Page 1,117«..1020..1,1161,1171,1181,119..1,1301,140..»

BlackByte 2.0 Ransomware: Infiltrate, Encrypt, and Extort in Just 5 Days – The Hacker News

Jul 07, 2023Swati KhandelwalEndpoint Security / Ransomware

Ransomware attacks are a major problem for organizations everywhere, and the severity of this problem continues to intensify.

Recently, Microsoft's Incident Response team investigated the BlackByte 2.0 ransomware attacks and exposed these cyber strikes' terrifying velocity and damaging nature.

The findings indicate that hackers can complete the entire attack process, from gaining initial access to causing significant damage, in just five days. They waste no time infiltrating systems, encrypting important data, and demanding a ransom to release it.

This shortened timeline poses a significant challenge for organizations trying to protect themselves against these harmful operations.

BlackByte ransomware is used in the final stage of the attack, using an 8-digit number key to encrypt the data.

To carry out these attacks, hackers use a powerful combination of tools and techniques. The investigation revealed that they take advantage of unpatched Microsoft Exchange Serversan approach that has proven highly successful. By exploiting this vulnerability, they gain initial access to the target networks and set the stage for their malicious activities.

The ransomware further employs process hollowing and antivirus evasion strategies to guarantee successful encryption and circumvent detection.

Furthermore, web shells equip them with remote access and control, enabling them to maintain a presence within the compromised systems.

The report also highlighted the deployment of Cobalt Strike beacons, which facilitate command and control operations. These sophisticated tools give attackers a wide range of skills, making it more difficult for organizations to defend against them.

Privileged Access Management: Learn How to Conquer Key Challenges

Discover different approaches to conquer Privileged Account Management (PAM) challenges and level up your privileged access security strategy.

Alongside these tactics, the investigation uncovered several other troubling practices cybercriminals use. They utilize "living-off-the-land" tools to blend in with legitimate processes and escape detection.

The ransomware modifies volume shadow copies on infected machines to prevent data recovery through system restore points. The attackers also deploy specially-crafted backdoors, ensuring continued access for the attackers even after the initial compromise.

The disturbing upsurge in ransomware attacks requires immediate action from organizations worldwide. In response to these findings, Microsoft has provided some practical recommendations.

Organizations are primarily urged to implement robust patch management procedures, ensuring they timely apply critical security updates. Enabling tamper protection is another essential step, as it strengthens security solutions against malicious attempts to disable or bypass them.

Here is the original post:
BlackByte 2.0 Ransomware: Infiltrate, Encrypt, and Extort in Just 5 Days - The Hacker News

Read More..

E2E encryption: Should big tech be able to read people’s messages? – BBC

5 July 2023

To play this content, please enable JavaScript, or try a different browser

Cyber correspondent Joe Tidy explains how end-to-end encryption works

Meta's Mark Zuckerberg is on a collision course with the UK government over continued plans to build super-secure messaging into all his apps despite a potential landmark law that could effectively outlaw the technology. Around the world, governments that also oppose the popular technology are watching the showdown closely to see who will blink first.

"End-to-end encryption", "backdoors" and "client-side scanning" - the biggest row in technology sounds very complicated.

But really it comes down to a very simple question. Should technology companies be able to read people's messages?

That is the crux of a row that has been brewing for years between Silicon Valley and the governments of at least a dozen countries around the world.

WhatsApp, iMessage, Android Messages and Signal all use the super-secure system called end-to-end encryption.

The technology means only the sender, at one end, and the receiver, at the other, can read messages, see media or hear phone calls. Even the app makers cannot access the content.

Big switchover

In the past 10 years, end-to-end encrypted apps have become increasingly popular, with billions of people using them every day.

Most governments and security agencies reluctantly accepted the technology's rise - until four years ago, when Mr Zuckerberg announced on stage the Messenger app and then Instagram would move to end-to-end encryption as standard.

"We're going to enable more than two billion people around the world to have their most personal conversations with each other privately," he said.

Since then, Mr Zuckerberg and his army of engineers have slowly and quietly been cracking on with the project. The company is refusing to speak to reporters on the record about how the mammoth task is going or when the big switchover will be. "By the end of 2023," is all it will say publicly.

Image source, Getty Images

The Messenger app is linked to Facebook and has an estimated 900 million users a month

Meanwhile, the calls to stop the switchover or build in safeguards have been growing louder.

Authorities in the UK, Australia, Canada, New Zealand, the United States, India, Turkey, Japan and Brazil - plus law-enforcement agencies such as Interpol - have criticised the technology.

But no government in the democratic world has risked passing a law that will interfere with these popular apps - until now.

Making technology companies build in some sort of technical backdoor to allow messages to be scanned for illegal material is one of the central tenets of the UK's wide-reaching Online Safety Bill, which looks likely to be passed into law in the near future.

Police officers, if they can no longer ask Meta for the contents of people's messages, will miss out on a key source of evidence they regularly use to convict criminals or terrorists, the government says.

And there is a particular concern about children being groomed online in secret.

End-to-end encryption "will be a huge boon to anyone who wants to hurt a child", Home Secretary Suella Braverman wrote to Mr Zuckerberg on Monday.

Home Secretary Suella Braverman has led the government's opposition to end-to-end encryption apps

And on Wednesday, the National Society for the Prevention of Cruelty to Children (NSPCC) has released a YouGov survey it commissioned, suggesting the British public wants police officers to be able to access people's messages, to protect children.

Of the 1,723 adults surveyed across the UK, 73% said technology companies should, by law, have to scan private messaging for child sexual abuse and disrupt it in end-to-end encrypted environments.

Most already scanned for child sexual abuse on their services, leading to many successful convictions, the NSPCC said.

"It is now clear that companies who wish to pit children's fundamental right to safety against the privacy rights of adults are out of step with the public and, ultimately, their user base," Richard Collard, at the charity, said.

In response to the survey, a Meta spokesman said the company had "developed safety measures that prevent, detect and allow us to take action against this heinous abuse" - age restrictions for contacting strangers, for example.

'Undermines privacy'

Also on Wednesday, as if to highlight the passions on both sides of the debate, 68 prominent security and privacy researchers have published a letter saying the Online Safety Bill would effectively break end-to-end encryption.

The bill puts the onus on tech firms to find a way to implement child safety measures whilst maintaining privacy for users but the experts say this is impossible.

"Our concern is that surveillance technologies are deployed in the spirit of providing online safety," the letter says.

"This act undermines privacy guarantees and, indeed, safety online."

It also sets a precedent for repressive regimes around the world to monitor and control what people are sharing, experts say.

Rebuilding trust

And to make matters worse for critics of the technology, Elon Musk announced, in May, he too was building end to end encryption, into Twitter messages.

Switching to the technology is complex and expensive, as evidenced by Meta, but ultimately worth it tech bosses think.

After years of data scandals, big tech sees it as key to rebuilding trust in its services.

And in a happy coincidence, end-to-end encryption makes these embattled companies' tricky job of moderation a lot easier - if they cannot see what users are sharing, then neither can they police it.

Read the original here:
E2E encryption: Should big tech be able to read people's messages? - BBC

Read More..

Vulnerability in Cisco Enterprise Switches Allows Attackers to Modify Encrypted Traffic – SecurityWeek

Cisco this week informed customers about a high-severity vulnerability in its Nexus 9000 series switches that could allow unauthenticated attackers to intercept and modify traffic.

Tracked as CVE-2023-20185, the issue impacts the ACI multi-site CloudSec encryption feature of the Nexus 9000 switches that are configured in application centric infrastructure (ACI) mode typically used in data centers for controlling physical and virtual networks.

An issue with the implementation of the ciphers used by the CloudSec encryption feature allows a remote, unauthenticated attacker to intercept encrypted traffic between sites and break the encryption using cryptanalytic techniques. The attacker could then read or modify the traffic.

This vulnerability affects Cisco Nexus 9000 Series Fabric Switches in ACI mode that are running releases 14.0 and later if they are part of a multi-site topology and have the CloudSec encryption feature enabled, Cisco explains in an advisory.

The issue impacts Nexus 9332C and Nexus 9364C fixed spine switches, and Nexus 9500 spine switches equipped with a Nexus N9K-X9736C-FX line card.

Cisco has not released patches to address the vulnerability and recommends that customers using vulnerable switches disable the ACI multi-site CloudSec encryption feature.

This week, the tech giant released software updates to address four medium-severity issues in Webex Meetings, Duo Authentication Proxy, and BroadWorks.

Successful exploitation of these vulnerabilities could lead to cross-site scripting (XSS) or cross-site request forgery (CSRF) attacks, information leaks, and privilege escalation.

Cisco says it is not aware of any malicious attacks or public proof-of-concept (PoC) code targeting these flaws. Additional information on the vulnerabilities can be found on Ciscos security advisories page.

Related: PoC Exploit Published for Cisco AnyConnect Secure Vulnerability

Related: Cisco Patches Critical Vulnerability in Enterprise Collaboration Solutions

Related: Cisco Says PoC Exploits Available for Newly Patched Enterprise Switch Vulnerabilities

Here is the original post:
Vulnerability in Cisco Enterprise Switches Allows Attackers to Modify Encrypted Traffic - SecurityWeek

Read More..

Manufacturing companies hit by ransomware had their data encrypted: Report – Times of India

Cybersecurity service provider Sophos has revealed that two-thirds or 68% of

attacks taking place in the manufacturing sector have successfully encrypted data. The State of Ransomware in Manufacturing and Production 2023 reported that it is the highest encryption rate for the sector over the past three years and is in line with a broader cross-sector trend of attackers more frequently succeeding in encrypting data.

However, in contrast to other sectors, the percentage of manufacturing organisations that used backups to recover data has increased, with 73% of the manufacturing organisations surveyed using backups this year versus 58% in the previous year. Despite this increase, the sector still has one of the lowest data recovery rates.

Using backups as a primary recovery mechanism is encouraging, since the use of backups promotes a faster recovery. While ransom payments cannot always be avoided, we know from our survey response data that paying a ransom doubles the costs of recovery, said John Shier, field CTO, Sophos. With 77% of manufacturing organisations reporting lost revenue after a

, this added cost burden should be avoided, and priority placed on earlier detection and response, he added.

In addition, despite the growing use of backups, manufacturing and production reported longer recovery times this year. In 2022, 67% of manufacturing organisations recovered within a week, while 33% recovered in more than a week. This past year, only 55% of manufacturing organizations surveyed recovered within a week.

Longer recovery times in manufacturing are a concerning development. As we've seen in Sophos' Active Adversary reports, based on incident response cases, the manufacturing sector is consistently at the top of organizations needing assistance recovering from attacks. This extended recovery is negatively impacting IT teams, where 69%

that addressing security incidents is consuming too much time and 66% are unable to work on other projects, Shier added.

Continued here:
Manufacturing companies hit by ransomware had their data encrypted: Report - Times of India

Read More..

Encryption A.l Developer Rug Pulls $2 Million To Repay A $300,000 Crypto Gambling Debt – Bitcoinist

A 22-year developer behind Encryption A.l, a cryptocurrency project, hasrug-pulled users of roughly $2 million ahead of the platforms liquidity migration. In a screenshot shared on July 3 and posted on Twitter, the developer apologized, saying that while he deeply regretted his actions and impact on users, he was battling a crypto-gambling addiction that has seen him lose over $300,000 in the past few months.

The decision to rug-pull user funds and make away with $2 million was, it appears, a way of recouping his crypto gambling losses.

According todatafrom DEXTools, the prices of OxEncrypt slumped by over 95% following this decision, crashing from over $3.25 to as low as $0.02 by the time the screenshot was shared. The token was only available for trading on Uniswap, the worlds largest decentralized cryptocurrency exchange.

OxEncrypt was the native token of Encryption A.l, a cryptocurrency project that claimed to be building an arsenal of tools to empower traders and developers.

Among some of the tools, the platformallowed the creation of Telegram bots which the developer said would instead allow the owner to trade decentralized finance (DeFi) instruments much more efficiently.

The team added that their bots use different algorithms to encrypt smart contract addresses so they arent detectable to sniper bots and Telegram bots. Among these tools include a Wallet Analysis Tool that gives a detailed report about a wallets balance; and a Fresh Wallet Detective tool for picking out the first 100 contract buyers.

In a post on Twitter, the platform was supposed to migrate on July 3 but added another 48 hours extension for users to migrate via DEXTools. The purpose of the migration was to, among other enhancements, improve the platforms functionality and address other concerns raised by community members.

Going by the timing of the rug pull, it appears the developer took advantage of the increased tokens locked in the projects liquidity pools on Uniswap to steal user funds. Typically, a hard rug pull executed by the developer means the project has been effectively abandoned unless it is revived by the community who saw value in the platform.

On the other hand, investors who had committed to the project have been left holding worthless OxEncrypt tokens. Moreover, unless the developer is sued, victims could have no recourse. This reality is considering the trustless, global, and immutable nature of Ethereum smart contracts enabling token locking and trading on Uniswap.

Feature image from Canva, chart from TradingView

Read the rest here:
Encryption A.l Developer Rug Pulls $2 Million To Repay A $300,000 Crypto Gambling Debt - Bitcoinist

Read More..

Encryption Software Market Size, Global Insights and Trends … – Digital Journal

PRESS RELEASE

Published July 6, 2023

Report Ocean recently released a comprehensive report on theglobal Encryption Software market, offering valuable insights into various factors impacting the markets growth. The report covers crucial information on market restraints, drivers, and opportunities, enabling readers to understand the market dynamics. It also provides a detailed analysis of industry developments and trends that are shaping theglobal Encryption Software market. Furthermore, the report includes a thorough assessment of the market at both global and regional levels, providing comprehensive insights for businesses and stakeholders.

The global encryption software market size was US$ 9.7 billion in 2021. The global encryption software market size is forecast to reach US$ 47.51 billion by 2030, growing at a compound annual growth rate (CAGR) of 19.3% during the forecast period from 2022 to 2030.

Request To Download Sample of This Strategic Report @https://reportocean.com/industry-verticals/sample-request?report_id=BWCC931

The primary purpose of the encryption software is to protect the confidentiality of data stored in files, folders, and disks and data traveling over wireless networks or data in transit, depending on an organizations security and compliance requirements. It involves converting a message or plain text into a coded message called an encrypted message so that only authorized parties can read it. Software encryption uses software to encrypt and decrypt resting and transiting data. Thus, by making the data unreadable by unauthorized people, encryption software ensures the security of confidential data.

Factors Influencing Market Growth

Impact Analysis of COVID-19

The adoption of encryption software increased during the COVID-19 pandemic. In addition, organizations globally were working remotely as governments worldwide imposed lockdowns in order to combat the spread of the virus. Thus, an increase in the quantity of data stored in the clouds was followed by other problems such as performance, availability, security, and encryption software solutions and services. In addition, the threat of data theft has increased the demand for this software. Thus, the COVID-19 pandemic has positively impacted the global encryption software market growth.

Regional Insights

North America held dominance in the encryption software market in 2021 and is forecast to continue dominating during the forecast period. As a result of the growing adoption and development of encryption software. In addition, the increasing demand to comply with stringent regulations, the increased presence of encryption software vendors, and the growth of government support are fueling the market growth in the region.

The Asia Pacific region is forecast to have lucrative growth in the market during the forecast period. As a result of the existing leading companies in the region. In addition, the rising investments by private and public sectors in order to secure sensitive data results in an increase in the demand for this software used to protect and ensure the privacy of data.

Leading Competitors

The leading prominent companies profiled in the global encryption software market are:

Scope of the Report

The global encryption software market segmentation focuses on Organization Size, Component, Deployment Model, Industry Vertical, Function, and Region.

Segmentation based on Organization Size

Segmentation based on Component

Segmentation based on Deployment Model

Segmentation based on Industry Vertical

Segmentation based on Function

Download Sample Report, SPECIAL OFFER (Avail an Up-to 30% discount on this report ): https://reportocean.com/industry-verticals/sample-request?report_id=BWCC931

Segmentation based on Region

Table of Content

Chapter 1: Global Encryption Software Industry Overview

Chapter 3: Market Dynamics

Chapter 4: Top Company Profiles

Chapter 5: Global Encryption Software market Competition, by Players

Chapter 6: Global Market Size by Regions

Chapter 7: Global Market Segment by Application

Chapter 8: Global Encryption Software Industry Segment by Type

Chapter 9: Market Chain, Sourcing Strategy, and Downstream Buyers

Chapter 10: Strategies and key policies by Distributors/Suppliers/Traders

Chapter 11: Key Marketing Strategy Analysis, by Market Vendors

Chapter 12: Market Effect Factors Analysis

Chapter 13: Global Encryption Software market Size Forecast (2023-2031).

Encryption Software Market Research Report Scenario includes:

>The report provides qualitative and quantitative trends of global Encryption Software Market across type, type of products, service, and geography.

>The report starts with the key takeaways, highlighting the key trends and outlook of the global Encryption Software Market.

>Provides the research methodology of the study.

>Further provides PEST analysis for each region.

>Highlights the key industry dynamics in the Encryption Software Market, including factors that are driving the market, prevailing deterrent, potential opportunities as well as future trends. Impact analysis of these drivers and restraints is also covered in this section.

>Discusses the global Encryption Software Market scenario, in terms of historical market revenues, and forecast till the year 2031.

Full Report Description, TOC, Table of Figure, Chart, etc.-https://reportocean.com/industry-verticals/sample-request?report_id=BWCC931

About Report Ocean:

We are the best market research reports provider in the industry. Report Ocean believes in providing quality reports to clients to meet the top line and bottom line goals which will boost your market share in todays competitive environment. Report Ocean is a one-stop solution for individuals, organizations, and industries that are looking for innovative market research reports.

Get in Touch with Us:Report Ocean:Email:[emailprotected]Address: 500 N Michigan Ave, Suite 600, Chicago, Illinois 60611 UNITED STATES Tel: +1 888 212 3539 (US TOLL FREE)Website:https://www.reportocean.com/

See the original post:
Encryption Software Market Size, Global Insights and Trends ... - Digital Journal

Read More..

DDoSia Attack Tool Evolves with Encryption, Targeting Multiple … – The Hacker News

The threat actors behind the DDoSia attack tool have come up with a new version that incorporates a new mechanism to retrieve the list of targets to be bombarded with junk HTTP requests in an attempt to bring them down.

The updated variant, written in Golang, "implements an additional security mechanism to conceal the list of targets, which is transmitted from the [command-and-control] to the users," cybersecurity company Sekoia said in a technical write-up.

DDoSia is attributed to a pro-Russian hacker group called NoName(057)16. Launched in 2022 and a successor of the Bobik botnet, the attack tool is designed for staging distributed denial-of-service (DDoS) attacks against targets primarily located in Europe as well as Australia, Canada, and Japan.

Lithuania, Ukraine, Poland, Italy, Czechia, Denmark, Latvia, France, the U.K., and Switzerland have emerged as the most targeted countries over a period ranging from May 8 to June 26, 2023. A total of 486 different websites were impacted.

Python and Go-based implementations of DDoSia have been unearthed to date, making it a cross-platform program capable of being used across Windows, Linux, and macOS systems.

"DDoSia is a multi-threaded application that conducts denial-of-service attacks against target sites by repeatedly issuing network requests," SentinelOne explained in an analysis published in January 2023. "DDoSia issues requests as instructed by a configuration file that the malware receives from a C2 server when started."

DDoSia is distributed through a fully-automated process on Telegram that allows individuals to register for the crowdsourced initiative in exchange for a cryptocurrency payment and a ZIP archive containing the attack toolkit.

What's noteworthy about the new version is the use of encryption to mask the list of targets to be attacked, indicating that the tool is being actively maintained by the operators.

"NoName057(16) is making efforts to make their malware compatible with multiple operating systems, almost certainly reflecting their intent to make their malware available to a large number of users, resulting in the targeting of a broader set of victims," Sekoia said.

The development comes as the U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned of targeted denial-of-service (DoS) and DDoS attacks against multiple organizations in multiple sectors.

"These attacks can cost an organization time and money and may impose reputational costs while resources and services are inaccessible," the agency said in a bulletin.

Although CISA did not provide any additional specifics, the warning overlaps with claims by Anonymous Sudan on its Telegram channel that it had taken down the websites of the Department of Commerce, Social Security Administration (SSA), and the Treasury Department's Electronic Federal Tax Payment System (EFTPS).

Anonymous Sudan attracted attention last month for carrying Layer 7 DDoS attacks against various Microsoft services, including OneDrive, Outlook, and Azure web portals. The tech giant is tracking the cluster under the name Storm-1359.

Privileged Access Management: Learn How to Conquer Key Challenges

Discover different approaches to conquer Privileged Account Management (PAM) challenges and level up your privileged access security strategy.

The hacking crew has asserted it's conducting cyber strikes out of Africa on behalf of oppressed Muslims across the world. But cybersecurity researchers believe it to be a pro-Kremlin operation with no ties to Sudan and a member of the KillNet hacktivist collective.

In an analysis released on June 19, 2023, Australian cybersecurity vendor CyberCX characterized the entity as a "smokescreen for Russian interests." The company's website has since become inaccessible, greeting visitors with a "403 Forbidden" message. The threat actor claimed responsibility for the cyber attack.

"The reason for the attack: stop spreading rumors about us, and you must tell the truth and stop the investigations that we call the investigations of a dog," Anonymous Sudan said in a message posted on June 22, 2023.

Anonymous Sudan, in a Bloomberg report last week, further denied it was connected to Russia but acknowledged they share similar interests, and that it goes after "everything that is hostile to Islam."

CISA's latest advisory has also not gone unnoticed, for the group posted a response on June 30, 2023, stating: "A small Sudanese group with limited capabilities forced 'the most powerful government' in the world to publish articles and tweets about our attacks."

Read more here:
DDoSia Attack Tool Evolves with Encryption, Targeting Multiple ... - The Hacker News

Read More..

Cisco warns of a security flaw in Nexus 9000 series switch – Computing

Cisco has released an advisory about a security vulnerability in the Nexus 9000 series switches that could enable an unauthorised remote attacker to read or alter encrypted traffic exchanged between different sites.

The vulnerability, assigned the identifier CVE-2023-20185, impacts Cisco Nexus 9000 Series Fabric Switches operating in ACI mode with releases 14.0 and beyond if they are part of a multi-site topology and have the CloudSec encryption feature activated.

CloudSec encryption is a feature of Cisco Nexus 9332C, Cisco Nexus 9364C Fixed Spine Switches and the Cisco Nexus 9500 Spine Switches equipped with a Cisco Nexus N9K-X9736C-FX Line Card.

Cisco says it currently has no knowledge of any public disclosures or instances of malicious exploitation related to the mentioned vulnerability.

The flaw in the ACI Multi-Site CloudSec encryption feature was discovered during an internal security testing of datacentre Cisco Nexus 9000 Series Fabric Switches.

The vulnerability arises from an implementation issue with the ciphers used by the CloudSec encryption feature on the affected switches, according to the company.

"An attacker with an on-path position between the ACI sites could exploit this vulnerability by intercepting intersite encrypted traffic and using cryptanalytic techniques to break the encryption," Cisco said.

Cisco has confirmed that CVE-2023-20185 does not impact Cisco Nexus 9000 Series Switches operating in standalone NX-OS mode.

Cisco has not yet issued any software updates to address the vulnerability. Additionally, there are no known workarounds available to mitigate or resolve the bug.

To address this vulnerability, Cisco suggests that customers utilising vulnerable switches should disable the ACI multi-site CloudSec encryption feature.

In addition, they are also advised to consult their support organisation for further guidance on exploring alternative solutions.

To verify whether CloudSec encryption is being used in an ACI site, users can follow these steps:

Cisco is also engaged in the process of addressing a vulnerability found in its Prime Collaboration Deployment (PCD) software. The bug, identified as CVE-2023-20060, was discovered in the web-based management interface of Cisco PCD versions 14 and earlier.

If successfully exploited, this vulnerability could enable a remote unauthenticated attacker to execute cross-site scripting attacks, albeit with the prerequisite of user interaction.

In May, Cisco released security updates to address four critical RCE vulnerabilities that affected multiple Small Business Series Switches. These vulnerabilities were deemed critical due to the potential for attackers to execute malicious code remotely, with root privileges on affected devices.

Each of these vulnerabilities was assigned a CVSS severity score of 9.8 out of 10, indicating their critical nature and the urgent need for remediation to prevent potential exploitation.

This year, Cisco has patched other Small Business products, notably the RV Series routers in February. Attackers could use those vulnerabilities to carry out actions including RCE and unauthorised access to corporate networks, often without requiring authentication.

View post:
Cisco warns of a security flaw in Nexus 9000 series switch - Computing

Read More..

Braverman writes to Zuckerberg expressing concerns over Meta’s … – The Independent

Sign up for the View from Westminster email for expert analysis straight to your inboxGet our free View from Westminster email

Suella Braverman has said she has written a letter to Meta boss Mark Zuckerberg, expressing her concerns over the companys plans to introduce end-to-end encryption without appropriate safeguards for children.

The Home Secretary told the Commons about the critical role that tech companies such as Meta play in supporting UK law enforcement agencies, revealing that the information provided by these platforms helps to protect approximately 1,200 children each month.

However, she insisted that Metas plans may hinder efforts to proactively detect and report instances of child grooming and abuse material on Facebook Messenger and Instagram Direct, saying: This will be a huge boon to anyone who wants to hurt a child.

Meta-owned messaging app WhatsApp already offers end-to-end encryption by default, which prevents anyone other than the sender and recipient of a message from accessing its contents.

The Online Safety Bill will hold tech firms to account, but indifference to abuse is intolerable

Home Secretary Suella Braverman

The social media giant is planning to add the feature to both Facebook Messenger and Instagram Direct chats later this year.

Speaking at Home Office questions, Ms Braverman said: The information that Meta and other tech companies give to UK law enforcement helps to protect around 1,200 children and leads to over 100 arrests of suspected child abusers every month.

But Meta plans to roll out end-to-end encryption soon without safeguards.

They will no longer proactively detect and alert authorities to child grooming and abuse material on Facebook Messenger and Instagram Direct.

This will be a huge boon to anyone who wants to hurt a child.

We remain committed to working with law enforcement and child safety experts as we roll out end-to-end encryption

Meta

The Online Safety Bill will hold tech firms to account, but indifference to abuse is intolerable.

I have written to Mark Zuckerberg, along with the security minister (Tom Tugendhat), childrens charities, campaign groups to outline our profound concerns.

And last week I was in New Zealand at the Five Eyes security conference where there was widespread support for working together to ensure social media companies put child safety first.

A Meta company spokesperson said: The overwhelming majority of Brits already rely on apps that use encryption to keep them safe from hackers, fraudsters and criminals.

We dont think people want us reading their private messages so have developed safety measures that prevent, detect and allow us to take action against this heinous abuse, while maintaining online privacy and security.

We remain committed to working with law enforcement and child safety experts as we roll out end-to-end encryption.

Read the original post:
Braverman writes to Zuckerberg expressing concerns over Meta's ... - The Independent

Read More..

RedEnergy Stealer-as-a-Ransomware Threat Targeting Energy and … – The Hacker News

Jul 05, 2023Ravie LakshmananCritical Infrastructure Security

A sophisticated stealer-as-a-ransomware threat dubbed RedEnergy has been spotted in the wild targeting energy utilities, oil, gas, telecom, and machinery sectors in Brazil and the Philippines through their LinkedIn pages.

The .NET malware "possesses the ability to steal information from various browsers, enabling the exfiltration of sensitive data, while also incorporating different modules for carrying out ransomware activities," Zscaler researchers Shatak Jain and Gurkirat Singh said in a recent analysis.

The objective, the researchers noted, is to couple data theft with encryption with the goal of inflicting maximum damage to the victims.

The starting point for the multi-stage attack is a FakeUpdates (aka SocGholish) campaign that tricks users into downloading JavaScript-based malware under the guise of web browser updates.

What makes it novel is the use of reputable LinkedIn pages to target victims, redirecting users clicking on the website URLs to a bogus landing page that prompts them to update their web browsers by clicking on the appropriate icon (Google Chrome, Microsoft Edge, Mozilla Firefox, or Opera), doing so which results in the download a malicious executable.

Following a successful breach, the malicious binary is used as a conduit to set up persistence, perform the actual browser update, and also drop a stealer capable of covertly harvesting sensitive information and encrypting the stolen files, leaving the victims at risk of potential data loss, exposure, or even the sale of their valuable data.

Zscaler said it discovered suspicious interactions taking place over a File Transfer Protocol (FTP) connection, raising the possibility that valuable data is being exfiltrated to actor-controlled infrastructure.

In the final stage, RedEnergy's ransomware component proceeds to encrypt the user's data, suffixing the ".FACKOFF!" extension to each encrypted file, deleting existing backups, and dropping a ransom note in each folder.

Privileged Access Management: Learn How to Conquer Key Challenges

Discover different approaches to conquer Privileged Account Management (PAM) challenges and level up your privileged access security strategy.

Victims are expected to make a payment of 0.005 BTC (about $151) to a cryptocurrency wallet mentioned in the note to regain access to the files. RedEnergy's dual functions as a stealer and ransomware represent an evolution of the cybercrime landscape.

The development also follows the emergence of a new RAT-as-a-ransomware threat category in which remote access trojans such as Venom RAT and Anarchy Panel RAT have been equipped with ransomware modules to lock various file extensions behind encryption barriers.

"It is crucial for individuals and organizations to exercise utmost caution when accessing websites, especially those linked from LinkedIn profiles," the researchers said. "Vigilance in verifying the authenticity of browser updates and being wary of unexpected file downloads is paramount to protect against such malicious campaigns."

See the rest here:
RedEnergy Stealer-as-a-Ransomware Threat Targeting Energy and ... - The Hacker News

Read More..