Infosec Monitor: No. 12

No. 12, January 19, 2024 — 2.1 Billion old NPM packages are downloaded each week. The cost of non-compliance could shut you down. And beware of Chinese drones?

Welcome back to another edition of the Infosec Monitor. A weekly newsletter covering what's happened, what's happening, and what's coming in cybersecurity.

In this week's edition of the Infosec Monitor — 2.1 Billion old NPM packages are downloaded each week. The cost of non-compliance could shut you down. And beware of Chinese drones?

News

Let's all download vulnerable code. 2.1 BILLION NPM downloads/week of archived code

New research shows developers download 2.1 billion deprecated packages weekly from the popular code repository. Out of the 50,000 more popular packages, 2.1 billion weekly downloads are of outdated versions, usually archived due to vulnerabilities and other flaws. Despite this, developers unknowingly keep downloading these versions as their software still depends on outdated packages on NPM. SC Magazine

Taking employee cybersecurity awareness to the next level

Many companies require their employees to take mandatory cybersecurity awareness training. The training usually involves a boring video or presentation and a short multiple-choice questionnaire. TAG.Global is taking a more comprehensive approach. It requires its employees to complete a fluency assessment test that covers a wide range of topics, such as phishing, device security, detecting fake websites, privacy settings, app security, data protection, and much more. Employees are given two chances to pass the test before taking a cybersecurity course. The exhaustive test aims to "cultivate awareness and foster a robust cybersecurity culture within the Middle East region." Dark Reading

New cybersecurity guidance for the public water sector from the FBI, CISA, and EPA

In response to criticism from the U.S. government's Office of the Inspector General (OIG), federal agencies, including the FBI, CISA, and EPA, have published a cybersecurity best practices guide for the water and sanitation sector. The guide aims to enhance the sector's preparedness and response to cyber threats. The guide outlines roles and responsibilities, incident response planning, and communication strategies. The initiative reflects efforts to strengthen cybersecurity in critical infrastructure sectors, especially in the face of increasing cyber threats from nation-states and ransomware attacks. The Record

Related: The U.S. Department of Energy is investing $30 million in organizations to secure clean energy infrastructure. Security Week

The cost of non-compliance — NYDFS fines firm $8 million. The company shuts down.

Genesis Global Trading, Inc., a cryptocurrency trading company, has ceased operations following an agreement to pay an $8 million penalty and surrender its licenses to New York state regulators. The New York State Department of Financial Services (NYDFS) found that Genesis had multiple compliance failures, leaving the company vulnerable to illicit activities and cybersecurity threats, including money laundering. The closure comes after DFS noted that Genesis' cybersecurity risk assessment, filed in December 2022, was significantly delayed, insufficiently comprehensive, and failed to address the cybersecurity risks to its business operations adequately. The Record

Russian-backed espionage group changing tactics

Google's Threat Analysis Group has reported a notable shift in the tactics of the Russian-linked hacking group Cold River. Traditionally involved in long-running espionage campaigns, particularly against NATO countries, Cold River is now using data-stealing malware, moving beyond its usual phishing strategies. The group, called Callisto Group and Star Blizzard, has developed a custom backdoor, SPICA, which they deliver through PDF documents disguised as opinion-editorial pieces. This new approach allows them to execute commands and steal information from victims' machines. TechCrunch

How much to fix a hacked court? More than $2.6 million

"The Kansas court system needs at least $2.6 million in additional funds to recover from an October cyberattack that prevented the electronic filing of documents and blocked online access to records for weeks." Security Week

Beware Chinese Drones?

The FBI and CISA are warning of significant risks to U.S. critical infrastructure due to the growing use of Chinese-made drones. The concerns stem from Chinese laws that compel companies, including drone manufacturers, to cooperate with state intelligence services, potentially leading to unauthorized data access. The agencies recommend that organizations in critical sectors such as energy, chemical, and communications should opt for drones that adhere to secure-by-design principles and are manufactured in the U.S. SC Magazine

Thank you for reading Infosec Monitor. This post is public so feel free to share it.

AI & Security

Frequent vulns raise concerns with popular AI framework MLFlow

Protect AI has discovered four critical vulnerabilities in MLFlow, a popular open-source machine learning framework, raising concerns about potential system takeovers and sensitive information loss. These vulnerabilities, including Remote Code Execution and Arbitrary File Overwrite, were identified within a span of 50 days. MLFlow, with a substantial user base that includes major tech companies, faces significant security challenges due to these flaws. CSO Online

MLFlow isn't the only one with flaws... Security Week

The power of AI in cybersecurity

A thoughtful review by Help Net Security on AI and cybersecurity. The dual-use nature of GenAI means that while it can assist security teams in enhancing system testing, it also enables cybercriminals to develop advanced malware and deceptive techniques like deepfakes. Recognizing these challenges, governments like the U.S. and UK are stepping up efforts to manage AI risks in cybersecurity, issuing guidelines and orders for secure AI development and deployment. Help Net Security

Cyber Security Incidents

Chinese hackers exploiting VMware vulnerability targeted defense, government, telecom, and tech center for over two years

Chinese hacking group UNC3886 has been exploiting a critical VMware vCenter Server vulnerability as a zero-day since at least late 2021, which VMware patched in October. Mandiant revealed the group used the flaw in a cyber espionage campaign, deploying backdoors and exploiting another VMware Tools vulnerability for privilege escalation and data harvesting. The attackers carefully covered their tracks by removing core dump files. Their targets primarily include organizations in defense, government, telecom, and technology sectors, showcasing their preference for zero-day vulnerabilities in critical platforms. The flaw is still actively being exploited. Bleeping Computer

€10 million demanded by ransomware gang of Spanish council, council refuses to pay

The mayor of Calvià, a Spanish municipality, has confirmed that the city council will not pay the €10 million ransom demanded following a ransomware attack. This decision aligns with Spain's commitment as a signatory of the Counter Ransomware Initiative, which discourages paying ransomware extortion demands. The attack has temporarily suspended administrative services, and the council is collaborating with the Civil Guard's cybercrime department to address the situation. SC Magazine

Over 178K SonicWall firewalls vulnerable to DoS

Security researchers have identified critical vulnerabilities in over 178,000 SonicWall next-generation firewalls, exposing them to DoS and potential RCE attacks.  Bleeping Computer

Malware campaign targeting Apache web servers and websites using Laravel

The FBI and CISA have issued an alert about a malware campaign targeting Apache web servers and websites using Laravel, a popular web application framework. The campaign, driven by 'Androxgh0st' malware, aims to steal credentials from high-profile applications like AWS and Microsoft 365. Attackers exploit known vulnerabilities to access and misuse credentials stored in Laravel .env files. Dark Reading

Other noteworthy incidents

CISA has warned about a critical vulnerability in Ivanti Endpoint Manager Mobile (EPMM) and MobileIron Core, which are now actively exploited in the wild. The Hacker News

VF Corp (owner of Vans) says 35 million impacted from December breach TechCrunch

Three English councils in Kent — Canterbury, Dover, and Thanet — have been affected by a cyberattack, leading to the shutdown of multiple online services. The Record

A cybersecurity incident disrupted Kansas State University systems. Bleeping Computer

Nearly 7,000 WordPress sites were compromised, with almost 200,000 still vulnerable to Balada Injector Dark Reading

Google's first zero-day of the year hits Chrome. The Hacker News

SoftwareProjects leaves a non-password-protected database online with 200GB of data. CSO Online

AboutCybersecurity is at a crossroads, changing more rapidly than we believed was possible just a few years ago. Stay informed on what's going on, what's happened, and what's coming next.I'm Bryan Smith, the author of the Infosec Monitor. I've spent over a decade pioneering changes in how cybersecurity is managed. From helping create the first cyber risk quantification (CRQ) software to advising how to approach cybersecurity pragmatically and proactively.

Data & Research

70% of organizations use managed AI services. From Wiz's new report, "State of AI in the Cloud 2024." Wiz

DDoS Attacks on the Environmental Services Industry Surge by 61,839% in 2023 The Hacker News

63% of cybersecurity professionals believe that working as a cybersecurity professional is more difficult today than two years ago. CSO Online

Cybersecurity Mergers, Acquisitions, and Funding

Software supply chain security startup Kusari raises $8 million. Security Week

Vicarius raised $30 million in Series B for AI innovation in vulnerability remediation. India Times

Snyk acquires Helios for an undisclosed sum. Dark Reading