflQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb204bf56-d933-4d45-bae4-4cb42b5b9d59_1344x768.png" width="1344" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b204bf56-d933-4d45-bae4-4cb42b5b9d59_1344x768.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1344,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1462543,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!wflQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb204bf56-d933-4d45-bae4-4cb42b5b9d59_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!wflQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb204bf56-d933-4d45-bae4-4cb42b5b9d59_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!wflQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb204bf56-d933-4d45-bae4-4cb42b5b9d59_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!wflQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb204bf56-d933-4d45-bae4-4cb42b5b9d59_1344x768.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Living off the land is the new normal, Stable Diffusion</figcaption></figure></div><p>Cyber security firm Huntress has confirmed what organisations like the NSA have been saying &#8212; that 'living off the land' is the new normal.&nbsp;</p><p>We've covered the shift towards living off the land techniques (abusing legitimate tools already present in the host environment) by <a href="https://srslyriskybiz.substack.com/i/137471088/russia-drops-the-cyber-hammer-for-the-sickle">both Russian</a> and <a href="https://srslyriskybiz.substack.com/p/why-chinas-latest-apt-campaign-is">Chinese APT actors</a>. A new <a href="https://www.huntress.com/blog/navigating-the-smb-threat-landscape-key-insights-from-huntress-smb-threat-report">Huntress report</a> focused on threats to small and medium-sized businesses (SMBs) found more than half of incidents involved LOLbins (living off the land binaries) and were "malware free".</p><p>One type of legitimate software that is commonly abused by threat actors to gain and maintain access to targeted environments is remote monitoring and management (RMM) software. Huntress found that 65% of all types of SMB security incidents involved RMM software such as ConnectWise, ScreenConnect, AnyDesk or TeamViewer. These types of software are not detected as malware and their use is often not audited, especially in small organisations.&nbsp;</p><p>Living off the land techniques are also being used by the most concerning threat actors that this newsletter has covered in recent months, including cyber crime groups (see our reports on <a href="https://srslyriskybiz.substack.com/p/when-good-cyber-security-leads-to">Octo Tempest</a> or <a href="https://srslyriskybiz.substack.com/p/lapsus-from-flash-in-the-pan-to-raging">Scattered Spider</a>) and state-backed groups such as the PRC's Volt Typhoon.</p><p>Volt Typhoon's campaign is <a href="https://srslyriskybiz.substack.com/p/why-chinas-latest-apt-campaign-is">genuinely concerning</a>. Microsoft thought the group was "pursuing development of capabilities that could disrupt critical communications infrastructure between the United States and Asia region during future crises".&nbsp;</p><p>In a recent <em>Risky Business</em> <a href="https://risky.biz/RB726/">podcast</a>, Morgan Adamski, the director of the NSA's Cybersecurity Collaboration Center said she was worried about the "scope, scale and sophistication" of Chinese APT activity. One element of this was the shift to living off the land.&nbsp;</p><p>"We're going to have to up our game", Adamski said. "You've got to know what your sys admins are doing, are they in every single day, are they actually supposed to be doing the activity that you see them doing?"</p><p>"And so it is going to take a concerted effort across everyone in the industry, as well as the net defenders, to really put a lot of time and effort behind this."</p><p>Living off the land is here to stay and cyber security organisations are going to have to adapt their practices to cope.&nbsp;</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://srslyriskybiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://srslyriskybiz.substack.com/subscribe?"><span>Subscribe now</span></a></p><h2>Hacks at Key Firms Upset Housing Markets</h2><p>When key firms that provide services to a range of clients are hit by cyber incidents, the damage ripples out through the economy. For example, in the UK and the US, attacks on companies that provide services to the real estate industry have impacted house sales.</p><p>The consequences of breaches like these means key service providers need to be held to very high standards of security.&nbsp;</p><p>Last week, Fidelity National Financial (FNF), a US Fortune 500 company that provides insurance and settlement services to the real estate industry, <a href="https://www.sec.gov/ix?doc=/Archives/edgar/data/1331875/000133187523000064/fnf-20231119.htm">announced</a> it had blocked access to some of its systems after detecting a breach.&nbsp;</p><p>FNF, which owns a <a href="https://web.archive.org/web/20230615075159/https://www.fnf.com/Companies">suite of related companies</a>, stated that "the services we provide related to title insurance, escrow and other title-related services, mortgage transaction services, and technology to the real estate and mortgage industries, have been affected by these measures".</p><p>The AlphV/Black Cat ransomware gang <a href="https://therecord.media/fidelity-national-financial-ransomware-alphv-black-cat">claimed responsibility</a> for the hack on their leak site the day after FNF's announcement, while also mocking Mandiant, presumably the firm AlphV believes FNF has engaged for incident response.</p><p>The fallout <a href="https://techcrunch.com/2023/11/27/ransomware-catastrophe-at-fidelity-national-financial-causes-panic-with-homeowners-and-buyers/">was described</a> as a "catastrophe" by <em>TechCrunch</em>, with prospective buyers being <a href="https://www.realestatenews.com/2023/11/21/hack-at-nations-largest-title-company-stalls-closings">unable to close</a> house purchases and left in the dark about their status. When <em>TechCrunch</em> called IPX 1031, an FNF subsidiary, a voicemail responded that "Fidelity National Financial is still experiencing a system-wide outage. We do not have access to send or receive email or access to any system. We appreciate your patience."</p><p>In the UK, an attack on CTS, a provider of managed IT services for law firms, is also affecting home purchases by disrupting the legal sector.</p><p>Last Thursday November 23, CTS <a href="https://cts.co.uk/hub/news/update-on-service-outage/">announced</a> it was experiencing a service outage caused by a cyber incident that had "impacted a portion of the services we deliver to some of our clients".&nbsp;</p><p><em>Today's Conveyancer</em>, a real estate lawyer publication, <a href="https://todaysconveyancer.co.uk/technology-failure-impacting-transactions/">reported the incident</a> was affecting around 80 firms across the country and wrote that it "risks bringing exchanges and completions to a standstill". The impact felt by each firm varied depending upon their reliance on cloud-based services. One CTS client told <em>Today's Conveyancer</em>:</p><blockquote><p>Depending on your cloud dependency you may, like us, still be able to find workarounds for matters exchanging and completing this week. Other firms have been more affected and are unable to access phone, emails, or case management systems. As a result some transactions are still going ahead today.&nbsp;&nbsp;</p></blockquote><p>A number of UK law firms <a href="https://propertyindustryeye.com/eye-newsflash-major-cybersecurity-issue-preventing-transactions-progressing/">spoke to</a> the UK's <em>Property Eye</em> property trade publication, confirming that the incident&#8217;s impact was widespread. O'Neil Patient, for example, said that "this issue is impacting a number of organisations across the sector, as our provider is a specialist in secure legal systems for many law firms and barrister&#8217;s chambers".&nbsp;&nbsp;</p><p>One lesson here is that service providers are high-impact targets and because so many customers rely on them they need top-notch cyber security standards.</p><p>While we do not know how FNF and CTS were breached, cyber security researcher Kevin Beaumont, using information <a href="https://en.wikipedia.org/wiki/Shodan_(website)">from Shodan</a>, <a href="https://cyberplace.social/@GossiTheDog/111484497228197522">notes both</a> were <a href="https://cyberplace.social/@GossiTheDog/111484493707351655">slow to patch</a> the latest Citrix Netscaler vulnerabilities.&nbsp;</p><p>It is standard practice for cybercrime gangs to take any vulnerability in internet-facing enterprise software and exploit it at scale for either data theft extortion or for network access. <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-325a">CISA warned</a> last week that these vulnerabilities were being actively exploited by cybercrime groups and they have already been implicated in the high-profile compromises of <a href="https://www.computerweekly.com/news/366560675/CISA-reveals-how-LockBit-hacked-Boeing-via-Citrix-Bleed">Boeing</a> and the <a href="https://srslyriskybiz.substack.com/p/lockbits-disastrous-success">Industrial and Commercial Bank of China</a>.&nbsp;</p><p>A patch for these Citrix Netscaler vulnerabilities <a href="https://www.netscaler.com/blog/news/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway/">was released on the 10th of October</a>. Perhaps the more straightforward lesson here is that organisations need to get much much faster at upgrading and patching their internet-facing vulnerabilities.</p><p>Coincidentally, <a href="https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight/essential-eight-maturity-model-changes">an updated version</a> of the ASD's "Essential Eight" strategies to mitigate cyber security incidents was released this week. One of the big changes is to place higher priority on rapid patching, and the ASD recommends that patches be applied "within 48 hours of release when vulnerabilities are assessed as critical by vendors or when working exploits exist". That's a tall order for most organisations, but how much angst would have been saved just in recent weeks if that recommendation was implemented?</p><p>In the race to exploit or remediate these bugs, too often threat actors are winning.</p><h2>Three Reasons to Be Cheerful This Week:</h2><ol><li><p><strong>Swapping vulns for coins:</strong> The UK's NCSC <a href="https://www.ncsc.gov.uk/blog-post/thanking-vulnerability-research-community-ncsc-challenge-coins">is launching</a> a set of <a href="https://en.wikipedia.org/wiki/Challenge_coin">challenge coins</a> it will give out to selected researchers who submit reports to its Vulnerability Reporting Service (VRS) and it thinks have "shown themselves to be exemplars of the vulnerability disclosure community". The VRS covers UK government services and this is a good way of encouraging reports that appeals to security researchers' sense of self-worth.&nbsp;</p></li><li><p><strong>International ransomware group dismantled:</strong> Authorities from seven different countries <a href="https://www.europol.europa.eu/media-press/newsroom/news/international-collaboration-leads-to-dismantlement-of-ransomware-group-in-ukraine-amidst-ongoing-war">have collaborated to dismantle</a> a ransomware group responsible for attacks in 71 different countries. The group used a variety of ransomware strains, including LockerGoga, MegaCortex, HIVE and Dharma, in attacks that affected over 1,800 victims worldwide. Coordinated raids took place at 30 locations and the group's leader and four accomplices were arrested in Ukraine.&nbsp;</p></li><li><p><strong>Myanmar rebels battling cyber scams:</strong> The Three Brotherhood Alliance, a militia opposed to the Myanmar junta, <a href="https://therecord.media/rebel-offensive-myanmar-cyber-scam-crackdown">has taken aim</a> against online &#8216;pig butchering&#8217; compounds operating near the border with China. The PRC has tried to pressure the Myanmar government to crack down on the crime with limited success. So it's a <a href="https://www.voanews.com/a/myanmar-rebel-offensive-helps-china-s-cybercrime-crackdown/7362836.html">happy coincidence</a> for the Chinese government that rebel forces have suddenly felt motivated to tackle cybercrime kingpins.&nbsp;</p></li></ol><h2>Sponsor Section</h2><p><em>In this Risky Business News sponsor interview Tom Uren talks to Brian Dye, CEO of Corelight about the value of data from NDR tools when it comes to longer term incident response.</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/sponsored-corelights-brian-dye-on-how-network-data/id1621305970?i=1000636575765&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000636575765.jpg&quot;,&quot;title&quot;:&quot;Sponsored: Corelight's Brian Dye on how network data is the connective tissue of incident response&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/sponsored-corelights-brian-dye-on-how-network-data/id1621305970?i=1000636575765&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2023-11-26T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/sponsored-corelights-brian-dye-on-how-network-data/id1621305970?i=1000636575765" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><h2>Shorts</h2><h3>DP World Dodges the Ransomware Bullet</h3><p>DP World Australia <a href="https://www.bleepingcomputer.com/news/security/dp-world-confirms-data-stolen-in-cyberattack-no-ransomware-used/">has confirmed</a> that ransomware was not deployed in a recent incident that <a href="https://srslyriskybiz.substack.com/p/lockbits-disastrous-success">we covered</a> earlier this month. DP World Australia says "a small amount" of data was stolen during the incident, including the personal information of current and former employees.</p><p>This is a best case scenario as the actual deployment of ransomware would have been far more damaging. As it was, the incident resulted in the shutdown of five ports across Australia, national news coverage and a whole-of-government response. Australia's Minister for Cyber Security, Clare O'Neil, <a href="https://www.afr.com/companies/transport/minister-lashes-dp-world-hack-failure-20231128-p5eney">even berated</a> DP World for not patching its systems more rapidly.&nbsp;&nbsp;</p><p>That's more than a little angst. DP World Australia's executive vice president Nicolaj Noes <a href="https://www.abc.net.au/news/2023-11-28/dp-world-australia-employee-data-stolen-cyber-attack-freight/103161588">told the</a> <em>Australian Broadcasting Corporation</em> that although getting cyber security right is complex, perhaps they should, in retrospect, have "done some things differently".</p><h3>PRC Ransomware Pressure Intensifies</h3><p>The Qilin ransomware group&nbsp; (aka Agenda) has <a href="https://www.bleepingcomputer.com/news/security/qilin-ransomware-claims-attack-on-automotive-giant-yanfeng/">claimed responsibility</a> for a cyber incident affecting production at Yanfeng Automotive Interiors, a Chinese automotive parts manufacturer. <em>Bleeping Computer</em> reports Yanfeng employs 57,000 people in 240 locations worldwide and the incident disrupted production at multinational automaker <a href="https://www.stellantis.com/en">Stellantis</a>' North American assembly plants.&nbsp;&nbsp;&nbsp;</p><p>Just two weeks ago, in the wake of a <a href="https://www.reuters.com/technology/cybersecurity/icbc-ransomware-attack-triggers-global-regulator-trader-scrutiny-2023-11-10/">ransomware attack on the US subsidiary</a> of China's largest bank, <a href="https://srslyriskybiz.substack.com/p/lockbits-disastrous-success">we speculated</a> about the Chinese government pressuring Russian officials to take action against ransomware crews. It's not clear that Qilin is Russia-based, although cyber security firm Group-IB <a href="https://www.group-ib.com/blog/qilin-ransomware/">reported earlier this year</a> that a Qilin recruiter looking for affiliates wrote in Russian and said that the group does not work in CIS countries (countries that were formerly part of the Soviet Union).&nbsp;&nbsp;&nbsp;&nbsp;</p><h2></h2><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://srslyriskybiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Seriously Risky Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Risky Biz Talks</h2><p><em>You can find the audio edition of this newsletter and other fine podcasts and interviews in the Risky Biz News feed (<a href="https://risky.biz/feeds/risky-business-news">RSS</a>, <a href="https://podcasts.apple.com/au/podcast/risky-business-news/id1621305970">iTunes</a> or <a href="https://open.spotify.com/show/0BdExoUZqbGsBYjt6QZl4Q">Spotify</a>).&nbsp;&nbsp;</em></p><p><em>In <a href="https://risky.biz/BTN60">our last</a> "Between Two Nerds" discussion Tom Uren and <a href="https://twitter.com/thegrugq">The Grugq</a> look at the evolution of Russian electricity network cyber attacks.&nbsp;</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/between-two-nerds-the-evolution-of-russian/id1621305970?i=1000636715871&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000636715871.jpg&quot;,&quot;title&quot;:&quot;Between Two Nerds: The evolution of Russian electricity attacks&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/between-two-nerds-the-evolution-of-russian/id1621305970?i=1000636715871&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2023-11-28T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/between-two-nerds-the-evolution-of-russian/id1621305970?i=1000636715871" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><h2>From <a href="https://riskybiznews.substack.com/">Risky Biz News</a>:</h2><p><strong>Fastly to block domain fronting in 2024: </strong>Internet infrastructure company Fastly will block domain fronting on its cloud platform from February 27, 2024.</p><p>Fastly now joins a growing list of major cloud companies that have banned domain fronting. The list includes <a href="https://aws.amazon.com/blogs/security/enhanced-domain-protections-for-amazon-cloudfront-requests/">Amazon</a> (banned in 2018), <a href="https://www.theverge.com/2018/4/18/17253784/google-domain-fronting-discontinued-signal-tor-vpn">Google</a> (2018),&nbsp; <a href="https://news.ycombinator.com/item?id=33572390">Microsoft</a> (2022), and <a href="https://gitlab.torproject.org/legacy/trac/-/issues/14256">Cloudflare</a> (2015).</p><p><a href="https://en.wikipedia.org/wiki/Domain_fronting">Domain fronting</a> is a technique to use different domain names on the same HTTPS connection. Because of its ability to hide backend infrastructure, domain fronting has also become popular with malware operations, being adopted by both <a href="https://www.cyberark.com/resources/threat-research-blog/implementing-malware-command-and-control-using-major-cdns-and-high-traffic-domains">financially</a> and <a href="https://www.sentinelone.com/blog/privacy-2019-tor-meek-rise-fall-domain-fronting/">espionage-motivated groups</a>.</p><p>[<a href="https://riskybiznews.substack.com/p/fastly-to-block-domain-fronting-in-2024">more</a> on <em>Risky Business News</em>, including the historyof domain fronting, its legitimate uses and how it has been used by services like Signal and Tor to bypass internet censorship.]</p><p><strong>Cyber insurance catches on across the EU: </strong>An <a href="https://www.enisa.europa.eu/publications/nis-investments-2023">ENISA report</a> on NIS compliance spending has found that roughly 42% of the EU's critical infrastructure and digital service provider operators have signed up for cyber insurance in 2022.</p><p>The report notes that while cyber insurance coverage was at 43% in 2020 and just 30% in 2021, the cyber insurance market now appears to be active and developed all over the EU.</p><p>[<a href="https://riskybiznews.substack.com/p/cyber-insurance-catches-on-across-eu">more</a> on <em>Risky Business News</em>, including how companies are complying with the <a href="https://en.wikipedia.org/wiki/Cyber-security_regulation#NIS_Directive">EU's NIS Directive</a>]</p><p><strong>Crypto-phishing service shuts down after stealing $71 million:</strong> A phishing platform specialising in cryptocurrency thefts has shut down operations after stealing more than $71 million over the past nine months.</p><p>Named Inferno Drainer, the platform launched in February this year. Spotted by Web3 security platform <a href="https://drops.scamsniffer.io/post/5-9-million-stolen-by-scam-as-a-service-provider-called-inferno-drainer/">ScamSniffer</a>, the service allowed threat actors to create phishing pages for more than 220 cryptocurrency brands.</p><p>ScamSniffer researchers say Inferno Drainer was responsible for more than 10,000 phishing sites and helped hackers steal cryptocurrency from more than 103,000 victims since its launch.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!G_bV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b3885d3-65f3-4a1a-9970-d9f796a091ef_1109x757.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!G_bV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b3885d3-65f3-4a1a-9970-d9f796a091ef_1109x757.png 424w, https://substackcdn.com/image/fetch/$s_!G_bV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b3885d3-65f3-4a1a-9970-d9f796a091ef_1109x757.png 848w, https://substackcdn.com/image/fetch/$s_!G_bV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b3885d3-65f3-4a1a-9970-d9f796a091ef_1109x757.png 1272w, https://substackcdn.com/image/fetch/$s_!G_bV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b3885d3-65f3-4a1a-9970-d9f796a091ef_1109x757.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!G_bV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b3885d3-65f3-4a1a-9970-d9f796a091ef_1109x757.png" width="1109" height="757" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1b3885d3-65f3-4a1a-9970-d9f796a091ef_1109x757.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:757,&quot;width&quot;:1109,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!G_bV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b3885d3-65f3-4a1a-9970-d9f796a091ef_1109x757.png 424w, https://substackcdn.com/image/fetch/$s_!G_bV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b3885d3-65f3-4a1a-9970-d9f796a091ef_1109x757.png 848w, https://substackcdn.com/image/fetch/$s_!G_bV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b3885d3-65f3-4a1a-9970-d9f796a091ef_1109x757.png 1272w, https://substackcdn.com/image/fetch/$s_!G_bV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b3885d3-65f3-4a1a-9970-d9f796a091ef_1109x757.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>[<a href="https://riskybiznews.substack.com/p/crypto-phishing-service-shuts-down">more</a> on <em>Risky Business News</em>]</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://srslyriskybiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Seriously Risky Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The Hack-for-Hire Industry: Death by a Thousand Cuts]]></title><description><![CDATA[PLUS: When theft doesn't work... troll]]></description><link>https://srslyriskybiz.substack.com/p/the-hack-for-hire-industry-death</link><guid isPermaLink="false">https://srslyriskybiz.substack.com/p/the-hack-for-hire-industry-death</guid><dc:creator><![CDATA[Tom Uren]]></dc:creator><pubDate>Thu, 23 Nov 2023 06:55:12 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47d7fadd-db6c-49df-af5d-604951ed4cf6_1344x768.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Your weekly dose of Seriously Risky Business news is written by <a href="https://twitter.com/tomatospy">Tom Uren</a> and edited by <a href="https://twitter.com/riskybusiness">Patrick Gray</a>. It's supported by <a href="https://www.lawfaremedia.org/">Lawfare</a> and this week's edition is brought to you by <a href="https://www.yubico.com/">Yubico</a>.</em></p><p><em>You can subscribe to an audio version of this newsletter as a podcast by searching for "Risky Business News" in your podcatcher or subscribing via <a href="https://risky.biz/feeds/risky-business-news/">this RSS feed</a>. Find this edition <a href="https://risky.biz/SRB58">here</a> and on Spotify:</em></p><iframe class="spotify-wrap podcast" data-attrs="{&quot;image&quot;:&quot;https://i.scdn.co/image/ab6765630000ba8aff2258f005c4c2a1b48d6904&quot;,&quot;title&quot;:&quot;Srsly Risky Biz: Death by a thousand cuts&quot;,&quot;subtitle&quot;:&quot;risky.biz&quot;,&quot;description&quot;:&quot;Episode&quot;,&quot;url&quot;:&quot;https://open.spotify.com/episode/27janbBvRVP60NaY2ueaIb&quot;,&quot;belowTheFold&quot;:false,&quot;noScroll&quot;:false}" src="https://open.spotify.com/embed/episode/27janbBvRVP60NaY2ueaIb" frameborder="0" gesture="media" allowfullscreen="true" allow="encrypted-media" data-component-name="Spotify2ToDOM"></iframe><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!sHeW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47d7fadd-db6c-49df-af5d-604951ed4cf6_1344x768.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!sHeW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47d7fadd-db6c-49df-af5d-604951ed4cf6_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!sHeW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47d7fadd-db6c-49df-af5d-604951ed4cf6_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!sHeW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47d7fadd-db6c-49df-af5d-604951ed4cf6_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!sHeW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47d7fadd-db6c-49df-af5d-604951ed4cf6_1344x768.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!sHeW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47d7fadd-db6c-49df-af5d-604951ed4cf6_1344x768.png" width="1344" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/47d7fadd-db6c-49df-af5d-604951ed4cf6_1344x768.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1344,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1542558,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!sHeW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47d7fadd-db6c-49df-af5d-604951ed4cf6_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!sHeW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47d7fadd-db6c-49df-af5d-604951ed4cf6_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!sHeW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47d7fadd-db6c-49df-af5d-604951ed4cf6_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!sHeW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47d7fadd-db6c-49df-af5d-604951ed4cf6_1344x768.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Death by a thousand papercuts, Stable Diffusion</figcaption></figure></div><p>We have removed this item because it largely centres on discussion of an article that is subject to a legal action and is <a href="https://www.reuters.com/investigates/special-report/usa-hackers-appin/">no longer published</a>. </p><h2>If Data Theft Doesn't Work&#8230; Troll</h2><p>The AlphV ransomware group <a href="https://www.databreaches.net/alphv-files-an-sec-complaint-against-meridianlink-for-not-disclosing-a-breach-to-the-sec/">has filed</a> a US Securities and Exchange Commission (SEC) complaint against one of its victims for failing to disclose that it had been breached.</p><p>In the words of AlphV's submission, the victim company MeridianLink "failed to file the requisite disclosure under Item 1.05 of Form 8-K within the stipulated four business days, as mandated by the new SEC rules".</p><p>According to AlphV, the group breached MeridianLink on November 7 and stole files but did not encrypt company systems.&nbsp;</p><p>Beyond the submission being a ridiculous troll, there are also a few more pedantic problems with AlphV's submission. The SEC's four-day disclosure rules don't actually come into effect until the middle of December and they only apply if the company decides the breach is material. <a href="https://www.databreaches.net/alphv-files-an-sec-complaint-against-meridianlink-for-not-disclosing-a-breach-to-the-sec/">MeridianLink told</a> <em>DataBreaches.net</em>, "based on our investigation to date, we have identified no evidence of unauthorised access to our production platforms, and the incident has caused minimal business interruption". So it doesn't sound like a material incident anyway.&nbsp;</p><p>It also looks like AlphV missed a trick here and doesn't appear to have applied for the <a href="https://www.sec.gov/whistleblower">SEC's whistleblower reward program</a>. This scheme is designed to encourage whistleblowing and monetary fines from SEC enforcement actions that result from submissions <a href="https://www.sec.gov/news/press-release/2023-89">can be shared with the whistleblower</a>. This would have been even more absurd and potentially more effective since this caper was all about using publicity to place extra pressure on MeridianLink.&nbsp;</p><p>However, cybersecurity professionals and companies should be aware there could be a real opportunity for ransomware groups to apply more pressure here. The SEC's <a href="https://srslyriskybiz.substack.com/i/138510536/secs-disclosure-demands-a-halloween-horror-for-cisos">recent case against SolarWinds and its CISO</a> is based on how the company's cyber security practices didn't match the company's public statements. Perhaps the opportunity for ransomware groups is to write penetration testing reports describing weaknesses in a company's cyber security defences and contrasting those findings with the victim's public statements (such as the boilerplate 'we take cyber security extremely seriously'&#8230;.etc). They could then threaten to send this report to the SEC.</p><h2></h2><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://srslyriskybiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://srslyriskybiz.substack.com/subscribe?"><span>Subscribe now</span></a></p><h2>Russia&#8217;s War for (Hacking) Talent</h2><p><em>The Record</em> has published <a href="https://therecord.media/victor-zhora-interview-click-here-ousted">a recent interview</a> with Victor Zhora, the former deputy head of the Ukraine's cyber security agency (<a href="https://cip.gov.ua/en">the SSSCIP</a>) discussing the evolving tactics of Russian cyber operations. (The day after the interview took place Zhora was <a href="https://therecord.media/two-ukraine-cyber-officials-dismissed-amid-embezzlement-probe">reportedly dismissed</a> from the SSSCIP amid an embezzlement investigation).&nbsp;</p><p>Most interestingly, Zhora commented on the difficulties that Russia has recruiting cyber talent, and that it is trying to build a talent pipeline from high schools and volunteer communities. Russia suffered a significant brain drain at the beginning of the invasion as skilled people left the country and this made it difficult for its cyber organisations to grow their capabilities.&nbsp;</p><p>He told <em>The Record</em> that, as a result, "they are putting focus on younger people because it's the only way for Russia to scale up and maintain the same intensity of cyberattacks".&nbsp;</p><p>Zhora also said that Russian groups were also scouring Telegram channels, presumably ones in which patriotic Russian hacktivists organise their activities:</p><blockquote><p>One way of engaging people to cyber offensive operations against Ukraine and our partners is seeking for talents in different Telegram channels where there&#8217;s always an officer of [the] FSB [Federal Security Service] or GRU [military intelligence] searching for the most skilled people and then inviting them to more official military structures.</p></blockquote><p>There is already good <a href="https://www.mandiant.com/resources/blog/gru-rise-telegram-minions">evidence of coordination</a> between Russian military intelligence and the country's hacktivist groups. However, it's difficult to trust unvetted groups of internet strangers with important cyber operations, so it makes sense to cherry pick (and vet) talented individuals for more important work.</p><p>Zhora also recapped trends in Russian cyber operations that <a href="https://srslyriskybiz.substack.com/i/137471088/russia-drops-the-cyber-hammer-for-the-sickle">we've covered before</a>. These include that Russian state groups remain focused on Ukrainian critical infrastructure and government organisations, but have shifted from disruptive operations to cyber espionage and data exfiltration. They've also shifted toward 'living off the land' approaches that rely on abusing legitimate tools that are already present in the host environment.&nbsp;&nbsp;</p><h2>Three Reasons to Be Cheerful This Week:</h2><ol><li><p><strong>US SIM swap requirements strengthened:</strong> The US Federal Communications Commission (FCC) has adopted new rules intended to protect US wireless telecommunications customers from SIM swap fraud. The new rules say wireless providers must use "secure methods of authenticating a customer", but don't specify what these secure methods are &#8212; it's up to providers to figure that out. The FCC writes "while the approach we take today gives wireless providers the <em>flexibility</em> to adapt to evolving threats, it also creates an <em>obligation</em> that they adapt to those threats". [<em>Risky Business News</em> has <a href="https://riskybiznews.substack.com/p/fcc-adopts-sim-swapping-port-out-protections">more coverage</a>]</p></li><li><p><strong>Hack-for-hire intermediary sentenced:</strong> An Israeli private investigator, Aviram Azari, <a href="https://www.justice.gov/usao-sdny/pr/israeli-hacker-hire-sentenced-80-months-prison-involvement-massive-spearphishing">has been sentenced</a> to 80 months in prison for organising global hacking campaigns. Prosecutors say Azari's clients paid him more than USD$4.8m over five years for organising the campaigns. <a href="https://www.reuters.com/technology/cybersecurity/israeli-private-detective-sentenced-us-6-23-years-hacker-for-hire-scheme-2023-11-16/">Notable campaigns</a> targeted individuals critical of now-defunct German payment processing company Wirecard and also climate activists who were campaigning against Exxon Mobil. <a href="https://www.reuters.com/investigates/special-report/usa-hackers-litigation/">One of the</a> hack-for-hire firms Azari used was Indian firm BellTrox.&nbsp;&nbsp;</p></li><li><p><strong>Binance pinged for USD$4.3bn: </strong>Binance, the world's largest cryptocurrency exchange, <a href="https://www.nbcnews.com/tech/tech-news/binance-ceo-steps-crypto-platform-hit-4-billion-fines-rcna126071">will pay USD$4.3bn</a> to settle violations of US anti-money laundering law. Its CEO Changpeng Zhao (aka CZ) will also step down. We are calling this good news because the terms of the settlement will help clamp down on ransomware payments. The US Treasury Department <a href="https://home.treasury.gov/news/press-releases/jy1925">said that</a> Binance didn't report ransomware payments despite "transacting millions of dollars of ransomware proceeds involving at least 24 different strains of ransomware".&nbsp;</p></li></ol><h2>Sponsor Section</h2><p><em>In this Risky Business News sponsor interview, Tom Uren talks to Derek Hanson, Yubico VP of Solutions Architecture and Alliances, about the state of authentication and what Passkeys are all about.</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/sponsored-everything-you-wanted-to-know-about-passkeys/id1621305970?i=1000635355292&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000635355292.jpg&quot;,&quot;title&quot;:&quot;Sponsored: Everything you wanted to know about Passkeys but were too afraid to ask&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/sponsored-everything-you-wanted-to-know-about-passkeys/id1621305970?i=1000635355292&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2023-11-20T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/sponsored-everything-you-wanted-to-know-about-passkeys/id1621305970?i=1000635355292" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><h2>Shorts</h2><h3>Twitter's Flagging Flagging Efforts</h3><p><em>Bloomberg</em> <a href="https://www.bloomberg.com/graphics/2023-israel-hamas-war-misinformation-twitter-community-notes/?accessToken=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzb3VyY2UiOiJTdWJzY3JpYmVyR2lmdGVkQXJ0aWNsZSIsImlhdCI6MTcwMDU0NzMwMiwiZXhwIjoxNzAxMTUyMTAyLCJhcnRpY2xlSWQiOiJTNEdNMDRUMEcxS1cwMSIsImJjb25uZWN0SWQiOiJGQTUwMzI1N0EwREI0MkNCOTNGM0YyODVENEIzRDNCMSJ9.mT0K36tL4mX71JzAttyDCQb_aPfXMZqtSanyDDPs5vw">analysed hundreds of viral posts</a> on X, the website formerly known as Twitter, relating to the Israel/Hamas conflict and found that the site's efforts to address misinformation were not keeping up with the speed with which misleading posts were going viral.&nbsp;&nbsp;</p><p>Since Elon Musk's takeover of Twitter he has dismantled much of the company's trust and safety function, so mechanisms it previously used to manage misinformation don't exist any more.&nbsp;</p><p>One recent innovation that attempts to address misinformation on the platform is <a href="https://help.twitter.com/en/using-x/community-notes">'Community Notes'</a>, a mechanism that gathers other X users' opinions to add context to posts and flag them as potentially misleading.</p><p>In theory, this could work because it harnesses users to address misinformation more broadly than a centralised Twitter team ever could. However, <em>Bloomberg</em> found that Community Notes correcting or adding context to posts typically appeared hours or even days after misleading posts had gone viral. Often these posts contained photos or videos that were repurposed from other conflicts (or even video games) and appear to be designed to be deliberately inflammatory.</p><p>Of course, Twitter's former role as a site to follow breaking news events is at odds with the slower pace that would come with the careful assessment of posts for misinformation.</p><h3>How to Join the Active Defence Party</h3><p>German digital technology think tank SNV (Stiftung Neue Verantwortung) has <a href="https://www.stiftung-nv.de/en/publication/active-cyber-defense-toward-operational-norms">published a paper</a> on how states should responsibly conduct 'Active Cyber Defence' operations. Its definition of active cyber defence is pretty broad and encompasses state action that ranges from telling ISPs to block or sinkhole malicious traffic to what this newsletter calls &#8216;offensive cyber operations&#8217; designed to disrupt cyber criminals, as per the <a href="https://srslyriskybiz.substack.com/p/uks-national-cyber-force-a-bunch">UK's National Cyber Force</a>.</p><p><a href="https://srslyriskybiz.substack.com/p/asd-enters-the-ransomware-suppression">Some states</a> already <a href="https://www.politico.com/news/2023/07/04/fbi-digital-sting-shows-the-promise-and-limits-of-hacking-hackers-00104545">carry out</a> these kinds of operations and we expect that over time more states will take part. The paper is a sensible policy blueprint on how states can join the party.&nbsp;</p><h3>I'm In Jail With a Broken Nose&#8230;</h3><p>Now here's an AI-enabled scam that will work. In <a href="https://www.c-span.org/video/?c5093648/philadelphia-attorney-tells-lawmakers-fell-victim-ai-scam">this video</a> attorney Gary Schildhorn describes a scam which started with a phone call from his son saying that he'd been in a car accident in which he'd broken his nose and injured a pregnant woman.</p><p>The AI technology required is the ability to clone a voice, which could then be combined with a <a href="https://en.wikipedia.org/wiki/Soundboard_(computer_program)">soundboard</a> to trigger pre-prepared phrases. But this is a targeted attack that requires the scammers to do some homework beforehand. Firstly, the scammers need to identify individuals with enough speech available online such that their voice can be cloned. They then need to find relatives and contact details. But once they've done that we suspect their success rate will be pretty good.&nbsp;&nbsp;</p><h3>Fortress Australia, Cyber Edition</h3><p>The Australian government <a href="https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/2023-2030-australian-cyber-security-strategy">released its latest cyber security strategy</a> this week and on the whole we approve.&nbsp;</p><p>The strategy takes a defence-in-depth approach framing with six 'cyber shields' ranging from "strong businesses and citizens" to "protected critical infrastructure". The third shield, "World-class threat sharing and blocking", is interesting. It takes a 'fortress Australia' approach and aims for whole-of-economy threat intelligence sharing, coupled with threat blocking at ISPs and telcos.</p><p>The strategy extends out to 2030, however, and there are not a lot of new funds given the extended time frame. A reasonable chunk of the new money is allocated <a href="https://ministers.dfat.gov.au/minister/tim-watts/media-release/2023-2030-cyber-security-strategy-resilient-region-and-global-leadership">to help Pacific countries</a> both improve their cyber security and also to respond to crises.&nbsp;</p><h2></h2><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://srslyriskybiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Seriously Risky Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Risky Biz Talks</h2><p><em>You can find the audio edition of this newsletter and other fine podcasts and interviews in the Risky Biz News feed (<a href="https://risky.biz/feeds/risky-business-news">RSS</a>, <a href="https://podcasts.apple.com/au/podcast/risky-business-news/id1621305970">iTunes</a> or <a href="https://open.spotify.com/show/0BdExoUZqbGsBYjt6QZl4Q">Spotify</a>).&nbsp;&nbsp;</em></p><p><em>In <a href="https://risky.biz/BTN59/">our last</a> "Between Two Nerds" discussion Tom Uren and <a href="https://twitter.com/thegrugq">The Grugq</a> discuss how being more open about cyber security threats is great for marketing but has also forced cyber security companies to pick sides and make value judgements.</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/between-two-nerds-how-marketing-has-changed-the-cyber/id1621305970?i=1000635474277&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000635474277.jpg&quot;,&quot;title&quot;:&quot;Between Two Nerds: How marketing has changed the cyber security landscape&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/between-two-nerds-how-marketing-has-changed-the-cyber/id1621305970?i=1000635474277&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2023-11-21T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/between-two-nerds-how-marketing-has-changed-the-cyber/id1621305970?i=1000635474277" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><h2>From <a href="https://riskybiznews.substack.com/">Risky Biz News</a>:</h2><p><strong>DIALStranger vulnerabilities disclosed after four years:</strong> Turkish security researcher Yunus &#199;adirci has discovered vulnerabilities in the DIAL protocol and misconfigurations in vendor equipment that can be used to force TVs and other capable devices into forcibly playing an attacker's video content.</p><p>The DIALStranger flaws were discovered way back in 2019, but &#199;adirci kept the <a href="https://github.com/yunuscadirci/DIALStranger/blob/main/DIAL%20Protocol%20Vulnerabilities%20and%20%20Implementation%20Errors%20-%202019.pdf">original report</a> private for four years as the protocol received patches and vendors slowly updated devices.</p><p>[<a href="https://riskybiznews.substack.com/p/dialstranger-vulnerabilities-disclosed-four-year">more</a> on <em>Risky Business News</em>, including how the flaw could be used for "mass-rickrolling"]</p><p><strong>NTMC leak</strong>: Bangladesh intelligence agency NTMC has left a sensitive database exposed on the internet and leaked the personal details of an unknown number of citizens. The leaked data contained more than 120 data points for each citizen, ranging from real names to Twitter IDs, criminal records, and phone call records. Discovered by Viktor Markopoulos of CloudDefense.AI, the researcher says he reported the database to Bangladesh officials, but the server was never secured. Instead, it was wiped and replaced with a ransom demand, presumably in an automated attack. [Additional coverage in <em><a href="https://www.wired.com/story/ntmc-bangladesh-database-leak/">Wired</a></em>]</p><p><strong>Tor Project removes 1k relays linked to cryptocurrency scheme:</strong> The Tor Project has removed an estimated 1,000 relay servers from its network, citing their involvement with a for-profit cryptocurrency scheme.</p><p>The scheme allegedly promised cryptocurrency tokens for users who set up and ran Tor relays.</p><p>In a <a href="https://blog.torproject.org/tor-network-community-health-update/">blog post</a> on Monday, Tor admins said they removed participating servers to protect the integrity and reputation of their project. The removal was subject to a community vote that passed last week.</p><p>[<a href="https://riskybiznews.substack.com/p/tor-project-removes-one-thousand-relays">more</a> on <em>Risky Business News</em>, including Tor's funding sources]</p>]]></content:encoded></item><item><title><![CDATA[LockBit's Disastrous Success]]></title><description><![CDATA[PLUS: Banks Dragged Kicking and Screaming to Combat Fraud]]></description><link>https://srslyriskybiz.substack.com/p/lockbits-disastrous-success</link><guid isPermaLink="false">https://srslyriskybiz.substack.com/p/lockbits-disastrous-success</guid><dc:creator><![CDATA[Tom Uren]]></dc:creator><pubDate>Thu, 16 Nov 2023 06:31:41 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818fe15c-4da9-4559-9d58-77d8155533bd_1344x768.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Your weekly dose of Seriously Risky Business news is written by <a href="https://twitter.com/tomatospy">Tom Uren</a> and edited by <a href="https://twitter.com/riskybusiness">Patrick Gray</a>. It's supported by <a href="https://www.lawfaremedia.org/">Lawfare</a> and this week's edition is brought to you by Gigamon and its <a href="https://www.gigamon.com/campaigns/precryption.html">precryption technology</a>.</em></p><p><em>You can subscribe to an audio version of this newsletter as a podcast by searching for "Risky Business News" in your podcatcher or subscribing via <a href="https://risky.biz/feeds/risky-business-news/">this RSS feed</a>. Find this edition <a href="https://risky.biz/SRB57">here</a> and on Apple podcasts:</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/srsly-risky-biz-lockbits-disastrous-success/id1621305970?i=1000635000800&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000635000800.jpg&quot;,&quot;title&quot;:&quot;Srsly Risky Biz: LockBit's disastrous success&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/srsly-risky-biz-lockbits-disastrous-success/id1621305970?i=1000635000800&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2023-11-16T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/srsly-risky-biz-lockbits-disastrous-success/id1621305970?i=1000635000800" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!s0zq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818fe15c-4da9-4559-9d58-77d8155533bd_1344x768.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!s0zq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818fe15c-4da9-4559-9d58-77d8155533bd_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!s0zq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818fe15c-4da9-4559-9d58-77d8155533bd_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!s0zq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818fe15c-4da9-4559-9d58-77d8155533bd_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!s0zq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818fe15c-4da9-4559-9d58-77d8155533bd_1344x768.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!s0zq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818fe15c-4da9-4559-9d58-77d8155533bd_1344x768.png" width="1344" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/818fe15c-4da9-4559-9d58-77d8155533bd_1344x768.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1344,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1381919,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!s0zq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818fe15c-4da9-4559-9d58-77d8155533bd_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!s0zq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818fe15c-4da9-4559-9d58-77d8155533bd_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!s0zq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818fe15c-4da9-4559-9d58-77d8155533bd_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!s0zq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F818fe15c-4da9-4559-9d58-77d8155533bd_1344x768.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">LockBit, Stable Diffusion</figcaption></figure></div><p>Ransomware criminals continue to make hay despite increased government efforts worldwide to clamp down on the ecosystem. What's next?</p><p>Last week, the US financial services division of China's biggest bank, the state-owned Industrial and Commercial Bank of China (ICBC), was hit by ransomware that reportedly affected trading in US Treasuries. <a href="https://www.ft.com/content/b08c3159-982e-4831-8897-e35f8aca49e1">According to</a> <em>The Financial Times,</em> "the attack prevented ICBC from settling Treasury trades on behalf of other market participants" and that "with its systems compromised, ICBC Financial Services proposed sending a USB stick with trading data to <a href="https://www.bnymellon.com/">BNY Mellon</a> to help it settle trades". I mean, this is very serious, but lol.</p><p>This left ICBC's US unit <a href="https://www.reuters.com/technology/cybersecurity/icbc-ransomware-attack-triggers-global-regulator-trader-scrutiny-2023-11-10/">owing BNY Mellon USD$9bn</a> for unsettled trades, with the subsidiary requiring a capital injection from its parent company to pay the debt. Yikes.&nbsp;</p><p>This hack was discussed in the diplomatic stratosphere, and US Treasury Secretary Janet Yellen <a href="https://www.reuters.com/technology/cybersecurity/yellen-no-impact-us-treasury-market-icbc-hack-2023-11-10/">raised it</a> with Chinese vice-premier He Lifeng.&nbsp;</p><p>Ransomware gang LockBit claimed the attack and told <em>Reuters</em> over the Tox encrypted messenger that ICBC had paid a ransom. <em>Reuters</em> was not able to independently verify this particular claim, but LockBit's involvement <a href="https://www.bleepingcomputer.com/news/security/lockbit-ransomware-exploits-citrix-bleed-in-attacks-10k-servers-exposed/">was confirmed</a> in <a href="https://www.wsj.com/finance/banking/icbc-hackers-used-methods-previously-flagged-by-u-s-authorities-7e131a82">reporting from </a><em><a href="https://www.wsj.com/finance/banking/icbc-hackers-used-methods-previously-flagged-by-u-s-authorities-7e131a82">The Wall Street Journal</a></em>.</p><p>This is a very brazen attack but we also think it's a risky one, at least for the people directly involved, as it is the kind of thing that motivates government officials to take action. And we're not talking about US officials here, but Chinese ones.</p><p>Assuming LockBit has some Russian nexus (<a href="https://therecord.media/ransomware-diaries-undercover-with-the-leader-of-lockbit">they advertise</a> on Russian-language dark web forums), Chinese officials could have some influence over Russian law enforcement efforts. The leverage the PRC has over Russia <a href="https://www.csis.org/analysis/best-and-bosom-friends-why-china-russia-ties-will-deepen-after-russias-war-ukraine">has increased</a> since the Russian invasion of Ukraine and, as <em>Risky Business News</em> <a href="https://riskybiznews.substack.com/i/138524539/cybercrime-and-threat-intel">reported last week</a>, Russian officials <em>can</em> arrest cybercriminals when they are motivated to.&nbsp;</p><p>If the PRC does ask Russian officials to take action, however, we think this will likely just result in the arrest of a few ransomware affiliates. It will not significantly change the ransomware game.&nbsp;</p><p>The ICBC aren't LockBit's only recent high-profile victims. Security researcher Kevin Beaumont <a href="https://doublepulsar.com/lockbit-ransomware-group-assemble-strike-team-to-breach-banks-law-firms-and-governments-4220580bfcee">reports that</a> a LockBit "strike team" has been using a recent Citrix Netscaler vulnerability (<a href="https://www.assetnote.io/resources/research/citrix-bleed-leaking-session-tokens-with-cve-2023-4966">known as CitrixBleed</a>) to get initial access to organisations and then passing that onto another team that ultimately deploys ransomware.&nbsp; (LockBit's <a href="https://www.bleepingcomputer.com/news/security/lockbit-ransomware-exploits-citrix-bleed-in-attacks-10k-servers-exposed/">use of CitrixBleed</a> to gain access to the ICBC <a href="https://www.wsj.com/finance/banking/icbc-hackers-used-methods-previously-flagged-by-u-s-authorities-7e131a82">was reported in</a> <em>The Wall Street Journal</em>).</p><p>Other organisations that Beaumont has found running vulnerable versions of Netscaler include British multinational law firm Allen and Overy, Boeing, and DP World Australia. LockBit <a href="https://www.reuters.com/technology/law-firm-allen-overy-hit-by-data-incident-2023-11-09/">has claimed credit</a> for the ransomware attack on Allen and Overy and have <a href="https://www.reuters.com/technology/cybersecurity/boeing-data-published-by-lockbit-hacking-gang-2023-11-10/">leaked data</a> purportedly from Boeing as well.&nbsp;</p><p>And DP World Australia was  crippled by an attack last Friday. Per the <em>Australian Financial Review</em>:</p><blockquote><p>The Middle Eastern-owned stevedore, which operates terminals in Sydney, Melbourne, Brisbane and Perth and handles about 40 per cent of the goods coming in and out of Australia was forced to shut down technology systems at 10am on Friday.</p><p>The shutdown prevented some 30,000 containers of goods from moving in or out of its terminals, including refrigerated containers that can hold anything from lobsters and wagyu beef to blood plasma.</p><p>While ships could still offload and pick up containers, the technology systems that allow trucks to share data with the stevedore were turned off, meaning trucks could not get into DP World&#8217;s terminals to collect or drop off containers.</p></blockquote><p>There hasn't been an official confirmation of who breached DP World Australia or how they did it, but Beaumont's Citrix Netscaler compromise theory seems plausible or even likely. A patch for that vulnerability was released on the 10th of October.&nbsp;</p><p>The Australian government has a playbook for these kinds of serious cyber incidents where it rolls out a whole of government response coordinated by a 'cyber disaster tsar' (aka the <a href="https://twitter.com/AUCyberSecCoord">National Cyber Security Coordinator</a>). This approach uses an <a href="https://www.homeaffairs.gov.au/about-us/our-portfolios/emergency-management/about-emergency-management/national-coordination-mechanism">emergency response framework</a> that was developed during the Covid pandemic and was first used in the case of a cyber incident when <a href="https://srslyriskybiz.substack.com/i/80898120/australian-health-insurance-breach-gets-whole-of-government-response">responding to the Medibank Private breach</a> late last year.&nbsp;</p><p>From the point of view of a critical infrastructure company, part of this is great. If you are the victim of a significant cyber security incident you'll get all kinds of government assistance! On the other hand, the government will learn if your cyber security posture was sub-par.&nbsp;&nbsp;</p><p>This essentially puts all critical infrastructure companies on notice to up their game.&nbsp;</p><p>That's a good thing, but what else can governments do? Back in November last year Australia's Cyber Security Minister Clare O'Neil <a href="https://minister.homeaffairs.gov.au/ClareONeil/Pages/standing-operation-against-cyber-criminal-syndicates.aspx">announced</a> "an ongoing, joint standing operation to investigate, target and disrupt cyber criminal syndicates with a priority on ransomware threat groups".</p><p>In January this year we covered how LockBit's porous OPSEC made it "<a href="https://srslyriskybiz.substack.com/p/lockbit-is-ripe-for-disruption">ripe for disruption</a>" and in June this year cyber security authorities in the Five Eyes, France and Germany issued a cyber security advisory warning about LockBit ransomware.&nbsp; We'd be stunned if these recent incidents don't make LockBit a priority target for state action.&nbsp;</p><p>Although we love writing about <a href="https://srslyriskybiz.substack.com/i/100356397/what-hive-and-alphabay-hopefully-have-in-common">flashy government disruption operations</a> involving website takedowns and <a href="https://www.justice.gov/opa/video/us-department-justice-disrupts-hive-ransomware-variant">press releases</a>, we think operations that covertly degrade ransomware groups are more sensible. Flashy operations push ransomware affiliates to greener pastures, whereas discreet operations leave them toiling joylessly in the ransomware salt mines.</p><p>We think these kinds of offensive cyber disruption operations will make a difference, but won't eliminate ransomware. Ultimately, the crime needs to be starved of funds and so efforts to prevent ransomware payments should be accelerated.&nbsp;&nbsp;&nbsp;</p><h2>Banks Dragged Kicking and Screaming to Combat Fraud&nbsp;</h2><p><em>Reuters</em> <a href="https://www.reuters.com/technology/cybersecurity/payments-app-zelle-begins-refunds-imposter-scams-after-washington-pressure-2023-11-13/">reports</a> that banks in the US have begun refunding victims of 'imposter scams' on payment app Zelle.&nbsp;</p><p>Imposter scams involve people being tricked into sending money to scammers. Prior to June 30 the banks that run Zelle did not refund victims of these scams, as the customers themselves were authorising the transfer. This meant they weren't required to provide refunds under federal law.&nbsp;&nbsp;</p><p>This reminds us of new UK <a href="https://www.psr.org.uk/news-and-updates/latest-news/news/psr-confirms-new-requirements-for-app-fraud-reimbursement/">rules for payment systems</a> that come into effect next year. The UK rules apply to essentially the same type of fraud, although the Brits call it Authorised Push Payment (or APP) fraud. On Britain's 'Faster Payments' system, UK payment firms will split the cost of reimbursement 50:50, giving both the sending and receiving firm incentives to crack down on fraud.</p><p><a href="https://www.psr.org.uk/publications/policy-statements/ps23-3-fighting-authorised-push-payment-fraud-a-new-reimbursement-requirement/">The documents</a> the UK's Payment Systems Regulator released regarding the change are very interesting, particularly its <a href="https://www.psr.org.uk/media/ycpd2ogg/ps23-3-annex-4-cost-benefit-analysis-june-2023.pdf">cost-benefit analysis</a>. They leave us with the strong feeling that US banks could do much more, but have taken the steps they have to head off the possibility of more expensive regulations.&nbsp;&nbsp;&nbsp;&nbsp;</p><p>Our question for US regulators and lawmakers is: who do you care more about? Banks or people?</p><h2></h2><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://srslyriskybiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://srslyriskybiz.substack.com/subscribe?"><span>Subscribe now</span></a></p><h2>Three Reasons to Be Cheerful This Week:</h2><ol><li><p><strong>Phobos ransomware affiliates charged in France:</strong> French authorities <a href="https://www.lemonde.fr/pixels/article/2023/11/09/rancongiciel-phobos-arrestation-de-deux-russes-soupconnes-d-une-dizaine-d-attaques-en-france_6199214_4408996.html">have charged</a> a Russian couple and allege that they have been working as affiliates for the Phobos ransomware gang. The couple are from Saint Petersburg, Russia and were <a href="https://tass.com/society/1680305">arrested in Italy</a> and then extradited to France. Officials say the couple has worked with Phobos since 2020 and are linked to payments from more than 150 victims across the world.&nbsp;</p></li><li><p><strong>Myanmar scam centre progress:</strong> Over 160 Thai nationals will be returned to Thailand after being rescued from gangs running scam centres following a joint PRC-Myanmar law enforcement operation. <em>Seriously Risky Business</em> covered these type of 'pig butchering' scam centres <a href="https://srslyriskybiz.substack.com/p/pig-butchering-is-even-worse-than">here</a>.</p></li><li><p><strong>Gene giants move to 2FA by default:</strong> Following the theft of user records from the 23andMe DNA testing firm, it and other companies in the sector, including Ancestry and MyHeritage, will start using <a href="https://techcrunch.com/2023/11/07/23andme-ancestry-myheritage-two-factor-by-default/">multi-factor authentication for customers by default</a>. For 23andMe, this is very much shutting the gate after the horse has bolted, but it is better than not shutting the gate at all.&nbsp;&nbsp;&nbsp;</p></li></ol><h2>Sponsor Section</h2><p><em>In this Risky Business News <a href="https://risky.biz/RBNEWSSI22">sponsor interview</a> Tom Uren talks to Ryan Mahoney, Product Director at Gigamon. The TLS 1.3 encryption standard makes passive network monitoring inside your network difficult without break and inspect contortions, but <a href="http://gigamon.com/precryption">Gigamon's precryption</a> technology provides the visibility into encrypted traffic in hybrid environments that network defenders need.</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/sponsored-ryan-mahoney-on-how-gigamon-lets-you-have/id1621305970?i=1000634567051&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000634567051.jpg&quot;,&quot;title&quot;:&quot;Sponsored: Ryan Mahoney on how Gigamon lets you have your cake and eat it too&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/sponsored-ryan-mahoney-on-how-gigamon-lets-you-have/id1621305970?i=1000634567051&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2023-11-13T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/sponsored-ryan-mahoney-on-how-gigamon-lets-you-have/id1621305970?i=1000634567051" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><h2>Shorts</h2><h3>Catching the Mirai Botnet Boys</h3><p><em>Wired's</em> Andy Greenberg has <a href="https://www.wired.com/story/mirai-untold-story-three-young-hackers-web-killing-monster/?redirectURL=/story/mirai-untold-story-three-young-hackers-web-killing-monster/">a good long read</a> covering the story of the <a href="https://www.malwarebytes.com/what-was-the-mirai-botnet">Mirai botnet</a> and its <a href="https://www.justice.gov/usao-ak/pr/hackers-cooperation-fbi-leads-substantial-assistance-other-complex-cybercrime">three authors</a>, who were teenagers when they started creating the software. Two of the three had originally started a DDoS protection company, ProTraf, and created Mirai to launch DDoS attacks to drum up business.</p><p>It was a slippery slope that eventually ended up with Mirai taking out significant portions of the internet with the world's largest DDoS attacks at the time. The three were eventually tracked down by the FBI and cooperated with the organisation in cases against other cybercriminals.</p><p>Ultimately, it's a story of redemption. The trio avoided jail time because of their cooperation with the FBI. While doing community service they assisted in the creation of an IoT malware honeypot for an anti-DDoS organisation and have since gone on to jobs in finance and security research.&nbsp;</p><h3>Not Catching Scattered Spider?</h3><p>Some of the individuals in the <a href="https://www.microsoft.com/en-us/security/blog/2023/10/25/octo-tempest-crosses-boundaries-to-facilitate-extortion-encryption-and-destruction/">Octo Tempest</a> group, aka Scattered Spider, that we've referred to <a href="https://srslyriskybiz.substack.com/p/when-good-cyber-security-leads-to">as Lapsus$-style hackers</a> have reportedly been identified. But what&#8217;s next? <a href="https://www.reuters.com/technology/cybersecurity/fbi-struggled-disrupt-dangerous-casino-hacking-gang-cyber-responders-say-2023-11-14/">According to </a><em><a href="https://www.reuters.com/technology/cybersecurity/fbi-struggled-disrupt-dangerous-casino-hacking-gang-cyber-responders-say-2023-11-14/">Reuters</a></em>:&nbsp;</p><blockquote><p>For more than six months, the FBI has known the identities of at least a dozen members tied to the hacking group responsible for the devastating September break-ins at casino operators MGM Resorts International and Caesars Entertainment, according to four people familiar with the investigation.</p></blockquote><p>The <em>Reuters'</em> article quotes several cyber security experts who question why these individuals haven't been arrested.</p><p>We are willing to give the FBI the benefit of the doubt here, especially after reading <em>Wired's</em> investigation into Mirai (above). In that case, the arrests took place over many months but ultimately resulted in them assisting police investigations and being diverted from a potential life of crime.&nbsp;</p><h3>State-based Hackers Focus of Government Reports&nbsp;</h3><p>The Australian Signals Directorate released its <a href="https://www.cyber.gov.au/about-us/reports-and-statistics/asd-cyber-threat-report-july-2022-june-2023">2023 Cyber Threat Report</a> on Tuesday and the UK's National Cyber Security Centre released its <a href="https://www.ncsc.gov.uk/collection/annual-review-2023">Annual 2023 Review</a> on the same day.</p><p>The two reports are same same but with slightly different flavours. Both emphasise the risk to critical infrastructure from state-backed hackers, although the UK report is far more explicit about the cyber security threat posed by the PRC.&nbsp;&nbsp;</p><h3>Israel Turning to Blacklisted Spyware Vendor&nbsp;</h3><p>According to <a href="https://www.axios.com/2023/11/14/pegasus-nso-hamas-israel-spyware?stream=top">reporting from </a><em><a href="https://www.axios.com/2023/11/14/pegasus-nso-hamas-israel-spyware?stream=top">Axios</a></em> and <em><a href="https://www.bloomberg.com/news/articles/2023-10-26/israel-taps-blacklisted-pegasus-maker-nso-to-track-gaza-hostages-and-hamas">Bloomberg</a></em>, Israeli security services are turning to the <a href="https://srslyriskybiz.substack.com/i/96161346/bad-times-continue-for-nso-group">NSO Group spyware company</a> and its Pegasus mobile spyware to help track hostages in Gaza that were kidnapped by Hamas.</p><p>Using mobile spyware like Pegasus to locate and possibly collect intelligence from hostages or suspected terrorists makes perfect sense in this situation. From the reporting it appears the Israeli government has its own capability but is looking to Israeli spyware companies including NSO Group, <a href="https://srslyriskybiz.substack.com/i/39054909/candiru-joins-bogeyman-club-founding-member-nso-also-in-the-news">Candiru</a> and others to provide extra capacity.&nbsp;&nbsp;</p><p>Both NSO Group and Candiru <a href="https://www.commerce.gov/news/press-releases/2021/11/commerce-adds-nso-group-and-other-foreign-companies-entity-list">were blacklisted</a> by the US government in 2021 because their spyware products had been used extensively to target civil society in a variety of countries. It looks like NSO Group is trying to redeem its reputation, and <em>Axios </em><a href="https://www.axios.com/2023/11/14/pegasus-nso-hamas-israel-spyware?stream=top">also covers</a> the company&#8217;s recent lobbying efforts in the US.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://srslyriskybiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Seriously Risky Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Risky Biz Talks</h2><p><em>You can find the audio edition of this newsletter and other fine podcasts and interviews in the Risky Biz News feed (<a href="https://risky.biz/feeds/risky-business-news">RSS</a>, <a href="https://podcasts.apple.com/au/podcast/risky-business-news/id1621305970">iTunes</a> or <a href="https://open.spotify.com/show/0BdExoUZqbGsBYjt6QZl4Q">Spotify</a>).&nbsp;&nbsp;</em></p><p><em>In <a href="https://risky.biz/BTN39/">our last</a> "Between Two Nerds" discussion Tom Uren and <a href="https://twitter.com/thegrugq">The Grugq</a> talk about International Humanitarian Law or the 'Rules of War' and whether they make any sense in cyberspace.&nbsp;</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/between-two-nerds-the-rules-of-war-in-cyberspace/id1621305970?i=1000634691025&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000634691025.jpg&quot;,&quot;title&quot;:&quot;Between Two Nerds: The Rules of War in cyberspace&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/between-two-nerds-the-rules-of-war-in-cyberspace/id1621305970?i=1000634691025&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2023-11-14T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/between-two-nerds-the-rules-of-war-in-cyberspace/id1621305970?i=1000634691025" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><h2>From <a href="https://riskybiznews.substack.com/">Risky Biz News</a>:</h2><p><strong>Clop is coming after your SysAid servers: </strong>The infamous Clop ransomware gang is exploiting a zero-day vulnerability in on-prem SysAid IT automation servers.</p><p>The attacks were discovered last week by SysAid's security team, and the company released a software update to patch the exploited bug&#8230;</p><p>The recent attacks would make SysAid the fourth different enterprise software the gang has exploited this year after it previously targeted GoAnywhere and MOVEit file transfer servers and PaperCut print management servers.</p><p>[<a href="https://riskybiznews.substack.com/p/clop-is-coming-after-your-sysaid-servers">more</a> on <em>Risky Business News</em>]</p><p><strong>OCCRP journalists targeted with Pegasus:</strong> Two Indian reporters from the Organized Crime and Corruption Reporting Project have had their phones targeted with the Pegasus spyware. The attacks took place hours after the two reporters reached out for comment to the Adani Group, one of India's largest companies. The reporters were investigating the Adani Group's owners for possible market manipulation by secretly buying their own stocks. OCCRP reporters <a href="https://www.occrp.org/en/40-press-releases/presss-releases/18198-indian-journalists-targeted-with-state-intimidation-and-spyware">Ravi Nair and Anand Mangnale</a> are two of the 20 Indians that Apple <a href="https://techcrunch.com/2023/10/30/indian-opposition-leaders-says-apple-has-warned-them-of-state-sponsored-iphone-attacks/">notified in October</a> that their phones were targeted by state-sponsored malware.</p><p><strong>Russia hacked 22 Danish critical infrastructure companies:</strong> Russian state-sponsored hackers have breached at least 22 Danish companies operating in the country's energy sector.</p><p>Denmark's CERT team for the critical infrastructure sector (SektorCERT) described the intrusions as the largest cyber-attack in the country's history.</p><p>In a <a href="https://sektorcert.dk/">report</a> [<a href="https://www.documentcloud.org/documents/24165245-sektorcert-angrebet-mod-dansk-kritisk-infrastruktur-tlp-clear">Danish PDF</a>, <a href="https://www.documentcloud.org/documents/24165244-sektorcert-translated">machine-translated English file</a>] published over the weekend, SektorCERT tentatively attributed the attacks to Sandworm, a cyber unit inside Russia's military intelligence service GRU.</p><p>[<a href="https://riskybiznews.substack.com/p/russia-hacked-22-danish-critical-infra-companies">more</a> on <em>Risky Business News</em>]</p>]]></content:encoded></item><item><title><![CDATA[Microsoft Should Look to the Past for Its Security Future ]]></title><description><![CDATA[PLUS: EncroChat Interception Cut Short by Police Leak]]></description><link>https://srslyriskybiz.substack.com/p/microsoft-should-look-to-the-past</link><guid isPermaLink="false">https://srslyriskybiz.substack.com/p/microsoft-should-look-to-the-past</guid><dc:creator><![CDATA[Tom Uren]]></dc:creator><pubDate>Thu, 09 Nov 2023 04:40:36 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bda74b7-e4dd-46a9-9725-6e47a924f32b_1344x768.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Your weekly dose of Seriously Risky Business news is written by <a href="https://twitter.com/tomatospy">Tom Uren</a> and edited by <a href="https://twitter.com/riskybusiness">Patrick Gray</a>. It's supported by <a href="https://www.lawfaremedia.org/">Lawfare</a> and this week's edition is brought to you by <a href="https://www.runzero.com/">runZero</a>.</em></p><p><em>You can subscribe to an audio version of this newsletter as a podcast by searching for "Risky Business News" in your podcatcher or subscribing via <a href="https://risky.biz/feeds/risky-business-news/">this RSS feed</a>. Find this edition <a href="https://risky.biz/SRB56">here</a> and on Apple podcasts:</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/srsly-risky-biz-microsofts-future-security-initiative/id1621305970?i=1000634214180&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000634214180.jpg&quot;,&quot;title&quot;:&quot;Srsly Risky Biz: Microsoft's Future Security Initiative disappoints&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/srsly-risky-biz-microsofts-future-security-initiative/id1621305970?i=1000634214180&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2023-11-09T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/srsly-risky-biz-microsofts-future-security-initiative/id1621305970?i=1000634214180" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!r2HB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bda74b7-e4dd-46a9-9725-6e47a924f32b_1344x768.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!r2HB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bda74b7-e4dd-46a9-9725-6e47a924f32b_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!r2HB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bda74b7-e4dd-46a9-9725-6e47a924f32b_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!r2HB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bda74b7-e4dd-46a9-9725-6e47a924f32b_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!r2HB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bda74b7-e4dd-46a9-9725-6e47a924f32b_1344x768.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!r2HB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bda74b7-e4dd-46a9-9725-6e47a924f32b_1344x768.png" width="1344" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7bda74b7-e4dd-46a9-9725-6e47a924f32b_1344x768.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1344,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1728940,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!r2HB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bda74b7-e4dd-46a9-9725-6e47a924f32b_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!r2HB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bda74b7-e4dd-46a9-9725-6e47a924f32b_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!r2HB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bda74b7-e4dd-46a9-9725-6e47a924f32b_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!r2HB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7bda74b7-e4dd-46a9-9725-6e47a924f32b_1344x768.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">AI cyber security strategy, Stable Diffusion</figcaption></figure></div><p>Last week, Microsoft announced a &#8220;Secure Future Initiative" to improve its ability to cope with increasingly sophisticated cyber security threats.&nbsp;</p><p>This reminds us of Microsoft's last security epiphany, the <a href="https://www.microsoft.com/en-us/security/blog/2022/01/21/celebrating-20-years-of-trustworthy-computing/">Trustworthy Computing initiative</a>, launched in 2002. Unfortunately, compared to the clarity, focus and commitment of the Trustworthy Computing initiative, this announcement is disappointing.</p><p><a href="https://blogs.microsoft.com/on-the-issues/2023/11/02/secure-future-initiative-sfi-cybersecurity-cyberattacks/">In a post</a> describing the Secure Future Initiative, Microsoft President and Vice Chair Brad Smith wrote that the new initiative was required because of the "increasing speed, scale and sophistication of cyberattacks".&nbsp;</p><p>We don't think Smith is quite right here. We would say Microsoft needs security reform because it has been making unacceptably vulnerable products.&nbsp;&nbsp;</p><p>Threats are increasing in speed, scale and sophistication, but the fundamental problem for Microsoft is that its security culture just isn't up to scratch. In a <a href="https://srslyriskybiz.substack.com/p/we-need-cloud-transparency-mandates">breach of its email services</a> earlier this year, for example, Microsoft's <a href="https://msrc.microsoft.com/blog/2023/09/results-of-major-technical-investigations-for-storm-0558-key-acquisition/">own post-mortem</a> revealed a series of decision-making failures that <a href="https://srslyriskybiz.substack.com/p/microsofts-security-culture-just">simply would not have occurred</a> in a security-conscious organisation.&nbsp;</p><p>This results in products that are not as secure as they should be. <a href="https://srslyriskybiz.substack.com/i/41691049/omi-more-like-omg-amirite">This newsletter has covered</a> a <a href="https://srslyriskybiz.substack.com/i/39287247/microsoft-regains-security-idiot-heavyweight-title">constant flow</a> of <a href="https://srslyriskybiz.substack.com/i/135882585/at-microsoft-all-days-are-dog-days">Microsoft security gaffes</a> over the past few years.</p><p>These security flaws draw in attackers like flies to rotting meat.&nbsp;</p><p>Smith wrote that Microsoft's efforts will consist of three pillars "focused on AI-based cyber defences, advances in fundamental software engineering, and advocacy for stronger application of international norms to protect civilians from cyber threats".</p><p>The most promising part of the initiative describes specific engineering goals that Microsoft is committing to. Charlie Bell, Microsoft&#8217;s Security Vice President, expands on these in <a href="https://www.microsoft.com/en-us/security/blog/2023/11/02/announcing-microsoft-secure-future-initiative-to-advance-security-engineering/">an internal email</a>, where he writes that Microsoft will:</p><ul><li><p>"transform the way we develop software with automation and AI so that we do our best work in delivering software that is secure by design, by default, in deployment, and in operation"</p></li><li><p>"provide a unified and consistent way of managing and verifying the identities and access rights of our users, devices, and services, across all our products and platforms"</p></li><li><p>Improve the speed of vulnerability response and security updates on cloud platforms to "cut the time it takes to mitigate cloud vulnerabilities by 50 percent".</p></li></ul><p>This all sounds good, and we cover some positive initiatives in Three Reasons to be Cheerful this week. But overall, we are terribly underwhelmed by Microsoft's messaging here. In his email Bell issues a lukewarm call to arms:</p><blockquote><p>We recognise that not all of you will be deeply involved in all of the advances we must make. After all, the first priority is security by default. But all of you will be engaged and, more importantly, your constant attention to security in everything you build and operate will be the source of continuous innovation for our collective secure future.&nbsp; Please read on, absorb the "what" and the "why," and contribute your ideas on innovation. We are all security engineers.</p></blockquote><p>In 2001, Microsoft was at a similar crossroads after it had been stung by a series of security problems, including the <a href="https://en.wikipedia.org/wiki/Code_Red_(computer_worm)">CodeRed</a> and <a href="https://en.wikipedia.org/wiki/Nimda">Nimda</a> worms. In January 2002 Bill Gates <a href="https://www.wired.com/2002/01/bill-gates-trustworthy-computing/">sent an internal email</a> that launched Microsoft's Trustworthy Computing initiative. In his very first paragraph Gates is crystal clear that the initiative is the top priority for everyone in the company:</p><blockquote><p>Over the last year it has become clear that ensuring .NET (Ed: a new <a href="https://dotnet.microsoft.com/en-us/learn/dotnet/what-is-dotnet-framework">Microsoft computing platform</a> at the time) is a platform for Trustworthy Computing is more important than any other part of our work. If we don&#8217;t do this, people simply won&#8217;t be willing &#8212; or able &#8212; to take advantage of all the other great work we do. Trustworthy Computing is the highest priority for all the work we are doing. We must lead the industry to a whole new level of Trustworthiness in computing.</p></blockquote><p>Towards the end of his email Gates re-emphasised the importance of Trustworthy Computing and underscored how Microsoft needed to shift its priorities:</p><blockquote><p>In the past, we&#8217;ve made our software and services more compelling for users by adding new features and functionality, and by making our platform richly extensible. We&#8217;ve done a terrific job at that, but all those great features won&#8217;t matter unless customers trust our software. So now, when we face a choice between adding features and resolving security issues, we need to choose security. Our products should emphasise security right out of the box, and we must constantly refine and improve that security as threats evolve&#8230; If we discover a risk that a feature could compromise someone&#8217;s privacy, that problem gets solved first. If there is any way we can better protect important data and minimise downtime, we should focus on this. These principles should apply at every stage of the development cycle of every kind of software we create, from operating systems and desktop applications to global Web services.</p></blockquote><p>This single paragraph clearly spells out how Microsoft went wrong, why it needed to change and what its new priorities were. After this memo Microsoft's security really did improve, for a while.</p><p>By contrast, Smith and Bell's messages about the Secure Future Initiative make no mention of changed priorities and what Microsoft will forego to achieve better security. Is the expectation that security improvements will flow naturally from doing extra engineering work rather than requiring any recalibration of Microsoft's priorities?</p><p>Beyond these engineering efforts, a large section of Smith's post deals with how Microsoft will use AI to improve security. Within Microsoft, the company will use it to improve its threat intelligence and cope with a "vast sea of digital data" including by helping it to "to find the right needle even in a sea of needles".&nbsp;</p><p>Outside the organisation Microsoft will use AI "as a gamechanger for all organisations to help defeat cyberattacks at machine speed". Of course, <a href="https://www.microsoft.com/en-gb/ai/responsible-ai?activetab=pivot1:primaryr6">using AI responsibly</a> is also a must.&nbsp;</p><p>I mean, I guess this is good, but how much of your security strategy should rely on AI being a game changer? Will the technology super charge Microsoft's security? Or just make security professionals moderately more effective? In our view, exploring AI to improve cyber security is a worthwhile experiment, but it is no substitute for the commitment to security that Gates demonstrated in 2002.</p><p>Smith's post finishes with norms of international behaviour, which he describes as a "third critical component" of Microsoft's Secure Future Initiative. This commits Microsoft to advocate for standards that would govern the behaviour of actors in cyberspace, including both government and non-state actors.&nbsp;&nbsp;</p><p>This section contains a diverse mix of recommendations or commitments that range from the sensible to the naive and sometimes self-serving. For example, "states should recognise cloud services as critical infrastructure, with protection against attack under international law".&nbsp;</p><p>We don&#8217;t think pursuing changes to international standards or behaviours will change the way threat actors behave in any significant way. Microsoft should focus on the baseline security of its products, with lobbying for better behaviour from states and cybercriminals a second- or third-order issue.&nbsp;</p><p>Fundamentally, our critique of the Secure Future Initiative stems from our diagnosis that Microsoft isn't delivering secure products because its culture does not value security appropriately. It won't fix that problematic culture by launching engineering efforts, using AI, or by improving international norms of behaviour.&nbsp;</p><h2></h2><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://srslyriskybiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://srslyriskybiz.substack.com/subscribe?"><span>Subscribe now</span></a></p><h2>Encrochat Crimephone Operation Cut Short By Police Leak</h2><p>Natalie Mottram, a former intelligence analyst for the Cheshire Police, <a href="https://nationalcrimeagency.gov.uk/news/operation-venetic-corrupt-police-worker-jailed-for-tipping-off-criminal-over-secret-international-investigation">has been jailed</a> in the UK for revealing to criminals that the <a href="https://srslyriskybiz.substack.com/i/131783272/the-encrochat-takedown-was-wildly-wildly-successful">EncroChat encrypted crimephone</a> had been hacked by law enforcement agencies.&nbsp;&nbsp;</p><p>The EncroChat system was breached by a French interception operation in April 2020. That month, Mottram told Jonathan Kay, her friend and flatmate and a man with criminal connections, that EncroChat had been compromised. Associates of Kay used EncroChat to <a href="https://www.manchestereveningnews.co.uk/news/greater-manchester-news/corrupt-police-analyst-who-told-28040020">warn other users</a> that the system had been compromised and by June the company EncroChat shut it down after learning it had been breached.</p><p>The UK's National Crime Agency learnt there was a leak when they intercepted some of these messages warning of a breach. The NCA then launched a sting operation to confirm Mottram was responsible.&nbsp;&nbsp;</p><p>The police action against EncroChat was <a href="https://srslyriskybiz.substack.com/i/131783272/the-encrochat-takedown-was-wildly-wildly-successful">tremendously successful</a> and <a href="https://srslyriskybiz.substack.com/p/crimephones-are-a-cops-best-friend">here is more</a> on the history of police actions against crimephones.&nbsp;</p><h2>Three Reasons to Be Cheerful This Week:</h2><ol><li><p><strong>More, Better MFA for all:</strong> Microsoft <a href="https://www.microsoft.com/en-us/security/blog/2023/11/06/automatic-conditional-access-policies-in-microsoft-entra-streamline-identity-protection/">has announced</a> that it will automatically roll out conditional access policies to Microsoft Entra ID (formerly Azure Active Directory) customers. This means that more users will be required to use multi-factor authentication and Microsoft's goal is to have 100% MFA authentication. Microsoft has <a href="https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/emphasizing-security-by-default-with-advanced-microsoft/ba-p/3773130">also rolled out</a> a feature to combat MFA push fatigue attacks where suspicious or risky login attempts won't result in a notification on a user's phone. Instead users <a href="https://www.bleepingcomputer.com/news/security/microsoft-authenticator-now-blocks-suspicious-mfa-alerts-by-default/">will be prompted</a> to open Microsoft's Authenticator app to complete the sign-in process.&nbsp;</p></li><li><p><strong>Indian crypto-scam arrests:</strong> Indian authorities <a href="https://riskybiznews.substack.com/i/138676406/cybercrime-and-threat-intel">arrested eight people</a>, including four police, involved in crypto-related scams. This is part of a <a href="https://timesofindia.indiatimes.com/city/shimla/2-5k-cr-cryptocurrency-scam-4-cops-among-8-more-arrested/articleshow/104997746.cms">continuing crackdown</a> with 18 people arrested so far.&nbsp;</p></li><li><p><strong>Dodgy VPNs need not apply:</strong> The Google Play store has <a href="https://security.googleblog.com/2023/11/more-ways-for-users-to-identify.html">started to add</a> security audit badges to VPN apps. An app can earn these badges by undergoing an independent security check through an approved partner. <em>Bleeping Computer</em> has <a href="https://www.bleepingcomputer.com/news/security/google-play-adds-security-audit-badges-for-android-vpn-apps/">good coverage</a>.&nbsp;</p></li></ol><h2>Sponsor Section</h2><p><em>In this Risky Business News sponsor interview, Tom Uren talks to Huxley Barbee, Security Evangelist at runZero, about finding the unknown unknowns and what is a security evangelist.</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/sponsored-runzeros-huxley-barbee-on-finding-the/id1621305970?i=1000633769483&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000633769483.jpg&quot;,&quot;title&quot;:&quot;Sponsored: runZero's Huxley Barbee on finding the unknown unknowns&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/sponsored-runzeros-huxley-barbee-on-finding-the/id1621305970?i=1000633769483&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2023-11-06T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/sponsored-runzeros-huxley-barbee-on-finding-the/id1621305970?i=1000633769483" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><h3>Sponsor Demo</h3><p><em>Senior Sales Engineer Ali Cheikh demonstrates the runZero platform to Risky Business host Patrick Gray. runZero is a cyber asset management tool that combines active scanning, passive discovery, and API integrations to discover IT, OT, and IoT assets (both managed and unmanaged) across your network, including cloud, mobile, and remote environments.</em></p><div id="youtube2-HFKlipfI0AM" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;HFKlipfI0AM&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/HFKlipfI0AM?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h2>Shorts</h2><h3>eIDAS Is Just a Terrible Idea</h3><p>More than 300 companies, NGOs, scientists and researchers have asked the EU to reconsider its proposed eIDAS regulation (Electronic Identification, Authentication and Trust Services) in two separate <a href="https://eidas-open-letter.org/">open letters</a>.&nbsp;</p><p>Both the <a href="https://mzl.la/eidas-letter">industry joint statement</a> and <a href="https://eidas-open-letter.org/">the letter</a> from civil society organisations and individuals argue that the regulation would undermine web security. The regulation proposes that any EU member government be able to issue certificates that web browsers must accept as valid, which would potentially allow any EU member state to intercept the web traffic of any EU citizen, for example. The industry letter was signed by Cloudflare, Akamai and Mozilla, and Google also <a href="https://security.googleblog.com/2023/11/qualified-certificates-with-qualified.html">separately</a> backed this industry position. <em>The Record</em> has <a href="https://therecord.media/eu-urged-to-drop-law-website-authentication-certificates">further coverage</a>.&nbsp;</p><h3>Iran-Israel Cyber Argy Bargy</h3><p><a href="https://unit42.paloaltonetworks.com/agonizing-serpens-targets-israeli-tech-higher-ed-sectors/">According to Palo Alto Networks</a>, an Iranian-backed hacking group that it calls Agonizing Serpens, has launched a series of destructive attacks targeting the education and technology sector in Israel from January through October this year. Microsoft <a href="https://www.microsoft.com/en-us/security/business/security-insider/wp-content/uploads/2023/05/Iran-turning-to-cyber-enabled-influence-operations-for-greater-effect-05022023.pdf">has linked</a> the group, also known as <a href="https://www.welivesecurity.com/2022/12/07/fantasy-new-agrius-wiper-supply-chain-attack/">Agrius</a>, <a href="https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide">Pink Sandstorm</a>, and <a href="https://www.sentinelone.com/blog/podcast-behind-the-scenes-of-blackshadow-apt-with-amitai-ben-shushan-ehrlich/">BlackShadow</a>, to Iran's Ministry of Intelligence and Security.</p><h3>Russia Arrests Cybercriminals When It Wants To</h3><p><em>Risky Business News</em> <a href="https://riskybiznews.substack.com/i/138524539/cybercrime-and-threat-intel">reports</a> that the Russian FSB detained two men accused of attacking Russian IT systems on behalf of Ukraine:&nbsp;</p><blockquote><p>Officials detained a <a href="https://smotrim.ru/article/3629695">student from Tomsk</a> and a <a href="https://topwar.ru/229239-v-kuzbasse-sotrudnikami-fsb-zaderzhan-aktivnyj-uchastnik-ukrainskih-kibervojsk.html">36-year-old from Belovo, Kemerovo</a>. The FSB says the two suspects joined Ukraine's "cyber troops," received orders from Ukraine's security services, and attacked Russian critical infrastructure. The two have been charged with high treason and face prison sentences from 12 years to life in prison.</p></blockquote><p>There are two lessons here. Firstly Russia has some capacity to arrest cyber criminals when the government cares. Secondly, attacking Russian IT systems from within the country is just a bad idea.</p><h2>Risky Biz Talks</h2><p><em>You can find the audio edition of this newsletter and other fine podcasts and interviews in the Risky Biz News feed (<a href="https://risky.biz/feeds/risky-business-news">RSS</a>, <a href="https://podcasts.apple.com/au/podcast/risky-business-news/id1621305970">iTunes</a> or <a href="https://open.spotify.com/show/0BdExoUZqbGsBYjt6QZl4Q">Spotify</a>).&nbsp;&nbsp;</em></p><p><em>In <a href="https://risky.biz/BTN39/">our last</a> "Between Two Nerds" discussion Tom Uren and <a href="https://twitter.com/thegrugq">The Grugq</a> discuss the 35th anniversary of the Morris worm and what it tells us about the evolution of cyber security.&nbsp;</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/between-two-nerds-the-morris-worm/id1621305970?i=1000633902043&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000633902043.jpg&quot;,&quot;title&quot;:&quot;Between Two Nerds: The Morris Worm&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/between-two-nerds-the-morris-worm/id1621305970?i=1000633902043&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2023-11-07T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/between-two-nerds-the-morris-worm/id1621305970?i=1000633902043" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><h2></h2><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://srslyriskybiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Seriously Risky Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>From <a href="https://riskybiznews.substack.com/">Risky Biz News</a>:</h2><p><strong>Chinese APTs evolve towards stealth, zero-day abuse: </strong>Chinese state-sponsored hacking operations have undergone a major shift in recent years, with groups growing in sophistication and abandoning noisy and high-volume campaigns for stealthy and extremely targeted attacks&#8230;</p><p>Recorded Future published an <a href="https://www.recordedfuture.com/charting-chinas-climb-leading-global-cyber-power">excellent report</a> this week that perfectly contextualises what has <a href="https://riskybiznews.substack.com/p/chinese-apts-evolve-stealth-zero-day-abuse">been happening with China's APTs in the 2020s.</a></p><p><a href="https://riskybiznews.substack.com/p/chinese-apts-evolve-stealth-zero-day-abuse">[much more</a> on <em>Risky Business News</em>, including trends such as the move away from custom malware and adoption of living-off-the-land techniques, and shifting from high-volume targeting towards "more coordinated and thoughtful" targeting.]</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iSds!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F037ce973-2b33-448f-9df1-e68f1786017f_930x542.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iSds!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F037ce973-2b33-448f-9df1-e68f1786017f_930x542.jpeg 424w, https://substackcdn.com/image/fetch/$s_!iSds!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F037ce973-2b33-448f-9df1-e68f1786017f_930x542.jpeg 848w, https://substackcdn.com/image/fetch/$s_!iSds!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F037ce973-2b33-448f-9df1-e68f1786017f_930x542.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!iSds!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F037ce973-2b33-448f-9df1-e68f1786017f_930x542.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iSds!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F037ce973-2b33-448f-9df1-e68f1786017f_930x542.jpeg" width="930" height="542" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/037ce973-2b33-448f-9df1-e68f1786017f_930x542.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:542,&quot;width&quot;:930,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!iSds!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F037ce973-2b33-448f-9df1-e68f1786017f_930x542.jpeg 424w, https://substackcdn.com/image/fetch/$s_!iSds!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F037ce973-2b33-448f-9df1-e68f1786017f_930x542.jpeg 848w, https://substackcdn.com/image/fetch/$s_!iSds!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F037ce973-2b33-448f-9df1-e68f1786017f_930x542.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!iSds!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F037ce973-2b33-448f-9df1-e68f1786017f_930x542.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Finally, the report also includes an attribution map for China's APT groups, including their suspected geographical locations. This is in line with what <a href="https://blog.sekoia.io/my-teas-not-cold-an-overview-of-china-cyber-threat/">Sekoia</a> published earlier this year, too.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FVPI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c23dfa3-4088-42b9-9e73-d1b84733e03c_910x547.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FVPI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c23dfa3-4088-42b9-9e73-d1b84733e03c_910x547.jpeg 424w, https://substackcdn.com/image/fetch/$s_!FVPI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c23dfa3-4088-42b9-9e73-d1b84733e03c_910x547.jpeg 848w, https://substackcdn.com/image/fetch/$s_!FVPI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c23dfa3-4088-42b9-9e73-d1b84733e03c_910x547.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!FVPI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c23dfa3-4088-42b9-9e73-d1b84733e03c_910x547.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FVPI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c23dfa3-4088-42b9-9e73-d1b84733e03c_910x547.jpeg" width="910" height="547" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0c23dfa3-4088-42b9-9e73-d1b84733e03c_910x547.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:547,&quot;width&quot;:910,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!FVPI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c23dfa3-4088-42b9-9e73-d1b84733e03c_910x547.jpeg 424w, https://substackcdn.com/image/fetch/$s_!FVPI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c23dfa3-4088-42b9-9e73-d1b84733e03c_910x547.jpeg 848w, https://substackcdn.com/image/fetch/$s_!FVPI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c23dfa3-4088-42b9-9e73-d1b84733e03c_910x547.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!FVPI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c23dfa3-4088-42b9-9e73-d1b84733e03c_910x547.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>US sanctions Russian woman for laundering money for Ryuk gang, Russian elites: </strong>The US Treasury has <a href="https://home.treasury.gov/news/press-releases/jy1874">sanctioned</a> a Russian businesswoman named Ekaterina Zhdanova for helping Russian oligarchs and cybercrime gangs evade sanctions and launder stolen cryptocurrency.</p><p>Officials say Zhdanova operated a luxury watch company with offices around the world in order to maintain access to the global financial system. She was also a customer of Garantex, a Russian cryptocurrency exchange the Treasury sanctioned in <a href="https://home.treasury.gov/news/press-releases/jy0701">April 2022</a> for laundering more than $100 million in cybercrime proceeds.</p><p>According to US officials, Zhdanova was involved in laundering more than $105 million for her customers.</p><p><strong>Mozi botnet goes down:</strong> The Mozi botnet has finally gone down for good after a mysterious entity removed its malware from infected IoT devices across the globe. The removal took place at the end of August, with infected hosts being first removed from systems in India and then from China. Security firm <a href="https://www.welivesecurity.com/en/eset-research/who-killed-mozi-finally-putting-the-iot-zombie-botnet-in-its-grave/">ESET says</a> the Mozi takedown was executed with a special killswitch component that was signed with the malware's original private key. The company couldn't say if the killswitch was activated by the Mozi botnet creators or by Chinese law enforcement, which detained some of the Mozi authors in <a href="https://therecord.media/mozi-botnet-authors-arrested-in-china">June 2021</a>. First spotted in November 2019, the botnet infected more than 1.5 million devices across its lifetime, peaking at 160,000 infected systems in September 2020.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MYX5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17035845-58b5-45e6-a626-2fe38b0d545c_901x933.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MYX5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17035845-58b5-45e6-a626-2fe38b0d545c_901x933.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MYX5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17035845-58b5-45e6-a626-2fe38b0d545c_901x933.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MYX5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17035845-58b5-45e6-a626-2fe38b0d545c_901x933.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MYX5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17035845-58b5-45e6-a626-2fe38b0d545c_901x933.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MYX5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17035845-58b5-45e6-a626-2fe38b0d545c_901x933.jpeg" width="901" height="933" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/17035845-58b5-45e6-a626-2fe38b0d545c_901x933.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:933,&quot;width&quot;:901,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MYX5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17035845-58b5-45e6-a626-2fe38b0d545c_901x933.jpeg 424w, https://substackcdn.com/image/fetch/$s_!MYX5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17035845-58b5-45e6-a626-2fe38b0d545c_901x933.jpeg 848w, https://substackcdn.com/image/fetch/$s_!MYX5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17035845-58b5-45e6-a626-2fe38b0d545c_901x933.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!MYX5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17035845-58b5-45e6-a626-2fe38b0d545c_901x933.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div>]]></content:encoded></item><item><title><![CDATA[When Good Cyber Security Leads to Violence]]></title><description><![CDATA[PLUS: SEC&#8217;s Disclosure Demands a Halloween Horror for CISOs]]></description><link>https://srslyriskybiz.substack.com/p/when-good-cyber-security-leads-to</link><guid isPermaLink="false">https://srslyriskybiz.substack.com/p/when-good-cyber-security-leads-to</guid><dc:creator><![CDATA[Tom Uren]]></dc:creator><pubDate>Thu, 02 Nov 2023 07:39:29 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7def7a01-75bc-40b3-bc72-0c2b4d339b2e_1344x768.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Your weekly dose of Seriously Risky Business news is written by <a href="https://twitter.com/tomatospy">Tom Uren</a> and edited by <a href="https://twitter.com/riskybusiness">Patrick Gray</a>. This week's edition is brought to you by vulnerability management and analysis platform <a href="https://nucleussec.com/">Nucleus Security</a>.</em></p><p><em>You can subscribe to an audio version of this newsletter as a podcast by searching for "Risky Business News" in your podcatcher or subscribing via <a href="https://risky.biz/feeds/risky-business-news/">this RSS feed</a>. Find this edition <a href="https://risky.biz/SRB55/">here</a> and on Spotify:</em></p><iframe class="spotify-wrap podcast" data-attrs="{&quot;image&quot;:&quot;https://i.scdn.co/image/ab6765630000ba8aff2258f005c4c2a1b48d6904&quot;,&quot;title&quot;:&quot;Srsly Risky Biz: When good cyber security leads to violence&quot;,&quot;subtitle&quot;:&quot;risky.biz&quot;,&quot;description&quot;:&quot;Episode&quot;,&quot;url&quot;:&quot;https://open.spotify.com/episode/4LZo6kBDGgllAbJhV1BY3z&quot;,&quot;belowTheFold&quot;:false,&quot;noScroll&quot;:false}" src="https://open.spotify.com/embed/episode/4LZo6kBDGgllAbJhV1BY3z" frameborder="0" gesture="media" allowfullscreen="true" allow="encrypted-media" data-component-name="Spotify2ToDOM"></iframe><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HeRN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7def7a01-75bc-40b3-bc72-0c2b4d339b2e_1344x768.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HeRN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7def7a01-75bc-40b3-bc72-0c2b4d339b2e_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!HeRN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7def7a01-75bc-40b3-bc72-0c2b4d339b2e_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!HeRN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7def7a01-75bc-40b3-bc72-0c2b4d339b2e_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!HeRN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7def7a01-75bc-40b3-bc72-0c2b4d339b2e_1344x768.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HeRN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7def7a01-75bc-40b3-bc72-0c2b4d339b2e_1344x768.png" width="1344" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7def7a01-75bc-40b3-bc72-0c2b4d339b2e_1344x768.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1344,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1157871,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HeRN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7def7a01-75bc-40b3-bc72-0c2b4d339b2e_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!HeRN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7def7a01-75bc-40b3-bc72-0c2b4d339b2e_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!HeRN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7def7a01-75bc-40b3-bc72-0c2b4d339b2e_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!HeRN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7def7a01-75bc-40b3-bc72-0c2b4d339b2e_1344x768.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cybersecurity violence, Stable Diffusion</figcaption></figure></div><p>Groups of young Lapsus$-style hackers are rapidly evolving their tradecraft and aggressively exploiting organisations in ways their victims don't expect.&nbsp;</p><p>A <a href="https://www.microsoft.com/en-us/security/blog/2023/10/25/octo-tempest-crosses-boundaries-to-facilitate-extortion-encryption-and-destruction/">new Microsoft report</a> describes the evolution of a group it calls Octo Tempest and charts its increasingly aggressive tactics and the rapid change in its targets. In early 2022, Octo Tempest focused on social engineering and targeting mobile providers to enable SIM-swapping crimes such as cryptocurrency theft, and selling the access gained to other criminals.&nbsp;</p><p>However, by early 2023, the group was targeting telecommunications, email and tech service providers, and collaborating with the ALPHV/BlackCat ransomware-as-a-service operation to extort organisations by threatening to leak stolen sensitive data.&nbsp;</p><p>By June 2023, Octo Tempest had started to deploy encrypting ransomware payloads and, over the year, has expanded its targets to businesses in sectors such as resources, gaming, hospitality, consumer products, retail, managed service providers, manufacturing, law, technology, and financial services.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4JCK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f0fca9-fe2e-4433-9560-1ef82256be2e_1330x618.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4JCK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f0fca9-fe2e-4433-9560-1ef82256be2e_1330x618.png 424w, https://substackcdn.com/image/fetch/$s_!4JCK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f0fca9-fe2e-4433-9560-1ef82256be2e_1330x618.png 848w, https://substackcdn.com/image/fetch/$s_!4JCK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f0fca9-fe2e-4433-9560-1ef82256be2e_1330x618.png 1272w, https://substackcdn.com/image/fetch/$s_!4JCK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f0fca9-fe2e-4433-9560-1ef82256be2e_1330x618.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4JCK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f0fca9-fe2e-4433-9560-1ef82256be2e_1330x618.png" width="1330" height="618" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/68f0fca9-fe2e-4433-9560-1ef82256be2e_1330x618.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:618,&quot;width&quot;:1330,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4JCK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f0fca9-fe2e-4433-9560-1ef82256be2e_1330x618.png 424w, https://substackcdn.com/image/fetch/$s_!4JCK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f0fca9-fe2e-4433-9560-1ef82256be2e_1330x618.png 848w, https://substackcdn.com/image/fetch/$s_!4JCK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f0fca9-fe2e-4433-9560-1ef82256be2e_1330x618.png 1272w, https://substackcdn.com/image/fetch/$s_!4JCK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f0fca9-fe2e-4433-9560-1ef82256be2e_1330x618.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Although Microsoft refers to this group as Octo Tempest, other security researchers have tracked similar behaviour under entities with different names (<a href="https://www.crowdstrike.com/blog/scattered-spider-attempts-to-avoid-detection-with-bring-your-own-vulnerable-driver-tactic/">Scattered Spider by Crowdstrike</a>, <a href="https://www.mandiant.com/resources/blog/unc3944-sms-phishing-sim-swapping-ransomware">UNC3944 by Mandiant</a> and Oktapus (because of its <a href="https://www.group-ib.com/blog/0ktapus/">targeting of identity provider Okta</a>). These names, however, do not describe groups with well-defined and stable membership so much as subsets of a broader ecosystem of individuals that cooperate on different criminal activities using an ever-evolving set of effective and increasingly aggressive tactics.&nbsp;</p><p>Some individuals involved have been linked to the Comm, a particularly nasty online group a recent <em>404 Media</em> <a href="https://www.404media.co/sim-swappers-are-working-directly-with-ransomware-gangs-now/">article</a> describes as a nebulous network of hackers, gamers, Discord adherents and others:</p><blockquote><p>The Comm is large, with hundreds or thousands of participants in various Telegram channels and Discord servers, with many different subsections and subgroups focusing on their own priorities.&nbsp;</p><p>In many cases, members of the Comm are not limited to just performing SIM swaps, which is when a hacker takes over a phone number to then break into the target&#8217;s online accounts. Members also participate in and commission physical violence. Comm members, for example, <a href="https://www.vice.com/en/article/y3wwj5/bloodied-macbooks-stacks-of-cash-inside-the-comm-discord-servers?ref=404media.co">have kidnapped one another to gain access to a rival&#8217;s cryptocurrency</a>. Gunmen fire weapons at targets' houses or throw bricks through their windows. Violence only makes up a slice of Comm, but it carries significant cultural weight throughout the group: Discord and Telegram channels often quickly share videos of the latest robbery or attack. Members have also <a href="https://www.vice.com/en/article/k7zbma/the-comm-acg-group-linked-to-nationwide-swatting?ref=404media.co">performed swattings against schools and universities</a>.&nbsp;</p></blockquote><p>A standout feature of Octo Tempest and related groups is their very effective use of social engineering to gain access to organisations. Microsoft says they do their homework:</p><blockquote><p>Octo Tempest commonly launches social engineering attacks targeting technical administrators, such as support and help desk personnel, who have permissions that could enable the threat actor to gain initial access to accounts. The threat actor performs research on the organisation and identifies targets to effectively impersonate victims, mimicking idiolect on phone calls and understanding personal identifiable information to trick technical administrators into performing password resets and resetting multifactor authentication (MFA) methods. Octo Tempest has also been observed impersonating newly hired employees in these attempts to blend into normal on-hire processes.</p></blockquote><p>Ransomware incident response firm Coveware wrote about Scattered Spider, a related group, in its <a href="https://www.coveware.com/blog/2023/10/27/scattered-ransomware-attribution-blurs-focus-on-ir-fundamentals">latest quarterly report</a>. Although the group is adept at social engineering, it appears that just a few individuals appear to have the right skills:</p><blockquote><p>One of the most common overlapping tactics observed was the skillful social engineering of the IT support desk to subvert, reset or overcome multi-factor authentication. Not only did we consistently see this tactic, but voice recordings from impacted enterprises confirmed that this group was consistently using the same two or three individuals to perform the social engineering.</p></blockquote><p>One of the more eye-opening details in Microsoft's report is Octo Tempest's use of threats of physical violence to try to coerce targeted individuals into sharing credentials for corporate access. This takes the personal information gathered in prior research and uses it to lend credibility to threats of physical violence, making use of home addresses and family names, for example.&nbsp;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!eD3r!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1cb8dcb-293d-4182-98ac-64d5710c1d89_665x647.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!eD3r!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1cb8dcb-293d-4182-98ac-64d5710c1d89_665x647.png 424w, https://substackcdn.com/image/fetch/$s_!eD3r!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1cb8dcb-293d-4182-98ac-64d5710c1d89_665x647.png 848w, https://substackcdn.com/image/fetch/$s_!eD3r!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1cb8dcb-293d-4182-98ac-64d5710c1d89_665x647.png 1272w, https://substackcdn.com/image/fetch/$s_!eD3r!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1cb8dcb-293d-4182-98ac-64d5710c1d89_665x647.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!eD3r!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1cb8dcb-293d-4182-98ac-64d5710c1d89_665x647.png" width="665" height="647" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e1cb8dcb-293d-4182-98ac-64d5710c1d89_665x647.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:647,&quot;width&quot;:665,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!eD3r!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1cb8dcb-293d-4182-98ac-64d5710c1d89_665x647.png 424w, https://substackcdn.com/image/fetch/$s_!eD3r!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1cb8dcb-293d-4182-98ac-64d5710c1d89_665x647.png 848w, https://substackcdn.com/image/fetch/$s_!eD3r!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1cb8dcb-293d-4182-98ac-64d5710c1d89_665x647.png 1272w, https://substackcdn.com/image/fetch/$s_!eD3r!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1cb8dcb-293d-4182-98ac-64d5710c1d89_665x647.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Octo Tempest threats, Microsoft</figcaption></figure></div><p>This is not new behaviour. The Cyber Safety Review Board's <a href="https://www.cisa.gov/resources-tools/resources/review-attacks-associated-lapsus-and-related-threat-groups-report">review of Lapsus$</a> and related groups published in July this year&nbsp; found some threat actors were targeting cybersecurity professionals and their families with swatting attacks.</p><p>Bill Siegel, Coveware's CEO, told <em>Seriously Risky Business </em>these threats were typically used as a last resort when quieter tactics such as social engineering had failed. He wasn't convinced that threats of violence were all that effective at gaining access, saying "in our experience, this tactic has the opposite of its intended effect".&nbsp;</p><p>"It hardens the resolve of the victim organisation to resist the attack and the extortion tactics," he continued. "It also opens the criminals up to a wide range of new potential criminal charges if they are ever caught."</p><p>However, threats of violence are among the tactics that current cyber security practice isn't prepared for &#8212; the <a href="https://en.wikipedia.org/wiki/Rubber-hose_cryptanalysis">rubber hose attack</a> doesn't appear in the <a href="https://attack.mitre.org/versions/v14/">latest MITRE ATT&amp;CK framework</a>, for example. Microsoft's report says threats of violence are rare, but Siegel says these threats can escalate to swatting attacks.&nbsp;</p><p>While we hope swatting attacks remain rare, the potentially severe consequences mean CISOs should implement measures to minimise their risk and impact.&nbsp;&nbsp;&nbsp;</p><p>Coveware also describes a new extortion tactic which we are dubbing PITA extortion (Persistent IniTial Access extortion). Coveware writes:</p><blockquote><p>The tactic involves persistence that is extremely deep and time consuming to cleanse.&nbsp; Once achieved, the threat actor then dangles the offer of "pay us and we will leave&#8230; Don&#8217;t pay us and we will continue to root around causing chaos".&nbsp;</p></blockquote><p>Microsoft and Coveware have a series of recommendations on how to deal with these kinds of threat actors. Beyond expected recommendations such as using phishing-resistant MFA for administrators, Microsoft also advocates the use of "out-of-band" communications channels during incident response, because Octo Tempest often monitors corporate messaging networks to gain insight into defender&#8217;s plans. It often communicates on these networks to taunt defenders too.</p><p>Coveware recommends hardening IT helpdesk procedures when password reset or MFA change requests are made to confirm the identity of the calling party. These include calling employees back on numbers listed in the company's internal directory and asking for photographic proof of identity. However, Coveware points out that, especially when IT support is outsourced offshore, incentives that encourage the quick resolution of problems actually make social engineering easier.</p><p>Aggressive Lapsus$-style hackers are adapting the tactics they use very rapidly and the cyber security ecosystem needs to keep up.</p><h2></h2><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://srslyriskybiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://srslyriskybiz.substack.com/subscribe?"><span>Subscribe now</span></a></p><h2>SEC&#8217;s Disclosure Demands a Halloween Horror for CISOs&nbsp;&nbsp;</h2><p>The US Securities and Exchange Commission has <a href="https://www.sec.gov/news/press-release/2023-227">announced charges</a> against US software maker SolarWinds and its CISO, Timothy Brown, "for fraud and internal control failures relating to allegedly known cybersecurity risks and vulnerabilities".</p><p>In other words, the SEC alleges Brown and SolarWinds defrauded investors by&nbsp; "overstating SolarWinds' cyber security practices and understating or failing to disclose known risks".&nbsp;</p><p>The <a href="https://www.sec.gov/files/litigation/complaints/2023/comp-pr2023-227.pdf">formal complaint</a> alleges that a SolarWinds 'Security Statement', as posted on its public website did not reflect the reality of the company&#8217;s operations. The security statement claimed that SolarWinds: followed the National Institute of Standards and Technology Cybersecurity Framework; followed a Secure Development Lifecycle; had implemented a strong password policy; and maintained strong access controls.</p><p>The SEC alleges that all these statements were untrue and also material to the company (important enough to <a href="https://en.wikipedia.org/wiki/Materiality_(law)#:~:text=underlying%20substantive%20law.-,In%20corporate%20and%20securities%20law,shares%20or%20invest%20their%20money.">affect the companies perceived value</a>). In one example, SolarWinds used an Akamai server to distribute updates to customers whose password was 'solarwinds123'. Even worse, the credential was discovered by a security researcher who found it in a public github repository.</p><p>To be absolutely clear here, the SEC is not trying to punish SolarWinds' for poor cyber security practices or for being the victim of a security incident. Its beef is with the public statements that allegedly whitewashed the true state of SolarWinds security.&nbsp;</p><p>The SEC also takes issue with what it describes as SolarWinds' "boilerplate" cyber security disclosure that was filed with the SEC when the firm returned to being a publicly traded company in October 2018. The SEC says this text only contained "generic and hypothetical risks that most companies face", and excluded specific risks the company was aware of.&nbsp;</p><p>SolarWinds is far from the only company using generic boilerplate disclosures when it comes to cyber security risk. The SEC wants to use SolarWinds as an example to let companies know they should "do better" and more accurately reflect the specific cyber security risks they face.</p><p>The <em>Risky Business</em> podcast has an <a href="https://risky.biz/RB727">extensive discussion</a> of this issue with Dmitri Alperovitch and former CISA Director Chris Krebs. Krebs thinks this case will have "massive implications". He said that if you are a&nbsp; CISO in a publicly-traded organisation "that is not fully empowered by the C-suite that is not fully resourced, equipped, with the appropriate personnel, then your risk tolerance just dropped a whole bunch".&nbsp;</p><p><em>Risky Business News</em> has a <a href="https://riskybiznews.substack.com/p/sec-charges-solarwinds-and-its-ciso">more detailed write up</a> that includes the reaction from a variety of security industry people.</p><h2>Three Reasons to Be Cheerful This Week:</h2><ol><li><p><strong>Nigerian cybercrime training centre shut down:</strong> The Nigeria Police Force <a href="https://twitter.com/PoliceNG/status/1717201993859490231">announced</a> that its National Cybercrime Center had shut down a recruitment and mentoring hub run by a cybercrime syndicate. The syndicate is linked to romance scams, business email compromise and financial fraud.&nbsp;</p></li><li><p><strong>Countries move against ransom payments, a little:</strong> 40 countries in the International Counter Ransomware Initiative plan to commit to <a href="https://themessenger.com/tech/ransomware-us-international-hacking-ransom-pledge">not paying ransoms</a> when national government computer systems are affected. Stifling payments is <a href="https://therecord.media/white-house-counter-ransomware-initiative-summit-new-measure">clearly a focus</a> of the group, and stopping government payments is a start.&nbsp;</p></li><li><p><strong>Good news everyone! Ransomware isn't ten times worse!</strong> In <a href="https://risky.biz/RB726">last week's</a> <em>Risky Business</em> podcast NSA Cybersecurity Director Rob Joyce praised the FBI's efforts to disrupt ransomware actors. Joyce said that without the FBI's actions ransomware "would be 10x worse".</p></li></ol><h2>Sponsor Section</h2><p><em>In this Risky Business News <a href="https://risky.biz/RBNEWSSI20/">sponsor interview</a>, Catalin Cimpanu talks with Patrick Garrity, VP of Marketing and security researcher at Nucleus Security, on the rise and evolution of vulnerability threat intel and how CISA KEV's new ransomware section will be a game changer.</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/sponsored-talking-with-nucleus-security-about/id1621305970?i=1000633010522&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000633010522.jpg&quot;,&quot;title&quot;:&quot;Sponsored: Talking with Nucleus Security about vulnerability threat intelligence&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/sponsored-talking-with-nucleus-security-about/id1621305970?i=1000633010522&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2023-10-29T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/sponsored-talking-with-nucleus-security-about/id1621305970?i=1000633010522" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><h2>Shorts</h2><h3>AI Safety and Security For All</h3><p>US President Joe Biden has <a href="https://www.whitehouse.gov/briefing-room/presidential-actions/2023/10/30/executive-order-on-the-safe-secure-and-trustworthy-development-and-use-of-artificial-intelligence/">issued</a> an Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence. It's very long but <a href="https://www.whitehouse.gov/briefing-room/statements-releases/2023/10/30/fact-sheet-president-biden-issues-executive-order-on-safe-secure-and-trustworthy-artificial-intelligence/">the fact sheet</a> is far more accessible.&nbsp;&nbsp;</p><p>The cyber security-related aspects focus on making AI technology itself safe, secure and trustworthy and also using it to improve cyber security. This includes establishing a program to develop AI tools to find and fix vulnerabilities in critical software.&nbsp;</p><p>Another element of the EO aims to protect firms from the theft of AI-related intellectual property.&nbsp;</p><h3>Apple Shuts the Door on Illicit (and Lawful) iMessage Access</h3><p>Apple <a href="https://security.apple.com/blog/imessage-contact-key-verification/">announced</a> an upcoming feature called iMessage Contact Key Verification that allows users to verify they are only messaging the person or people they intend to.</p><p>The idea here is to protect against the compromise of Apple's key directory service, which could allow an adversary to decrypt messages.</p><p>This would also make impractical what is often called the <a href="https://www.lawfaremedia.org/article/principles-more-informed-exceptional-access-debate">GCHQ proposal</a> for exceptional access. In this proposal, sometimes also known as the 'ghost user protocol', government's compel service providers to silently and invisibly add law enforcement personnel into ongoing conversations under warrant.</p><h3>Breaking Open Operation Triangulation&nbsp;</h3><p>Kaspersky has <a href="https://securelist.com/operation-triangulation-catching-wild-triangle/110916/">a good write up</a> of its efforts to recover the malware used in what it calls <a href="https://securelist.com/operation-triangulation/109842/">Operation Triangulation</a>, an iPhone and iPad malware campaign that targeted the devices of some Kaspersky employees. The Russian FSB security service attributed the operation to the NSA and said that thousands of devices belonging to Russian citizens had been affected.&nbsp;</p><p>The developers took many precautions to prevent recovery and analysis of their malware. It took Kaspersky several months but it was able to recover the exploits, implant and various modules used in the attack.</p><h3>StripedFly Mystery</h3><p>If you enjoy malware deep dives, Kim Zetter <a href="https://www.zetter-zeroday.com/p/sophisticated-stripedfly-spy-platform">also examines</a> the mystery of StripedFly, an espionage platform that masquerades as a cryptominer and uses a custom TOR implementation for communication.</p><h2>Risky Biz Talks</h2><p><em>You can find the audio edition of this newsletter and other fine podcasts and interviews in the Risky Biz News feed (<a href="https://risky.biz/feeds/risky-business-news">RSS</a>, <a href="https://podcasts.apple.com/au/podcast/risky-business-news/id1621305970">iTunes</a> or <a href="https://open.spotify.com/show/0BdExoUZqbGsBYjt6QZl4Q">Spotify</a>).&nbsp;&nbsp;</em></p><p><em>In <a href="https://risky.biz/BTN39/">our last</a> "Between Two Nerds" discussion Tom Uren and <a href="https://twitter.com/thegrugq">The Grugq</a> talk about what is really at stake with cyber security and why it is worth investing in.&nbsp;</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/between-two-nerds-what-is-really-at-stake-with-cyber/id1621305970?i=1000633143556&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000633143556.jpg&quot;,&quot;title&quot;:&quot;Between Two Nerds: What is really at stake with cyber security&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/between-two-nerds-what-is-really-at-stake-with-cyber/id1621305970?i=1000633143556&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2023-10-31T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/between-two-nerds-what-is-really-at-stake-with-cyber/id1621305970?i=1000633143556" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><h2></h2><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://srslyriskybiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Seriously Risky Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>From <a href="https://riskybiznews.substack.com/">Risky Biz News</a>:</h2><p><strong>CitrixBleed vulnerability goes from bad to disastrous: </strong>A Citrix vulnerability has entered the dangerous stage of mass exploitation as multiple threat actors are compromising unpatched devices all over the internet in a race with each other to steal their session tokens.</p><p>Known as CitrixBleed and tracked as CVE-2023-4966, the vulnerability impacts Citrix ADC and Citrix NetScaler, which are extremely complex networking devices used in large enterprise and government networks in multiple roles, such as gateways, proxies, caching, VPN servers, and a bunch of other stuff.</p><p>The vulnerability allows threat actors to send junk data to the Citrix OpenID component that will crash and leak a part of the device's memory. In some cases, this memory may contain session tokens that attackers can collect and then bypass authentication and access the device. For a more technical explanation, check this <a href="https://www.assetnote.io/resources/research/citrix-bleed-leaking-session-tokens-with-cve-2023-4966">write-up</a> from Assetnote researchers.</p><p>[<a href="https://riskybiznews.substack.com/p/citrixbleed-vulnerability-turns-disastrous">more</a> on <em>Risky Business News </em>including more on the bug's exploitation which has possibly been occurring since late August]</p><p><strong>First Kazakhstan-based APT discovered, tries to disguise itself as Azerbaijan: </strong>In a <a href="https://blog.talosintelligence.com/attributing-yorotrooper/">blog post</a> this week, researchers with Cisco Talos have formally linked a cyber-espionage group named YoroTrooper to Kazakhstan, making it the <a href="https://malpedia.caad.fkie.fraunhofer.de/actors">first</a> official APT group operating out of the country.</p><p>First spotted in the wild in June 2022, the group has followed the pattern of most nascent cyber espionage programs, starting with run-of-the-mill commodity malware and slowly moving to custom capabilities in recent attacks.</p><p>[<a href="https://riskybiznews.substack.com/p/risky-biz-news-first-kazakhstan-based">more</a> on <em>Risky Business News</em>]</p><p><strong>Spyware alerts in India:</strong> Apple has notified over a half dozen lawmakers from India's main opposition parties that their iPhones have been targeted by state-sponsored attacks. Victims included figures from India's main opposition parties, such as the National Congress, AIMIM, the AAP, and the Communist Party. The alleged hacking attempts took place <a href="https://en.wikipedia.org/wiki/Elections_in_India">weeks before</a> Indians are set to elect members to its new Parliament. In a <a href="https://www.youtube.com/watch?v=u769P52pGlI">press</a> <a href="https://archive.ph/ylJYn">conference</a>, Rahul Gandhi, leader of the National Congress Party and Modi's main rival for the upcoming elections, accused the Indian government of the attempted hacks. Besides politicians, two Indian journalists and a member of an NGO also received notifications from Apple. [<a href="https://techcrunch.com/2023/10/30/indian-opposition-leaders-says-apple-has-warned-them-of-state-sponsored-iphone-attacks/">Additional coverage</a> in <em>TechCrunch</em>]</p>]]></content:encoded></item><item><title><![CDATA[Hacktivists Strike At Ransomware's Soft Underbelly]]></title><description><![CDATA[PLUS: Never Get Involved in a Land War in Europe]]></description><link>https://srslyriskybiz.substack.com/p/hacktivists-strike-at-ransomwares</link><guid isPermaLink="false">https://srslyriskybiz.substack.com/p/hacktivists-strike-at-ransomwares</guid><dc:creator><![CDATA[Tom Uren]]></dc:creator><pubDate>Thu, 26 Oct 2023 04:59:53 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2769eb5-8460-449e-8158-e079361e7418_1344x768.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Your weekly dose of Seriously Risky Business news is written by <a href="https://twitter.com/tomatospy">Tom Uren</a> and edited by <a href="https://twitter.com/riskybusiness">Patrick Gray</a>. This week's edition is brought to you by <a href="https://www.resourcely.io/">Resourcely</a>.</em></p><p><em>You can subscribe to an audio version of this newsletter as a podcast by searching for "Risky Business News" in your podcatcher or subscribing via <a href="https://risky.biz/feeds/risky-business-news/">this RSS feed</a>. Find this edition <a href="https://risky.biz/SRB54">here</a> and on Apple podcasts:</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/srsly-risky-biz-ransomwares-soft-underbelly/id1621305970?i=1000632649907&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000632649907.jpg&quot;,&quot;title&quot;:&quot;Srsly Risky Biz: Ransomware's soft underbelly&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/srsly-risky-biz-ransomwares-soft-underbelly/id1621305970?i=1000632649907&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2023-10-26T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/srsly-risky-biz-ransomwares-soft-underbelly/id1621305970?i=1000632649907" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!aF8y!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2769eb5-8460-449e-8158-e079361e7418_1344x768.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!aF8y!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2769eb5-8460-449e-8158-e079361e7418_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!aF8y!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2769eb5-8460-449e-8158-e079361e7418_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!aF8y!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2769eb5-8460-449e-8158-e079361e7418_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!aF8y!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2769eb5-8460-449e-8158-e079361e7418_1344x768.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!aF8y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2769eb5-8460-449e-8158-e079361e7418_1344x768.png" width="1344" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f2769eb5-8460-449e-8158-e079361e7418_1344x768.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1344,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1717089,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!aF8y!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2769eb5-8460-449e-8158-e079361e7418_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!aF8y!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2769eb5-8460-449e-8158-e079361e7418_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!aF8y!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2769eb5-8460-449e-8158-e079361e7418_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!aF8y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2769eb5-8460-449e-8158-e079361e7418_1344x768.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cybersecurity soft underbelly, Stable Diffusion</figcaption></figure></div><p>A purported group of pro-Ukrainian cyber activists, the Ukrainian Cyber Alliance, <a href="https://therecord.media/trigona-ransomware-group-website-takedown-ukrainian-cyber-alliance">has disrupted</a> an active ransomware gang, known as Trigona, by hacking and deleting the group's servers.&nbsp;</p><p>If a group of hacktivists can compromise a ransomware gang, these gangs are certainly susceptible to operations run by better organised and resourced state cyber outfits.&nbsp;</p><p>While the hacktivists&#8217; actions will hurt, this is probably a speed hump for Trigona rather than an enduring disruption. <a href="https://twitter.com/azalsecurity/status/1715124110202736666">The group claims</a> that it will return quickly.</p><p>We think a competent state-backed group would maximise the grief it caused by quietly degrading a ransomware group's activities over a long period of time.</p><p>The ransomware group <a href="https://www.bleepingcomputer.com/news/security/trigona-ransomware-spotted-in-increasing-attacks-worldwide/">has operated</a> since the beginning of 2022 but only branded itself 'Trigona' toward the end of last year <a href="https://www.bleepingcomputer.com/news/security/trigona-ransomware-spotted-in-increasing-attacks-worldwide/">when it launched</a> a Tor negotiation site. A Trend Micro <a href="https://www.trendmicro.com/en_za/research/23/f/an-overview-of-the-trigona-ransomware.html">report on the group</a> from June this year describes it as "highly active&#8221;. The report said the group had created both Linux and Windows versions of its malware and was continuously updating them.</p><p>Trend Micro detected attempted Trigona ransomware attacks primarily in the technology and healthcare industries, with just over half detected in the US and India. However, Trigona&#8217;s attacks could be opportunistic rather than targeted to specific industries and countries. In April this year, for example, the group targeted internet-exposed Microsoft SQL servers using password guessing attacks.</p><p>Trend Micro said the Trigona group had "poor operational security when it comes to the implementation of Tor sites". However, the cyber security firm said the group&#8217;s targeting of poorly-secured SQL servers was a cut above less technically proficient actors.&nbsp;</p><p>The Ukrainian Cyber Alliance said it gained access to Trigona's infrastructure using a <a href="https://www.bleepingcomputer.com/news/security/ukrainian-activists-hack-trigona-ransomware-gang-wipe-servers/">known vulnerability</a> in its Atlassian Confluence collaboration platform. A representative of the Alliance, herm1t, <a href="https://twitter.com/vx_herm1t/status/1714431574714806315">said on X</a> (formerly Twitter) that Trigona's "admin panel, landing, blog, leaks site, internal server (RocketChat, Atlassian), wallets and dev servers dumped and erased". In a <a href="https://www.facebook.com/ruheight/posts/pfbid02nuzurXMLoZEU9qM7kEG3oxECm7aS2Yahi6d5UEAquPmhZSJRfAuqRybTa84Kj9d8l">Facebook post</a>, the same representative said Trigona's "entire infrastructure is completely destroyed" and they<a href="https://www.bleepingcomputer.com/news/security/ukrainian-activists-hack-trigona-ransomware-gang-wipe-servers/"> told</a> <em>Bleeping Computer</em> that they had taken the gang's cryptocurrency hot wallets.&nbsp;</p><p>Herm1t <a href="https://twitter.com/vx_herm1t/status/1714426955913744684">also said</a> data from Trigona had been taken and would be distributed to researchers after the Cyber Alliance had a chance to go through it.</p><p>The Ukrainian Cyber Alliance's claimed motivation here is that ransomware groups are bad people that often operate freely in Russia. In their Facebook post, Herm1t says "we simply found one such gang and treated them the same way they treat others".</p><p>Now, it can be difficult to be sure that purported hacktivists <a href="https://srslyriskybiz.substack.com/i/40802210/if-it-looks-like-a-hacktivist-and-quacks-like-a-hacktivist">are genuine</a> and one possibility here is that this breach <em>is</em> a state operation masquerading as a hacktivist action. However, we don't think that this is the case. For a start, the Ukrainian Cyber Alliance has a track record dating back to 2014 <a href="https://www.bleepingcomputer.com/news/security/ukrainian-activists-hack-trigona-ransomware-gang-wipe-servers/">as described in</a> <em>Bleeping Computer</em>. And we can't think why a state-backed group would pretend to be hacktivists when hacking a ransomware group. They'd simply disrupt the ransomware group without feeling the need to advertise their success afterwards.&nbsp;</p><p>We <a href="https://srslyriskybiz.substack.com/p/asd-enters-the-ransomware-suppression">support the idea</a> that states should use their offensive cyber capabilities to disrupt cyber criminals, and this incident is proof that ransomware groups are susceptible to compromise.</p><p>The Trigona incident certainly shows that US Cyber Command or the UK National Cyber Force would have opportunities if they were seriously tasked with tackling ransomware operators.</p><p>There's certainly a need for more operations disrupting ransomware &#8212; NCC group reports that September 2023 was a record month for ransomware incidents (as covered in the <em>Risky Business News</em> section of this newsletter).&nbsp;</p><h2></h2><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://srslyriskybiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://srslyriskybiz.substack.com/subscribe?"><span>Subscribe now</span></a></p><h2>Never Get Involved in a Land War in Europe&nbsp;</h2><p>The International Committee of the Red Cross (ICRC) has <a href="https://shop.icrc.org/protecting-civilians-against-digital-threats-during-armed-conflict-recommendations-to-states-belligerents-tech-companies-and-humanitarian-organizations-pdf-en.html">released an advisory board report</a> on "Protecting Civilians Against Digital Threats During Armed Conflict". We doubt it will do much to change the mind of combatants and hacktivists but it does have some useful advice for tech companies and other non-combatants.</p><p>We <a href="https://srslyriskybiz.substack.com/p/bringing-humanitarian-law-to-cyber">recently covered</a> an opinion piece from two ICRC lawyers that focused more narrowly on the role of hacktivists in combat. This new report doesn't add much in that regard, but in addition to advice for what the report calls "belligerents", it also contains advice for states, tech companies and humanitarian organisations.</p><p>The recommendations to tech companies are interesting in that they reflect some of the problems that SpaceX in particular has encountered during the Russian invasion of Ukraine. We have paraphrased these recommendations here:</p><ul><li><p>Consider whether the services you provide and who you provide them to make your company a military target&nbsp;</p></li><li><p>Keep military and civilian infrastructure separate if possible</p></li><li><p>Try to protect civilian populations even when following legal obligations such as sanctions</p></li><li><p>Try to stop content and disinformation that incites violence or encourages hate speech.</p></li></ul><p>SpaceX, probably inadvertently, <a href="https://srslyriskybiz.substack.com/i/50927008/experts-starlink-is-a-legitimate-military-target">made itself a military</a> target in the first month of the invasion&nbsp; by providing Starlink services and terminals to Ukraine. These ended up being used by the Ukrainian military for combat communications and targeting, so Starlink ended up carrying both military and civilian traffic. SpaceX <a href="https://www.cnbc.com/2022/12/05/spacex-unveils-starshield-a-military-variation-of-starlink-satellites.html">announced in December</a> 2022 that it was launching a new military-specific product called Starshield.&nbsp;</p><p>Although Elon Musk was hasty providing SpaceX to Ukraine, in our view he has muddled through pretty successfully. It was the right move to provide Starlink to Ukraine, but it might have helped the company be better prepared if it had thought through some of these issues beforehand.&nbsp;</p><p>Before 2022, these kinds of war-related issues must have seemed like off-the-wall scenarios that would never eventuate. Sadly, they now seem like business as usual.&nbsp;&nbsp;&nbsp;</p><h2>Ukraine's Security Service In Bed With Hackers?</h2><p><em>The Record</em> <a href="https://therecord.media/sbu-involved-in-alfa-bank-hack">reports</a> that, according to a source within <a href="https://en.wikipedia.org/wiki/Security_Service_of_Ukraine">Ukraine's SBU security service</a>, the SBU collaborated with hacker groups to breach Russia's largest private bank.&nbsp;</p><p>Two pro-Ukrainian hacker groups, KibOrg and NLB, claimed to have breached Alfa-Bank and stolen customer records, and released some of this data publicly. This data is said to include information that relates to the bank's owner, billionaire Mikhail Fridman, and his pro-Russian blogger son, among others.&nbsp;</p><p><em>The Record</em> writes:</p><blockquote><p>A source within Ukraine's security service who requested anonymity because he is not authorised to speak publicly about the incident confirmed to Recorded Future News that the Ukrainian agency was involved in the operation, but did not provide further details.</p></blockquote><p>We've <a href="https://srslyriskybiz.substack.com/i/133353650/ukraine-hacktivist-operations-barking-louder-still-no-bite">had our doubts</a> about how useful a hacktivist army can be, but this <em>could </em>be a significant step towards integrating Ukraine's hacktivist army into operations that contribute meaningfully to the country's strategic efforts. But it's hard to know given there is so little information about what "involved" in this case actually means.&nbsp;</p><p>It could, for example, mean as little as taking information acquired through the reported breach. This isn't new &#8212; Ukrainian officials <a href="https://therecord.media/ukraine-cyber-intelligence-war-russia">already claim</a> to have taken advantage of previous leaks for intelligence purposes. Or it could mean as much as specific tasking <em>before</em> Alfa-bank was reportedly hacked. That would be a pretty significant step in turning the hacktivist goodwill that supported Ukraine into a genuinely useful capability.&nbsp;</p><h2>Three Reasons to Be Cheerful This Week:</h2><ol><li><p><strong>Ransomware double happiness:</strong> In addition to the hacktivist disruption of Trigona, an international coalition of law enforcement agencies <a href="https://cyberscoop.com/police-seize-ragnar-locker-leak-site/">took down</a> Ragnar Locker ransomware's website and arrested key members of the group. <em>Risky Business News</em> has <a href="https://riskybiznews.substack.com/p/two-ransomware-gang-websites-go-puff">more coverage</a>.&nbsp;&nbsp;</p></li><li><p><strong>Indian tech support scam crackdown:</strong> In <a href="https://www.outlookindia.com/national/cbi-conducts-nationwide-raids-under-operation-chakra-2-for-cyber-enabled-financial-frauds-news-325546">Operation Chakra-II</a>, India's Central Bureau of Investigation (CBI) raided call centres in 76 locations engaged in scams involving tech support and cryptocurrency. The CBI received help from Microsoft and Amazon who provided a joint referral that <a href="https://blogs.microsoft.com/on-the-issues/2023/10/19/microsoft-amazon-tech-support-fraud-india/">Microsoft says</a> "enabled the exchange of actionable intelligence and insights with CBI and other international law enforcement agencies to help them take action at scale". The call centres raided by CBI impersonated Microsoft and Amazon tech support. This is the first time the two companies have collaborated to combat tech support fraud.</p></li><li><p><strong>US disrupts illicit North Korean IT workers:</strong> The US Department of Justice <a href="https://www.justice.gov/opa/pr/justice-department-announces-court-authorized-action-disrupt-illicit-revenue-generation">announced</a> that it had seized 17 websites in connection with the infiltration of North Korean IT workers into foreign companies. These workers were employed in legitimate companies under false pretences and their salaries were used to fund North Korea's weapons program. This comes on top of the previous seizure of about USD$1.5m.&nbsp;&nbsp;</p></li></ol><h2>Sponsor Section</h2><p><em>In this Risky Business News <a href="https://risky.biz/RBNEWSSI19">sponsor interview</a>, Catalin Cimpanu talks with Resourcely CEO Travis McPeak about the modern DevOps ecosystem, how giving developers tools with security baked in keeps everyone safe and happy, and how that's easier than expecting your software engineers to become cybersecurity experts overnight.</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/sponsored-its-better-for-everyone-when-devops-have/id1621305970?i=1000632219272&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000632219272.jpg&quot;,&quot;title&quot;:&quot;Sponsored: It's better for everyone when DevOps have tools that are secure-by-default&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/sponsored-its-better-for-everyone-when-devops-have/id1621305970?i=1000632219272&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2023-10-23T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/sponsored-its-better-for-everyone-when-devops-have/id1621305970?i=1000632219272" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><h2>Shorts</h2><h3>Stealing Tokens From Tech Support</h3><p>A threat actor has <a href="https://sec.okta.com/harfiles">breached Okta's support system</a> and used the access to steal customer credentials.</p><p>The intruder gained access to customer credentials by stealing <a href="https://help.okta.com/oag/en-us/content/topics/access-gateway/troubleshooting-with-har.htm">HTTP Archive</a> or HAR files that were uploaded to Okta by customers to help troubleshoot recent support cases. HAR files typically contain cookies and session tokens that can be used to impersonate users, and these were used in attacks detected by <a href="https://blog.cloudflare.com/how-cloudflare-mitigated-yet-another-okta-compromise/">Cloudflare</a>, <a href="https://www.beyondtrust.com/blog/entry/okta-support-unit-breach">BeyondTrust</a> and <a href="https://blog.1password.com/okta-incident/">1Password</a>.&nbsp;</p><p>In at least one case the intruder tried to add another identity provider or IDP, what we <a href="https://srslyriskybiz.substack.com/i/136806708/bring-your-own-identity-provider-attacks">previously called</a> a Bring-Your-Own Identity Provider attack.&nbsp;</p><p>In retrospect, Okta probably should have been sanitising these files at ingest, rather than expecting customers to do it.</p><p><em>Krebs on Security</em> has <a href="https://krebsonsecurity.com/2023/10/hackers-stole-access-tokens-from-oktas-support-unit/">further coverage</a>.&nbsp;</p><h3>AI Phishing Faster, But Dumber. For Now.&nbsp;</h3><p>IBM's X-Force security research team <a href="https://securityintelligence.com/posts/ai-vs-human-deceit-unravelling-new-age-phishing-tactics/?stream=top">has examined</a> how ChatGPT can be used to generate phishing emails, and measured how effective these emails are.&nbsp;</p><p>Although ChatGPT has protections in place to prevent it being used maliciously, X-Force was able to convince it to produce phishing emails tailored to specific industries with a series of five prompts. These phishing emails were not quite as good as human-created ones, but they were created much, much faster.</p><p>In terms of click through rates, human-crafted phishing emails were better, although not by much. When it came to being reported as suspicious, AI-generated phishing emails were worse, although again not by much when compared to run of the mill human-generated phishing emails.&nbsp;</p><p>X-Force red team phishing emails were reported significantly less frequently than either AI or 'regular' phishing emails, but generating these high-quality phishing emails typically takes about 16 hours. This sounds like a long time to write an email, but the process starts with open source research on platforms such as LinkedIn and Glassdoor to find recent events relevant to the company that can be used to build credibility.</p><p>By contrast, ChatGPT-generated emails took just five minutes to generate.&nbsp;</p><h2></h2><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://srslyriskybiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Seriously Risky Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Risky Biz Talks</h2><p><em>You can find the audio edition of this newsletter and other fine podcasts and interviews in the Risky Biz News feed (<a href="https://risky.biz/feeds/risky-business-news">RSS</a>, <a href="https://podcasts.apple.com/au/podcast/risky-business-news/id1621305970">iTunes</a> or <a href="https://open.spotify.com/show/0BdExoUZqbGsBYjt6QZl4Q">Spotify</a>).&nbsp;&nbsp;</em></p><p><em>In <a href="https://risky.biz/BTN55">our last</a> "Between Two Nerds" discussion Tom Uren and <a href="https://twitter.com/thegrugq">The Grugq</a> look at "spooky effects" aka when agencies play silly buggers with target computers.&nbsp;</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/the-between-two-nerds-halloween-special/id1621305970?i=1000632383381&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000632383381.jpg&quot;,&quot;title&quot;:&quot;The Between Two Nerds Halloween Special&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/the-between-two-nerds-halloween-special/id1621305970?i=1000632383381&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2023-10-24T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/the-between-two-nerds-halloween-special/id1621305970?i=1000632383381" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><h2>From <a href="https://riskybiznews.substack.com/">Risky Biz News</a>:</h2><p><strong>Record ransomware numbers:</strong> The month of September 2023 has been the most active month for ransomware gangs on record, with 514 disclosed attacks. September 2023 beats the previous record of 459 ransomware attacks disclosed earlier this year in March. Two groups that launched last month, LostTrust and RansomedVC, ranked in the top five of most active groups. The numbers were compiled by <a href="https://www.nccgroup.com/us/resource-hub/cyber-threat-intelligence-reports/">NCC Group</a> using data published on ransomware leak sites.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ON48!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e740984-7d6f-44c5-9ea7-e10e119acf9a_701x432.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ON48!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e740984-7d6f-44c5-9ea7-e10e119acf9a_701x432.png 424w, https://substackcdn.com/image/fetch/$s_!ON48!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e740984-7d6f-44c5-9ea7-e10e119acf9a_701x432.png 848w, https://substackcdn.com/image/fetch/$s_!ON48!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e740984-7d6f-44c5-9ea7-e10e119acf9a_701x432.png 1272w, https://substackcdn.com/image/fetch/$s_!ON48!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e740984-7d6f-44c5-9ea7-e10e119acf9a_701x432.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ON48!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e740984-7d6f-44c5-9ea7-e10e119acf9a_701x432.png" width="701" height="432" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7e740984-7d6f-44c5-9ea7-e10e119acf9a_701x432.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:432,&quot;width&quot;:701,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ON48!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e740984-7d6f-44c5-9ea7-e10e119acf9a_701x432.png 424w, https://substackcdn.com/image/fetch/$s_!ON48!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e740984-7d6f-44c5-9ea7-e10e119acf9a_701x432.png 848w, https://substackcdn.com/image/fetch/$s_!ON48!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e740984-7d6f-44c5-9ea7-e10e119acf9a_701x432.png 1272w, https://substackcdn.com/image/fetch/$s_!ON48!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e740984-7d6f-44c5-9ea7-e10e119acf9a_701x432.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Australia to get a cyber shield:</strong> Microsoft has signed an agreement with the Australian government to build a cyber shield and help the country fend off cyber-attacks. The project's official name will be the Microsoft-Australian Signals Directorate Cyber Shield, or MACS. It is a classic threat-exchange program aimed at improving the detection of threats targeting Australia. Besides MACS, Microsoft will also invest <a href="https://news.microsoft.com/en-au/features/microsoft-announces-a5-billion-investment-in-computing-capacity-and-capability-to-help-australia-seize-the-ai-era/">AUS$5 billion</a> to build nine more data centers in the country, raising the total to 29.</p><p><strong>Cisco IOS XE hackers are hiding their tracks as patches come out:</strong> Over the past three days&#8212;since our last newsletter edition&#8212;the situation around the latest zero-day attacks targeting Cisco IOS XE devices has drastically changed, and we feel the need to cover it in our featured section and provide a short summary of what has been going on.</p><p>Although these attacks have been taking place since at least September 28, news of this campaign came out last Monday, <a href="https://blog.talosintelligence.com/active-exploitation-of-cisco-ios-xe-software/">on October 16</a>, when Cisco revealed the existence of a zero-day tracked as CVE-2023-20198 in the web administration panel of its IOS XE operating system.</p><p>[<a href="https://riskybiznews.substack.com/p/cisco-ios-xe-hackers-cover-tracks-patches">more</a> on <em>Risky Business News</em>]</p>]]></content:encoded></item><item><title><![CDATA[Mature Organisations Still a Security Horror Show]]></title><description><![CDATA[PLUS: Five Eyes to Watch Sticky Fingers]]></description><link>https://srslyriskybiz.substack.com/p/mature-organisations-still-a-security</link><guid isPermaLink="false">https://srslyriskybiz.substack.com/p/mature-organisations-still-a-security</guid><dc:creator><![CDATA[Tom Uren]]></dc:creator><pubDate>Thu, 19 Oct 2023 03:30:38 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb9fa348-dc2f-4ad8-89b8-c76d169959c4_1344x768.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Your weekly dose of Seriously Risky Business news is written by <a href="https://twitter.com/tomatospy">Tom Uren</a> and edited by <a href="https://twitter.com/riskybusiness">Patrick Gray</a>. It's supported by the Cyber Initiative at the <a href="https://hewlett.org/programs/cyber/">Hewlett Foundation</a> and this week's edition is brought to you by <a href="https://www.airlockdigital.com/">Airlock Digital</a>.&nbsp;</em></p><p><em>You can subscribe to an audio version of this newsletter as a podcast by searching for "Risky Business News" in your podcatcher or subscribing via <a href="https://risky.biz/feeds/risky-business-news/">this RSS feed</a>. Find this edition <a href="https://risky.biz/SRB53">here</a> and on Apple podcasts:</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/srsly-risky-biz-cisa-to-vendors-fix-your-products/id1621305970?i=1000631803420&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000631803420.jpg&quot;,&quot;title&quot;:&quot;Srsly Risky Biz: CISA to vendors &#8212; fix your products&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/srsly-risky-biz-cisa-to-vendors-fix-your-products/id1621305970?i=1000631803420&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2023-10-19T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/srsly-risky-biz-cisa-to-vendors-fix-your-products/id1621305970?i=1000631803420" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><h2>Mature Organisations Still a Security Horror Show</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wvu5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb9fa348-dc2f-4ad8-89b8-c76d169959c4_1344x768.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wvu5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb9fa348-dc2f-4ad8-89b8-c76d169959c4_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!wvu5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb9fa348-dc2f-4ad8-89b8-c76d169959c4_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!wvu5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb9fa348-dc2f-4ad8-89b8-c76d169959c4_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!wvu5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb9fa348-dc2f-4ad8-89b8-c76d169959c4_1344x768.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wvu5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb9fa348-dc2f-4ad8-89b8-c76d169959c4_1344x768.png" width="1344" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/eb9fa348-dc2f-4ad8-89b8-c76d169959c4_1344x768.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1344,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1739234,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!wvu5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb9fa348-dc2f-4ad8-89b8-c76d169959c4_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!wvu5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb9fa348-dc2f-4ad8-89b8-c76d169959c4_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!wvu5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb9fa348-dc2f-4ad8-89b8-c76d169959c4_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!wvu5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb9fa348-dc2f-4ad8-89b8-c76d169959c4_1344x768.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cyber security horror show, Stable Diffusion</figcaption></figure></div><p>CISA and NSA have <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-278a">published a joint advisory</a> on the most common misconfigurations experienced in cases across federal and state governments, the defence industrial base and critical infrastructure operators.&nbsp;</p><p>You would expect to see well configured networks at these organisations, but the CISA/NSA advisory says these misconfigurations occurred even in networks with "mature cyber postures". The list is made up of 101-level problems:</p><ol><li><p>Default configurations of software and applications</p></li><li><p>Improper separation of user/administrator privilege</p></li><li><p>Insufficient internal network monitoring</p></li><li><p>Lack of network segmentation</p></li><li><p>Poor patch management</p></li><li><p>Bypass of system access controls</p></li><li><p>Weak or misconfigured multifactor authentication (MFA) methods</p></li><li><p>Insufficient access control lists (ACLs) on network shares and services</p></li><li><p>Poor credential hygiene</p></li><li><p>Unrestricted code execution</p></li></ol><p>The report describes these misconfigurations as "systemic weaknesses across many networks". Given that getting these settings right is <a href="https://www.splunk.com/en_us/blog/learn/cyber-hygiene.html">'basic cyber hygiene'</a>, these misconfigurations <em>shouldn't</em> exist in an organisation with a mature cyber posture.&nbsp;</p><p>These misconfiguration errors fall into two buckets.&nbsp;</p><p>The first bucket includes misconfigurations at least partly attributable to manufacturer's standard practices. Many commercial devices, for example, contain predefined default credentials for built-in administrative accounts. The report cites "network access [devices], printers, scanners, security cameras, conference room audiovisual (AV) equipment, voice over internet protocol (VoIP) phones, and internet of things (IoT) devices" as commonly containing default credentials.</p><p>Other examples include insecure or legacy protocols or services enabled by default, or insecure or overly permissive standard configurations.</p><p>In these cases network defenders are required to undertake configuration work even before products we would call 'insecure by default' are deployed.</p><p>These misconfiguration errors could be reduced by pressuring vendors to improve their security practices. The advisory says "software manufacturers must reduce the prevalence of these misconfigurations&#8230; by incorporating secure-by-design and -default principles and tactics into their software development practices".</p><p>In the second bucket, the network owner is responsible for the misconfigurations or weaknesses in network segmentation, internal network monitoring, privilege management, and credential hygiene.</p><p>Under 'poor credential hygiene', for example, the advisory explains how lax policies result in passwords that can easily be guessed in a relatively short time. In one security assessment it took just 12 hours for a security assessment team to crack 80% of user passwords. Even worse, assessment teams also frequently discover cleartext passwords.&nbsp;</p><p>The advisory recommends organisations follow National Institute of Standards and Technologies (NIST) <a href="https://csrc.nist.gov/pubs/sp/800/63/b/upd2/final">password policy guidelines</a> and suggests they consider using password managers.&nbsp;</p><p>Overall, our reading of the advisory is that &#8212; even for many US organisations important enough to receive support from CISA and NSA &#8212; security is not good enough. And manufacturers actually add to the problem by shipping products that require network defenders to remediate security vulnerabilities before they can be deployed safely.&nbsp;</p><p>This advisory, then, explains the reasons <em>why</em> governments should be pressing software manufacturers to embrace secure-by-design principles. Even large organisations struggle with the basics, so it's time that product vendors started helping rather than hindering security efforts.&nbsp;</p><h4>What is Secure by Design?</h4><p>Another strand of CISA's effort entails defining what secure-by-design product development actually looks like. This week it released <a href="https://www.cisa.gov/resources-tools/resources/secure-by-design">a revised version</a> of the Secure-by-Design guidance document it co-authored with US and international partner organisations.&nbsp;</p><p>The document contains high-level principles targeted at senior leadership (eg 'Embrace radical transparency and accountability!', Lol) as well as more practical advice aimed at practitioners ('Actively discourage unsafe legacy features'). It's a heady mix.&nbsp;</p><p>The other two principles are 'Take ownership of customer security outcomes' and 'Lead from the top'. From a vendor management perspective these three principles sound more like 'effort and expense' rather than 'profit and dollars'.&nbsp;&nbsp;</p><p>However, more practically, the document contains stacks of software development and business process suggestions that would improve security if organisations implement them. These range from the mundane, such as 'eliminate default passwords' to the paradigm-subverting 'replace hardening guides with loosening guides'.&nbsp;</p><p>This is all good stuff if a vendor already wants to improve the security of its products. The document describes <em>how</em> vendors can make their development practices more secure. But it doesn't do all that much to convince vendors to invest the time and effort to improve product security.</p><p>It also seems that CISA and its co-authors aren't convinced that vendors are on board with secure development either. They write:</p><blockquote><p>Customers should also push their vendors to publicly document the secure by design actions each vendor takes. Collectively, this can create a strong demand signal for security, which can encourage and enable software manufacturers to take steps towards greater security. In other words, just as we seek to create a pervasive secure by design philosophy within software manufacturers, we need to create a "secure by demand" culture with their customers .</p></blockquote><p>This, in essence, is the problem at the crux of the secure-by-design push. What are the incentives that will encourage vendors to adopt these more secure practices? Cyber security authorities don't have the regulatory clout to force vendors to change their ways.</p><p>We think there is space here for government regulators to require more transparency from vendors. The document's section on 'embrace radical transparency' has a number of concrete suggestions that would not be too onerous for vendors but could still provide the market with useful information about product security.</p><p>These include publishing statistics such as patching or MFA adoption rates, or publishing high level threat models and security roadmaps. Requiring these initiatives by themselves won't change much, but they are the baby steps that could start the ball rolling.&nbsp;</p><h2></h2><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://srslyriskybiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://srslyriskybiz.substack.com/subscribe?"><span>Subscribe now</span></a></p><h2>Five Eyes to Watch Sticky Fingers</h2><p>At an <a href="https://www.fbi.gov/news/press-releases/fbi-hosts-five-eyes-summit-to-launch-drive-to-secure-innovation-in-response-to-intelligence-threats">FBI-hosted security summit</a>, Five Eyes security intelligence leaders warned about the threat of PRC-sponsored intellectual property (IP) theft. This was the first-ever public joint appearance of leaders from Five Eyes countries&#8217; security intelligence services and it is good to see this kind of public outreach.&nbsp;</p><p>The <em><a href="https://www.abc.net.au/news/2023-10-18/five-eyes-spy-summit-asio-cia-fbi-san-francisco/102984976">Australian Broadcasting Corporation</a></em><a href="https://www.abc.net.au/news/2023-10-18/five-eyes-spy-summit-asio-cia-fbi-san-francisco/102984976"> reported</a> FBI Director Christopher Wray told the summit that AI technology was a particular target, but the group of leaders also provided specific historical examples of IP theft. Wray cited the story of a US wind turbine company whose market capitalisation plummeted after its IP was stolen by an insider that had been recruited by the company's Chinese joint venture partner.&nbsp;</p><p>Mike Burgess, Director-General of the Australian Security Intelligence Organisation, spoke of an Australian company who discovered that inferior counterfeit products were being sold under its brand name. It was subsequently found that PRC state-backed hackers stole the company's IP using malware delivered by a USB drive given to a company employee at an international conference.&nbsp;&nbsp;</p><p>"That USB downloaded malware onto that laptop, which later on, when they were connected back to their corporate network, was used to steal their intellectual property," Burgess said.&nbsp;&nbsp;</p><p>"That intellectual property was passed from the intelligence services to [a] state-owned enterprise that mass produced the goods and sold them on the market that undercut them."&nbsp;</p><p><a href="https://www.npsa.gov.uk/secure-innovation/company-guidance">The UK</a> and <a href="https://www.asio.gov.au/five-principles-secure-innovation">Australian governments</a> have already published security guidance tailored for innovative startup companies.&nbsp;&nbsp;</p><h2>Three Reasons to Be Cheerful this Week:</h2><ol><li><p><strong>NTLM death watch:</strong> Microsoft <a href="https://techcommunity.microsoft.com/t5/windows-it-pro-blog/the-evolution-of-windows-authentication/ba-p/3926848">has announced</a> plans to remove support for NTLM authentication in Windows 11 at some point in the future. NTLM has been around since 1993 and is <a href="https://learn.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain#security-considerations">insecure</a> relative to newer protocols, but is still required in some scenarios. <em>Risky Business News</em> has <a href="https://riskybiznews.substack.com/p/microsoft-takes-ntlm-behind-the-shed">more coverage</a>.</p></li><li><p><strong>AI help with access control lists:</strong> Google <a href="https://security.googleblog.com/2023/10/scaling-beyondcorp-with-ai-assisted.html">has described</a> a new tool that allows developers to modify security policies using simple English instructions rather than system-specific syntax. CISA and NSA identified poor access control management as one of the 10 most common misconfiguration problems in large organisations, so if it could be extended for systems beyond Google's, this could be a win.&nbsp;&nbsp;&nbsp;</p></li><li><p><strong>California's Delete Act signed: so Californians will be able to request their personal data be deleted from the servers of online companies including data brokers. <a href="https://www.theverge.com/2023/10/11/23912548/california-delete-act-personal-data-single-request-online-data-brokers">Further coverage</a> in </strong><em><strong>The Verge</strong></em><strong>.</strong></p></li></ol><h2>Sponsor Section</h2><p><em>In this Risky Business News <a href="https://risky.biz/RBNEWSSI18">sponsor interview</a>, Catalin Cimpanu talks with Airlock Digital founders Daniel Schell and David Cottingham about the recent Microsoft Digital Defense Report and the problem of properly securing PowerShell.</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/sponsored-airlock-digitals-co-founders-on-securing/id1621305970?i=1000631403582&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000631403582.jpg&quot;,&quot;title&quot;:&quot;Sponsored: Airlock Digital's co-founders on securing PowerShell&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/sponsored-airlock-digitals-co-founders-on-securing/id1621305970?i=1000631403582&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2023-10-15T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/sponsored-airlock-digitals-co-founders-on-securing/id1621305970?i=1000631403582" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><h2>Shorts</h2><h3>iOS Sandboxing: Two Steps Forward</h3><p>Google's Project Zero <a href="https://googleprojectzero.blogspot.com/2023/10/an-analysis-of-an-in-the-wild-ios-safari-sandbox-escape.html">has a write up</a> that likely describes one of the exploits that was used in the Intellexa alliance-related campaign that <a href="https://srslyriskybiz.substack.com/i/137884612/eu-needs-to-grow-a-spine-on-spyware">we wrote about</a> last week. The exploit was part of a chain discovered by Google's Threat Analysis Group in collaboration with Amnesty International, at about the same time Amnesty was examining the Intellexa iOS one-click 0day.</p><p>This exploit targeted a buffer overflow vulnerability in the Safari renderer sandbox. Ian Beer, the report's author, describes the bug as "very basic" and says a "simple fuzzer targeting the IPC layer would likely have found this vulnerability in seconds". Although the bug itself was simple, the exploit itself was complex and Beer thinks the authors went to the effort to build a framework that could be reused for future bugs. In other words, they did a lot of work to make things easier for themselves in future.&nbsp;</p><p>Forcing attackers to do more work to successfully exploit bugs is good, but Beer suggests it would be good to pay attention to secure coding fundamentals as well. He writes:</p><blockquote><p>This vulnerability was introduced less than two years ago &#8212; we as an industry, at a minimum should be aiming to ensure that at least new code is vetted for well-known vulnerabilities like buffer overflows. A low bar which is clearly still not being met.</p></blockquote><h3>Your Face Belongs to&#8230; Clearview</h3><p><em>The Verge</em> has a <a href="https://www.theverge.com/23919134/kashmir-hill-your-face-belongs-to-us-clearview-ai-facial-recognition-privacy-decoder">long interview</a> with <em>New York Times</em> tech reporter Kashmir Hill about facial recognition company Clearview AI. It's a good interview that covers both Clearview AI&#8217;s history and also the policy questions that facial recognition technology presents.</p><p>Hill covers privacy issues and has recently published <em>Your Face Belongs to Us</em>, a book about Clearview AI.</p><h3>Sandworm Targets Ukrainian Telcos</h3><p>Ukraine's CERT <a href="https://cert.gov.ua/article/6123309">has revealed</a> (Ukrainian document) that Russian cyber operators regularly target Ukrainian telcos with combined cyber espionage and disruption operations. These operations typically start with an intelligence-gathering phase where credentials and documents are stolen. This is followed by a destructive phase where they disable network, server and data storage equipment. <em>The Record </em>has <a href="https://therecord.media/russia-sandworm-hacking-ukraine-telecom-internet-providers">more coverage</a>.</p><h2></h2><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://srslyriskybiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Seriously Risky Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Risky Biz Talks</h2><p><em>You can find the audio edition of this newsletter and other fine podcasts and interviews in the Risky Biz News feed (<a href="https://risky.biz/feeds/risky-business-news">RSS</a>, <a href="https://podcasts.apple.com/au/podcast/risky-business-news/id1621305970">iTunes</a> or <a href="https://open.spotify.com/show/0BdExoUZqbGsBYjt6QZl4Q">Spotify</a>).&nbsp;&nbsp;</em></p><p><em>In <a href="https://risky.biz/BTN54">our last</a> "Between Two Nerds" Tom Uren and <a href="https://twitter.com/thegrugq">The Grugq</a> discuss how changing circumstances affect the risk/reward balance and alter whether effects operations are worthwhile.</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/between-two-nerds-effects-operations-during-war-and-peace/id1621305970?i=1000631541425&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000631541425.jpg&quot;,&quot;title&quot;:&quot;Between Two Nerds: Effects operations during war and peace&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/between-two-nerds-effects-operations-during-war-and-peace/id1621305970?i=1000631541425&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2023-10-16T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/between-two-nerds-effects-operations-during-war-and-peace/id1621305970?i=1000631541425" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><h2>From <a href="https://riskybiznews.substack.com/">Risky Biz News</a>:</h2><p><strong>Israel warns citizens of security camera hack risk: </strong>In the face of an escalating military conflict with Hamas and Hezbollah forces, the Israeli government has asked citizens to secure home security cameras or shut them down completely, fearing the devices could be hacked and used for espionage and intelligence collection.</p><p>In a <a href="https://www.gov.il/he/departments/news/home_camera_owners_change_your_password">memo</a> on Friday, Israel's National Cyber Directorate asked camera owners to change their passwords, enable two-factor authentication if present, and enable automatic security updates.</p><p>If camera owners can't change any of their settings, officials have urged owners to either cover camera lenses or shut down devices completely.</p><p>Israeli officials aren't taking any chances and have most likely learned a vital lesson from the recent Russo-Ukrainian conflict, where security cameras across Ukraine have been hacked by Russian hackers to <a href="https://www.theguardian.com/world/2023/apr/11/russian-hackers-target-security-cameras-inside-ukraine-coffee-shops">track military aid convoys</a> and <a href="https://ssu.gov.ua/en/novyny/sbu-zaklykaie-vlasnykiv-vulychnykh-vebkamer-vymknuty-onlaintransliatsiiu-shchob-ne-dopomahaty-rf-navodyty-rakety-na-ukrainu">adjust missile targeting in real-time</a>.</p><p><strong>Aviram Azari case:</strong> US prosecutors say that an Israeli private investigator named Aviram Azari hired hackers to steal emails from climate activists and leak them to news agencies. The stolen emails were used to write articles criticising the tactics of climate activists. The articles were then cited in lawsuits involving Exxon Mobil, seeking to dodge investigations about its impact on climate change. US prosecutors have not linked Azari to Exxon Mobile. Prosecutors have <a href="https://storage.courtlistener.com/recap/gov.uscourts.nysd.521827/gov.uscourts.nysd.521827.70.0.pdf">asked</a> the judge for a sentence of hundreds of months in prison, while Azari's team is <a href="https://storage.courtlistener.com/recap/gov.uscourts.nysd.521827/gov.uscourts.nysd.521827.71.0.pdf">asking</a> for a maximum 60 months prison sentence after he pleaded guilty last year. Azari's sentencing is scheduled this week on October 18. [Additional coverage in <em><a href="https://www.reuters.com/world/us/mercenary-hackers-stole-data-that-exxon-later-cited-climate-lawsuits-us-2023-10-12/">Reuters</a></em>]</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!R0vy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8cb4c6eb-9156-44b2-8e1d-29b4dc326a22_596x312.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!R0vy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8cb4c6eb-9156-44b2-8e1d-29b4dc326a22_596x312.png 424w, https://substackcdn.com/image/fetch/$s_!R0vy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8cb4c6eb-9156-44b2-8e1d-29b4dc326a22_596x312.png 848w, https://substackcdn.com/image/fetch/$s_!R0vy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8cb4c6eb-9156-44b2-8e1d-29b4dc326a22_596x312.png 1272w, https://substackcdn.com/image/fetch/$s_!R0vy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8cb4c6eb-9156-44b2-8e1d-29b4dc326a22_596x312.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!R0vy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8cb4c6eb-9156-44b2-8e1d-29b4dc326a22_596x312.png" width="596" height="312" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8cb4c6eb-9156-44b2-8e1d-29b4dc326a22_596x312.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:312,&quot;width&quot;:596,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!R0vy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8cb4c6eb-9156-44b2-8e1d-29b4dc326a22_596x312.png 424w, https://substackcdn.com/image/fetch/$s_!R0vy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8cb4c6eb-9156-44b2-8e1d-29b4dc326a22_596x312.png 848w, https://substackcdn.com/image/fetch/$s_!R0vy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8cb4c6eb-9156-44b2-8e1d-29b4dc326a22_596x312.png 1272w, https://substackcdn.com/image/fetch/$s_!R0vy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8cb4c6eb-9156-44b2-8e1d-29b4dc326a22_596x312.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Ransomware payments:</strong> A <a href="https://www.splunk.com/en_us/form/ciso-report.html">Splunk survey</a> of 350 CISOs found that 96% worked for companies that got hit by ransomware over the past year, and a whopping 83% ended up paying the attackers. The survey found that the vast majority paid the attackers through an intermediary, such as a negotiator or their cyber insurance provider. A quarter of all paid ransoms were above $250,000, making the attacks a very lucrative business for ransomware gangs. [Additional coverage on the <a href="https://www.splunk.com/en_us/newsroom/press-releases/2023/ciso-research-reveals-90-of-organizations-suffered-at-least-one-major-cyber-attack-in-the-last-year-83-report-ransomware-payments.html">Splunk</a> website]</p><p>"The cyber insurance process has changed over the past few years. It is getting to the point where we are wondering if it is worth our time."</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!10rb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F278ed7ae-b511-489f-93bb-06b1a6a82de1_688x785.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!10rb!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F278ed7ae-b511-489f-93bb-06b1a6a82de1_688x785.png 424w, https://substackcdn.com/image/fetch/$s_!10rb!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F278ed7ae-b511-489f-93bb-06b1a6a82de1_688x785.png 848w, https://substackcdn.com/image/fetch/$s_!10rb!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F278ed7ae-b511-489f-93bb-06b1a6a82de1_688x785.png 1272w, https://substackcdn.com/image/fetch/$s_!10rb!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F278ed7ae-b511-489f-93bb-06b1a6a82de1_688x785.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!10rb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F278ed7ae-b511-489f-93bb-06b1a6a82de1_688x785.png" width="688" height="785" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/278ed7ae-b511-489f-93bb-06b1a6a82de1_688x785.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:785,&quot;width&quot;:688,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!10rb!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F278ed7ae-b511-489f-93bb-06b1a6a82de1_688x785.png 424w, https://substackcdn.com/image/fetch/$s_!10rb!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F278ed7ae-b511-489f-93bb-06b1a6a82de1_688x785.png 848w, https://substackcdn.com/image/fetch/$s_!10rb!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F278ed7ae-b511-489f-93bb-06b1a6a82de1_688x785.png 1272w, https://substackcdn.com/image/fetch/$s_!10rb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F278ed7ae-b511-489f-93bb-06b1a6a82de1_688x785.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div>]]></content:encoded></item><item><title><![CDATA[Bringing Humanitarian Law to Cyber War]]></title><description><![CDATA[PLUS: EU Needs to Grow a Spine on Spyware]]></description><link>https://srslyriskybiz.substack.com/p/bringing-humanitarian-law-to-cyber</link><guid isPermaLink="false">https://srslyriskybiz.substack.com/p/bringing-humanitarian-law-to-cyber</guid><dc:creator><![CDATA[Tom Uren]]></dc:creator><pubDate>Thu, 12 Oct 2023 04:54:29 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F839eb815-2fa5-4105-b2e3-48747bb2a681_1344x768.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Your weekly dose of Seriously Risky Business news is written by <a href="https://twitter.com/tomatospy">Tom Uren</a> and edited by <a href="https://twitter.com/riskybusiness">Patrick Gray</a>. It's supported by the Cyber Initiative at the <a href="https://hewlett.org/programs/cyber/">Hewlett Foundation</a> and this week's edition is brought to you by <a href="https://www.netwrix.com/">Netwrix</a>.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://srslyriskybiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://srslyriskybiz.substack.com/subscribe?"><span>Subscribe now</span></a></p><p><em>You can subscribe to an audio version of this newsletter as a podcast by searching for "Risky Business News" in your podcatcher or subscribing via <a href="https://risky.biz/feeds/risky-business-news/">this RSS feed</a>. Find this edition <a href="https://risky.biz/SRB52">here</a> and on Spotify:</em></p><iframe class="spotify-wrap podcast" data-attrs="{&quot;image&quot;:&quot;https://i.scdn.co/image/ab6765630000ba8aff2258f005c4c2a1b48d6904&quot;,&quot;title&quot;:&quot;Srsly Risky Biz: The EU needs to grow a political spine on spyware&quot;,&quot;subtitle&quot;:&quot;risky.biz&quot;,&quot;description&quot;:&quot;Episode&quot;,&quot;url&quot;:&quot;https://open.spotify.com/episode/68BC8XZIBOeWB4AyUT7R6q&quot;,&quot;belowTheFold&quot;:false,&quot;noScroll&quot;:false}" src="https://open.spotify.com/embed/episode/68BC8XZIBOeWB4AyUT7R6q" frameborder="0" gesture="media" allowfullscreen="true" allow="encrypted-media" data-component-name="Spotify2ToDOM"></iframe><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jLgB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F839eb815-2fa5-4105-b2e3-48747bb2a681_1344x768.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jLgB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F839eb815-2fa5-4105-b2e3-48747bb2a681_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!jLgB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F839eb815-2fa5-4105-b2e3-48747bb2a681_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!jLgB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F839eb815-2fa5-4105-b2e3-48747bb2a681_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!jLgB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F839eb815-2fa5-4105-b2e3-48747bb2a681_1344x768.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jLgB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F839eb815-2fa5-4105-b2e3-48747bb2a681_1344x768.png" width="1344" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/839eb815-2fa5-4105-b2e3-48747bb2a681_1344x768.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1344,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1368749,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!jLgB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F839eb815-2fa5-4105-b2e3-48747bb2a681_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!jLgB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F839eb815-2fa5-4105-b2e3-48747bb2a681_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!jLgB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F839eb815-2fa5-4105-b2e3-48747bb2a681_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!jLgB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F839eb815-2fa5-4105-b2e3-48747bb2a681_1344x768.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Lawyer in a war zone, Stable Diffusion</figcaption></figure></div><p>It is hard to care about hacktivism when the news from Israel and Gaza is so bleak, but there has been a flurry of activity from both camps <a href="https://edition.cnn.com/2023/10/09/middleeast/israel-hamas-gaza-war-explained-mime-intl/index.html">since the conflict erupted</a>.&nbsp;&nbsp;</p><p>Cyber attacks <a href="https://techcrunch.com/2023/10/09/hacktivism-erupts-in-response-to-hamas-israel-war/">reported so far</a> include the DDoSing of both Israeli <a href="https://therecord.media/hacktivists-take-sides-israel-palestinian">and Palestinian websites</a> and the leaking of stolen documents and credentials from Israeli-related sites. While these actions generally made little difference to events on the ground, some attacks attempted to disrupt Israel's response to Hamas rocket attacks.</p><p>Per <a href="https://riskybiznews.substack.com/p/microsoft-deprecates-vbscript">Wednesday's edition</a> of <em>Risky Business News</em>:</p><blockquote><p>Pro-Palestine hacktivist groups have launched several cyberattacks that targeted Israel's rocket alert system. DDoS attacks hit endpoints responsible for alerting citizens of incoming missile raids, even <a href="https://www.linkedin.com/feed/update/urn:li:activity:7116846445214715904/">as early as one hour</a> after the Hamas operation began. Several groups participated in the attacks, such as Anonymous Sudan, Killnet, and AnonGhost. The latter also <a href="https://archive.ph/tMh9J">exploited</a> vulnerabilities in the API system of Red Alert, an Android app that sends rocket alerts to Israeli citizens. The group abused the API to <a href="https://archive.ph/Fo2eU">send fake rocket and nuclear bomb alerts</a> meant to sow panic among the Israeli population.&nbsp;</p></blockquote><p>Threat intelligence analyst <a href="https://twitter.com/Cyberknow20">CyberKnow</a> is tracking 83 groups so far that have announced involvement in the Israel-Hamas hostilities &#8212; 69 pro-Palestine groups and 14 pro-Israel groups.&nbsp;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6ONZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff477df7f-f8fd-424c-8c54-67406197ccdf_1422x805.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6ONZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff477df7f-f8fd-424c-8c54-67406197ccdf_1422x805.jpeg 424w, https://substackcdn.com/image/fetch/$s_!6ONZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff477df7f-f8fd-424c-8c54-67406197ccdf_1422x805.jpeg 848w, https://substackcdn.com/image/fetch/$s_!6ONZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff477df7f-f8fd-424c-8c54-67406197ccdf_1422x805.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!6ONZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff477df7f-f8fd-424c-8c54-67406197ccdf_1422x805.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6ONZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff477df7f-f8fd-424c-8c54-67406197ccdf_1422x805.jpeg" width="1422" height="805" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f477df7f-f8fd-424c-8c54-67406197ccdf_1422x805.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:805,&quot;width&quot;:1422,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:247675,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6ONZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff477df7f-f8fd-424c-8c54-67406197ccdf_1422x805.jpeg 424w, https://substackcdn.com/image/fetch/$s_!6ONZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff477df7f-f8fd-424c-8c54-67406197ccdf_1422x805.jpeg 848w, https://substackcdn.com/image/fetch/$s_!6ONZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff477df7f-f8fd-424c-8c54-67406197ccdf_1422x805.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!6ONZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff477df7f-f8fd-424c-8c54-67406197ccdf_1422x805.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Hacktivists stated positions in the Israel-Hamas conflict</figcaption></figure></div><p>The current scenario is similar to the Russian invasion of Ukraine, where hacktivist groups support both sides. Of course, state-linked groups posing as hacktivists are also involved.&nbsp;&nbsp;</p><p>A <a href="https://www.mandiant.com/resources/blog/likely-iranian-threat-actor-conducts-politically-motivated-disruptive-activity-against">likely Iran-linked threat actor</a>, Moses Staff, has reappeared on Twitter/X, <a href="https://twitter.com/StaffofMoses1/status/1710606686572978408">posting in support</a> of Hamas&#8217;s actions. While purporting to be a ransomware actor, the group has <a href="https://therecord.media/new-moses-staff-group-targets-israeli-organizations-in-destructive-attacks">previously launched</a> a number of destructive attacks against Israeli organisations.</p><p>On the Israel-supporting side, Predatory Sparrow has <a href="https://twitter.com/GonjeshkeDarand/status/1711447030369820866">posted on Twitter/X</a> "we are back". This group is responsible for some spectacularly successful attacks in Iran, including one that <a href="https://twitter.com/GonjeshkeDarand/status/1541288345183158272">dropped molten steel</a> all over a factory floor. Other attacks have affected Iran&#8217;s train services and its fuel subsidy system.&nbsp;</p><p>These operations were professionally executed and Predatory Sparrow also takes extensive steps to illustrate that it is conducting 'responsible' destructive cyber operations. In these attacks, for example, they've issued prior warnings to minimise collateral damage and prevent people from being physically hurt. (For more information see this newsletter's <a href="https://srslyriskybiz.substack.com/i/61819123/israels-implausible-deniability">previous coverage</a> and <a href="https://risky.biz/BTN2/">my discussion</a> with The Grugq covering Predatory Sparrow).</p><p>We are sceptical about the value of genuine (i.e. not linked to a state) hacktivist operations, mostly because they could interfere with intelligence collection operations established to inform state actions that have far greater impact on events. Governments need to think about managing or shaping civilian hacktivist actions during conflict to minimise interference with their own cyber operations.</p><p>The role of cyber operations during conflict and the obligations on states to restrain hacktivism has drawn the attention of high profile legal specialists. Writing in a blog associated with the <em>European Journal of International Law</em>, two lawyers <a href="https://www.ejiltalk.org/8-rules-for-civilian-hackers-during-war-and-4-obligations-for-states-to-restrain-them/">recently published</a> eight rules for civilian hackers, and four obligations on states to restrain them. The eight rules for hackers are:</p><ol><li><p>Do not direct cyber attacks against civilian objects.</p></li><li><p>Do not use malware or other tools or techniques that spread automatically and damage military objectives and civilian objects indiscriminately.</p></li><li><p>When planning a cyber attack against a military objective, do everything feasible to avoid or minimise the effects your operation may have on civilians.</p></li><li><p>Do not conduct any cyber operation against medical and humanitarian facilities.</p></li><li><p>Do not conduct any cyber attack against objects indispensable to the survival of the population or that can release dangerous forces.</p></li><li><p>Do not make threats of violence to spread terror among the civilian population.</p></li><li><p>Do not incite violations of international humanitarian law.</p></li><li><p>Comply with these rules even if the enemy does not.</p></li></ol><p>These rules and the obligations on states are essentially an extension of the <a href="https://casebook.icrc.org/a_to_z/glossary/fundamental-principles-ihl">fundamental principles</a> of International Humanitarian Law (IHL, or the Rules of War), and try to ensure cyber hacktivism avoids harming civilians as much as possible.</p><p>It's <a href="https://therecord.media/hacktivists-respond-to-red-cross-rules-with-ridicule">easy to be cynical</a> about these rules, especially when participants engaged in real-world conflict are not observing IHL. It is hard to see that civilian hacktivists motivated by righteous fury will restrain themselves when atrocities are being committed.&nbsp;</p><p>For now, however, actors with the skills and resources to cause the most damage (such as Predatory Sparrow) are associated with states. International law <em>may</em> make a difference to these groups. After all, the whole point of IHL is to at least try to make war a little bit less horrible, even if it is not always successful.&nbsp;</p><h2>EU Needs to Grow a Spine on Spyware&nbsp;</h2><p>A new investigation has found that EU-based spyware firms have sold their products to authoritarian governments and these products have been used to target European, US and UN government officials.</p><p>The investigation, reported under the name <a href="https://eic.network/projects/predator-files.html">'The Predator Files'</a>, is a collaboration between the European Investigative Collaborations (EIC) media network and Amnesty International.&nbsp;</p><p>Amnesty International's Security Lab provided technical assistance to the investigation and produced a <a href="https://www.amnesty.org/en/documents/act10/7245/2023/en/">technical report</a> focused on the Intellexa alliance and its Predator spyware. The Intellexa alliance is a collection of spyware and intelligence companies that appear to have corporate links or share common ownership.&nbsp;</p><p>Amnesty documents a particular Predator campaign that appears to be Vietnam-linked and conducted targeting over X (formerly Twitter). In this case, malicious Predator infection links were sent in replies to targets from the @Joseph_Gordon16 Twitter/X account.&nbsp;</p><p>This public targeting provided Amnesty's Security Lab with insight into the Predator operator's goals. Its report says:</p><blockquote><p>The targets selected by this account included journalists, academic researchers working on security issues in the South China Sea and Vietnam, as well as senior political officials in the EU, US, and elsewhere, involved in work related to international fishing regulation, an issue of interest to the Vietnamese authorities</p></blockquote><p>The accounts targeted include various European Commission officials, the German Ambassador to the US, Taiwanese President Tsai Ing-Wen, the Taiwanese Ministry of Foreign Affairs, and a Berlin-based media website covering news about Vietnam. The @Joseph_Gordon16-associated infection attempts documented by Amnesty International occurred from February through June this year.&nbsp;</p><p>Assuming the operators <em>are</em> linked to the Vietnamese government, at a big-picture level this targeting itself seems fair enough, as it is the sort of espionage that Western governments consider legitimate.</p><p>The way it was carried out though&#8212;replying with malicious links on Twitter&#8212;is pretty crude. Presumably this technique works sometimes, but it's not very specific.&nbsp;</p><p>Relatedly, Amnesty found that four US congresspeople were targeted, although perhaps not intentionally. Two of the four, US Senator John Hoeven and Representative Michael McCaul were separately tagged in a tweet from President Tsai Ing-Wen and one from the Taiwanese Ministry of Foreign Affairs respectively. The Predator campaign operator replied with malicious links to the original tweet without removing tags to Hoeven and McCaul, so perhaps they weren't the intended targets. The report isn't explicit about whether the other two US congresspersons involved, Senators Chris Murphy and Gary Peters, were directly targeted, although it was in a tweet that also referenced an Albanian parliamentarian.</p><p>From a European perspective, however, the use of Predator in this campaign is outrageous and notionally European companies are selling spyware which is then used to target European and allied politicians. Predator was also used in last year's <a href="https://www.politico.eu/article/greece-spyware-scandal-cybersecurity/">Greek spyware scandal</a>, where it was deployed for political purposes and used on journalists, activists, opposition political figures and even government cabinet members.&nbsp;&nbsp;&nbsp;&nbsp;</p><p>Sales of systems like Predator outside the EU are theoretically subject to export controls but Intellexa has been skirting these regulations by selling via an Intellexa entity in the United Arab Emirates. Amnesty International's report describes this as an EU and member state regulatory failure, and they are not wrong.&nbsp;</p><p>The US government has already acted against Intellexa. In July this year <a href="https://www.washingtonpost.com/national-security/2023/07/18/entity-list-spyware-intellexa-cytrox/">it put</a> Intellexa and Cytrox, the Intellexa alliance firm that originally developed Predator spyware, on the US <a href="https://en.wikipedia.org/wiki/Entity_List">entity list</a>. This prohibits US companies from doing business with them.</p><p>The Europeans need to grow a spine here. The European Parliament's <a href="https://www.europarl.europa.eu/committees/en/pega/home/highlights">PEGA Committee</a> investigating the use of spyware has bemoaned the lack of political will to actually do anything about this problem. In its report to the parliament it concluded that:</p><blockquote><p>&#8230;neither the Member States, nor the Council, nor the Commission seemed to be at all interested in maximising their efforts to fully investigate the spyware abuse, thus knowingly protecting Union governments which violate human rights within and outside of the Union.</p></blockquote><p>Perhaps the targeting of EU officials and politicians will finally provide the incentive to act. But we can only hope.</p><h2>The Chinese Spies Are In The Mail</h2><p>According to <em>The Financial Times</em>, Belgian <a href="https://www.ft.com/content/256ee824-9710-49d2-a8bc-f173e3f74286">intelligence is concerned</a> that a Chinese logistics company that has a large presence in Li&#232;ge could be used for espionage.&nbsp;&nbsp;</p><p>Cainiao, the logistics arm of Chinese giant Alibaba, runs a large logistics hub at Belgium's Li&#232;ge cargo airport. The Belgian State Security Service (VSSE) fears that information from the logistics hub could be provided to the Chinese government to give them insights into supply chains and potential vulnerabilities.&nbsp;</p><p>There certainly are reasons to be concerned and we've <a href="https://srslyriskybiz.substack.com/p/srsly-risky-biz-thursday-september-958">argued in the past</a> that "Chinese firms are so closely interlinked with the Chinese government that they cannot be trusted in critical infrastructure".&nbsp;</p><p>The <em>Financial Times</em> writes that "Cainiao is able to access data about merchants, products, transport details and flows, said a person familiar with its IT systems", which sounds concerning. However, it also states that the logistics centre in Li&#232;ge "mainly handles goods sold directly to European consumers through the online shopping site AliExpress".&nbsp;</p><p>So the magnitude of the risk here really depends upon whether Cianiao has access to data about <em>other</em> logistics shipments, not just its own. If it can only see its own shipments, we don't see that Cianiao's presence in Belgium is really an additional espionage risk, since a Chinese Alibaba group company already knows all about the shipments anyway.</p><p>Still, and we've <a href="https://srslyriskybiz.substack.com/p/srsly-risky-biz-thursday-september-958">made this point before</a>, it's the PRC's own actions that make it difficult for its companies to be trusted overseas. There are genuine reasons to be concerned.&nbsp;</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://srslyriskybiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Seriously Risky Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Three Reasons to Be Cheerful this Week:</h2><ol><li><p><strong>Google makes passkeys default sign-in:</strong> Google has made <a href="https://blog.google/technology/safety-security/passkeys-default-google-accounts/">passkeys the default</a> way to sign in to accounts as of Tuesday this week.&nbsp;</p></li><li><p><strong>VBScript on the way out:</strong> Microsoft has announced it will remove VBscript from future versions of Windows, although it will be available as a "<a href="https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/features-on-demand-v2--capabilities?view=windows-11">Feature On Demand</a>" if it is needed. VBScript has been part of the Windows operating system since 1998 and has been a popular tool amongst malware developers. <em>Risky Business News</em> has more <a href="https://riskybiznews.substack.com/p/microsoft-deprecates-vbscript">in-depth coverage</a>.&nbsp;</p></li><li><p><strong>Clouds mandate more MFA:</strong> <a href="https://aws.amazon.com/blogs/security/security-by-design-aws-to-enhance-mfa-requirements-in-2024/">AWS announced</a> that accounts with the highest privileges will be required to use Multi Factor Authentication from mid-2024. Google <a href="https://www.cybersecuritydive.com/news/aws-mandates-mfa-default/695532/">subsequently told</a> <em>Cybersecurity Dive</em> it would impose the same requirement before the end of this year.&nbsp;</p></li></ol><h2>Sponsor Section</h2><p><em>In this Risky Business News <a href="https://risky.biz/RBNEWSSI17">sponsor interview</a> Tom Uren asks Martin Cannard, VP of Product Strategy at Netwrix, how privileged access management can help defend organisations. 'Advanced Persistent Teenagers' regularly use social engineering techniques to compromise highly privileged accounts, but that doesn't mean it's instantly game over.</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/sponsored-pam-vs-teenagers-fight/id1621305970?i=1000630629179&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000630629179.jpg&quot;,&quot;title&quot;:&quot;Sponsored: PAM vs teenagers... FIGHT!&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/sponsored-pam-vs-teenagers-fight/id1621305970?i=1000630629179&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2023-10-08T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/sponsored-pam-vs-teenagers-fight/id1621305970?i=1000630629179" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><h2>Shorts</h2><h3>This Robot Will Seduce and Rob You</h3><p>Researchers at cyber security firm Avast have <a href="https://decoded.avast.io/threatintel/lovegpt-how-single-ladies-looking-for-your-data-upped-their-game-with-chatgpt/">produced a report</a> looking at how ChatGPT is being used in a dating platform scam.</p><p>The tool has been around for at least a decade, but the incorporation of ChatGPT led the researchers to call it LoveGPT. The tool is quite sophisticated and automates the creation of fake profiles and harvests data across 13 dating platforms. ChatGPT functionality is used in creating description text in fake profiles, reading and replying to messages and asking for phone numbers.&nbsp;</p><p><em>The Record</em> has <a href="https://therecord.media/lovegpt-romance-scam-tool-uses-chatgpt">more comprehensive coverage</a>.&nbsp;</p><h3>Crypto Theft Wrapped in Fraud, Surrounded by Incompetence</h3><p><em>Wired</em> has a <a href="https://www.wired.com/story/ftx-1-billion-crypto-heist/">tremendously entertaining</a> story about the shenanigans at the FTX crypto exchange on the day it declared bankruptcy and a thief stole over USD$400m worth of cryptocurrency.</p><h2>Risky Biz Talks</h2><p><em>You can find the audio edition of this newsletter and other fine podcasts and interviews in the Risky Biz News feed (<a href="https://risky.biz/feeds/risky-business-news">RSS</a>, <a href="https://podcasts.apple.com/au/podcast/risky-business-news/id1621305970">iTunes</a> or <a href="https://open.spotify.com/show/0BdExoUZqbGsBYjt6QZl4Q">Spotify</a>).&nbsp;&nbsp;</em></p><p><em>In <a href="https://risky.biz/BTN53">our last</a> "Between Two Nerds" discussion Tom Uren and <a href="https://twitter.com/thegrugq">The Grugq</a> look at the potential for a cyber criminal match made in hell between ransomware actors and BEC scammers.</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/between-two-nerds-bec-and-ransomware-a-match-made-in-hell/id1621305970?i=1000630764600&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000630764600.jpg&quot;,&quot;title&quot;:&quot;Between Two Nerds: BEC and ransomware, a match made in hell&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/between-two-nerds-bec-and-ransomware-a-match-made-in-hell/id1621305970?i=1000630764600&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2023-10-10T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/between-two-nerds-bec-and-ransomware-a-match-made-in-hell/id1621305970?i=1000630764600" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><h2>From <a href="https://riskybiznews.substack.com/">Risky Biz News</a>:</h2><p><strong>Tech companies and security firms rally against EU vulnerability disclosure rules: </strong>A group of more than 50 tech experts and organizations have signed an <a href="https://www.centerforcybersecuritypolicy.org/insights-and-research/joint-letter-of-experts-on-cra-and-vulnerability-disclosure">open letter</a> asking EU officials to rethink Article 11of the upcoming <a href="https://www.consilium.europa.eu/en/press/press-releases/2023/07/19/cyber-resilience-act-member-states-agree-common-position-on-security-requirements-for-digital-products/">EU Cyber Resilience Act</a>.</p><p>The article introduces a mandatory requirement for all software vendors to disclose vulnerabilities to the ENISA, the EU's cybersecurity agency, within 24 hours of becoming aware of in-the-wild exploitation. ENISA will then relay this information to national CSIRT teams and stock market watchdogs across its member states.</p><p>The open letter's signatories argue that the CRA's Article 11&#8212;in its current form, at least&#8212;greatly expands the number of organisations that will have first-hand and real-time immediate knowledge of actively exploited vulnerabilities, which, in turn, increases the risks to product vendors, their customers, and the general public.</p><p>[<a href="https://riskybiznews.substack.com/p/tech-companies-eu-vulnerability-disclosure-rules">more</a> on <em>Risky Business News</em>]</p><p><strong>Human-operated ransomware attacks double in a year: </strong>The number of human-operated ransomware attacks has more than doubled over the past year, Microsoft said in its yearly <a href="https://www.microsoft.com/en-us/security/security-insider/microsoft-digital-defense-report-2023">Digital Defense Report</a>.</p><p>The term "human-operated ransomware" refers to certain intrusions where the ransomware is deployed manually rather than using automated scripts.</p><p>[<a href="https://riskybiznews.substack.com/p/human-operated-ransomware-attacks-double">much more</a> on <em>Risky Business News</em>, including that the number of ransomware incidents has returned to 'normal' after the initial disruption of the Russian invasion of Ukraine and how in more than half of ransomware incidents file encryption is deployed within a day of initial access.]&nbsp;</p><p><strong>DPRK operations:</strong> Google's Mandiant division has <a href="https://www.mandiant.com/resources/blog/north-korea-cyber-structure-alignment-2023">published</a> an updated guide to understanding North Korea's APT and cyber operations, complete with an updated organisational chart. The report's main findings are that DPRK groups now increasingly share resources and temporarily collaborate on operations, making exact attribution extremely difficult.</p><blockquote><p>Malware infrastructure overlaps indicating resources and attribution muddled by shifting assignments show how DPRK cyber operations are changing. However, operations conducted to fulfil regime requirements remain steadfast and we believe they will continue. While defenders may not be able to easily sort new DPRK activity into a previously identified bucket, the malware reuse and shared resources creates opportunities for detection and country level attribution.</p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!tiPV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d2a93d-ebbb-493a-93b9-b8caca67c6cb_1048x1206.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tiPV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d2a93d-ebbb-493a-93b9-b8caca67c6cb_1048x1206.jpeg 424w, https://substackcdn.com/image/fetch/$s_!tiPV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d2a93d-ebbb-493a-93b9-b8caca67c6cb_1048x1206.jpeg 848w, https://substackcdn.com/image/fetch/$s_!tiPV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d2a93d-ebbb-493a-93b9-b8caca67c6cb_1048x1206.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!tiPV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d2a93d-ebbb-493a-93b9-b8caca67c6cb_1048x1206.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tiPV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d2a93d-ebbb-493a-93b9-b8caca67c6cb_1048x1206.jpeg" width="1048" height="1206" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/70d2a93d-ebbb-493a-93b9-b8caca67c6cb_1048x1206.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1206,&quot;width&quot;:1048,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!tiPV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d2a93d-ebbb-493a-93b9-b8caca67c6cb_1048x1206.jpeg 424w, https://substackcdn.com/image/fetch/$s_!tiPV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d2a93d-ebbb-493a-93b9-b8caca67c6cb_1048x1206.jpeg 848w, https://substackcdn.com/image/fetch/$s_!tiPV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d2a93d-ebbb-493a-93b9-b8caca67c6cb_1048x1206.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!tiPV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d2a93d-ebbb-493a-93b9-b8caca67c6cb_1048x1206.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://srslyriskybiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Seriously Risky Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[NSA Wants to Protect America's AI Edge]]></title><description><![CDATA[PLUS: Rich Pickings at the Network Edge]]></description><link>https://srslyriskybiz.substack.com/p/nsa-wants-to-protect-americas-ai</link><guid isPermaLink="false">https://srslyriskybiz.substack.com/p/nsa-wants-to-protect-americas-ai</guid><dc:creator><![CDATA[Tom Uren]]></dc:creator><pubDate>Thu, 05 Oct 2023 03:44:19 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F081eabb8-6b40-4b76-afad-53050ea8c20d_1344x768.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Your weekly dose of Seriously Risky Business news is written by <a href="https://twitter.com/tomatospy">Tom Uren</a> and edited by <a href="https://twitter.com/riskybusiness">Patrick Gray</a>. It's supported by the Cyber Initiative at the <a href="https://hewlett.org/programs/cyber/">Hewlett Foundation</a> and this week's edition is brought to you by <a href="https://www.proofpoint.com/">Proofpoint</a>.</em></p><p><em>You can subscribe to an audio version of this newsletter as a podcast by searching for "Risky Business News" in your podcatcher or subscribing via <a href="https://risky.biz/feeds/risky-business-news/">this RSS feed</a>. Find this edition <a href="https://risky.biz/SRB51">here</a> and on Apple podcasts:&nbsp;</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/srsly-risky-biz-nsa-wants-to-protect-americas-ai-edge/id1621305970?i=1000630255301&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000630255301.jpg&quot;,&quot;title&quot;:&quot;Srsly Risky Biz: NSA wants to protect America's AI edge&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/srsly-risky-biz-nsa-wants-to-protect-americas-ai-edge/id1621305970?i=1000630255301&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2023-10-05T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/srsly-risky-biz-nsa-wants-to-protect-americas-ai-edge/id1621305970?i=1000630255301" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!r_wy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F081eabb8-6b40-4b76-afad-53050ea8c20d_1344x768.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!r_wy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F081eabb8-6b40-4b76-afad-53050ea8c20d_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!r_wy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F081eabb8-6b40-4b76-afad-53050ea8c20d_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!r_wy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F081eabb8-6b40-4b76-afad-53050ea8c20d_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!r_wy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F081eabb8-6b40-4b76-afad-53050ea8c20d_1344x768.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!r_wy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F081eabb8-6b40-4b76-afad-53050ea8c20d_1344x768.png" width="1344" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/081eabb8-6b40-4b76-afad-53050ea8c20d_1344x768.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1344,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1225863,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!r_wy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F081eabb8-6b40-4b76-afad-53050ea8c20d_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!r_wy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F081eabb8-6b40-4b76-afad-53050ea8c20d_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!r_wy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F081eabb8-6b40-4b76-afad-53050ea8c20d_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!r_wy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F081eabb8-6b40-4b76-afad-53050ea8c20d_1344x768.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">A spy in a data centre, Stable Diffusion</figcaption></figure></div><p>The US National Security Agency (NSA) is creating a new Artificial Intelligence Security Center to develop secure AI for use in defence and national security. The Center will also work to maintain the US's AI advantage by protecting against intellectual property (IP) theft.</p><p>The Director of NSA and US Cyber Command, General Paul Nakasone, announced the creation of the new centre <a href="https://www.youtube.com/watch?v=tJnMlPydBak">in a speech</a> at the National Press Club in Washington DC.&nbsp;</p><p>In his speech Nakasone pithily described AI security as "about protecting AI systems from learning, doing and revealing the wrong thing", before listing <a href="https://youtu.be/tJnMlPydBak?t=1270">some goals</a> of the new centre:</p><blockquote><p>The AI Security Centre will become NSA's focal point for leveraging foreign intelligence insights, contributing to the development of best practices, guidelines, principles, evaluation methodology and risk frameworks for AI security. With an end goal of promoting the secure development, integration and adoption of AI capabilities within our national security systems and our defence industrial base.&nbsp;</p><p>The AI Security Center will also help industry understand the threats against their intellectual property and collaborate to help prevent and eradicate threats.&nbsp;</p><p>The AI Security Center will work closely with US industry, national labs, academia, across the IC and Department of Defense and select foreign partners.</p></blockquote><p>In other words, helping develop secure AI that contributes to national security, while stopping other countries stealing the technology (looking at you, China).&nbsp;</p><p>What Nakasone has announced seems fair enough. Bringing the NSA's AI efforts together in a place where the organisation can more easily collaborate with external partners is a good move.</p><p>We also agree with Nakasone that AI security is "principally a cyber security responsibility". Making AI secure may require new tools and techniques, but traditional cyber security&nbsp; methodologies and thought processes will be transferable when developing AI security frameworks.&nbsp;</p><p>The assumption underpinning the launch of the AI Security Center is that AI will transform defence, national security and other industries and sectors. But Nakasone isn't blinded by AI hype and his action in creating the centre is informed by NSA's homework on the field. In early September <a href="https://therecord.media/nsa-cyber-command-wrapped-ai-studies">Nakasone revealed</a> that the NSA had recently developed a roadmap sketching out how the organisation could take advantage of AI.&nbsp;</p><p><a href="https://www.c-span.org/video/?530208-1/top-cyber-officials-speak-cybersecurity-summit#">Speaking at the Billington Cybersecurity Summit</a>, Nakasone said NSA already used AI, "primarily within our signals intelligence mission", and the roadmap had also looked at potential uses within its cyber security mission. And the NSA found these technologies could have "tremendous impact" on the agency's business functions such as compliance and HR, for example.&nbsp;</p><p>Governments worldwide are concerned about AI and it regularly appears on lists of critical technologies, including those kept by governments in the <a href="https://www.gov.uk/government/publications/uk-science-and-technology-framework/the-uk-science-and-technology-framework#identifying-critical-technologies">UK</a> and <a href="https://www.industry.gov.au/publications/list-critical-technologies-national-interest">Australia</a>. There are also reasons to be particularly concerned about AI. Just this week, the European Commission <a href="https://ec.europa.eu/commission/presscorner/detail/en/ip_23_4735">formally identified</a> AI as one of four technology areas that were not only critical for economic security but were also particularly 'risky'.</p><p>The Commission identified AI, advanced semiconductors, biotechnology and quantum technology as particularly concerning, because they are 'dual-use', meaning they could be used for civil and military applications and to undermine or violate human rights.</p><p>So Nakasone is doing what he can to make NSA's efforts to protect AI in defence and national security as effective as possible. That's good, and the NSA is well placed to contribute to the US government's <a href="https://www.whitehouse.gov/wp-content/uploads/2023/05/National-Artificial-Intelligence-Research-and-Development-Strategic-Plan-2023-Update.pdf">broader strategic goals</a> of safe and secure AI.&nbsp;&nbsp;</p><p>There's more that can be done here, though, outside Nakasone's purview.&nbsp;</p><p>When it comes to protecting AI IP, for example, the NSA is well placed to provide advice and even prevent cyber espionage. However, the PRC doesn't restrict itself to just cyber-enabled IP theft and has a holistic approach to acquiring IP that includes both human and cyber espionage. So how is the US addressing threats like insider risk and traditional person-based espionage in an AI IP context?&nbsp;&nbsp;</p><p>It'd be a real shame if the US AI advantage is stolen by people rather than by packets.&nbsp;&nbsp;</p><h2></h2><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://srslyriskybiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://srslyriskybiz.substack.com/subscribe?"><span>Subscribe now</span></a></p><h2>Rich Pickings at the Network Edge&nbsp;</h2><p>A Mandiant report <a href="https://www.mandiant.com/resources/blog/time-to-exploit-trends-2021-2022">released this week</a> found that 62% of exploited-in-the-wild vulnerabilities are 0days and the remaining 38% are exploited after public disclosure. It also found that the percentage of vulnerabilities attributable to Microsoft, Apple and Google has declined to less than half the total.</p><p>Mandiant observes a consistent decrease in what it calls the "time-to-exploit" (TTE), the "time taken to exploit them either prior to or after public disclosure". However, we have a problem with this metric as described in the report, as it combines 0days, which by definition should have a negative TTE (?), with n-days, which have a positive TTE.&nbsp;</p><p>The report says that average TTE has declined over the last several years but then also notes that "n-day exploitation timelines may have grown slightly". Wut.</p><p>There may be a reason to combine 0days and n-days in this way, but we are not seeing it.&nbsp;</p><p>Moving beyond this gripe, the report identifies a consistent trend in the percentage of vulnerabilities found in the top three vendors (Microsoft, Apple and Google) declining over time. Over the last few years less than half the vulnerabilities discovered originate from the three organisations.</p><p>The flipside of this is the targeted exploitation of internet-facing enterprise products that often have broad visibility into a network and/or administrative privileges. These include VPN devices, firewalls, and other products from vendors such as <a href="https://www.cisa.gov/news-events/alerts/2021/04/02/fbi-cisa-joint-advisory-exploitation-fortinet-fortios-vulnerabilities">Fortinet</a>, <a href="https://www.cisa.gov/news-events/alerts/2023/09/06/cisa-releases-update-threat-actors-exploiting-citrix-cve-2023-3519-implant-webshells">Citrix</a>, <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa21-110a">PulseSecure</a>, <a href="https://www.cisa.gov/news-events/alerts/2023/04/18/apt28-exploits-known-vulnerability-carry-out-reconnaissance-and-deploy-malware-cisco-routers">Cisco</a> and others.</p><p>The sterling example of this (if sterling was horrible) is the Cl0p ransomware gang&#8217;s sustained targeting of enterprise file transfer systems. Since 2020 it has launched <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-158a">sequential campaigns</a> against Accellion's File Transfer Appliance, <a href="https://www.bleepingcomputer.com/news/security/clop-ransomware-claims-it-breached-130-orgs-using-goanywhere-zero-day/">Fortra's GoAnywhere Managed File Transfer</a> product and Progress Software's MOVEit file transfer software. Just this week we saw exploitation kick off against another Progress Software product, WS_FTP. (<em>Risky Business News</em> has <a href="https://riskybiznews.substack.com/p/ransomware-gangs-go-after-teamcity-ws-ftp">more coverage</a>).</p><p>In terms of victims affected, Cl0p's MOVEit campaign is perhaps the largest of all time. Cybersecurity firm EMSISOFT <a href="https://www.emsisoft.com/en/blog/44123/unpacking-the-moveit-breach-statistics-and-analysis/">has found</a> that 2,309 organisations and 62 million individuals have been affected by the campaign. It's also been lucrative for Cl0p. Ransomware incident response firm Coveware estimates that the gang may earn from USD75m to 100m from the MOVEit campaign alone.</p><p>Cl0p has shown that there is gold in exploiting enterprise software, so we expect that threat actors will continue to focus on enterprise network edge devices.</p><h2>Three Reasons to Be Cheerful this Week:</h2><ol><li><p><strong>SEC rule changes encourage cyber security strengthening:</strong> A poll of publicly traded companies <a href="https://www.cybersecuritydive.com/news/c-suite-cybersecurity-sec-disclosure/695425/">has found</a> that nearly two-thirds of them are strengthening their cyber security programs in the wake of changes to SEC disclosure rules.&nbsp;&nbsp;</p></li><li><p><strong>Strengthened anti-spam email protections:</strong> Google <a href="https://blog.google/products/gmail/gmail-security-authentication-spam-protection/">has announced</a> it will tighten its requirements for "bulk senders" of email, including requiring them to use <a href="https://help.proofpoint.com/Proofpoint_Essentials/Email_Security/User_Topics/DKIM_and_DMARC">SPF/DKIM and DMARC</a> email authentication protocols and enable recipients to unsubscribe with a single click.&nbsp;&nbsp;</p></li><li><p><strong>Pig butchering ring busted:</strong> Thai police, with help from the US Department of Homeland Security and cryptocurrency exchange Binance, have <a href="https://www.binance.com/en/blog/ecosystem/binance-aids-royal-thai-police-in-crackdown-on-criminal-networks-9108477038245506340">disrupted</a> a <a href="https://srslyriskybiz.substack.com/p/pig-butchering-is-even-worse-than">'pig butchering'</a> criminal group. The Thai police's Cyber Crime Investigation Bureau seized assets worth USD$277m, including luxury cars and real estate. Over 3,200 victims have come forward seeking compensation.&nbsp;</p></li></ol><h2>Sponsor Section</h2><p><em>In <a href="https://risky.biz/RBNEWSSI16">this sponsored podcast</a> Proofpoint&#8217;s Selena Larson talks with Tom Uren about recent changes in the e-crime ecosystem.</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/risky-biz-sponsor-interview-the-e-crime-ecosystem-is/id1621305970?i=1000629840052&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000629840052.jpg&quot;,&quot;title&quot;:&quot;Risky Biz Sponsor Interview: The e-crime ecosystem is changing&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/risky-biz-sponsor-interview-the-e-crime-ecosystem-is/id1621305970?i=1000629840052&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2023-10-01T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/risky-biz-sponsor-interview-the-e-crime-ecosystem-is/id1621305970?i=1000629840052" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><h2>Shorts</h2><h3>Counting the Cost of Microsoft's Storm-0558 Hack</h3><p><em>Reuters</em> <a href="https://www.reuters.com/world/us/chinese-hackers-stole-60000-emails-us-state-department-microsoft-hack-senate-2023-09-27/">reports that</a> the hack of Microsoft's email services resulted in the theft of 60,000 emails from 10 State Department accounts by a Chinese state-linked threat actor known as Storm-0558. Around 25 organisations were affected but it hasn't been reported what the group took from the other victims.&nbsp;</p><h3>AWS Talks Honeypots</h3><p>Amazon Web Services has published <a href="https://aws.amazon.com/blogs/security/how-aws-threat-intelligence-deters-threat-actors/">a piece</a> describing its "MadPot" honeypot system and it contains some interesting nuggets. When a new MadPot sensor is created it is typically discovered by internet scanning probes within 90 seconds. On average, it only takes three minutes after discovery before attempts are made to penetrate and exploit it, even though, in the words of the post, "these workloads aren&#8217;t advertised or part of other visible systems that would be obvious to threat actors".&nbsp;</p><p>The post also describes how MadPot was used to identify activity by Volt Typhoon, a state-sponsored China-based actor that has <a href="https://srslyriskybiz.substack.com/p/why-chinas-latest-apt-campaign-is">targeted critical infrastructure</a>. Even though the group used relatively stealthy 'living off the land' techniques, the MadPot system had captured data on a Volt Typhoon payload containing a unique signature. MadPot historical data was queried with this signature to identify other IP addresses that Volt Typhoon had used and correlate activity that would otherwise appear to be unrelated.</p><h3>From Timbuktu to Tokyo</h3><p>US and Japanese authorities <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-270a">have warned</a> that China-linked cyber actors are compromising international subsidiaries of US and Japanese companies as beachheads to target the companies&#8217; headquarters.</p><p>The threat actors gain administrative access to Cisco routers at the subsidiary firms and then install custom malicious firmware.&nbsp;</p><h2>Risky Biz Talks</h2><p><em>You can find the audio edition of this newsletter and other fine podcasts and interviews in the Risky Biz News feed (<a href="https://risky.biz/feeds/risky-business-news">RSS</a>, <a href="https://podcasts.apple.com/au/podcast/risky-business-news/id1621305970">iTunes</a> or <a href="https://open.spotify.com/show/0BdExoUZqbGsBYjt6QZl4Q">Spotify</a>).&nbsp;&nbsp;</em></p><p><em>In <a href="https://risky.biz/BTN52/">our last</a> "Between Two Nerds" discussion Tom Uren and <a href="https://twitter.com/thegrugq">The Grugq</a> look at whether offensive cyber operations against ransomware groups have succeeded or failed.</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/between-two-nerds-have-offensive-cyber-operations-against/id1621305970?i=1000629970508&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000629970508.jpg&quot;,&quot;title&quot;:&quot;Between Two Nerds: Have offensive cyber operations against ransomware groups failed?&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/between-two-nerds-have-offensive-cyber-operations-against/id1621305970?i=1000629970508&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2023-10-03T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/between-two-nerds-have-offensive-cyber-operations-against/id1621305970?i=1000629970508" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><h2></h2><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://srslyriskybiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Seriously Risky Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>From <a href="https://riskybiznews.substack.com/">Risky Biz News</a>:</h2><p><strong>Ransomware gangs hit TeamCity and WS_FTP servers:</strong> Ransomware groups are exploiting recently disclosed vulnerabilities in TeamCity and WS_FTP servers to breach corporate networks and ransom organisations.</p><p>The attacks are exploiting <a href="https://www.sonarsource.com/blog/teamcity-vulnerability/">CVE-2023-42793</a> and <a href="https://www.assetnote.io/resources/research/rce-in-progress-ws-ftp-ad-hoc-via-iis-http-modules-cve-2023-40044">CVE-2023-40044</a>.</p><p>The first is an authentication bypass and RCE vulnerability that can allow threat actors to take full control of JetBrains TeamCity CI/CD servers. Once on the development pipeline, threat actors can pivot to other resources on a company's internal or cloud network, from where ransomware gangs can do extensive damage.</p><p>The second is a remote code execution in WS_FTP, a file-transfer application developed by Progress Software&#8212;the same company that also made the MOVEit file-sharing server, heavily exploited by the Clop gang earlier this year in hacks that impacted more than 2,000 organisations. This bug is particularly nasty because it can be exploited with one HTTPS POST request.</p><p>[<a href="https://riskybiznews.substack.com/p/ransomware-gangs-go-after-teamcity-ws-ftp">more</a> on <em>Risky Business News</em>]</p><p><strong>Disclosure snafu delays critical Exim patch more than a year:</strong> A critical vulnerability impacting more than 3.5 million Exim email servers has remained unpatched for more than 15 months in one of the most egregious instances of vulnerability disclosure snafus in recent history.</p><p>Tracked as <a href="https://www.zerodayinitiative.com/advisories/ZDI-23-1469/">CVE-2023-42115</a>, the vulnerability is a no-authentication remote code execution with a severity rating of 9.8/10.</p><p>[<a href="https://riskybiznews.substack.com/p/disclosure-snafu-delays-exim-patch-a-year">more</a> on <em>Risky Business News, </em>including an explanation of how it is hard to blame any of the parties involved even though it is still a huge cluster]</p><p><strong>Chinese APT hacks subsidiaries, pivots to corporate headquarters:</strong> Cybersecurity agencies from Japan and the US have issued a <a href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3539209/us-and-japanese-agencies-issue-advisory-about-china-linked-actors-hiding-in-rou/">joint</a> <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-270a">security</a>&nbsp; <a href="https://www.npa.go.jp/bureau/cyber/koho/caution/caution20230927.html">advisory</a> about a Chinese APT group that is hacking the overseas subsidiaries of US and Japanese companies and then pivoting to their corporate headquarters.</p><p>Known as BlackTech (Palmerworm, Temp.Overboard, Circuit Panda, and Radio Panda), the group targets internet-facing routers as their entry point into victim networks.</p><p>To maintain access, the group hot-patches the router firmware with a modified version that bypasses security features and contains a built-in SSH backdoor to maintain future access.</p><p>[<a href="https://riskybiznews.substack.com/p/chinese-apt-hacks-subsidiaries">more</a> on <em>Risky Business News</em>]</p>]]></content:encoded></item><item><title><![CDATA[Lapsus$: From Flash in the Pan to Raging Fire]]></title><description><![CDATA[PLUS: Russia Drops the Cyber Hammer for the Sickle]]></description><link>https://srslyriskybiz.substack.com/p/lapsus-from-flash-in-the-pan-to-raging</link><guid isPermaLink="false">https://srslyriskybiz.substack.com/p/lapsus-from-flash-in-the-pan-to-raging</guid><dc:creator><![CDATA[Tom Uren]]></dc:creator><pubDate>Thu, 28 Sep 2023 03:57:42 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76bb6a6e-25a3-44d7-a637-a31e98280556_1344x768.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Your weekly dose of Seriously Risky Business news is written by <a href="https://twitter.com/tomatospy">Tom Uren</a> and edited by <a href="https://twitter.com/riskybusiness">Patrick Gray</a>. It's supported by the Cyber Initiative at the <a href="https://hewlett.org/programs/cyber/">Hewlett Foundation</a> and this week's edition is brought to you by Stairwell.</em></p><p><em>You can subscribe to an audio version of this newsletter as a podcast by searching for "Risky Business News" in your podcatcher or subscribing via <a href="https://risky.biz/feeds/risky-business-news/">this RSS feed</a>. Find this edition <a href="https://risky.biz/SRB50">here</a> and on Apple podcasts:</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/srsly-risky-biz-the-cyber-yoofs-must-be-stopped/id1621305970?i=1000629461137&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000629461137.jpg&quot;,&quot;title&quot;:&quot;Srsly Risky Biz: The cyber-yoofs must be stopped!&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/srsly-risky-biz-the-cyber-yoofs-must-be-stopped/id1621305970?i=1000629461137&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2023-09-28T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/srsly-risky-biz-the-cyber-yoofs-must-be-stopped/id1621305970?i=1000629461137" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!uBy3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76bb6a6e-25a3-44d7-a637-a31e98280556_1344x768.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!uBy3!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76bb6a6e-25a3-44d7-a637-a31e98280556_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!uBy3!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76bb6a6e-25a3-44d7-a637-a31e98280556_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!uBy3!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76bb6a6e-25a3-44d7-a637-a31e98280556_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!uBy3!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76bb6a6e-25a3-44d7-a637-a31e98280556_1344x768.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!uBy3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76bb6a6e-25a3-44d7-a637-a31e98280556_1344x768.png" width="1344" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/76bb6a6e-25a3-44d7-a637-a31e98280556_1344x768.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1344,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1565074,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!uBy3!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76bb6a6e-25a3-44d7-a637-a31e98280556_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!uBy3!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76bb6a6e-25a3-44d7-a637-a31e98280556_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!uBy3!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76bb6a6e-25a3-44d7-a637-a31e98280556_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!uBy3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76bb6a6e-25a3-44d7-a637-a31e98280556_1344x768.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Raging Fire, Stable Diffusion</figcaption></figure></div><p>Teenage hackers have breached systems at Caesars Entertainment and MGM Resorts International, two large US resort, entertainment and gaming companies. These incidents showcase how hacking groups comprising young people <a href="https://srslyriskybiz.substack.com/i/136390816/advanced-persistent-teenagers">using Lapsus$-style techniques</a> are becoming one of the greatest cyber security threats to organisations.&nbsp;</p><p>Both hacks had significant impact.</p><p>Caesars Entertainment <a href="https://www.casino.org/vitalvegas/caesars-entertainment-paid-millions-to-hackers-now-look-like-geniuses/">reportedly paid</a> a ransom of USD$15m after the group stole personal information from its loyalty program database, including driver licence and social security numbers. The organisation&#8217;s <a href="https://investor.caesars.com/node/33686/html">SEC filing</a> uses a form of words that we suspect will become standard when paying a data extortion ransom:</p><blockquote><p>We have taken steps to ensure that the stolen data is deleted by the unauthorised actor, although we cannot guarantee this result.&nbsp;</p></blockquote><p>In some respects, Caesars Entertainment got off lightly because it experienced very little business downtime.&nbsp;</p><p>By contrast, MGM Resorts, Nevada&#8217;s largest employer and operator of the most casinos on the Las Vegas Strip, suffered a <a href="https://abcnews.go.com/Business/mgm-reeling-cyber-chaos-5-days-after-attack/story?id=103148809">series of crippling outages</a>. These included doors and elevators not working, ATMs and its website going down, credit card payment facilities being unavailable and guests being unable to use their room keycards.</p><p><a href="https://www.ft.com/content/a25d2897-b0ce-4ba7-92ed-ff5df09d1b47">Media reporting</a> and a <a href="https://twitter.com/BrettCallow/status/1702415605612331061">statement from the ALPHV ransomware group</a> said much of this disruption was caused by MGM Resorts&#8217; own attempts to limit further compromise by preemptively shutting down systems.&nbsp;</p><p><a href="https://www.cybersecuritydive.com/news/mgm-resorts-caesars-attacks-hospitality/693689/">Various</a> <a href="https://www.ft.com/content/a25d2897-b0ce-4ba7-92ed-ff5df09d1b47">media</a> <a href="https://www.reuters.com/technology/power-influence-notoriety-gen-z-hackers-who-struck-mgm-caesars-2023-09-22/">reports</a> attribute these recent incidents to threat actors variously known as Scattered Spider, Muddled Libra, and UNC3944. The parties involved <a href="https://twitter.com/BrettCallow/status/1702688840807547033">appear to be working</a> with the ALPHV ransomware group.</p><p>These actors appear to be <a href="https://twitter.com/Adam_Cyber/status/1702772894709780744?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1702772894709780744%7Ctwgr%5E85e52cf2b44847669f324664d60441b9d7901190%7Ctwcon%5Es1_&amp;ref_url=https%3A%2F%2Fwww.reuters.com%2Ftechnology%2Fpower-influence-notoriety-gen-z-hackers-who-struck-mgm-caesars-2023-09-22%2F">responsible for </a><em><a href="https://twitter.com/Adam_Cyber/status/1702772894709780744?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1702772894709780744%7Ctwgr%5E85e52cf2b44847669f324664d60441b9d7901190%7Ctwcon%5Es1_&amp;ref_url=https%3A%2F%2Fwww.reuters.com%2Ftechnology%2Fpower-influence-notoriety-gen-z-hackers-who-struck-mgm-caesars-2023-09-22%2F">lots</a></em><a href="https://twitter.com/Adam_Cyber/status/1702772894709780744?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1702772894709780744%7Ctwgr%5E85e52cf2b44847669f324664d60441b9d7901190%7Ctwcon%5Es1_&amp;ref_url=https%3A%2F%2Fwww.reuters.com%2Ftechnology%2Fpower-influence-notoriety-gen-z-hackers-who-struck-mgm-caesars-2023-09-22%2F"> of incidents</a>. Crowdstrike <a href="https://www.reuters.com/technology/power-influence-notoriety-gen-z-hackers-who-struck-mgm-caesars-2023-09-22/">told </a><em><a href="https://www.reuters.com/technology/power-influence-notoriety-gen-z-hackers-who-struck-mgm-caesars-2023-09-22/">Reuters</a></em> it attributed 52 attacks globally to Scattered Spider since March 2022. (Scattered Spider is Crowdstrike's name). Similarly, Mandiant told <em>Reuters</em> that it attributed 100 intrusions in the last two years to UNC3944 (Mandiant's name). Mandiant's <a href="https://www.mandiant.com/resources/blog/unc3944-sms-phishing-sim-swapping-ransomware">report on the 'threat cluster'</a>, released just over two weeks ago, says that UNC3944's targeting has expanded to "a wide range of industries including hospitality, retail, media and entertainment, and financial services".&nbsp;&nbsp;</p><p><a href="https://cyberscoop.com/youth-hacking-ring-at-the-center-of-cybercrime-spree/">Interesting reporting</a> from <em>CyberScoop</em> attributes these recent breaches to multiple subsets of actors that have sprung out of an online community calling itself "the Com", as opposed to a single group with a fixed membership. The Com appears to be particularly nasty. Per <em>CyberScoop</em>:</p><blockquote><p>The FBI has been involved in multiple investigations involving people associated with the Com for alleged violent activity, <a href="https://www.vice.com/en/article/k7zbma/the-comm-acg-group-linked-to-nationwide-swatting">Vice reported in May</a>. In <a href="https://www.documentcloud.org/documents/23830461-williams_complaint">a May 2023 affidavit</a>, an FBI agent described the Com as a "group of cyber-criminal actors" that is "geographically diverse" and organises in various subgroups to "engage in various types of criminal activity to include cyber intrusions, SIM swapping, cryptocurrency theft, commissioning real life violence, and Swatting," the practice of sending armed emergency response teams to a victim&#8217;s location under false pretences.</p></blockquote><p>The Com ecosystem also had links to the Lapsus$ group, a loosely affiliated group of teenage hackers that was so outrageously successful that it was the subject of a Cyber Safety Review Board (CSRB) <a href="https://www.cisa.gov/resources-tools/resources/review-attacks-associated-lapsus-and-related-threat-groups-report">report released late last month</a>.</p><p>Mandiant's report into the tactics used by UNC3944 describes brutally efficient operations:</p><blockquote><p>UNC3944 relies heavily on social engineering to obtain initial access to its victims. They frequently use SMS phishing campaigns and calls to victim help desks to attempt to obtain password resets or multifactor bypass codes.</p><p>The threat actors used commercial residential proxy services to access their victims from the same local area to fly under the radar of security monitoring tools.</p><p>The threat actors consistently use legitimate software, including a variety of remote access tools the actors have downloaded from the vendor websites.</p><p>The threat actors operate with an extremely high operational tempo, accessing critical systems and exfiltrating large volumes of data over a course of a few days. The tempo and volume of systems UNC3944 accesses can overwhelm security response teams.</p><p>Once obtaining a foothold, UNC3944 often spends significant time searching through internal documentation, resources, and internal chat logs to surface information that could help facilitate escalating privileges and maintaining presence within victim environments.</p><p>UNC3944 often achieves privilege escalation by targeting password managers or privileged access management systems.</p></blockquote><p>These recent incidents show that Lapsus$ wasn't a flash in the pan. Instead, it represented a breakthrough in the techniques threat actors use to overcome standard cyber security practices. These practices are no longer fit for purpose.&nbsp;</p><p>For example, attackers used the "Bring Your Own Identity Provider" method <a href="https://srslyriskybiz.substack.com/i/136806708/bring-your-own-identity-provider-attacks">we wrote about</a> earlier this month in the MGM Resorts incident. In this attack, the Com hackers acquired Okta Super Administrator account credentials (probably by phishing) and then convinced the MGM Resorts help desk to reset Multi-Factor Authentication (MFA) options. The attackers then used legitimate functionality to enable further follow-on actions.&nbsp;</p><p>One policy that would have stopped this attack would be to prevent help desk staff from resetting Super Administrator MFA. This seems blindingly obvious in retrospect, but hadn't previously been a widely exploited loophole.&nbsp;</p><p>And although Lapsus$ itself was bad enough, teenage hackers&#8217; collaboration with global ransomware crews is even more worrying. While several individuals involved in Lapsus$ have been arrested and the authorities are pursuing the MGM Resorts and Caesars Entertainment attackers, we don&#8217;t think this will deter other teenage hackers. Part of the CSRB's Lapsus$ report dealt with juvenile cybercrime prevention programs, which certainly seem like a good idea but won't yield any immediate benefits.&nbsp;</p><p>Our advice is to (re-)read the Lapsus$ report and harden your identity procedures and policies.</p><h2></h2><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://srslyriskybiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://srslyriskybiz.substack.com/subscribe?"><span>Subscribe now</span></a></p><h2>Russia Drops the Cyber Hammer for the Sickle</h2><p>Ukraine's cyber security organisation, <a href="https://cip.gov.ua/en/news">the SSSCIP</a>, has identified some new behaviour in its <a href="https://cip.gov.ua/en/news/yak-zminyuyutsya-taktiki-cili-i-spromozhnosti-khakerskikh-grup-uryadu-rf-ta-kontrolovanikh-nim-ugrupovan-zvit">review of Russian cyber tactics</a> over the first half of 2023.</p><p>One new trend is what the report describes as "sustained interest" in Ukrainian law enforcement agencies. The SSSCIP believes the goal here is to find out what evidence Ukraine has regarding Russian war crimes and also to understand what information Ukraine has about Russian spies operating in the country.</p><p>The report found Russia was more frequently directing cyber operations at the Ukrainian private sector to enhance the monitoring of the outcomes of its kinetic operations, including missile and drone attacks.&nbsp;</p><p>This is in contrast to Russia's previous 'kitchen sink' approach of launching both destructive conventional and cyber attacks against critical infrastructure. There was also a shift to gathering intelligence about the Ukrainian supply chain.&nbsp;</p><p>These are all more sensible uses of cyber operations and attempt to complement rather than duplicate other capabilities.&nbsp;</p><p>Russian threat actors are also focusing on immediate data exfiltration, dumping as many as 21,000 documents and browser credentials within the first 30 minutes after gaining access. After stealing that data, they try to take advantage of established trust relationships by sending malware via email, for example.&nbsp;</p><p>The SSSCIP believes this is because Ukrainian detection and response times have improved so much that the Russians don't have time for lateral movement before they are booted off networks.&nbsp;</p><p>Another interesting aspect is the Russian focus on the media sector. This primarily targets&nbsp; individuals and journalists and the SSSCIP says "the goal behind these attacks is to gain control over media resources and accounts, intending to employ them for disinformation campaigns and influence operations".&nbsp;</p><p>The report highlights a number of other trends, including more phishing attacks, less malware, more 'living off the land' (abusing legitimate tools already present in the host environment), ongoing targeting of email servers and revisiting previous victims.&nbsp;</p><h2>Microsoft Security Culture&#8230; Still Sucks</h2><p>The week after we wrote that <a href="https://srslyriskybiz.substack.com/p/pig-butchering-is-even-worse-than">Microsoft's security culture isn't up to scratch</a>, cloud security firm Wiz discovered a <a href="https://www.wiz.io/blog/38-terabytes-of-private-data-accidentally-exposed-by-microsoft-ai-researchers">38TB data leak</a> from the company.&nbsp;</p><p>The leak happened because of a misconfigured Azure Shared Access Signature (SAS) token. Mistakes happen, but the architectural decisions here are mind-blowing. Per Wiz's blog:</p><blockquote><p>Generating an Account SAS is a simple process&#8230; [T]he user configures the token&#8217;s scope, permissions, and expiry date, and generates the token. Behind the scenes, the browser downloads the account key from Azure, and signs the generated token with the key. This entire process is done on the client side; it&#8217;s not an Azure event, and the resulting token is not an Azure object.&nbsp;</p><p>Because of this, when a user creates a highly-permissive non-expiring token, there is no way for an administrator to know this token exists and where it circulates. Revoking a token is no easy task either &#8212; it requires rotating the account key that signed the token, rendering all other tokens signed by the same key ineffective as well. These unique pitfalls make this service an easy target for attackers looking for exposed data.&nbsp;</p><p>Besides the risk of accidental exposure, the service&#8217;s pitfalls make it an effective tool for attackers seeking to maintain persistency on compromised storage accounts. A recent Microsoft report indicates that attackers are taking advantage of the service&#8217;s lack of monitoring capabilities in order to issue privileged SAS tokens as a backdoor. Since the issuance of the token is not documented anywhere, there is no way to know that it was issued and act against it.&nbsp;&nbsp;</p></blockquote><p>Yikes. Patrick, Adam and guest Lina Lau discussed this on <a href="https://risky.biz/RB722">last week's</a> <em>Risky Business</em> podcast.</p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/risky-business-722-microsoft-embraces-zero-trust-authentication/id216478078?i=1000628529523&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000628529523.jpg&quot;,&quot;title&quot;:&quot;Risky Business #722 -- Microsoft embraces Zero Trust... Authentication?&quot;,&quot;podcastTitle&quot;:&quot;Risky Business&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/risky-business-722-microsoft-embraces-zero-trust-authentication/id216478078?i=1000628529523&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2023-09-20T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/risky-business-722-microsoft-embraces-zero-trust-authentication/id216478078?i=1000628529523" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><h2>Three Reasons to be Cheerful this Week:</h2><ol><li><p><strong>Regional effort to tackle Asian scam networks:</strong> China, the United Nations, and ASEAN are joining forces to crack down on cyber-enabled scams including what is known as '<a href="https://srslyriskybiz.substack.com/p/pig-butchering-is-even-worse-than">pig butchering</a>'. [Additional coverage in the<em> <a href="https://www.scmp.com/week-asia/economics/article/3235813/asias-scam-menace-prompts-rare-china-asean-un-unified-response">South China Morning Post</a></em>]</p></li><li><p><strong>Hunt Forward the new norm:</strong> The UK government has admitted that it too conducts "<a href="https://www.cybercom.mil/Media/News/Article/3218642/cyber-101-hunt-forward-operations/">hunt forward</a>" operations. These are operations that find and disrupt adversary activity on partner networks and were pioneered by US Cyber Command. <em>The Record</em> has <a href="https://therecord.media/uk-hunt-forward-operations-lt-gen-tom-copinger-symes">an interview</a> with Lt. Gen. Tom Copinger-Symes, deputy commander of the UK's Strategic Command about the UK's hunt forward and other cyber operations.</p></li><li><p><strong>Blocking outbound NTLM hashes:</strong> Microsoft <a href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-ntlm-blocking-now-supported-in-windows-insider/ba-p/3916206">has announced</a> that Windows 11 will soon block sending of <a href="https://en.wikipedia.org/wiki/NTLM">NTLM</a> over remote outbound connections. This should block remote attackers from tricking Server Message Block (<a href="https://en.wikipedia.org/wiki/Server_Message_Block">SMB</a>) clients into sending them a relatively easy to crack NTLM authentication hash.&nbsp;</p></li></ol><h2>Sponsor Section</h2><p><em>In this Risky Business News <a href="https://risky.biz/RBNEWSSI15">sponsor interview</a>, Catalin Cimpanu talks with Stairwell Principal Reverse Engineer Silas Cutler about Akira's recent server leak and attacker infrastructure.</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/sponsored-stairwells-silas-cutler-on-the-akira-leak/id1621305970?i=1000629022307&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000629022307.jpg&quot;,&quot;title&quot;:&quot;Sponsored: Stairwell's Silas Cutler on the Akira leak and attacker infrastructure&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/sponsored-stairwells-silas-cutler-on-the-akira-leak/id1621305970?i=1000629022307&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2023-09-24T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/sponsored-stairwells-silas-cutler-on-the-akira-leak/id1621305970?i=1000629022307" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><h2></h2><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://srslyriskybiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Seriously Risky Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Shorts</h2><h3>Deduplicating Cyber Incident Reporting</h3><p><em>The Record</em> has a <a href="https://therecord.media/dhs-floats-single-cyber-incident-reporting-portal">good account</a> of a US Department of Homeland Security (DHS) <a href="https://www.dhs.gov/sites/default/files/2023-09/DHS%20Congressional%20Report%20-%20Harmonization%20of%20Cyber%20Incident%20Reporting%20to%20the%20Federal%20Government.pdf">document released last week</a> on harmonising cyber incident reporting to the federal government. Already there are 45 cyber incident reporting requirements across 22 federal agencies, with more proposed, yet some of the requirements are just duplicates of others rather than&nbsp; providing more necessary information.&nbsp;</p><p>The document pretty sensibly suggests rationalising these requirements and having clear and shared definitions for timelines and triggers. It suggests that a single incident reporting portal could be developed. Pretty sensible stuff.&nbsp;</p><h3>Reducing Hardware Supply Chain Risk</h3><p>The US Cybersecurity and Infrastructure Security Agency released its first version of the <a href="https://www.cisa.gov/news-events/news/cisa-releases-hardware-bill-materials-framework-hbom-supply-chain-risk-management-scrm">Hardware Bill of Materials (HBOM) framework</a>. It's meant to mitigate supply chain risks for hardware products. <em>Risky Business News</em> has <a href="https://riskybiznews.substack.com/p/cisa-releases-hbom-framework">more coverage</a>.&nbsp;&nbsp;</p><h2>Risky Biz Talks</h2><p><em>You can find the audio edition of this newsletter and other fine podcasts and interviews in the Risky Biz News feed (<a href="https://risky.biz/feeds/risky-business-news">RSS</a>, <a href="https://podcasts.apple.com/au/podcast/risky-business-news/id1621305970">iTunes</a> or <a href="https://open.spotify.com/show/0BdExoUZqbGsBYjt6QZl4Q">Spotify</a>).&nbsp;&nbsp;</em></p><p><em>In <a href="https://risky.biz/BTN51">our last</a> "Between Two Nerds" discussion Tom Uren and <a href="https://twitter.com/thegrugq">The Grugq</a> examine how US and UK strategies to use cyber power differ but are in some ways mirror images of each other.</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/between-two-nerds-why-the-uk-and-us-cyber-strategies/id1621305970?i=1000629141051&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000629141051.jpg&quot;,&quot;title&quot;:&quot;Between Two Nerds: Why the UK and US Cyber Strategies are Mirror Images&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/between-two-nerds-why-the-uk-and-us-cyber-strategies/id1621305970?i=1000629141051&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2023-09-25T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/between-two-nerds-why-the-uk-and-us-cyber-strategies/id1621305970?i=1000629141051" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><h2>From <a href="https://riskybiznews.substack.com/">Risky Biz News</a>:</h2><p><strong>China admits NSA hacked Huawei:</strong> China's Ministry of State Security (MSS) published an extremely rare <a href="https://mp.weixin.qq.com/s/FNOb9IAnMe7-wiDTA6HlxQ">official statement</a> on its WeChat account last week formally accusing the US National Security Agency of hacking and maintaining access to servers at Huawei's headquarters since 2009.</p><p>The statement is the first time the Chinese government has confirmed the NSA's Huawei hack&#8212;first reported by the <a href="https://www.nytimes.com/2014/03/23/world/asia/nsa-breached-chinese-servers-seen-as-spy-peril.html">New York Times</a> and <a href="https://www.spiegel.de/international/world/nsa-spied-on-chinese-government-and-networking-firm-huawei-a-960199.html">Der Spiegel</a> back in 2014.</p><p>The MSS statement doesn't go into any technical details about the actual hacking but merely recycles information from the NYT and Spiegel reports and the Snowden leaks. It does, instead, spend a lot of time accusing the US of using (and I kid you not) "the despicable tactics of the 'Matrix' to maintain a 'cyber hegemony'."</p><p>[<a href="https://riskybiznews.substack.com/p/china-says-nsa-hacked-huawei">more</a> on <em>Risky Business News</em>]</p><p><strong>Lazarus steals $54 million from CoinEx crypto-exchange: </strong>North Korean hackers known as the Lazarus Group have stolen $54 million from the CoinEx cryptocurrency exchange.</p><p>The hack took place on Tuesday, September 12. In a <a href="https://announcement.coinex.com/hc/en-us/articles/19187420867348-Latest-Progress-of-the-Hacking-Attack-on-Sep-12-2023-Updated-on-Sep-14-">statement</a>, CoinEx said the hackers identified a leak of some of its private keys and used them to steal Ether, Tron, and Matic assets from some of the company's hot wallets.</p><p>The company didn't formally link the hack to North Korea, but a blockchain investigator named ZachXBT <a href="https://archive.ph/IPO6b">found</a> that some of CoinEx's stolen funds were sent to the same address that is storing funds stolen from the recent hack of the Stake.com crypto-gambling site.</p><p>[<a href="https://riskybiznews.substack.com/p/north-korean-hackers-are-behind-coinex-hack">more</a> on <em>Risky Business News</em>]</p><p><strong>FSB agent detained:</strong> Russian authorities have arrested an FSB officer from the city of Perm for taking a bribe from a hacking group to arrange their release from prison and dismissal of their criminal case. The bribe was 100 million rubles, representing more than $1 million. The officer was detained in April this year, and his detention has been extended until November. The name of the criminal gang who paid the bribe is unknown. The gang was detained in <a href="https://tass.ru/obschestvo/13637797">February 2022</a>, and it is not related to the REvil and Infraud arrests that took place at the time (likely related to this <a href="https://www.justice.gov/usao-nj/pr/russian-national-charged-bank-fraud-related-hacking-campaign">US case</a>). [h/t Oleg Shakirov; Additional coverage in <a href="https://www.kommersant.ru/doc/6212079">Kommersant</a>]</p>]]></content:encoded></item><item><title><![CDATA[Microsoft's Security Culture Just Isn't up to Scratch ]]></title><description><![CDATA[PLUS: The UK Goverment Helps Itself]]></description><link>https://srslyriskybiz.substack.com/p/microsofts-security-culture-just</link><guid isPermaLink="false">https://srslyriskybiz.substack.com/p/microsofts-security-culture-just</guid><dc:creator><![CDATA[Tom Uren]]></dc:creator><pubDate>Thu, 14 Sep 2023 05:53:08 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79bebdd9-4c60-497b-8616-1a909000d58c_1344x768.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Your weekly dose of Seriously Risky Business news is written by <a href="https://twitter.com/tomatospy">Tom Uren</a> and edited by <a href="https://twitter.com/riskybusiness">Patrick Gray</a>. It's supported by the Cyber Initiative at the <a href="https://hewlett.org/programs/cyber/">Hewlett Foundation</a> and this week's edition is brought to you by <a href="https://redcanary.com/">Red Canary</a>.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://srslyriskybiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://srslyriskybiz.substack.com/subscribe?"><span>Subscribe now</span></a></p><p><em>You can subscribe to an audio version of this newsletter as a podcast by searching for "Risky Business News" in your podcatcher or subscribing via <a href="https://risky.biz/feeds/risky-business-news/">this RSS feed</a>. Find this edition <a href="https://risky.biz/SRB49/">here</a> and on Spotify:</em></p><iframe class="spotify-wrap podcast" data-attrs="{&quot;image&quot;:&quot;https://i.scdn.co/image/ab6765630000ba8aff2258f005c4c2a1b48d6904&quot;,&quot;title&quot;:&quot;Srsly Risky Biz: Microsoft's security culture sucks&quot;,&quot;subtitle&quot;:&quot;risky.biz&quot;,&quot;description&quot;:&quot;Episode&quot;,&quot;url&quot;:&quot;https://open.spotify.com/episode/0hNYmM0h5qZVipezyv1QvM&quot;,&quot;belowTheFold&quot;:false,&quot;noScroll&quot;:false}" src="https://open.spotify.com/embed/episode/0hNYmM0h5qZVipezyv1QvM" frameborder="0" gesture="media" allowfullscreen="true" allow="encrypted-media" data-component-name="Spotify2ToDOM"></iframe><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!nQS5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79bebdd9-4c60-497b-8616-1a909000d58c_1344x768.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!nQS5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79bebdd9-4c60-497b-8616-1a909000d58c_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!nQS5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79bebdd9-4c60-497b-8616-1a909000d58c_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!nQS5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79bebdd9-4c60-497b-8616-1a909000d58c_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!nQS5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79bebdd9-4c60-497b-8616-1a909000d58c_1344x768.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!nQS5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79bebdd9-4c60-497b-8616-1a909000d58c_1344x768.png" width="1344" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/79bebdd9-4c60-497b-8616-1a909000d58c_1344x768.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1344,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1312197,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!nQS5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79bebdd9-4c60-497b-8616-1a909000d58c_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!nQS5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79bebdd9-4c60-497b-8616-1a909000d58c_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!nQS5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79bebdd9-4c60-497b-8616-1a909000d58c_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!nQS5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79bebdd9-4c60-497b-8616-1a909000d58c_1344x768.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Security culture, Stable Diffusion</figcaption></figure></div><p>Last week, Microsoft released its <a href="https://msrc.microsoft.com/blog/2023/09/results-of-major-technical-investigations-for-storm-0558-key-acquisition/">latest report</a> into how its services <a href="https://srslyriskybiz.substack.com/p/we-need-cloud-transparency-mandates">were compromised</a> by a China-based actor it called Storm-0558. It's an eye opening document that raises some red flags about Microsoft's security culture.</p><p>To summarise the incident briefly, Storm-0558 used a Microsoft Account (MSA) signing key to gain access to the email accounts of individuals in businesses and in government departments including the US Department of State and the US Department of Commerce. For several reasons this hack should not have worked, yet Storm-0558 was able to take advantage of multiple flaws in Microsoft processes to achieve its objectives.</p><p>From the perspective of someone who has worked in high-security environments, some of these flaws are absolutely bewildering.&nbsp;</p><p>They raise serious concerns about the way Microsoft approaches security.&nbsp;&nbsp;</p><p>For example, in this incident an MSA consumer key was able to access enterprise accounts. This is explained in Microsoft's report:</p><blockquote><p>To meet growing customer demand to support applications which work with both consumer and enterprise applications, Microsoft introduced a common key metadata publishing endpoint in September 2018. As part of this converged offering, Microsoft updated documentation to clarify the requirements for key scope validation &#8211; which key to use for enterprise accounts, and which to use for consumer accounts.&nbsp;&nbsp;</p><p>As part of a pre-existing library of documentation and helper APIs, Microsoft provided an API to help validate the signatures cryptographically but did not update these libraries to perform this scope validation automatically (this issue has been corrected). The mail systems were updated to use the common metadata endpoint in 2022. Developers in the mail system incorrectly assumed libraries performed complete validation and did not add the required issuer/scope validation. Thus, the mail system would accept a request for enterprise email using a security token signed with the consumer key (this issue has been corrected using the updated libraries).&nbsp;&nbsp;</p></blockquote><p>Microsoft combined two systems that had been logically separated, but apparently it never occurred to anyone involved in the process that in doing so, they should update the software libraries to enforce access boundaries. In a security-conscious organisation this change in architecture would be identified as a potential security risk very early in the process and mitigations developed, implemented, and tested.&nbsp;</p><p>As it was&#8230; it appears that everyone thought enforcing security boundaries was someone else's job and so nothing happened.</p><p>Additionally, the purloined key notionally expired in April 2021 but was successfully used by Storm-0558 in 2023. Microsoft systems weren't enforcing key expiration dates because&#8230; why? No one thought to confirm that keys expired in practice?</p><p>My former colleague at ASD, Vaughan Shanks, CEO of Cydarm and a computer scientist who has worked at both ASD and NSA, described these lapses as "flabbergasting".&nbsp;</p><p>Shanks also pointed to Microsoft's handling of crash dumps in this incident as an indicator of a lax security culture.&nbsp;</p><p>In this compromise, Microsoft believes the key in question was stolen when a consumer signing system crashed in April 2021. Following Microsoft's "standard debugging process" this crash dump was transferred from the company's hardened production environment to the company's debugging system on its corporate network.&nbsp;</p><p>Sometime after April 2021, Storm-0558 compromised a Microsoft engineer&#8217;s corporate account with access to the debugging environment. Microsoft thinks the "most probable" way Storm-0558 obtained the key is by grabbing this crash dump, although the company doesn't have logs with specific evidence of the data being taken because of its log deletion policy.</p><p>Microsoft had several independent measures in place that should have prevented the key from ending up on its corporate network. These measures &#8212; redacting keys from crash dumps and subsequently scanning for key material and credentials at different points in processing &#8212; all failed. Microsoft says that all these technical issues have been fixed, but the broader problem here is that Microsoft prioritised convenience over security.&nbsp;</p><p>That may be OK for some Microsoft systems, but when dealing with the keys to the kingdom why take risks that will not just bite you, but take a huge chunk out of your ass if they are realised?</p><p>"If you are dealing with the fundamental root of trust", Shanks says, "you should probably accept that you need to work in a windowless basement without internet access".&nbsp;</p><p>This isn't an isolated security gaffe and this newsletter has <a href="https://srslyriskybiz.substack.com/p/microsofts-sociopathic-cybersecurity">consistently lamented</a> Microsoft's <a href="https://srslyriskybiz.substack.com/i/41991621/the-first-step-is-realising-you-have-a-problem">approach to security</a>. The mistakes we've highlighted above &#8212; not ensuring scope is respected when systems are combined and treating crash dumps potentially containing signing keys with standard processes &#8212; aren't bizarre edge cases that could catch any organisation by surprise. These are decision-making failures that simply wouldn't happen in an organisation that <em>actually</em> cared about security. This breach didn't happen because of a series of amazing coincidences, it happened because Microsoft's security culture is not up to scratch.</p><h2>UK Government Works Hand in Hand With... Itself</h2><p>The UK's <a href="https://ico.org.uk/">Information Commissioner's Office</a> (ICO) and <a href="https://www.ncsc.gov.uk/">National Cyber Security Centre</a> (NCSC) have <a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2023/09/uk-information-commissioner-and-ncsc-ceo-sign-memorandum-of-understanding/">signed a Memorandum of Understanding</a> (MOU) that will get the two organisations working together to improve cyber security standards.&nbsp;</p><p>Ultimately both organisations share broadly similar strategic goals&#8211;to protect the public and make the UK safer from cyber crime and data breaches. However, some functions and responsibilities the organisations have could discourage firms from engaging with them. For example, where the NCSC might help a firm with incident response, the ICO could potentially fine it for poor cyber security practice.&nbsp;</p><p><a href="https://ico.org.uk/media/about-the-ico/mou/4026408/ico-and-ncsc-mou.pdf">The MOU</a> is a formal attempt to maximise cooperation between the two bodies while minimising the fear that the NCSC might rat out an organisation to the ICO. The ICO's release directly addresses that particular fear, saying the MOU "reaffirms that the NCSC will never pass information shared with it in confidence by an organisation to the ICO".&nbsp;</p><p>For its part, the ICO says it will encourage organisations to engage with the NCSC. In a sentence that would never be written outside government, the ICO says it "commits to exploring how it can transparently demonstrate that meaningful engagement with the NCSC will reduce regulatory penalties". Translated from weasel words to English, this is (may be?) a promise to consider reducing fines for organisations that work with the NCSC.&nbsp;&nbsp;</p><p>In May this year the NCSC and ICO issued a <a href="https://www.ncsc.gov.uk/blog-post/why-more-transparency-around-cyber-attacks-is-a-good-thing-for-everyone">coordinated call</a> for company transparency regarding cyber attacks, especially involving ransomware. They said they were "increasingly concerned about what happens behind the scenes of the attacks we don&#8217;t hear about, particularly the ransomware ones".&nbsp;</p><p>We don't think the MOU will actually change all that much about how the two organisations operate, but it gives them both a formal document they can point to to reassure victims that might otherwise hesitate to get in touch.&nbsp;&nbsp;</p><h2>DoD Cyber Strategy To Make Friends and Influence People&nbsp;</h2><p>The US Department of Defense (DoD) has released the <a href="https://www.defense.gov/News/Releases/Release/Article/3523199/dod-releases-2023-cyber-strategy-summary/#:~:text=The%20strategy%20highlights%20DOD's%20actions,protect%20the%20defense%20industrial%20base.">unclassified summary</a> of its 2023 cyber strategy and although it is pretty much what you'd expect, there are parts of the strategy we like. For example, the DoD does not think that cyber operations in isolation are all that useful. From the introduction:&nbsp;</p><blockquote><p>The Department's experiences have shown that cyber capabilities held in reserve or employed in isolation render little deterrent effect on their own. Instead, these military capabilities are most effective when used in concert with other instruments of national power, creating a deterrent greater than the sum of its parts.&nbsp;</p></blockquote><p>Happily, the department's goal to "disrupt and degrade malicious cyber actors" is framed quite broadly and includes "degrading [malicious actors&#8217;] supporting ecosystems". The DoD appears to be taking a supporting role here and the document speaks of "complement[ing] concurrent actions by the diplomatic, law enforcement, and intelligence communities, among others".</p><p>Another aspect of the strategy we like is that it describes allies and partners as a "force multiplier" and "a foundational strategic advantage for the United States". The strategy specifically mentions <a href="https://www.cybercom.mil/Media/News/Article/3218642/cyber-101-hunt-forward-operations/">&#8216;hunt forward&#8217; operations</a> and technical collaboration with partners that can "illuminate malicious cyber activity on their networks".&nbsp;</p><p>There is an opportunity here to win friends and influence non-aligned countries by exposing malicious activity coming from countries such as the PRC and Russia. It's one thing for a government to generally understand that cyber espionage goes on, it's another thing to know for sure that the PRC or Russia is actively hacking it.&nbsp;</p><h2></h2><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://srslyriskybiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Seriously Risky Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Three Reasons to be Cheerful this Week:</h2><ol><li><p><strong>Free vulnerability scanning for US water utilities:</strong> The Cybersecurity and Infrastructure Security Agency (CISA) has <a href="https://www.facebook.com/CISA/posts/pfbid02TnWj41SJzm4WCXX9Dq2gZ5QzErRrLeiubgEvcvZ7SYzLhfsDiaEYGj5nd2FyLxsbl">announced</a> it is opening up its <a href="https://www.cisa.gov/resources-tools/services/cisa-vulnerability-scanning">Vulnerability Scanning</a> (VS) service to US water and wastewater utilities. <a href="https://riskybiznews.substack.com/p/cisa-to-provide-free-security-scans-water">More coverage</a> at <em>Risky Business News</em>.&nbsp;</p></li><li><p><strong>Real-time safe browsing for Chrome:</strong> <a href="https://blog.google/products/chrome/Google-chrome-new-features-redesign-2023/">Google is extending</a> its Safe Browsing malicious link and file warning system to provide real-time protection for all Chrome users. Until now, Chrome had updated its list of malicious sites every 30 to 60 minutes, but Google says that nowadays 60% of phishing sites exist for less than 10 minutes. The firm says the new default won't share your browsing history with Google.</p></li><li><p><strong>US and UK sanction 11 Trickbot members: </strong>The <a href="https://home.treasury.gov/news/press-releases/jy1714">US</a> and <a href="https://www.nationalcrimeagency.gov.uk/news/russian-ransomware-group-hit-with-new-sanctions">UK</a> governments have imposed sanctions on and revealed the real-world identities of 11 members of the Trickbot cybercrime operation. The new sanctions come after both governments doxxed and sanctioned seven members earlier this year <a href="https://riskybiznews.substack.com/p/risky-biz-news-us-and-uk-sanction">in February</a>. <em>Risky Business News</em> has <a href="https://riskybiznews.substack.com/p/us-and-uk-dox-sanction-trickbot-conti-member">additional coverage</a>.&nbsp;</p></li></ol><h2>Sponsor Section</h2><p><em><a href="https://risky.biz/RBNEWSSI14">In this</a> Risky Business News sponsor interview, Catalin Cimpanu talks with <a href="https://redcanary.com/">Red Canary</a> Principal Readiness Engineer Gerry Johansen about the need to prepare IR plans in advance and why that&#8217;s just as important as the IR playbook itself.</em></p><iframe class="spotify-wrap podcast" data-attrs="{&quot;image&quot;:&quot;https://i.scdn.co/image/ab6765630000ba8aff2258f005c4c2a1b48d6904&quot;,&quot;title&quot;:&quot;Sponsored: Red Canary's Gerry Johansen on IR readiness&quot;,&quot;subtitle&quot;:&quot;risky.biz&quot;,&quot;description&quot;:&quot;Episode&quot;,&quot;url&quot;:&quot;https://open.spotify.com/episode/7BPJjjpMJuBfXC6fUcAwzG&quot;,&quot;belowTheFold&quot;:true,&quot;noScroll&quot;:false}" src="https://open.spotify.com/embed/episode/7BPJjjpMJuBfXC6fUcAwzG" frameborder="0" gesture="media" allowfullscreen="true" allow="encrypted-media" loading="lazy" data-component-name="Spotify2ToDOM"></iframe><h2>Shorts</h2><h3>Cyber War Crimes are Just War Crimes</h3><p>The International Criminal Court's (ICC) Prosecutor, Karim A. A. Khan, has penned a pretty sensible article <a href="https://www.wired.com/story/icc-cyberwar-crimes/">essentially saying</a> that cyber operations are just another tool that can be used to commit war crimes. Therefore, these operations need to comply with International Humanitarian Law (i.e. the Rules of War) and be <a href="https://casebook.icrc.org/a_to_z/glossary/fundamental-principles-ihl">targeted, proportionate and necessary</a>. This is consistent with our view that "<a href="https://srslyriskybiz.substack.com/i/69156582/cyber-war-crimes-are-not-a-thing">cyber war crimes are not a thing</a>".&nbsp;</p><p>0Khan also notes that the ICC needs to improve its own security practices to defend because "disinformation, destruction, the alteration of data, and the leaking of confidential information may obstruct the administration of justice at the ICC".&nbsp;</p><h3>Russian Cyber Criminals Land In Turkey</h3><p>The <em>Financial Times</em> <a href="https://www.ft.com/content/d5ba3c90-c2f2-4d4e-9cf0-b929930ad8f7">reports</a> that some Russian cybercriminals have moved to Turkey fearing that they would be conscripted into the war effort in Ukraine if they remained in Russia.&nbsp;</p><p>In theory perhaps, a hacker's location shouldn't matter, but a Turkish police official told the <em>Financial Times</em> that the criminals avoid targeting Turks to avoid attracting the attention of local authorities. A local information security specialist told the <em>Financial Times</em> "Russian hackers taught their Turkish counterparts sophisticated code to collate the vast amounts of data being harvested, while the Turkish criminals leveraged their contacts in western Europe, especially Germany, to secure better prices for efficiently organised data sets".</p><h2>Risky Biz Talks</h2><p><em>You can find the audio edition of this newsletter and other fine podcasts and interviews in the Risky Biz News feed (<a href="https://risky.biz/feeds/risky-business-news">RSS</a>, <a href="https://podcasts.apple.com/au/podcast/risky-business-news/id1621305970">iTunes</a> or <a href="https://open.spotify.com/show/0BdExoUZqbGsBYjt6QZl4Q">Spotify</a>).&nbsp;&nbsp;</em></p><p><em>In <a href="https://risky.biz/BTN50/">our last</a> "Between Two Nerds" discussion Tom Uren and <a href="https://twitter.com/thegrugq">The Grugq</a> look at how AI can turbocharge cyber scams.</em></p><iframe class="spotify-wrap podcast" data-attrs="{&quot;image&quot;:&quot;https://i.scdn.co/image/ab6765630000ba8aff2258f005c4c2a1b48d6904&quot;,&quot;title&quot;:&quot;Between Two Nerds: How AI can turbocharge cyber scams&quot;,&quot;subtitle&quot;:&quot;risky.biz&quot;,&quot;description&quot;:&quot;Episode&quot;,&quot;url&quot;:&quot;https://open.spotify.com/episode/2Rmqm9RiNL215wG8IK5tXg&quot;,&quot;belowTheFold&quot;:true,&quot;noScroll&quot;:false}" src="https://open.spotify.com/embed/episode/2Rmqm9RiNL215wG8IK5tXg" frameborder="0" gesture="media" allowfullscreen="true" allow="encrypted-media" loading="lazy" data-component-name="Spotify2ToDOM"></iframe><h2>From <a href="https://riskybiznews.substack.com/">Risky Biz News</a>:</h2><p><strong>Microsoft to phase out 3rd-party printer drivers for security reasons:</strong> Microsoft will phase out the use of third-party printer drivers in Windows in favor of a new and more secure interface.</p><p>"In the near future, Windows will default to a new print mode that disables 3rd party drivers for printing," <a href="https://mastodon.social/@spoofy@infosec.exchange/111020609047138781">said</a> Microsoft security engineer Johnathan Norman.</p><p>"That new system will have quite a few big security improvements, which we plan to detail in a future blog post."</p><p>[<a href="https://riskybiznews.substack.com/p/microsoft-to-phase-out-3rd-party-printer-drivers">more</a> on <em>Risky Business News</em>]</p><p><strong>US and UK dox and sanction 11 more Trickbot/Conti members. Charges included too:</strong> The <a href="https://home.treasury.gov/news/press-releases/jy1714">US</a> and <a href="https://www.nationalcrimeagency.gov.uk/news/russian-ransomware-group-hit-with-new-sanctions">UK</a> governments have revealed the real-world identities and imposed sanctions on 11 additional members of the Trickbot/Conti cybercrime operation. The new sanctions come after both governments doxed and sanctioned seven members earlier this year <a href="https://riskybiznews.substack.com/p/risky-biz-news-us-and-uk-sanction">in February</a>.</p><p>All 18 sanctioned individuals are Russian nationals, and both US and UK officials said some of the group's key members "highly likely maintain links to the Russian Intelligence Services from whom they have likely received tasking," which explains why the Conti crew was one of the first cybercrime groups to come out and support Russia's invasion of Ukraine.</p><p>[<a href="https://riskybiznews.substack.com/p/us-and-uk-dox-sanction-trickbot-conti-member">more</a> on <em>Risky Business News, including a summary of the sanctioned individuals and their roles in the cybercrime groups</em>]</p><p><strong>Myanmar fraud crackdown:</strong> China's Ministry of Public Security (MPS) says it received <a href="https://mp.weixin.qq.com/s/jYC59R6IjLhMybMyTevXEQ">1,207 suspects</a> from Myanmar law enforcement. The suspects were detained last week as part of a <a href="https://riskybiznews.substack.com/p/china-cracks-down-on-se-asia-scam-call-centers">coordinated large-scale crackdown</a> against scam call centres in Myanmar's northern regions. The suspects are accused of scamming Chinese citizens in telecom fraud and extortion schemes. A <a href="https://mp.weixin.qq.com/s/IVpTzCUXsG8zb7ZNK7n-2Q">Chinese police report</a> claimed that 95% of the Chinese nationals working in northern Myanmar call centres had gone there "voluntarily" after failing to find employment in China. Previous reporting on the topic and a <a href="https://www.ohchr.org/en/press-releases/2023/08/hundreds-thousands-trafficked-work-online-scammers-se-asia-says-un-report">UN report</a> say the opposite, claiming that many are trafficked and forced to work in the call centres against their will.</p><p><em>Note: It's a complicated issue. The UN report also says:</em></p><blockquote><p><em>In some cases, individuals may have understood that they were being recruited to conduct online fraud but were deceived as to the conditions &#8212; for example they were not aware that they would be detained in the compounds, under- or unpaid, subject to beatings and other forms of violence, or forced to pay a ransom in order to leave.&nbsp;</em></p></blockquote>]]></content:encoded></item><item><title><![CDATA[Pig Butchering Is Even Worse Than You Think]]></title><description><![CDATA[PLUS: Telstra's Digicel Pacific Linked To Commercial Spy Operations]]></description><link>https://srslyriskybiz.substack.com/p/pig-butchering-is-even-worse-than</link><guid isPermaLink="false">https://srslyriskybiz.substack.com/p/pig-butchering-is-even-worse-than</guid><dc:creator><![CDATA[Tom Uren]]></dc:creator><pubDate>Thu, 07 Sep 2023 05:01:04 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fda1066-991a-4b36-81a1-4d72c47d5afc_1344x768.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Your weekly dose of Seriously Risky Business news is written by <a href="https://twitter.com/tomatospy">Tom Uren</a> and edited by <a href="https://twitter.com/riskybusiness">Patrick Gray</a>. It's supported by the Cyber Initiative at the <a href="https://hewlett.org/programs/cyber/">Hewlett Foundation</a> and this week's edition is brought to you by enterprise browser maker <a href="https://www.island.io/">Island</a>.</em></p><p><em>You can subscribe to an audio version of this newsletter as a podcast by searching for "Risky Business News" in your podcatcher or subscribing via <a href="https://risky.biz/feeds/risky-business-news/">this RSS feed</a>. Find this edition <a href="https://risky.biz/SRB48">here</a> and on Spotify:</em></p><iframe class="spotify-wrap podcast" data-attrs="{&quot;image&quot;:&quot;https://i.scdn.co/image/ab6765630000ba8aff2258f005c4c2a1b48d6904&quot;,&quot;title&quot;:&quot;Srsly Risky Biz: Why \&quot;pig butchering\&quot; is even worse than you think&quot;,&quot;subtitle&quot;:&quot;risky.biz&quot;,&quot;description&quot;:&quot;Episode&quot;,&quot;url&quot;:&quot;https://open.spotify.com/episode/3olIAzs9dcvgdQ8VsJZUqI&quot;,&quot;belowTheFold&quot;:false,&quot;noScroll&quot;:false}" src="https://open.spotify.com/embed/episode/3olIAzs9dcvgdQ8VsJZUqI" frameborder="0" gesture="media" allowfullscreen="true" allow="encrypted-media" data-component-name="Spotify2ToDOM"></iframe><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!--uG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fda1066-991a-4b36-81a1-4d72c47d5afc_1344x768.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!--uG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fda1066-991a-4b36-81a1-4d72c47d5afc_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!--uG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fda1066-991a-4b36-81a1-4d72c47d5afc_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!--uG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fda1066-991a-4b36-81a1-4d72c47d5afc_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!--uG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fda1066-991a-4b36-81a1-4d72c47d5afc_1344x768.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!--uG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fda1066-991a-4b36-81a1-4d72c47d5afc_1344x768.png" width="1344" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9fda1066-991a-4b36-81a1-4d72c47d5afc_1344x768.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1344,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1517061,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!--uG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fda1066-991a-4b36-81a1-4d72c47d5afc_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!--uG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fda1066-991a-4b36-81a1-4d72c47d5afc_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!--uG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fda1066-991a-4b36-81a1-4d72c47d5afc_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!--uG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fda1066-991a-4b36-81a1-4d72c47d5afc_1344x768.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Sad people in a busy office, cyber slaves, Stable Diffusion.</figcaption></figure></div><p>A harrowing new UN report describes how hundreds of thousands of trafficked people are forced into working in online scam operations.</p><p>These operations cover the gamut from online fraud such as romance scams and fake cryptocurrency investment schemes to illegal gambling. They take place in online scam centres known as "<a href="https://acg.pnp.gov.ph/main/cyber-security-bulletin/330-acg-cyber-security-bulletin-nr-182-understanding-the-boiler-room-scam.html">boiler rooms</a>" or "<a href="https://www.proofpoint.com/us/blog/threat-insight/broken-dreams-and-piggy-banks-pig-butchering-crypto-fraud-growing-online">pig-butchering farms</a>".</p><p>The human toll is staggering. <a href="https://bangkok.ohchr.org/wp-content/uploads/2023/08/ONLINE-SCAM-OPERATIONS-2582023.pdf">The report</a> says that at least 120,000 people across Myanmar and 100,000 in Cambodia are thought to be forced to work on online scams. The report cites Myanmar's military coup, ongoing violence and breakdown in the rule of law as significant factors in the proliferation of boiler rooms in the country.&nbsp;</p><p>The report describes the Philippines, Thailand and Laos as transit or destination countries "where at least tens of thousands of people" have been involved. Police operations in the Philippines <a href="https://www.abc.net.au/news/2023-05-06/philippines-rescues-more-than-1-000-trafficking-victims/102312936">rescued over 1,000 people</a> in May of this year and <a href="https://abcnews.go.com/Business/wireStory/2700-people-tricked-working-cybercrime-syndicates-rescued-philippines-100433999">another 2,700 people</a> in June from this kind of forced labour.&nbsp;</p><p>The workers are lured to the online scam centres by the promise of an attractive job with a high salary, regular bonuses, free accommodation and food. Unlike previously documented trafficking, which usually involved low-skilled work, the report says the profile of these victims is quite different:</p><blockquote><p>Many of the victims are well-educated, sometimes coming from professional jobs or with graduate or even post-graduate degrees, computer-literate and multilingual. Victims come from across the ASEAN region (from Indonesia, Lao PDR, Malaysia, Myanmar, Philippines, Singapore, Thailand and Vietnam), as well as mainland China, Hong Kong and Taiwan, South Asia, and even further afield from Africa and Latin America.</p></blockquote><p>Once they arrive at the country in which the online scam centre is located, these workers often have their passports taken and they are placed in gated compounds. They are forced to work by threat of force. Per the report:</p><blockquote><p>Reports commonly describe people being subjected to torture, cruel and degrading treatment and punishments including the threat or use of violence (as well as being made to witness violence against others) most commonly beatings, humiliation, electrocution and solitary confinement, especially if they resist orders or disobey compound rules or if they do not meet expected scamming targets. Reports have also been received of sexual violence, including gang rape as well as trafficking into the sex sector, most usually as punishment, for example for failing to meet their targets.</p></blockquote><p>Traffickers also levy debts on the migrants, claiming costs for travel, quarantine, training and living costs and also performance-related fines.&nbsp;</p><p>The COVID-19 pandemic and associated response measures had a drastic impact on activities across the region. These events left large numbers of migrant workers unemployed and prompted people worldwide to spend more time online. This increased the pool of potential targets.&nbsp;</p><p>The PRC in particular has been hard hit by these scams. <a href="https://riskybiznews.substack.com/p/china-cracks-down-on-se-asia-scam-call-centers">Per Catalin Cimpanu</a> at <em>Risky Business News</em>:</p><blockquote><p>With a large portion of call centre workers being Chinese nationals, China has been one of the most impacted countries by the "boiler room" and "pig butchering" epidemic&#8230;</p><p>A Chinese film named "<a href="https://www.imdb.com/title/tt28076784/">No More Bets</a>" was this summer's highest-grossing movie on China's internal market. The film follows the adventures and inhumane treatment a Chinese programmer goes through after being lured to work for one of these call centres &#8212; showing how prevalent these scams and recruitment schemes have become across China.</p></blockquote><p>In June this year China's ambassador to Myanmar <a href="https://www.bangkokpost.com/thailand/general/2618314/china-tells-myanmar-to-root-out-scam-gangs">asked</a> the military junta to crack down on the online scam centres operating in Myanmar's north. Results include about 300 people in total being arrested in four different actions.&nbsp;</p><p>These scams are thought to generate billions of dollars each year, and of course, the people who lose money to these scams are another set of victims. Many of the scams are long-term efforts that build rapport with a victim over time to encourage them to invest money in a non-existent asset.&nbsp;</p><p>This is a complex problem, and the report recognises that weak rule of law, poor governance, corruption and the Covid-19 pandemic all play a part in the rise of the forced online scam issue.</p><p>There is an important role for internet companies to play here. As the report notes, "the prominent role of social media and other digital platforms is an inherent &#8212; and striking &#8212; feature of these online scam operations". Online platforms are used to both recruit unwitting workers and to cultivate targets.</p><p>The UN report names Boo, Facebook, Grindr, Hinge, Instagram, Lazada, Line, LinkedIn, Meet Me, Muslima, OkCupid, Omi, Shopee, Skout, Telegram, TikTok, Tinder, WeChat, WhatsApp, and Wink as the networks used by scammers to defraud people. It also says advertisements to recruit workers were placed on social media such as Facebook, Instagram and Tinder.&nbsp;&nbsp;</p><p>We think governments should ask what these platforms can do to mitigate these crimes, both in worker recruitment and scams. Platform efforts won't solve this problem, but given its scale, even an incremental improvement could potentially stop thousands of people from being scammed or forced to work in an online scam centre.</p><h2></h2><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://srslyriskybiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://srslyriskybiz.substack.com/subscribe?"><span>Subscribe now</span></a></p><h2>Telstra's Digicel Pacific Linked To Commercial Spy Operations</h2><p>A Pacific Islands mobile phone operator, Digicel Pacific, <a href="https://www.occrp.org/en/daily/17987-australia-owned-pacific-telco-likely-exploited-by-private-spies">has likely</a> been used by commercial spy firms to track people and intercept their data.&nbsp;</p><p>These particular attacks don't require Digicel's network, but instead rely on leasing the firm&#8217;s "<a href="https://en.wikipedia.org/wiki/Global_title">global titles</a>", a type of network address which these firms need to send and receive <a href="https://www.techtarget.com/searchnetworking/definition/Signaling-System-7">signalling protocol messages</a> used to exploit loopholes in the global telecommunications system. These attacks <a href="https://www.lighthousereports.com/investigation/ghost-in-the-network/">can be used</a> to locate phones and intercept calls or texts. Intercepting texts, like a SIM swap attack, can be used to facilitate account hijacking.&nbsp;</p><p>Telstra, a major Australian telecommunications operator, bought Digicel Pacific in July 2022 with support from AUD$2 billion of Australian government financing. <a href="https://amp.abc.net.au/article/102784160">Part of the justification</a> for this deal was to prevent the PRC from buying Digicel and using the telco to facilitate espionage in the region.&nbsp;</p><p>Telstra says it has been terminating Digicel's global title leases, and that only a small number remain. Clamping down on these leases is a good thing, but surveillance operators will probably find other telcos they can obtain global titles from. A <em>Lighthouse Reports</em> <a href="https://www.lighthousereports.com/investigation/ghost-in-the-network/">investigation</a> into a Swiss-based phone surveillance operator, for example, found that it had leased hundreds of global titles.&nbsp;</p><p>This news highlights that, yes, telcos can be used to facilitate spying and that access to even just one part of a telco is useful. Access to <em>all</em> of a telco? Priceless.</p><h2>Age Verification Could Drive Kids to Weirder Websites</h2><p>A federal judge has ruled that a Texas law requiring pornography sites to implement age-verification measures was unconstitutional and temporarily blocked its implementation.&nbsp;</p><p>Other states including Utah, Louisiana, Mississippi, Virginia and Utah have passed similar laws.</p><p>Age verification is a simple solution to a complex problem that may well have unintended consequences. This week, the Australian government also <a href="https://www.infrastructure.gov.au/sites/default/files/documents/government-response-to-the-roadmap-for-age-verification-august2023.pdf">published a plan</a> that said age verification technology was not yet fit for purpose.</p><p>The government's approach is informed by a "<a href="https://www.esafety.gov.au/sites/default/files/2023-08/Roadmap-for-age-verification_2.pdf">Roadmap for Verification</a>" report produced by <a href="https://www.esafety.gov.au/">Australia's eSafety Office</a>. The report examines the issue holistically and includes original research into when young people first encounter pornography.&nbsp;</p><p>One of the more interesting findings is that children often see pornography in group chats and on social media, so dedicated sites are not the only concern when it comes to preventing underage access. It also points out there is a risk that mandatory age verification mechanisms could push children actively looking for porn towards sites that don't comply and may potentially contain riskier content.&nbsp;</p><p>Overall, in the short term it recommends that government and industry provide more assistance to carers so they can apply "a combination of supervision, safety discussions and the use of filters, safety settings, and parental controls".</p><p>The report does not reject age-verification technologies outright but determines most are not yet ready for widespread use. However, the report considers newer privacy-preserving age-verification technologies may be suitable and recommends testing them to see if they'll work.</p><p>It's a good report and it's clear that the eSafety Office did their homework here &#8212; it's informed by nearly 380 pages of what the office calls a "<a href="https://www.esafety.gov.au/sites/default/files/2023-08/Age-verification-background-report.pdf">background report</a>".</p><h2>Three Reasons to be Cheerful this Week:</h2><ol><li><p><strong>More Cyber Opportunity:</strong> Craig Newmark Philanthropies <a href="https://therecord.media/craigslist-founder-donates-to-hbcu-cyber-program">has donated</a> USD$200k to support a cybersecurity program at historically black colleges and universities. Newmark, the founder of Craigslist has <a href="https://www.whitehouse.gov/oncd/briefing-room/2023/02/28/readout-office-of-national-cyber-director-hosts-roundtable-onthe-state-of-cybersecurity-in-the-black-community/">over time</a> committed USD$100m to various cyber security efforts.&nbsp;&nbsp;</p></li><li><p><strong>OT Adversary Emulation:</strong> CISA and nonprofit MITRE have <a href="https://therecord.media/cisa-creates-adversary-emulation-platform">teamed up</a> to build Operational Technology (OT) capabilities into MITRE's adversary emulation Caldera platform. The goal with <a href="https://medium.com/@mitrecaldera/announcing-mitre-caldera-for-ot-47c6f22a676d">Caldera for OT</a> is to give industrial control system defenders better tools to conduct security assessments.&nbsp;</p></li><li><p><strong>BGP resilience is improving:</strong> Network analytics firm Kentik <a href="https://www.kentik.com/blog/a-tale-of-two-bgp-leaks/">reports</a> that two recent Border Gateway Protocol (BGP) <a href="https://www.kentik.com/kentipedia/bgp-route-leaks/">leaks</a> <em>didn't</em> cause widespread disruption. Kentik's director of internet analysis, Doug Madory, thinks that increased use of <a href="https://www.manrs.org/2020/10/what-is-rov/">Route Origin Validation technologies like Resource Public Key Infrastructure</a> have made BGP more resilient. In times past "large routing leaks like these" might have caused widespread internet disruption, he says. However, he adds, although the global routing system has become more resilient there is still plenty of scope for deliberate attacks to succeed (see <a href="https://www.kentik.com/blog/bgp-hijacks-targeting-cryptocurrency-services/">BGP-enabled cryptocurrency thefts</a>, for example).&nbsp;</p></li></ol><h2>Sponsor Section</h2><p><em>In this Risky Business News <a href="https://risky.biz/RBNEWSSI13">sponsor interview</a>, Tom Uren talks to Mike Fey, CEO and co-founder of Island, about the idea of an "enterprise browser." Tom and Mike discuss what an enterprise browser actually is, what problems it solves, and why browsers focused on business requirements haven't been a product category until now.</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/risky-biz-sponsor-interview-why-island-raised-over/id1621305970?i=1000626639453&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000626639453.jpg&quot;,&quot;title&quot;:&quot;Risky Biz Sponsor Interview: Why Island raised over $250m to build an enterprise browser&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/risky-biz-sponsor-interview-why-island-raised-over/id1621305970?i=1000626639453&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2023-09-04T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/risky-biz-sponsor-interview-why-island-raised-over/id1621305970?i=1000626639453" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><h2>Shorts</h2><h3>Microsoft Figures Out Storm-0558 Key "Acquisition"</h3><p>Microsoft has <a href="https://msrc.microsoft.com/blog/2023/09/results-of-major-technical-investigations-for-storm-0558-key-acquisition/">published the results</a> of its investigation into how a Chinese-based threat actor known as Storm-0558 was able to acquire a Microsoft account consumer signing key and use it to access enterprise and government email accounts.</p><p>It's worth a read. The very high-level summary is that an incorrectly redacted crash dump containing the key was transferred from Microsoft's hardened production environment to its corporate network where it was snaffled by Storm-0558.&nbsp;</p><p>Overall, Storm-0558 took advantage of a series of five different errors &#8212; which Microsoft says they've fixed &#8212; to use the key to get unauthorised access to email. It's top-notch work from Storm-0558 to seize on these mistakes and take advantage of them.&nbsp;</p><h3>LastPass Breach All About the Crypto</h3><p><em>Krebs On Security</em> has <a href="https://krebsonsecurity.com/2023/09/experts-fear-crooks-are-cracking-keys-stolen-in-lastpass-breach/">examined the possibility</a> that password vaults stolen from LastPass last year are being cracked and used in a string of six-figure cryptocurrency thefts.&nbsp;</p><p>Last year a threat actor carried out a multi-stage hack to get access to LastPass customer vaults. In the first step, in August last year, a threat actor gained access to LastPass's development environment by compromising an engineer's laptop. The information gained in that attack was then used to target a second engineer whose device <a href="https://arstechnica.com/information-technology/2023/02/lastpass-hackers-infected-employees-home-computer-and-stole-corporate-vault/">was compromised via</a> Plex Media Server. This second breach allowed the attacker to download LastPass customer vault backups from cloud storage. Secrets in these vaults were still protected by the customer's master password.</p><p>Since December 2022 there have been a string of cryptocurrency thefts linked by a common modus operandi. Collectively, 150 people have lost over USD$35m in cryptocurrency. One common factor linking these thefts is that the victims were using LastPass to store their "seed phrase", essentially the private key that controls the cryptocurrency.</p><p>The theory here is that the attackers have been cracking these vaults and then stealing cryptocurrency.&nbsp; It's an enticing theory and Krebs' detective story is well worth reading.</p><h3>US Number Two In Phishing</h3><p>Krebs also has a <a href="https://krebsonsecurity.com/2023/09/why-is-us-being-used-to-phish-so-many-of-us/">piece up</a> about the disproportionate use of the ".US" country code top-level domain (ccTLD) in phishing scams. .US is second only to Mali (.ML) in ccTLDs being used for phishing.&nbsp;</p><p>In theory, to register a .US domain you need to have some sort of relationship with the US, such as being a citizen or resident. Other ccTLDs that restrict registrations based on nationality have very low phishing rates, so this measure should prevent phishing abuse. In practice, however, this requirement is 'satisfied' by simply ticking a (pre-filled) box on the registrar's sign up form.</p><h3>Bring Your Own Identity Provider Attacks</h3><p>Identity and access management company Okta says <a href="https://arstechnica.com/security/2023/09/4-okta-customers-hit-by-campaign-that-gave-attackers-super-admin-control/">four of its customers</a> had been affected by a recent social engineering campaign that aimed to gain control of highly privileged accounts.&nbsp;</p><p>In this campaign the attackers tried to convince IT help desk personnel in the targeted company to reset MFA for their <a href="https://help.okta.com/en-us/content/topics/security/administrators-super-admin.htm">Okta Super Administrators</a>. It appears the attackers already had account passwords or were somehow able to manipulate authentication flows so that they didn't need them for these purposes.</p><p>Super admins can't masquerade as other accounts, so the attackers then configured a second identity provider controlled by them. This is a legitimate feature used in mergers and acquisitions, for example, but allows impersonation of other users by the attackers in this case. This technique <a href="https://www.mandiant.com/sites/default/files/2021-11/wp-m-unc2452-000343.pdf">was used</a> by Russian actors in the SolarWinds incident</p><p>Okta has a <a href="https://sec.okta.com/articles/2023/08/cross-tenant-impersonation-prevention-and-detection">suite of recommendations</a> on how to prevent these kinds of attacks and best protect highly privileged accounts.&nbsp;</p><p>Patrick Gray and Adam Boileau discussed this topic in detail at the top of <a href="https://risky.biz/RB720/">this week's</a> <em>Risky Business</em> podcast.&nbsp;</p><h2></h2><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://srslyriskybiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Seriously Risky Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Risky Biz Talks</h2><p><em>You can find the audio edition of this newsletter and other fine podcasts and interviews in the Risky Biz News feed (<a href="https://risky.biz/feeds/risky-business-news">RSS</a>, <a href="https://podcasts.apple.com/au/podcast/risky-business-news/id1621305970">iTunes</a> or <a href="https://open.spotify.com/show/0BdExoUZqbGsBYjt6QZl4Q">Spotify</a>).&nbsp;&nbsp;</em></p><p><em>In <a href="https://risky.biz/BTN49">our last</a> "Between Two Nerds" discussion Tom Uren and <a href="https://twitter.com/thegrugq">The Grugq</a> look at how companies often make unilateral decisions that constrain states&#8217; behaviour, for better and worse.&nbsp;</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/between-two-nerds-when-states-are-at-the-mercy-of/id1621305970?i=1000626766129&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000626766129.jpg&quot;,&quot;title&quot;:&quot;Between Two Nerds: When states are at the mercy of tech company policy&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/between-two-nerds-when-states-are-at-the-mercy-of/id1621305970?i=1000626766129&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2023-09-05T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/between-two-nerds-when-states-are-at-the-mercy-of/id1621305970?i=1000626766129" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><h2>From <a href="https://riskybiznews.substack.com/">Risky Biz News</a>:</h2><p><strong>Germany warns of Chinese APTs hijacking SOHO routers for espionage:</strong> The German government says Chinese APTs are hijacking SOHO routers, NAS devices, and smart home automation systems to conduct cyber-espionage operations.</p><p>The hacked devices are used as a giant mesh of proxies that relay and hide the origin of the attack.</p><p>Chinese cyber-espionage groups like APT15 (Vixen Panda, Ke3chang) and APT31 (Zirconium, Judgement Panda) have been observed utilising the tactic, according to a <a href="https://www.verfassungsschutz.de/SharedDocs/publikationen/DE/cyberabwehr/2023-02-bfv-cyber-brief.html">security advisory</a> published by the German Federal Office for the Protection of the Constitution (BfV) last week. A Google Translate machine-translated version of the alert is <a href="https://www.documentcloud.org/documents/23935188-bfv-apt15apt31-translated-alert">here</a>.</p><p>[<a href="https://riskybiznews.substack.com/p/germany-warns-of-chinese-apts-hijacking-routers">more</a> on <em>Risky Business News</em>]</p><p><strong>GREF (APT15):</strong> A Chinese cyber-espionage group known as GREF (<a href="https://www.lookout.com/threat-intelligence/article/uyghur-surveillance-campaign-badbazaar-moonshine">APT15</a> or Vixen Panda) has planted trojaned versions of the Signal and Telegram apps on the official Google and Samsung app stores. The two apps contained functional versions of the two apps and a copy of the BadBazaar spyware. <a href="https://www.welivesecurity.com/en/eset-research/badbazaar-espionage-tool-targets-android-users-trojanized-signal-telegram-apps/">ESET says</a> the trojaned Telegram app was advertised in a Uyghur Telegram group and that evidence suggests it was installed by more than 14,000 users. The GREF group has a long history of targeting China's Uyghur and Turkic ethnic minorities.</p><p><strong>Chastity cage leak:</strong> A Chinese smart sex toy company has left one of its databases exposed online and has leaked information on customers who own its male chastity devices (aka penis cages). Exposed data included email addresses, plaintext passwords, home addresses, IP addresses, and even GPS coordinates for some users. The security researcher who found the database says they reported the leak to the company and China's CERT team in June, with little success. The researcher says they went as far as to deface the vendor's homepage to inform the company about its leaky database. The company restored its website but did not secure its database. [Additional coverage in <a href="https://techcrunch.com/2023/09/02/smart-chastity-cage-emails-passwords-location/">TechCrunch</a>]</p>]]></content:encoded></item><item><title><![CDATA[UK's Investigatory Powers Proposal: Don't Believe the Hype]]></title><description><![CDATA[PLUS: More on China's Barracuda Exploitation. A Lot More.]]></description><link>https://srslyriskybiz.substack.com/p/uks-investigatory-powers-proposal</link><guid isPermaLink="false">https://srslyriskybiz.substack.com/p/uks-investigatory-powers-proposal</guid><dc:creator><![CDATA[Tom Uren]]></dc:creator><pubDate>Thu, 31 Aug 2023 04:30:52 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49d78058-9b2d-49f7-ac24-27b5703ab78b_1344x768.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Your weekly dose of Seriously Risky Business news is written by <a href="https://twitter.com/tomatospy">Tom Uren</a> and edited by <a href="https://twitter.com/riskybusiness">Patrick Gray</a>. It's supported by the Cyber Initiative at the <a href="https://hewlett.org/programs/cyber/">Hewlett Foundation</a> and this week's edition is brought to you by <a href="https://stairwell.com/">Stairwell</a>.</em></p><p><em>You can subscribe to an audio version of this newsletter as a podcast by searching for "Risky Business News" in your podcatcher or subscribing via <a href="https://risky.biz/feeds/risky-business-news/">this RSS feed</a>. Find this edition <a href="https://risky.biz/SRB47">here</a> and on Apple Podcasts:</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/srsly-risky-biz-the-uk-snoopers-charter-wont-stop/id1621305970?i=1000626275994&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000626275994.jpg&quot;,&quot;title&quot;:&quot;Srsly Risky Biz: The UK snoopers' charter won't stop security patches&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/srsly-risky-biz-the-uk-snoopers-charter-wont-stop/id1621305970?i=1000626275994&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2023-08-31T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/srsly-risky-biz-the-uk-snoopers-charter-wont-stop/id1621305970?i=1000626275994" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lOVN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49d78058-9b2d-49f7-ac24-27b5703ab78b_1344x768.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lOVN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49d78058-9b2d-49f7-ac24-27b5703ab78b_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!lOVN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49d78058-9b2d-49f7-ac24-27b5703ab78b_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!lOVN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49d78058-9b2d-49f7-ac24-27b5703ab78b_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!lOVN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49d78058-9b2d-49f7-ac24-27b5703ab78b_1344x768.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lOVN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49d78058-9b2d-49f7-ac24-27b5703ab78b_1344x768.png" width="1344" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/49d78058-9b2d-49f7-ac24-27b5703ab78b_1344x768.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1344,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:948293,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!lOVN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49d78058-9b2d-49f7-ac24-27b5703ab78b_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!lOVN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49d78058-9b2d-49f7-ac24-27b5703ab78b_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!lOVN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49d78058-9b2d-49f7-ac24-27b5703ab78b_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!lOVN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49d78058-9b2d-49f7-ac24-27b5703ab78b_1344x768.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">A spy in Westminster, Stable Diffusion</figcaption></figure></div><p>Fears that proposed amendments to the UK's Investigatory Powers Act will prevent vendors from issuing software updates are overblown.</p><p>Early last month the UK government opened <a href="https://www.gov.uk/government/consultations/revised-investigatory-powers-act-notices-regimes-consultation/consultation-on-revised-notices-regimes-in-the-investigatory-powers-act-2016-accessible-version">a consultation period on proposed changes</a> to its Investigatory Powers Act (IPA), the legislation that governs law enforcement and intelligence agencies&#8217; use of intrusive investigatory powers such as telco-mediated lawful interception.&nbsp;</p><p>The IPA has been in force since 2016 when it combined existing statutory powers granted to UK authorities into a single piece of legislation. It also strengthened approval and oversight processes, with use of the most intrusive powers requiring a <a href="https://www.ipco.org.uk/what-we-do/the-double-lock/">'double-lock'</a> approval from a government minister and an independent judicial commissioner.&nbsp;</p><p>One of the proposed changes to the IPA is that telecommunications operators be required to notify the Secretary of State of planned changes to their services that could negatively impact investigatory powers. (Telecommunications operators include anyone providing a telecommunications service in the UK, including apps like WhatsApp and Signal.) Per the <a href="https://www.gov.uk/government/consultations/revised-investigatory-powers-act-notices-regimes-consultation/consultation-on-revised-notices-regimes-in-the-investigatory-powers-act-2016-accessible-version#why-are-we-consulting">consultation document</a>:</p><blockquote><p>This would be intended to facilitate early engagement between operators and the government so that, where necessary, appropriate steps can be taken in good time to ensure that any negative impact on investigatory powers is fully considered, and so that we can ensure continuity of lawful access to data against a background of changing technology.</p></blockquote><p><a href="https://9to5mac.com/2023/08/24/apple-security-updates-ban/">Some commentators</a> have <a href="https://www.justsecurity.org/87615/changes-to-uk-surveillance-regime-may-violate-international-law/">suggested that</a> this forewarning could be used with other IPA coercive powers to stymie security updates to messaging apps. The IPA <a href="https://www.gov.uk/government/consultations/revised-investigatory-powers-act-notices-regimes-consultation/consultation-on-revised-notices-regimes-in-the-investigatory-powers-act-2016-accessible-version#what-are-the-notice-regimes">already contains powerful provisions</a> for the government to issue various notices that can compel operators to take particular actions. Probably the most extreme, National Security Notices (NSNs), requires that operators do anything that the Secretary of State considers "necessary in the interests of national security".&nbsp;</p><p>Another proposed change to the IPA is to strengthen its extraterritorial provisions to make it clearer that overseas operators offering services in the UK cannot avoid obligations by using complex corporate structures.&nbsp;</p><p>Commenting on the proposed new provisions in <em>Just Security</em>, <a href="https://privacyinternational.org/node/3310">Ioannis Kouvakas</a>, Senior Legal Officer at Privacy International, writes:</p><blockquote><p>While the proposal does not specify what technical changes would require notification, these may include changes in the architecture of software that would interfere with the U.K.&#8217;s current surveillance powers. As a result, an operator of a messaging service wishing to introduce an advanced security feature would now have to first let the Home Office know in advance. Device manufacturers would likely also have to notify the government before making available important security updates that fix known vulnerabilities and keep devices secure. Accordingly, the Secretary of State, upon receiving such an advance notice, could now request operators to, for instance, abstain from patching security gaps to allow the government to maintain access for surveillance purposes.</p></blockquote><p>Kouvakas thinks that the extraterritorial provisions could breach international human rights. Stopping security updates worldwide, for example, might not be necessary or proportionate, he says.</p><p>Kouvakas is stretching here. For a start, one of the goals of the IPA is to ensure that intrusive powers are used proportionately and only when necessary. The safeguards here include the previously mentioned double-lock approval process and an <a href="https://www.ipco.org.uk/who-we-are/investigatory-powers-commissioner/">independent commissioner</a> who oversees operation of the Act.&nbsp;&nbsp;&nbsp;</p><p>Speaking of the proposed notification obligation, the consultation document states "we fully acknowledge the need for strong safeguards that deliver the IPA's fundamental &#8203;&#8203;principle of necessity and proportionality". It continues:</p><blockquote><p>&#8230;we intend to develop a series of thresholds that would also trigger the notification requirement, for example, if a technical change could substantively impact existing IPA capabilities or the availability of communications and communications related data for a certain number of users or a certain percentage of the market. We welcome comments from respondents on this approach, including potential thresholds.</p></blockquote><p>The thresholds cited here look to be much more about big picture architectural changes like the rollout of end-to-end encryption or switching from <a href="https://www.techtarget.com/searchunifiedcommunications/answer/What-is-the-difference-between-RCS-and-SMS">SMS to RCS</a>, rather than the minutiae of security updates that are rolled out all the time. How would service providers know beforehand which security updates fix vulnerabilities that the government is currently exploiting? And how would they know whether that crossed any kind of threshold in terms of the number of affected users?</p><p>We think a more likely scenario is that a notification from a telecommunications operator about a significant upcoming change results in a back and forth discussion with the UK government about the implications for investigatory capabilities. This could ultimately result in some response that tries to maintain capability, such as an <a href="https://www.gov.uk/government/consultations/revised-investigatory-powers-act-notices-regimes-consultation/consultation-on-revised-notices-regimes-in-the-investigatory-powers-act-2016-accessible-version#what-are-the-notice-regimes">IPA Technical Capability Notice</a> that requires the development of something that would allow the UK government to maintain the access it needs.</p><p>The proposed changes to the IPA are not about halting security patches&#8212;they&#8217;re about being better prepared for the future when an operator plans to flip an important switch.&nbsp;&nbsp;&nbsp;</p><h2></h2><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://srslyriskybiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Seriously Risky Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>More on China's Barracuda Exploitation. A Lot More.&nbsp;</h2><p>Mandiant has published <a href="https://www.mandiant.com/resources/blog/unc4841-post-barracuda-zero-day-remediation">more details</a> about a "Chinese-nexus" espionage group that engaged in an extensive campaign that compromised Barracuda Email Security Gateways (ESG). Back in June we <a href="https://srslyriskybiz.substack.com/p/chinas-barracuda-hacks-were-just">described this campaign</a> as "just plain rude":</p><blockquote><p>The polite thing to do when your APT operation is discovered by your adversaries is to pack up, go home, and ready your next campaign. What you shouldn't do is escalate in response to discovery, dig in, and turn thousands of expensive email gateway appliances into boat anchors.</p><p>But this is exactly what a Chinese APT group did in response to one of its recent campaigns being rumbled.</p></blockquote><p>Mandiant thought the group, which it called UNC4841, was engaged in fairly targeted espionage and was prepared from the get go to dig in when it was discovered.&nbsp;</p><p>The report provides an exhaustive timeline of the group's Barracuda exploitation activity in a nice chart (below) that plots group activity and the cumulative number of victims compromised over time. The chart illustrates that once Barracuda discovered the campaign and issued remediation advice, there was a lot of activity from UNC4841, but not many new victims were compromised.&nbsp;</p><p>This activity involved maintaining access by deploying additional malware or moving laterally. In its <a href="https://www.mandiant.com/resources/blog/barracuda-esg-exploited-globally">first post</a> describing this campaign, Mandiant detailed various persistence mechanisms used by UNC4841. This new report describes a "second wave" of new malware families also used in an attempt to maintain persistence.&nbsp;</p><p>Despite this, the campaign was relatively targeted and Mandiant thinks only about 5% of Barracuda ESGs worldwide were compromised. And, Mandiant says, additional malware to maintain persistence was deployed on only a small percentage of these compromised devices. For example, the most broadly used malware families used in this second wave, which Mandiant calls SKIPJACK and DEPTHCHARGE, were only deployed to 5.8% and 2.64% of compromised ESG devices respectively.</p><p>Mandiant thinks that the speed of malware deployment and the number of different varieties used indicates UNC4841 expected to be caught at some point and had prepared tooling in advance to dig into high-value targets when that happened.</p><p>The cyber security firm also expands on the group's targeting:</p><blockquote><p>A deeper examination of identified affected organisations showed a recurring targeting of sectors that are key to global governments maintaining a competitive technological and economic edge in the face of impending strategic state deadlines. Entities were observed within the semiconductor, public health, aerospace, artificial intelligence/autonomous vehicles, and rare earth metal production sectors. Further, religious based organisations were impacted by UNC4841 campaigns. A cluster of organisations with mission-based aid or stated evangelical missions that impact China (and Chinese claimed geographies such as Hong Kong and Taiwan) were observed being targeted with the initial stages of malware utilised by this threat actor. Unlike numerous impacted organisations that align with traditional espionage requirements, these entities only received early stage implants such as SALTWATER, SEASPY, and SEASIDE. This may suggest a lower priority among UNC4841 collection requirements with evidence of deeper compromise, persistence, and exfiltration being observed among entities aligning with more conventional geopolitical, defence, and technology related mandates.</p></blockquote><p>Overall, Mandiant notes it has observed higher level trends in Chinese cyber espionage "toward more purposeful, stealthy, and effective operations that avoid detection and complicate attribution."&nbsp;</p><p><em>Listen to Patrick Gray and Tom Uren discuss this edition of the newsletter in the Seriously Risky Business podcast:</em></p><h2>Three Reasons to be Cheerful this Week:</h2><ol><li><p><strong>FBI dismantles Qakbot botnet: </strong>The FBI <a href="https://www.fbi.gov/news/stories/fbi-partners-dismantle-qakbot-infrastructure-in-multinational-cyber-takedown">announced</a> that it had disrupted the Qakbot malware botnet in a "multinational cyber takedown". Qakbot had facilitated ransomware attacks that caused hundreds of millions of dollars in losses and the FBI had identified over 700,000 infected computers worldwide. The operation redirected Qakbot traffic to FBI-controlled servers that instructed infected computers to uninstall the malware. <a href="https://riskybiznews.substack.com/p/fbi-takes-down-and-mass-uninstalls-qakbot-botnet">Further coverage</a> at <em>Risky Business News</em>.</p></li><li><p><strong>WebDetetive spyware taken down:</strong> Hackers <a href="https://docs.google.com/document/d/1FYS3uLIBo_oFafvbpCpy_7f38yNy6-mQkUH9aY8xjEY/edit">claim to have breached</a> Portuguese-language spyware WebDetetive and removed the spyware from victim devices. The hackers also said they had downloaded data about those who had paid for the spyware and shared that data with leak archive site <a href="https://ddosecrets.com/wiki/Distributed_Denial_of_Secrets">DDoSecrets</a>. WebDetetive was used extensively in Brazil and had been used to compromise more than 76,000 Android phones.&nbsp;</p></li><li><p><strong>US FedGov Vulnerability Disclosure Program Works:</strong> <a href="https://docs.google.com/document/d/1FYS3uLIBo_oFafvbpCpy_7f38yNy6-mQkUH9aY8xjEY/edit">CISA says</a> that its Vulnerability Disclosure Program (VDP) platform is being used by 40 federal civilian agencies. These agencies have collectively received over 1,300 valid reports, over 1,100 of which have been remediated. The platform provides a common interface for vulnerability reports across agencies.&nbsp;</p></li></ol><h2>Sponsor Section</h2><p><em><a href="https://risky.biz/RBNEWSSI5/">In this</a> Risky Business News sponsor interview, Catalin Cimpanu talks with Chris St. Myers, Threat Intelligence Lead at Stairwell, on how the company Inception platform can be used for finding old or new threats that sometimes may go unnoticed.</em></p><p><em>And in <a href="https://youtu.be/VgYoEzY6R04">this video</a> Stairwell's Mike Wiacek demonstrates Stairwell's file analysis and threat detection platform to Risky Business host Patrick Gray. Stairwell helps you monitor and analyse every executable file in your organisation, automatically collecting crucial intelligence and providing your security team with in-depth visibility and detections.</em></p><div id="youtube2-VgYoEzY6R04" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;VgYoEzY6R04&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/VgYoEzY6R04?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h2>Shorts</h2><h3>Meta Removes Largest Influence Campaign</h3><p>Meta announced that it had taken down a large Chinese influence campaign that the <a href="https://about.fb.com/news/2023/08/raising-online-defenses/">company described</a> as "largest known cross-platform covert influence operation". It involved over 7,700 Facebook accounts and at least USD$3,500 in advertising spending.&nbsp;</p><p>Despite the size of the campaign, Meta's quarterly <a href="https://transparency.fb.com/sr/Q2-2023-Adversarial-threat-report">Adversarial Threat Report</a> says "despite the very large number of accounts and platforms it used, Spamouflage consistently struggled to reach beyond its own (fake) echo chamber."&nbsp;</p><h3>UN Treaty on Cybercrime</h3><p>UN negotiations for a cybercrime treaty are continuing in New York this week. US negotiators are hoping for an agreement that represents an advance on the <a href="https://en.wikipedia.org/wiki/Convention_on_Cybercrime">Budapest Convention</a>, which is ratified by 50 countries only and not by China, Russia, India or Brazil.&nbsp;</p><p>Human rights and civil liberties groups are concerned that the treaty may be used for surveillance and repression. It is a worry as that is exactly the sort of treaty that China and Russia would like.&nbsp;</p><h2></h2><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://srslyriskybiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://srslyriskybiz.substack.com/subscribe?"><span>Subscribe now</span></a></p><h2>Risky Biz Talks</h2><p><em>You can find the audio edition of this newsletter and other fine podcasts and interviews in the Risky Biz News feed (<a href="https://risky.biz/feeds/risky-business-news">RSS</a>, <a href="https://podcasts.apple.com/au/podcast/risky-business-news/id1621305970">iTunes</a> or <a href="https://open.spotify.com/show/0BdExoUZqbGsBYjt6QZl4Q">Spotify</a>).&nbsp;&nbsp;</em></p><p><em>In <a href="https://risky.biz/BTN48">our last</a> "Between Two Nerds" discussion, Tom Uren and <a href="https://twitter.com/thegrugq">The Grugq</a> look at how asset inventory tools aren&#8217;t a substitute for knowing what a business values.</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/between-two-nerds-know-thyself/id1621305970?i=1000626025927&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000626025927.jpg&quot;,&quot;title&quot;:&quot;Between Two Nerds: Know thyself&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/between-two-nerds-know-thyself/id1621305970?i=1000626025927&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2023-08-29T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/between-two-nerds-know-thyself/id1621305970?i=1000626025927" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><h2>From <a href="https://riskybiznews.substack.com/">Risky Biz News</a>:</h2><p><strong>WinRAR 0-day used to hack stock and crypto traders:</strong> Hackers have used a zero-day vulnerability in the WinRAR file compression utility to install malware on user devices and steal funds from stock and cryptocurrency trading accounts.</p><p>The 0-day was discovered by security researchers from <a href="https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/">Group-IB</a>, who spotted the attacks while investigating a DarkMe malware campaign. Researchers tracked the earliest exploits to April this year.</p><p>All the attacks appear to have been focused on the brokerage and crypto-trading communities, with booby-trapped ZIP files uploaded on eight popular forums. </p><p>[<a href="https://riskybiznews.substack.com/p/winrar-zero-day-hacked-crypto-trader-accounts">more</a> on <em>Risky Business News</em>]</p><p><strong>Malware found on Rust's Crates repository:</strong> Seven malicious packages have been found and removed from Crates, the official package repository for the Rust programming language, marking the second time malware has been found on the portal. [This is the <a href="https://blog.rust-lang.org/2022/05/10/malicious-crate-rustdecimal.html">first-known</a> <a href="https://www.sentinelone.com/labs/cratedepression-rust-supply-chain-attack-infects-cloud-ci-pipelines-with-go-malware/">incident</a>, if anyone's curious.]</p><p>The packages were discovered by DevSecOps company Phylum, which <a href="https://blog.phylum.io/rust-malware-staged-on-crates-io/">described</a> them as showing "the hallmarks of early preparations for a broader campaign."</p><p>[<a href="https://riskybiznews.substack.com/p/malware-found-on-rust-package-repository">more</a> on <em>Risky Business News</em>]</p><p><strong>Incident disrupts Polish railway:</strong> Suspected Russian saboteurs have disrupted the services of Poland's national railway system. Officials say the attackers broadcast an emergency stop signal on a frequency used by the country's train system. The signal caused around 20 trains to come to an emergency stop for a few hours near Szczecin, a port city near the German border. Officials say the emergency signal was mixed with Russia's national anthem and a speech by President Vladimir Putin. [<a href="https://www.bbc.com/news/world-europe-66630260">Additional coverage</a> in the <em>BBC</em>]</p>]]></content:encoded></item><item><title><![CDATA[Why Russia's Cyber War Against Ukraine Failed]]></title><description><![CDATA[PLUS: Advanced Persistent Teenagers]]></description><link>https://srslyriskybiz.substack.com/p/why-russias-cyber-war-against-ukraine</link><guid isPermaLink="false">https://srslyriskybiz.substack.com/p/why-russias-cyber-war-against-ukraine</guid><dc:creator><![CDATA[Tom Uren]]></dc:creator><pubDate>Fri, 25 Aug 2023 04:31:24 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe11e79fb-b34c-41b2-b52c-c3ceeb302026_1344x768.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Your weekly dose of Seriously Risky Business news is written by <a href="https://twitter.com/tomatospy">Tom Uren</a> and edited by <a href="https://twitter.com/riskybusiness">Patrick Gray</a>. It's supported by the Cyber Initiative at the <a href="https://hewlett.org/programs/cyber/">Hewlett Foundation</a> and this week's edition is brought to you by <a href="https://www.trailofbits.com/">Trail of Bits</a>.</em></p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://srslyriskybiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://srslyriskybiz.substack.com/subscribe?"><span>Subscribe now</span></a></p><p><em>You can subscribe to an audio version of this newsletter as a podcast by searching for "Risky Business News" in your podcatcher or subscribing via <a href="https://risky.biz/feeds/risky-business-news/">this RSS feed</a>. Find this edition<a href="https://risky.biz/SRB46"> here</a> and on Apple podcasts:</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/srsly-risky-biz-why-did-russia-deploy-hackers-to-war-zones/id1621305970?i=1000625628406&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000625628406.jpg&quot;,&quot;title&quot;:&quot;Srsly Risky Biz: Why did Russia deploy hackers to war zones?&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/srsly-risky-biz-why-did-russia-deploy-hackers-to-war-zones/id1621305970?i=1000625628406&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2023-08-25T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/srsly-risky-biz-why-did-russia-deploy-hackers-to-war-zones/id1621305970?i=1000625628406" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><h2>Why Russia's Cyber War Against Ukraine Failed</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lxlf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe11e79fb-b34c-41b2-b52c-c3ceeb302026_1344x768.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lxlf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe11e79fb-b34c-41b2-b52c-c3ceeb302026_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!lxlf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe11e79fb-b34c-41b2-b52c-c3ceeb302026_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!lxlf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe11e79fb-b34c-41b2-b52c-c3ceeb302026_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!lxlf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe11e79fb-b34c-41b2-b52c-c3ceeb302026_1344x768.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lxlf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe11e79fb-b34c-41b2-b52c-c3ceeb302026_1344x768.png" width="1344" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e11e79fb-b34c-41b2-b52c-c3ceeb302026_1344x768.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1344,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1127071,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!lxlf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe11e79fb-b34c-41b2-b52c-c3ceeb302026_1344x768.png 424w, https://substackcdn.com/image/fetch/$s_!lxlf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe11e79fb-b34c-41b2-b52c-c3ceeb302026_1344x768.png 848w, https://substackcdn.com/image/fetch/$s_!lxlf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe11e79fb-b34c-41b2-b52c-c3ceeb302026_1344x768.png 1272w, https://substackcdn.com/image/fetch/$s_!lxlf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe11e79fb-b34c-41b2-b52c-c3ceeb302026_1344x768.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Russian cyber war, Stable Diffusion</figcaption></figure></div><p>In a joint <em>Risky Business</em> and <em>Geopolitics Decanted</em> <a href="https://risky.biz/illiavitiuk">feature interview</a>, Patrick Gray and Dmitri Alperovitch spoke with Ilia Vitiuik, the Head of the Department of Cyber and Information Security of the Security Service of Ukraine (SBU) about how Ukraine has countered Russia's cyber operations.</p><p>Vitiuk described Russian cyber operations against Ukraine as a "cyber war" with destructive campaigns against Ukraine starting in 2014, eight years before the full-scale invasion. Significant destructive cyber operations he cited included NotPetya, <a href="https://www.cfr.org/cyber-operations/compromise-power-grid-eastern-ukraine">electricity network attacks</a> in 2015 and 2016 and a less well-known attempt to cause a train collision by interfering with a railroad control system.&nbsp;</p><p>Vitiuk said these incidents motivated Ukraine to improve its cyber security.&nbsp;</p><p>"During that time, we improved our legislation, we adopted a new cybersecurity strategy," Vitiuk said. "We invented tools and techniques that are actually effective [in] countering these Russian aggressive potential cyber attacks."&nbsp;</p><p>The number of cyber attacks the SBU dealt with that it believes comes from Russia have grown fivefold between 2020 and 2022. As a result, well before the physical invasion, the SBU had tremendous experience remediating and recovering from Russian attacks. Today, SBU deals with 10 to 15 "serious events" daily.&nbsp;</p><p>Vitiuk said experience gained over the previous eight years was probably "the crucial thing" that enabled Ukraine to counter Russian cyber operations.&nbsp;</p><p>There were many disruptive operations leading up to the invasion, Vitiuk said.</p><p>"It was a mixture of everything. Defacing websites, using wipers, lockers, DDoS attacks, and also the psychological disinformation campaign that actually was also launched simultaneously in order to make people panic that all of their data were stolen and will be exposed and that all the IT infrastructure will be wiped away."</p><p>Vitiuk thinks these early attacks were "about the psychology of the people". If they had succeeded, they would "wipe out a lot of infrastructure and make people panic [and] make people more vulnerable" to the subsequent invasion. This could explain why these attacks occurred weeks before the invasion rather than being timed to sow chaos as the ground invasion was kicking off.&nbsp;</p><p>Ukraine had help. Vitiuk describes how US Cyber Command came to Ukraine in December 2021 and provided hardware and software to help the country defend high-value critical infrastructure. Vitiuk says these actions "helped us a lot" when Russian actors targeted that infrastructure.</p><p>Vitiuk also spoke of how Russian hackers had physically relocated to be "closer to the frontlines". This was to facilitate communication with the Russian military, get better access to Ukrainian military devices captured on the battlefield and to access Ukrainian infrastructure located in occupied territories.&nbsp;</p><p>This forward deployment, for example, would have facilitated a <a href="https://srslyriskybiz.substack.com/p/why-russias-plan-to-hide-spy-data#%C2%A7ukraine-thwarts-sandworm-op-targeting-military-systems">recently-thwarted</a> Russian effort to compromise Ukrainian combat information systems. Vitiuk provided more detail about the Russian effort and its potential to be extremely damaging.</p><p>The full interview is a compelling insight into cyber defence in a large-scale conflict. It is <a href="https://podcasts.apple.com/au/podcast/feature-interview-how-sandworm-prepared-ukraine-for/id216478078?i=1000625071166">available here</a> or on Apple podcasts:</p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/feature-interview-how-sandworm-prepared-ukraine-for/id216478078?i=1000625071166&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000625071166.jpg&quot;,&quot;title&quot;:&quot;Feature Interview: How Sandworm prepared Ukraine for a cyber war&quot;,&quot;podcastTitle&quot;:&quot;Risky Business&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/feature-interview-how-sandworm-prepared-ukraine-for/id216478078?i=1000625071166&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2023-08-21T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/feature-interview-how-sandworm-prepared-ukraine-for/id216478078?i=1000625071166" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><h2>Advanced Persistent Teenagers</h2><p>Earlier this month the <a href="https://www.cisa.gov/cyber-safety-review-board">Cyber Safety Review Board</a> (CSRB) released an <a href="https://www.cisa.gov/resources-tools/resources/review-attacks-associated-lapsus-and-related-threat-groups-report">excellent report</a> into the activities of the Lapsus$ threat actor group. The report identifies many current security practices that aren't up to scratch and should be required reading for CISOs.&nbsp;</p><p>Lapsus$ was a loosely-organised transnational group of hackers based mainly in the UK and Brazil that emerged in late 2021 and went on an <a href="https://therecord.media/lapsus-the-script-kiddies-are-alright/">absolute tear</a> in 2022. The report said the core membership was a small group of around 10 known members, and the CSRB did not find evidence of affiliation with state actors.&nbsp;</p><p>The group "seemed to work at various times for notoriety, financial gain, or amusement," the report said. Because Lapsus$ had ties to other threat actor groups that used similar tactics, the CSRB also considered these groups in its review.</p><p>The Board said "Lapsus$ was unique for its effectiveness, speed, creativity, and boldness". Despite its small size, the group managed to compromise high-profile companies including Microsoft, Uber, Nvidia, Rockstar Games, and Samsung. The group's "attacks were consistently effective against some of the most well-resourced and well-defended companies in the world".&nbsp;</p><p>Rather than diving into specific incidents, the review took a holistic approach and made recommendations about the systemic issues that enabled Lapsus$' attacks.&nbsp;&nbsp;</p><p><a href="https://risky.biz/RB717">In an interview</a> on the <em>Risky Business</em> podcast last week, CSRB Deputy Chair Heather Adkins said Lapsus$ included "very creative kids who have digital skills" but the "large majority of the very successful attacks against well-defended organisations stemmed from some fairly basic social engineering".&nbsp;&nbsp;</p><p>"[Lapsus$] were just using accents, different languages, just calling people up, if the first thing didn't succeed they'd try, try again until something succeeded," Adkins continued. "They weren't really worried so much about failing, they were only worried about succeeding."&nbsp;</p><p>Another aspect of Lapsus$&#8217; success, she said, was that "there were really no rules" for the group.</p><p>Some members of Lapsus$, for example, <a href="https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/">exploited Emergency Disclosure Requests</a>, emergency requests for information from service providers, typically law enforcement agencies, for sensitive personal information about targeted people. The group would then use this information to take over online accounts and access personal photos for use in extortion attempts.</p><p>Some of the groups related to Lapsus$ also harassed cyber security researchers and staff at targeted organisations. The report said:</p><blockquote><p>The seriousness of this activity ranged from mischief to dangerous behaviour. Lapsus$ was known to join and monitor an organisation&#8217;s incident response channels, and in one instance took over a screen share and deleted resources live in front of the victim. Similarly, Lapsus$ publicly posted screenshots of victim environments to demonstrate their access. On the more serious end of this behaviour, loosely affiliated threat actors threatened and harassed security professionals by publishing their personal information online, i.e., doxing, and pestered targeted organisations&#8217; employees on Keybase, Twitter, and other online forums. The Board also heard of a subset of threat actors that recruited forum members to hijack cybersecurity professionals&#8217; online accounts, and conducted <a href="https://www.fbi.gov/contact-us/field-offices/lasvegas/news/press-releases/fbi-las-vegas-federal-fact-friday-the-dangers-of-swatting">swatting attacks</a> against them and their families. This demonstrates the potentially serious physical threat these groups posed.</p></blockquote><p>Adkins described this behaviour as a "wake up call".&nbsp;</p><p>"Believe it or not, many of the nation state actors we study are professionalised. They are not going to call up your local police department and have your house swatted."</p><p>Adkins thinks this results in many infosec people thinking "about the bad guys at a distance &#8230; [and that] they're going to operate within these constraints that we assume and we build these &#8230; investigator biases around how they behave."</p><p>Aside from breaking imaginary norms of behaviour, Lapsus$ was also particularly adept at exploiting the 'seams' between organisations. It identified points of weakness or vulnerability that existed in these relationships and exploited them ruthlessly.&nbsp;</p><p>In one example, Lapsus$ <a href="https://www.okta.com/blog/2022/04/okta-concludes-its-investigation-into-the-january-2022-compromise/">targeted</a> a company that provided technical support for identity vendor Okta in order to access Okta's downstream customers. Although the breach did not compromise Okta customers, the report describes it as a "remarkable example of a creative three-stage supply chain attack".&nbsp;</p><p>The group targeted telecommunications providers because of their role in authentication processes that involve One Time Passcodes (OTPs) sent via SMS and voice calls. Lapsus$ compromised telecommunications infrastructure or subverted business processes and accounts to access these authentication mechanisms.</p><p>Some of Lapsus$&#8217; techniques fell into the 'it&#8217;s not dumb if it works' category. For example, the group could rely on MFA push fatigue when spamming employees with access approval requests until they simply said yes. The report said "sometimes these prompts occurred late at night, or during inconvenient times, possibly to increase the likelihood of the employee accepting the prompt".&nbsp;</p><p>Lapsus$ also tried to recruit insiders from targeted organisations and posted advertisements offering money for access to internal systems. The group offered up to USD$20k per week to insiders to conduct SIM swaps.&nbsp;</p><p>If it didn't have inside help, the group would carry out <a href="https://en.wikipedia.org/wiki/SIM_swap_scam">fraudulent SIM swaps</a> to enable access to other target accounts.</p><p>One clear message from the report is that SMS and voice-based MFA processes provide weak protection against determined attackers. From a CISO's point of view, they are better than nothing, but only barely.&nbsp;&nbsp;</p><p>So it is no surprise that many of the report's recommendations focus on improving identity management while mitigating telecommunications and reseller vulnerabilities.&nbsp;</p><p>The report recommends "everyone must progress toward a passwordless world", and mentions technologies built into consumer devices, such as FIDO2-compliant solutions, WebAuthn and Passkeys.&nbsp;</p><p>At the same time, the Board recognised that implementing these solutions will take time and that SMS and voice authentication processes will be around for a while.&nbsp;</p><p>There are a swathe of recommendations aimed at making telco SIM swapping procedures more rigorous. The report suggests that the Federal Communications Commission and the Federal Trade Commission "standardise and facilitate the adoption of best practices to reduce or eliminate fraudulent SIM swaps".&nbsp;</p><p>These are exactly the kind of specific recommendations that we hoped would come out of a report like this. They address the root causes that allow Lapsus$ and groups like it to be successful, but they can only be arrived at by examining a broad set of incidents.&nbsp;</p><h2></h2><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://srslyriskybiz.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Seriously Risky Business! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Three Reasons to be Cheerful this Week:</h2><ol><li><p><strong>16Shop phishing arrests:</strong> An international operation coordinated by Interpol <a href="https://www.interpol.int/en/News-and-Events/News/2023/Notorious-phishing-platform-shut-down-arrests-in-international-police-operation">has resulted</a> in the arrests of three individuals associated with the '16shop' phishing-as-a-service platform. Two of the suspects were arrested in Indonesia and one in Japan. Cyber security firm Group-IB says the platform has been active since late 2017 and has been used in the creation of over 150,000 phishing domains. The platform's administrator was a 21-year-old based in Indonesia.&nbsp;</p></li><li><p><strong>Three years prison for USD$20m of SIM Swapping: </strong>A US court sentenced 26-year-old Anthony Francis Faulk to three years in prison for his role in a cryptocurrency hacking trio. The trio tricked cellphone service providers into transferring victims&#8217; phone numbers to a SIM under their control. Faulk and his co-conspirators would then reset passwords for email and cryptocurrency trading accounts to empty the associated wallets.</p></li><li><p><strong>NCSC Ransomware Tipoffs:</strong> The UK's National Cyber Security Centre is <a href="https://therecord.media/gchq-ncsc-tipping-off-ransomware-targets-early-warning">disrupting ransomware attacks</a> by tipping off potential victims prior to the deployment of encrypting malware. Detecting the ransomware attack is the easy part, apparently the hard part is finding contact details for the potential victims. Only one in 50 targeted organisations are alerted and sometimes the person contacted believes the&nbsp; NCSC is a scammer. The NCSC is appealing for more British organisations to join its <a href="https://www.ncsc.gov.uk/information/early-warning-service">Early Warning</a> program to receive these alerts.</p></li></ol><h2>Sponsor Section</h2><p><em>In <a href="https://risky.biz/RBNEWSSI12">this</a> Risky Business News sponsor interview Tom Uren talks to Dan Guido, CEO of Trail of Bits, about AI. Dan thinks AI technologies will be a "game changer." But he also thinks the conversation around AI is not very sophisticated just yet.</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/risky-biz-sponsor-interview-using-ai-to-do-security/id1621305970?i=1000625067951&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000625067951.jpg&quot;,&quot;title&quot;:&quot;Risky Biz Sponsor Interview: Using AI to do security research&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/risky-biz-sponsor-interview-using-ai-to-do-security/id1621305970?i=1000625067951&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2023-08-21T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/risky-biz-sponsor-interview-using-ai-to-do-security/id1621305970?i=1000625067951" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><p><em>Trail of Bits co-founder and CEO Dan Guido was asked to provide feedback on the effects of AI on modern technology at a meeting of the Commodity Futures Trading Commission's Technology Advisory Committee (TAC) on July 18. His comments are summarised in the company's blog <a href="https://blog.trailofbits.com/2023/07/31/how-ai-will-affect-cybersecurity-what-we-told-the-cftc/">here</a> and are available in full in the video below.</em></p><div id="youtube2-RM4Gag7TIYo" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;RM4Gag7TIYo&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/RM4Gag7TIYo?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h2>Shorts</h2><h3>Another Glenn Greenwald Source Goes to Jail</h3><p>Brazilian authorities have sentenced a hacker named Walter Delgatti Neto to 20 years in prison in connection to the so-called <a href="https://en.wikipedia.org/wiki/Vaza_Jato">Vaza Jato</a> leaks.</p><p>In 2019 he <a href="https://apnews.com/article/22e23c99868d49ceaacbd4f8b1ccd17e">leaked messages</a> from prosecutors involved in an anti-corruption probe. These <a href="https://www.theguardian.com/world/2019/jun/10/brazil-lula-sergio-moro-judge-collaborated-with-prosecutors">leaks revealed</a> that a judge, S&#233;rgio Moro, had coached prosecutors during a corruption investigation known as Operation Car Wash, or "Lava Jato".&nbsp;</p><p>One of Moro's investigations resulted in the conviction of former Brazilian President Lula da Silva, which forced him out of the 2018 presidential poll. Moro was appointed to serve as the justice minister in the Bolsonaro government in 2019.</p><p>The Brazilian Supreme Court later ruled that Moro was <a href="https://www.reuters.com/world/americas/brazil-supreme-court-confirms-ruling-that-judge-was-biased-against-lula-2021-06-23/">biased against Lula</a>. Lula's conviction was <a href="https://www.reuters.com/world/americas/brazil-judge-annuls-lulas-convictions-opens-door-2022-run-2021-03-08/">subsequently annulled</a>, and he is once again serving as President of Brazil.&nbsp;</p><h3>Latest Open Source Hippies: The US Government</h3><p>The US Government has <a href="https://www.cisa.gov/news-events/news/we-want-your-input-help-secure-open-source-software">announced a request for information</a> seeking help on ways to secure open source software.&nbsp;</p><p>The post compares the effort to secure open source software to the investment required to build the US interstate highway system. Although the investment was massive, the returns were also huge. We like the analogy, but of course the announcement doesn't commit any funding!&nbsp;</p><p>The White House <a href="https://www.whitehouse.gov/briefing-room/statements-releases/2023/08/09/biden-harris-administration-launches-artificial-intelligence-cyber-challenge-to-protect-americas-critical-software/">also launched</a> a two-year competition led by DARPA to use AI to identify and fix software problems. The competition will feature almost USD$20m in prizes and we think it will move the needle. AI assistants are already being used to help write code, so they need to be security savvy too.&nbsp;&nbsp;</p><h3>Preparing For the Post-Quantum Future</h3><p>CISA, NIST, and the NSA <a href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3498776/post-quantum-cryptography-cisa-nist-and-nsa-recommend-how-to-prepare-now/">have published</a> a <a href="https://www.cisa.gov/news-events/alerts/2023/08/21/cisa-nsa-and-nist-publish-factsheet-quantum-readiness">joint guide</a> to help organisations migrate to post-quantum cryptographic algorithms. Essentially, the guide says you should figure out what encryption systems you are using and come up with a plan to migrate to quantum-secure systems..&nbsp;</p><p>Google is taking these first steps and <a href="https://security.googleblog.com/2023/08/toward-quantum-resilient-security-keys.html">last week announced</a> the release of the first "quantum resilient" FIDO2 security key.&nbsp;</p><h2>Risky Biz Talks</h2><p><em>You can find the audio edition of this newsletter and other fine podcasts and interviews in the Risky Biz News feed (<a href="https://risky.biz/feeds/risky-business-news">RSS</a>, <a href="https://podcasts.apple.com/au/podcast/risky-business-news/id1621305970">iTunes</a> or <a href="https://open.spotify.com/show/0BdExoUZqbGsBYjt6QZl4Q">Spotify</a>).&nbsp;&nbsp;</em></p><p><em>In <a href="https://risky.biz/BTN47/">our last</a> "Between Two Nerds" discussion Tom Uren and <a href="https://twitter.com/thegrugq">The Grugq</a> look at&nbsp; hacking CCTV cameras for fun and profit.</em></p><div class="apple-podcast-container" data-component-name="ApplePodcastToDom"><iframe class="apple-podcast " data-attrs="{&quot;url&quot;:&quot;https://embed.podcasts.apple.com/au/podcast/between-two-nerds-hacking-cctv-cameras-for-fun-and-profit/id1621305970?i=1000625220635&quot;,&quot;isEpisode&quot;:true,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/podcast-episode_1000625220635.jpg&quot;,&quot;title&quot;:&quot;Between Two Nerds: Hacking CCTV cameras for fun and profit&quot;,&quot;podcastTitle&quot;:&quot;Risky Business News&quot;,&quot;podcastByline&quot;:&quot;&quot;,&quot;duration&quot;:&quot;&quot;,&quot;numEpisodes&quot;:&quot;&quot;,&quot;targetUrl&quot;:&quot;https://podcasts.apple.com/au/podcast/between-two-nerds-hacking-cctv-cameras-for-fun-and-profit/id1621305970?i=1000625220635&amp;uo=4&quot;,&quot;releaseDate&quot;:&quot;2023-08-22T00:00:00Z&quot;}" src="https://embed.podcasts.apple.com/au/podcast/between-two-nerds-hacking-cctv-cameras-for-fun-and-profit/id1621305970?i=1000625220635" frameborder="0" allow="autoplay *; encrypted-media *;" allowfullscreen="true"></iframe></div><p><em>&nbsp;</em></p><h2>From <a href="https://riskybiznews.substack.com/">Risky Biz News</a>:</h2><p><strong>US warns space sector of hacks, spying, IP theft, and sabotage:</strong> As the US private space sector is growing into a global behemoth and as Starlink shows the crucial role private satellite networks can play in a military conflict, the US government is urging companies to bolster their defenses against foreign sabotage and espionage.</p><p>Three US intelligence agencies&#8212;the FBI, the National Counterintelligence and Security Center, and the US Air Force Office of Special Investigations&#8212;published a <a href="https://www.documentcloud.org/documents/23919697-safeguarding-the-us-space-industry">joint security advisory</a> [<a href="https://www.dni.gov/files/NCSC/documents/SafeguardingOurFuture/FINAL%20FINAL%20Safeguarding%20the%20US%20Space%20Industry%20-%20Digital.pdf">PDF</a>] last week describing the type of threats the commercial space industry could face from foreign intelligence agencies.</p><p>Officials warn of hacks, malicious insiders, employee recruitment efforts, and misleading investments and business partnerships.</p><p>All of these are designed to enable espionage, the theft of intellectual property, and sabotage of space infrastructure in the case of a military conflict.</p><p>[<a href="https://riskybiznews.substack.com/p/us-warns-space-sector-of-hacks-espionage">more</a> on <em>Risky Business News</em>]</p><p><strong>Lockbit has been bluffing in extortion schemes, is close to an implosion: </strong>New clues discovered by threat intelligence analysts suggest that the Lockbit ransomware group may be having technical difficulties, which have contributed to the operation losing some of its top affiliates over the past months.</p><p>According to a <a href="https://analyst1.com/ransomware-diaries-volume-3-lockbits-secrets/">report</a> published by Analyst1's Jon DiMaggio, the Lockbit gang is having problems publishing and leaking victim data on its dark web leak site.</p><p>The gang has run out of server storage, DiMaggio says. It often claims that a victim's files have been published, but the files can't be downloaded.</p><p>[<a href="https://riskybiznews.substack.com/p/lockbit-has-been-bluffing-close-to-implosion">more</a> on <em>Risky Business News</em>]</p><p><strong>PowerShell's official package repo is a supply chain mess: </strong><a href="https://www.powershellgallery.com/">PowerShell Gallery</a>, the official repository for the PowerShell scripting language, contains (still-unfixed) design flaws that can be abused by threat actors for typosquatting and impersonation attacks.</p><p>Discovered by cloud security firm <a href="https://blog.aquasec.com/powerhell-active-flaws-in-powershell-gallery-expose-users-to-attacks">AquaSec</a>, these issues can be weaponized in supply chain attacks to trick developers into downloading and running malicious PowerShell packages on their systems or inside enterprise applications.</p><p>[<a href="https://riskybiznews.substack.com/p/powershell-supply-chain-mess">more</a> on <em>Risky Business News</em>]</p>]]></content:encoded></item></channel></rss>