Page 1,346«..1020..1,3451,3461,3471,348..1,3601,370..»

Threatening Encryption, Senate Democrats Aid GOP War on Abortion – Tech Policy Press

Why are supposedly pro-choice Senators supporting bills that would make it harder for abortion seekers to communicate privately? asks Riana Pfefferkorn, a research scholar at the Stanford Internet Observatory.

Senate Judiciary Committee chair Dick Durbin (D-IL) recently highlighted the crucial role of digital privacy in Americans access to abortion care. During an April 26 hearing about the devastating impact on Americans reproductive rights of the Supreme Courts June 2022 decision to overturn Roe v. Wade, Sen. Durbin rightly noted that without robust privacy protections, abortion seekers leave a digital trail that can be used against them in states that have criminalized abortion.

So why are he and his fellow committee Democrats aiding the GOPs assault on abortion by supporting bills that threaten Americans ability to communicate privately about abortion care?

Two bills introduced last month would expand online services potential liability for child safety offenses by their users: the EARN IT Act, co-sponsored by Sen. Richard Blumenthal (D-CT) and Sen. Lindsey Graham (R-SC), and Sen. Durbins own STOP CSAM Act. Its already a federal crime if a service knowingly hosts child sex abuse material (CSAM, also known as child pornography). Under these new bills, when certain crimes against children occur on their services, tech companies could also be sued civilly by victims or charged by prosecutors at the state level.

These bills threaten Americans communication privacy by using the specter of potentially ruinous liability to disincentivize online services from offering end-to-end encryption, a widely-used technology that protects our digital communications. In encrypted apps like WhatsApp, iMessage, and FaceTime, messages and calls are encoded so that theyre decipherable only by the intended participants in a conversation. This makes encryption a vital tool for safeguarding sensitive communications including financial transactions, national security correspondence, attorney-client conversations, and so on.

However, because encrypted services cant read their users conversations or wiretap them for law enforcement, some members of Congress are concerned that criminals use encryption to hide their conversations. To that end, while neither bill overtly bans encryption, EARN IT and STOP CSAM both contain language that could let courts hold encrypted services liable for their users child safety offenses, which can be harder to detect in encrypted environments than unencrypted ones.

The bills potential to penalize encrypted services is no accident, as their sponsors have made clear: Sen. Blumenthal previously refused to amend EARN IT to avoid negatively impacting encryption, claiming he didnt want encryption to be a get-out-of-jail-free card for tech companies. More recently, Sen. Durbins comments at a February hearing framed end-to-end encryption as an impediment to protecting childrens safety.

The thing is, theres no way to make an end-to-end encrypted service that allows the detection only of malicious communications while keeping innocuous ones unreadable by outside eyes. Thats been the consensus of computer security experts for the last quarter-century. If Congress passes a law that induces encrypted services to remove or weaken their end-to-end encryption for fear of liability, that will affect everyone who uses these apps.

That includes someone trying to get an abortion in post-Roe America. For abortion providers, abortion seekers, and those who want to offer a helping hand, the ability to communicate privately and securely has never been more crucial. And using encryption is the best way to do that.

Encryption helps everyone involved in abortion care protect themselves. From law enforcement and prosecutors in states that have criminalized abortion. From anti-abortion activists motivated to hack into the communications of reproductive health clinics. From tech company employees whod like to sift through users messages, looking for someone they can turn in for a bounty.

To show that Democratic lawmakers really care about Americans abortion rights, they should embrace encrypted apps and encourage people to use them when discussing abortion care. Instead, its two Democrats who are leading the offensive against encryption in the Senate. Having just discussed digital privacys importance to post-Roe abortion access last Wednesday, Sen. Durbins committee is now considering bills that would harm digital privacy unless significant amendments are made.

The last time the committee voted on EARN IT, before the Supreme Court overturned Roe, every single Democrat voted yes. Now its 2023 and Roe has fallen and yet at todays hearing, they all voted yes again. Encouragingly, though, several members (including one Republican) raised the need to amend the bill to better protect encryption, with Sen. Alex Padilla (D-CA) noting encryptions importance to abortion access and recalling last weeks hearing on that topic. What remains to be seen is whether todays supportive comments about encryption will be translated into effective language in future versions of the EARN IT and STOP CSAM bills.

Abortion shouldnt be a crime. Neither should protecting users digital privacy. By pushing to make it easier for criminal investigators to access Americans private communications, Sens. Durbin and Blumenthal and every Democrat who joined them while staying silent about privacy are carrying water for the GOPs war on Americans reproductive rights. Lawmakers cant have it both ways: You simply cannot be both pro-choice and anti-encryption.

Riana Pfefferkorn is a Research Scholar at the Stanford Internet Observatory. She investigates the U.S. and other governments policies and practices for forcing decryption and/or influencing the security design of online platforms and services, devices, and products, both via technical means and through the courts and legislatures. Riana also studies novel forms of electronic surveillance and data access by U.S. law enforcement and their impact on civil liberties. Previously, Riana was the Associate Director of Surveillance and Cybersecurity at the Stanford Center for Internet and Society, where she remains an affiliate. Prior to joining Stanford, she was an associate in the Internet Strategy & Litigation group at the law firm of Wilson Sonsini Goodrich & Rosati, and a law clerk to the Honorable Bruce J. McGiverin of the U.S. District Court for the District of Puerto Rico. During law school, she interned for the Honorable Stephen Reinhardt of the U.S. Court of Appeals for the Ninth Circuit. Rianahas spoken at various legal and security conferences, including Black Hat and DEF CONs Crypto & Privacy Village. She is frequently quoted in the press, including the New York Times, the Washington Post, and NPR.Rianais a graduate of the University of Washington School of Law and Whitman College.

Related

Continue reading here:
Threatening Encryption, Senate Democrats Aid GOP War on Abortion - Tech Policy Press

Read More..

New EARN IT Act Has Old Issues – Duo Security

The latest version of the highly controversial EARN IT Act that is in committee in the Senate right now may be a more serious threat to strong encryption than the previous versions and could force platform providers into the decision not to even offer encrypted services, lawmakers, civil liberties and technology policy advocates say.

The current iteration of the EARN IT Act is the third one and like the others, its main focus is on identifying and eliminating child exploitation material online. But as in the other versions, the current bill has language that would increase the liability for platform operators that use end-to-end encryption on their services. The bill currently is in the Senate Judiciary Committee, and experts worry that if it passes it will have a severe impact on the security of the services platform owners such as Google, Meta, and others can offer.

The crux of the issue is whether platform operators should know and be responsible for all of the content that passes through their systems.

As introduced, EARN IT dramatically increases the risk of liability for any service that offers end-to-end encryption. Under EARN IT, the use of encryption (or the failure to weaken that encryption) cannot serve as an independent basis for liability. But EARN IT expressly permits courts to consider the use of encryption as evidence to support other claims including under state laws with a lower mens rea requirement, TechFreedom officials said in a letter to Judiciary Committee leaders.

In other words, under the terms of the proposed bill, platform owners would almost certainly have to know whats on the platforms, which would essentially eliminate the use of strong encryption. A separate bill called the STOP CSAM Act has similar language,

Current law does not immunize platforms for criminal conduct. The new bills would drastically drop that requirement so that theyre liable for negligence in civil suits. Platforms would likely have to know whats on the platforms, so they might set up automated content analysis, which is bad, and undermine encryption, said Cody Venzke, senior policy counsel at the ACLU.

Wyden, one of the strongest advocates for encryption and privacy on Capitol Hill, said hes concerned that lawmakers are putting their efforts in the wrong place.

CSAM is a problem and this bill is not the answer. The focus ought to be to help prevent kids from becoming victims in the first place, not on undermining security and privacy, said Sen. Ron Wyden (D-Ore.), during an online event Wednesday.

We need to pass comprehensive privacy legislation in this country. This fight has been the longest running battle since the Trojan War. The root cause of so much bad corporate behavior really is the privacy issue. Tech companies hoover up so much private data and then they misuse it.

Other organizations worry that the EARN IT Acts language could lead to the use of client-side scanning, which allows services to scan users devices for illegal material rather than doing so on the platform side.

Notably, the bill leaves room to impose forms of client- side scanning, which violates user privacy by sending data to law enforcement straight from user devices, before a message is encrypted. EFF has long held that client-side scanning violates the privacy promise of end-to-end encryption, even though it allows the encryption process to proceed in a narrow, limited sense, the Electronic Frontier Foundation said in a letter to the Judiciary Committee leaders.

Read more:
New EARN IT Act Has Old Issues - Duo Security

Read More..

Apricorn releases its first offering to feature NVME SSD – SecurityBrief New Zealand

Apricorn has released the USB 10Gbps Aegis NVX, the first encrypted device the company has offered to feature an NVME SSD inside.

Apricorn makes software-free, 256-bit AES XTS hardware-encrypted USB drives, and its latest offering uses proprietary architecture.

The companys new offering has been designed to address the immediate protection of raw data delivered directly from its source at high speeds.

In fact, the NVX was created to meet demands and product requirements such as those necessary for using a USB with high-definition video cameras, which need an offering capable of writing to an external SSD through a USB C or HDMI.

The NVX can read/write at 1000 megabytes per second, a high-speed capability that is sought after in military intelligence, digital forensics, filmmaking, and healthcare, where write speeds over 600 megabytes per second are crucial.

With the advent of NVMe technology, Apricorn saw an opportunity to develop encrypted storage for users who are operating ultra-fast devices, but have had to settle for awkward, multi-step means of securing data, says Kurt Markley, U.S. Managing Director at Apricorn.

We built the NVX with NVMe speeds and took it a step further with our own unique approach based on Apricorns 40-year legacy as pioneers in secure device innovation.

We patented our design, which takes high-speed output and simultaneously writes and encrypts on the fly. It can keep up with whatever machine its hooked up to, with speed to spare.

The Aegis NVX is Apricorns first device to use the companys new design patented NVME architecture.

However, the offering still functions the same as all Apricorn secure devices: it shares no CSPs with its host and employs no software component in its authentication and encryption processes.

The Aegis NVX also has a keyboard built in that provides the ability to authenticate a user without needing them to interact with a host computer, as is the way for other software-encrypted devices.

Further, the product comes with an internal encryption module that platforms all encryption and decryption processes.

Apricorn notes this is vital to the offerings compatibility with virtually any operating system, as well as equipment with no operating system or keyboard.

For most applications, the speeds of our encrypted HDDs and SSDs continue to do a great job of covering the performance needs of our users, Markley adds.

But teams who are working with technology such as HD video cameras, medical imaging and forensic tools are going to be excited about the speed and rugged security of this device.

They can take the NVX in any environment and its going to protect their data in real-time with USB 10Gbps, a superspeed transfer rate that is not limited by the traditional USB type. Plus, it doesnt require software.

Apricorns Aegis NVX is approximately 75% the size of a smartphone, and its enclosure is milled from a solid block of 6061 aluminium alloy and assembled using breakaway headless fasteners and epoxy threadlock.

In addition, each USB has a wear-resistant membrane keypad that has been tested to 10,000 presses.

The Aegis NVX comes standard with AegisWare, Apricorns proprietary firmware and feature set, which the company developed to address constantly evolving security threats and business needs for highly regulated sectors such as government, defence, finance, manufacturing and healthcare.

Further security advantages of Apricorns USB 10Gbps hardware-encrypted Secure Keys include:

Initial capacity offerings will be 500 gigabytes and two terabytes, with a price range of 280.00 - 600.00 MSRP.

See the original post:
Apricorn releases its first offering to feature NVME SSD - SecurityBrief New Zealand

Read More..

EU lawyers say plan to scan private messages for child abuse may be unlawful – The Guardian

European Union

Under proposed chat controls regulation, any encrypted service provider could be forced to screen for identifiers

An EU plan under which all WhatsApp, iMessage and Snapchat accounts could be screened for child abuse content has hit a significant obstacle after internal legal advice said it would probably be annulled by the courts for breaching users rights.

Under the proposed chat controls regulation, any encrypted service provider could be forced to survey billions of messages, videos and photos for identifiers of certain types of content where it was suspected a service was being used to disseminate harmful material.

The providers issued with a so-called detection order by national bodies would have to alert police if they found evidence of suspected harmful content being shared or the grooming of children.

Privacy campaigners and the service providers have already warned that the proposed EU regulation and a similar online safety bill in the UK risk end-to-end encryption services such as WhatsApp disappearing from Europe.

Now leaked internal EU legal advice, which was presented to diplomats from the blocs member states on 27 April and has been seen by the Guardian, raises significant doubts about the lawfulness of the regulation unveiled by the European Commission in May last year.

The legal service of the council of the EU, the decision-making body led by national ministers, has advised the proposed regulation poses a particularly serious limitation to the rights to privacy and personal data and that there is a serious risk of it falling foul of a judicial review on multiple grounds.

The EU lawyers write that the draft regulation would require the general and indiscriminate screening of the data processed by a specific service provider, and apply without distinction to all the persons using that specific service, without those persons being, even indirectly, in a situation liable to give rise to criminal prosecution.

The legal service goes on to warn that the European court of justice has previously judged the screening of communications metadata is proportionate only for the purpose of safeguarding national security and therefore it is rather unlikely that similar screening of content of communications for the purpose of combating crime of child sexual abuse would be found proportionate, let alone with regard to the conduct not constituting criminal offences.

The lawyers conclude the proposed regulation is at serious risk of exceeding the limits of what is appropriate and necessary in order to meet the legitimate objectives pursued, and therefore of failing to comply with the principle of proportionality.

The legal service also raises concerns that by seeking to clamp down on the solicitation of children, the providers would have to introduce age verification technology and processes to popular encrypted services.

The lawyers write that this would necessarily involve the mass profiling of users, or the biometric analysis of the users face or voice, or alternatively the use of a digital certification system they note would necessarily add another layer of interference with the rights and freedoms of the users.

Despite the advice, it is understood that 10 EU member states Belgium, Bulgaria, Cyprus, Hungary, Ireland, Italy, Latvia, Lithuania, Romania and Spain back continuing with the regulation without amendment.

Patrick Breyer, a German MEP who sits on the European parliaments civil liberties committee, said the EU should drop the plans, which he labelled as dystopian and claimed would tie up law enforcement and tech companies in chasing down false reports of harmful content.

He said: The council of the EUs services now confirm in crystal clear words what other legal experts, human rights defenders, law enforcement officials, abuse victims and child protection organisations have been warning about for a long time: obliging email, messaging and chat providers to search all private messages for allegedly illegal material and report to the police destroys and violates the right to confidentiality of correspondence.

{{topLeft}}

{{bottomLeft}}

{{topRight}}

{{bottomRight}}

{{.}}

Read the original:
EU lawyers say plan to scan private messages for child abuse may be unlawful - The Guardian

Read More..

Hardware Encryption Devices Market is anticipated to reach USD 805.5 billion by the end of 2026 – openPR

Hardware Encryption Devices Market

Study uses 2022 as a base year while forecast data between 2023 to 2028 is considered as forecast data. The research report includes Macro & Micro economic factors insight to understand industry dynamics. Research furthermore consolidates the impact of government regulations and standards on the market. The percentage splits, market shares, growth rate and breakdowns of the product markets are determined by using secondary sources and verified through primary sources. The study also provides key market indicators affecting the growth of the market.Access Full Report @https://www.profsharemarketresearch.com/hardware-encryption-devices-market-report/

Major players in the market are identified through secondary research and their market revenues are determined through various research techniques. Secondary research included the research of the annual and financial reports of the top manufacturers. The wide spectrum of the analytical methods used to prepare the research study helps to achieve a higher precision level. Research study on Hardware Encryption Devices Market helps clients to make precise decisions to expand their market share globally. Precise insight into the segments and sub-segments of the market has been delivered from the research study.Analytical data presented in the form of Tables & Figures makes it easier for the user to understand the complex market insight. The research report is prepared by using various analytical methodologies and models. Some of the important methodologies are SWOT analysis, PESTEL, PORTERS and various others. A wide spectrum of analytical methods used to prepare the research study helps to achieve a higher precision level. The study focuses on industry chain analysis, upstream and downstream aspects, key players, process analysis, cost analysis, market distribution channels, and major downstream buyers.

Access sample report @https://www.profsharemarketresearch.com/enquiry/hardware-encryption-devices-market-report-enquiry/

The Hardware Encryption Devices Market report is segmented based on below parameters:Hardware Encryption Devices types:

Encrypted Hard Disk DrivesEncrypted Solid-State DrivesHardware Security Module

Competitive analysis:

Western Digital CorpSeagate Technology PLCSamsung ElectronicsThalesMicron Technology IncNetAppKingston Technology CorpToshibaGemaltoCertes Networks Inc.Kanguru SolutionsApplication analysis:

IT & TelecomBFSIGovernment & Public UtilitiesManufacturing Enterprise

Research study on Hardware Encryption Devices Market is based on the following regions and countries:North America U.S.A CanadaEurope France Germany Spain UK Rest of EuropeAsia Pacific China Japan India South East AsiaLatin America BrazilMiddle East and AfricaHardware Encryption Devices Market Report delivers a comprehensive analysis of : Challenges and Opportunities Emerging and Current market trends Market player Capacity, Production, Revenue (Value) Market Forecast for 2023-29 Market growth drivers Supply (Production), Consumption, Export, and Import analysis End user/application Analysis

Contact :Jes JSales ManagerProfshare Market ResearchUS : +1 917 7225960jesj@profsharemarketresearch.com

About Us:Profshare Market Research is a full-service market research company that delivers in-depth market research globally. We operate within consumer and business-to-business markets offering both qualitative and quantitative research services. We work for private sector clients, along with public sector and voluntary organizations. Profshare Market Research publishes high-quality, in-depth market research studies, to help clients obtain granular level clarity on current business trends and expected future developments. We are committed to our client's needs, providing custom solutions best fit for strategy development and implementation to extract tangible results.

This release was published on openPR.

Read the original:
Hardware Encryption Devices Market is anticipated to reach USD 805.5 billion by the end of 2026 - openPR

Read More..

Meet Akira A new ransomware operation targeting the enterprise – BleepingComputer

The new Akira ransomware operation has slowly been building a list of victims as they breach corporate networks worldwide, encrypt files, and then demand million-dollar ransoms.

Launched in March 2023, Akira claims to have already conducted attacks on sixteen companies. These companies are in various industries, including education, finance, real estate, manufacturing, and consulting.

While another ransomware named Akira wasreleased in 2017, it is not believed that these operations are related.

A sample of the Akira ransomware was discovered byMalwareHunterTeam, who shared a sample with BleepingComputer so we could analyze it.

When executed, Akira will delete Windows Shadow Volume Copies on the device by running the following PowerShell command:

The ransomware will then proceed to encrypt files that contain the following file extensions:

While encrypting, the encryptor will skip files found in the Recycle Bin, System Volume Information, Boot, ProgramData, and Windows folders. It will also avoid encrypting the Windows system files with.exe, .lnk, .dll, .msi, and .sys file extensions.

When encrypting files, the ransomware encrypts files and appends the.akiraextension will be appended to the file's name.

For example, a file named 1.doc would be encrypted and renamed to 1.doc.akira, as shown in the encrypted folder below.

Akira also uses theWindows Restart ManagerAPI to close processes or shut down Windows services that may be keeping a file open and preventing encryption.

Each computer folder will contain a ransom note namedakira_readme.txtthat includes information on what happened to a victim's files and links to the Akira data leak site and negotiation site.

"As for your data, if we fail to agree, we will try to sell personal information/trade secrets/databases/source codes - generally speaking, everything that has a value on the darkmarket - to multiple threat actors at ones. Then all of this will be published in our blog," threatens the Akira ransom note.

Each victim has a unique negotiation password that is entered into the threat actor's Tor site. Unlike many other ransomware operations, this negotiation site just includes a chat system that the victim can use to negotiate with the ransomware gang.

Like other ransomware operations, Akira will breach a corporate network and spread laterally to other devices. Once the threat actors gain Windows domain admin credentials, they will deploy the ransomware throughout the network.

However, before encrypting files, the threat actors will steal corporate data for leverage in their extortion attempts, warning victims that it will be publicly released if a ransom is not paid.

The Akira gang put a lot of effort into their data leak site, giving it a retro look where visitors can navigate it by typing in commands, as shown below.

At the time of this writing, Akira has leaked the data for four victims on their data leak site, with the size of the leaked data ranging from5.9 GB for one companyto259 GB for another.

From negotiations seen by BleepingComputer, the ransomware gang demands ransoms ranging from a $200,000 to millions of dollars.

They are also willing to lower ransom demands for companies who do not need a decryptor, and just want to prevent the leaking of stolen data.

The ransomware is currently being analyzed for weaknesses, and BleepingComputer does not advise victims to pay the ransom until its determined if a free decryptor can recover files for free.

Read more from the original source:
Meet Akira A new ransomware operation targeting the enterprise - BleepingComputer

Read More..

6 Reasons Why Supply Chain Attacks Are on the Rise – MUO – MakeUseOf

As supply chain attacks become an increasingly common type of cyberattack, cybersecurity professionals are pressured to come up with new, more powerful solutions to combat this ongoing threat to individuals and organizations across the world.

However, before being able to develop efficient defenses against cyberattacks, we must figure out why supply chain attacks are on the rise and learn from our past mistakes.

A supply chain attack is a type of cyberattack that targets organizations by seeking weak links in their supply chain, such as third-party software, hardware, and services. Even if an organization itself has strong cybersecurity, there are usually insecure software suppliers or other third parties that can be used as a backdoor to bypass an organization's security systems.

In short, an attacker finds an easy target and takes advantage of the trusted relationship between parties inside a supply chain. Usually, they infect the suppliers software with malware to get unauthorized access to the supply chain, and then they spread malware across the network. As you suspect, this can cause large-scale data breaches.

Unfortunately, since the compromised components in a successful supply chain attack spread like wildfire, these types of cyberattacks are hard to detect. If you suspect your sensitive data has been compromised, there are ways you can protect yourself after a data breach, but youll have to act swiftly.

What makes supply chain attacks particularly perilous is the fact that even the slightest crack in security or the smallest change could have serious consequences. For instance, if a single piece of code gets compromised, the entire supply chain could suffer. Even trusted software isnt safe from these types of attacks since even the most trusted software has its weaknesses, and attackers are more than willing to exploit them.

Now, lets look at some of the primary reasons why supply chain attacks are on the rise.

While open source software comes with superb benefits to organizations (from flexibility and transparency to cost-cutting), its vulnerabilities pose serious risks to app security. Since anyone can inspect, improve, or otherwise modify open source software, this makes it open to supply chain attacks.

Cybercriminals could easily exploit its vulnerabilities to gain unauthorized access to the organizations systems, where they could steal sensitive data or sabotage software or the entire system.

As you can already guess, reliance on third-party apps can raise the risk of network cyberattacks and network-level security threats. If a third-party app gets hacked, cybercriminals could get their hands on sensitive data from all those who are currently using it.

Plus, the app may not have the same privacy protections the organization has, which means the user data could be shared with third parties without their consentor worse, it could be sold to advertisers for a quick buck.

Whether were talking about ransomware, spyware, or control-and-command attack, malicious software (aka malware) is becoming more sophisticatedeven ChatGPT is being used for malware creation.

As malware evolves, its getting harder to detect it within a supply chain as it can disguise itself as a secure app or a legitimate software update.

With supply chain attacks, insider threats dont stop at the organizations employees but also include all third parties the organization cooperates with. To counter this type of threat, its critical to apply strict access control and user activity monitoring. Although these attacks are relatively rare, their consequences could be catastrophic for an organization.

The human error factor cant be completely eliminated, but it can be minimized with proper security practices, such as promoting awareness about supply chain issues and providing training for the employees. After all, a human error can be something as simple as clicking on a wrong link in an email and unknowingly downloading malware to spy on you and steal your data.

While trusting business partners, third-party providers, employees, and end-users is a pretty polite thing to do, it wont do much for the security of the organization. For sensitive data within an organization to be secure, end-to-end encryption is a must-have.

With strong encryption at your side, cybercriminals will have trouble establishing the backdoor for data exfiltration during a supply chain attack. In short, all your private data will stay private.

A zero-trust model does not assume that users and apps are trustworthy by default, but requires authentication before allowing access to data and other IT assets. By blocking unauthorized activities within a network, a zero-trust framework can reduce supply chain attacks.

However, another thing the zero-trust framework could reduce is productivity, which is why many organizations are slow to adopt it. Moreover, there is also a problem of compliance with existing security systems, as well as time and costs that could set small organizations back.

Yes, we can, although its not as simple as it may seem. In most cases, supply chain attacks are far-reaching, well-researched, and well-resourced operations. They also exploit the trust between business partners and third-party software providers, which makes these types of attacks difficult to prevent and detect before damage is done.

But we can start by applying the zero-trust model (involving multi-factor authentication and end-to-end encryption) as well as strengthening security systems and conducting regular security audits. Also, never underestimate what employee training can do for the overall security of an organization.

Visit link:
6 Reasons Why Supply Chain Attacks Are on the Rise - MUO - MakeUseOf

Read More..

Cyber alert issued against ‘Royal’ ransomware that attacks health, education sectors – ETCIO

New Delhi: The Indian cyber security agency has issued a warning against the "Royal ransomware" virus that attacks critical sectors like communications, healthcare, education, and even individuals and seeks pay-off in Bitcoins for not leaking personal data in the public domain.

The Indian Computer Emergency Response Team or CERT-In has stated in the latest advisory that this Internet-spread ransomware sneaks in through phishing emails, malicious downloads, abusing RDP (remote desktop protocol) and other forms of social engineering.

"Royal ransomware is targeting multiple crucial infrastructure sectors, including manufacturing, communications, healthcare, education, etc. or individuals. The ransomware encrypts the files on a victim's system and attackers ask for ransom payment in bitcoin," the advisory said.

continued below

The CERT-In is the federal technology arm to combat cyber attacks and guard the cyber space against phishing and hacking assaults and similar online attacks.

The advisory said the "threat actors have followed many tactics to mislead victims into installing the remote access software as a part of callback phishing, where they pretend to be various service providers."

"It will divide the content into two segments i.e. encrypted and unencrypted. The malware may choose a small amount of data from a large file to encrypt so as to increase the chances of avoiding caution or detection. It adds 532 bytes at the end of encrypted file for writing randomly generated encrypted key, file size of encrypted file and encryption percentages parameter," the CERT-In said.

The lethality of this virus can be gauged from the fact that before starting encryption of the data it attacks, the ransomware checks the state of targeted files and deletes shadow copies to "prevent recovery" through service.

After intruding into network, the malware tries to make persistence and lateral movement in the network. Even after getting access of domain controller, the ransomware disables anti-virus protocols. Moreover, the ransomware exfiltrates a large amount of data before encryption, the advisory said.

It has been observed, it said, that 'Royal ransomware' does not share information like the ransom amount, any instructions, etc. on a note like other ransomware, instead it connects with the victim directly via a .onion URL route (darkweb browser).

The agency has suggested some counter-measures and Internet hygiene protocols to guard from this ransomware attack and others like it.

Maintain offline backup of data, and regularly maintain backup and restoration as this practice will ensure the organisation will not be severely interrupted and have irretrievable data.

It is also recommended to have all backup data encrypted, immutable (i.e., cannot be altered or deleted) covering the entire organisation's data infrastructure, it said.

The users should enable protected files in the Windows Operating System to prevent unauthorised changes to critical files and they should disable remote desktop connections, employ least-privileged accounts and limit users who can log in using remote desktop part from setting an account lockout policy.

A number of other best practices have been suggested by the agency, including basic ones like having an updated anti-virus in the computer systems and not clicking on unsolicited emails from unknown links.

Join the community of 2M+ industry professionals Subscribe to our newsletter to get latest insights & analysis.

Read the original here:
Cyber alert issued against 'Royal' ransomware that attacks health, education sectors - ETCIO

Read More..

The NSA’s research chief on emerging tech including ‘beyond … – The Record by Recorded Future

NASHVILLE Gilbert Herrera was accustomed to never seeing the fruits of his labor.

After spending almost 40 years at Sandia National Laboratories, Herrera was appointed in 2021 as the head of the National Security Agencys Research Directorate, the largest research and development organization in the U.S. clandestine community.

One of the reasons why I decided to come to NSA is because I spent a career engaged in research and technology deployment in a field that you hope your research would never be tested, Herrera told The Record on Thursday during the Vanderbilt University Summit on Modern Conflict and Emerging Threats. Sandia, based in Albuquerque, New Mexico, is one of the federal governments most important nuclear science laboratories.

But at NSA, research eventually makes its way into mission, helping anyone ranging from lower-level agency analysts all the way to policymakers who seek better information.

The Record sat down with Herrera before his appearance at the summit to discuss the directorate, how it works to be relevant and the outlook for some of todays top emerging technologies. This transcript has been edited for length and clarity.

The Record: What is the job of the Research Directorate?

Gilbert Herrera: The role of the Research Directorate is really twofold.

One is, it needs to be the eyes and ears of the agency in terms of what's happening in research, in academia and in industry; to kind of have this outward-facing look. That's why we have a number of facilities that are unclassified, like universities and whatnot.

The other is to help prevent technology surprise on the inside. We help advise the agency, make sure we're prepared for that. And part of that is developing tools and techniques that help in a mission.

TR: How does the directorate stay operationally relevant? Do you keep an ear out for whats happening in the private sector or academia? Are you tinkering in a lab? Are you receiving orders from leadership to explore certain technologies?

GH: We have a lot of people who are outward-facing, but we also have people who are inward-facing and people that do both.

So having people go forward to work with the mission customers, so they could better understand what their needs are, so they could feel the pain. That helps inform the research. It's this virtuous cycle of gaining an understanding of the mission needs; understanding in part through practice and in part through observation of what the best opportunities are in the research regime. Then conducting tailored and focused research so you can create tools that will make the life of the analyst easier is really what an effective research organization and a mission organization does.

It's that virtuous cycle of understanding, awareness, creation and deployment.

TR: What's changed at the directorate under your tenure and where do you want to put emphasis?

GH: It's easy to get caught up in the moment of wanting to solve today's problem, but what I'm trying to do is make sure we have an adequate balance of today, tomorrow, and then the future transformational problems.

Because we need to do all three. An example of the today is, we actually have an email distribution list where if an analyst has a scientific question that they need answered, then it goes to this [distribution list] of a bunch of scientists called Scientist on Call and then they can answer it. That's an important thing for us to do. That's probably not research.

When the [Ukraine] war broke out, there were a number of things we did where we deployed researchers in order to help in the prompt.

The other is that as I came in, it was right around the time of changing focus away from looking at the war on terror. We also had China and Russia and Iran and others as priorities and more focusing on the realities of today. Our mission pivoted at the time that I came in, and so I'm working with my leadership team to make sure that we're following that pivot.

TR: Lets talk about some emerging technologies. Artificial intelligence. What excites you about it? What concerns you?

GH: What excites me is that it's developing at a level much faster than I ever expected. I've been involved in AI for a while and I never thought it could actually help research, per se.

But I'm beginning to change my mind on that.

I'm beginning to believe now that AI might be able to actually support science. What it's done relative to writing is beyond belief. These models are so big. I see that there's a lot more near-term opportunity.

Now from a threat perspective the most immediate one is that AI can now help the infamous Nigerian prince and other phishers to make more credible English-sounding attacks.

But it's much more than that in terms of potential for reverse engineering.

Right now, the big companies have said that they have put protections on it. You can't tell DALL-E to make child pornography or write stuff like that, but innovative people can find loops around that. The LLaMA model that Facebook had done has gotten into the outside world and people are already modifying that.

Bad actors will pursue ways to get around it and do bad things like child porn, like finding zero-day vulnerabilities and all these other terrible things.

The challenge we have with AI is similar to the challenge we had in 1968 when the protocols were developed for TCP IP. If you develop these technologies without envisioning how you integrate security into them, then that's a problem. I don't know how well we've done with AI. I don't have an opinion at this point.

TR: Lightning round time. Your take on quantum computing, encryption and a non-obvious threat we should be talking about today?

GH: Let me do the reverse order.

What are the energy ramifications of AI? These models take massive amounts of energy to train and to update [and utilize]. AI is going to help revolutionize things but at what energy cost? I don't think weve fully thought through the ramifications. It could be that in the final analysis, we save energy through AI, but I'm not sure that's obvious.

Now, relative to quantum, you really said two questions in one. The first one relative to the encryption part. NSM-10 came out. People need to take it seriously. There's guidance in moving to quantum-resistant encryption. NIST has published a bunch of standards. Something the government rarely does in my reading, they published some standards a year early, and more will come out this summer.

Now, back to computing. I've been involved in quantum computing since 2006. I am on the National Quantum Initiative Advisory Committee, and, over time, my optimism has diminished. I still am a believer in quantum computing. We'll get there someday, but it's a really tough problem.

We need the best minds working on it. The Laboratory for Physical Sciences, which is the physical science research arm of my organization, is funding academics all over the world in pursuit of dealing with the underlying problems for quantum computing because there are still a lot of unanswered questions.

What I hope we can do in quantum computing space is get through the quantum winter, because a winter is coming.

Remember, AI was coined in 1956. Then it ran into the reality of the compute they had. Then there was another revolution in the early 80s when the microprocessor came out and they realized you had neither enough information or compute power. The next one came towards the end of the 90s with the dawn of the internet, but the infrastructure wasn't there. We're finally successful now where we have sufficient compute power and information and new technologies like the GPU, so we can train models. There were, in my counting, three winters before we got to the final goal.

What I tell people is my own personal estimate is somewhere between and I stole this from somebody else 10 years and never.

Martin Matishak is a senior cybersecurity reporter for The Record. He spent the last five years at Politico, where he covered Congress, the Pentagon and the U.S. intelligence community and was a driving force behind the publication's cybersecurity newsletter.

See the original post:
The NSA's research chief on emerging tech including 'beyond ... - The Record by Recorded Future

Read More..

Dallas City Hall Giving Few Details on Ransomware Attack – D Magazine

This story was originally published on 5/5. It was updated at 12:40 p.m on 5/6.

Two days after the city of Dallas fell victim to a cyberattack, its Facebook account gave advice about securing devices by strengthening passwords. It is ironic, given that its Information and Technology Services department was in the middle of trying to contain a ransomware attack by the group that calls itself Royal, which also claimed responsibility for holding the appraisal districts information hostage last year. The punctuation on the problem was that the webpage the post directed people to was down, just like most city webpages, because of that attack.

The city is keeping quiet about specific details regarding the attack other than to say its tech employees are working to contain the damage and bring everything back online.

Since City of Dallas Information and Technology Services detected a cyber threat Wednesday morning, employees have been hard at work to contain the issue and ensure continued service to our residents, City Manager T.C. Broadnax said in a statement Thursday. While the source of the outage is still under investigation, I am optimistic that the risk is contained. For those departments affected, emergency plans prepared and practiced in advance are paying off.

The citys news portal, where updates are posted.

The public library website, but some things are not accessible.

Dallas city meeting calendars and agendas.

Videos of city meetings

The citys open records request portal (but requests may be processed slowly)

The webpage for the citys development services is down, and permits cannot be processed.

Dallas Water Utilities website (you can pay by mail, and disconnections have been put on hold, and late fees wont be assessed).

Websites for Zoning, Public Works, Dallas Police Department, and Dallas Fire Rescue.

Online services with the citys Development Services Department (but they will review paper plans in person).

Municipal court will remain closed Monday.

and pretty much everything else.

Dallas police Chief Eddie Garcia told the Dallas Morning News that the department had emergency plans in place and had deployed them but that its operations were significantly impacted by the outage the attack caused. Offense reports and jail intake forms are being filled out by hand, he said. The departments website, internal shared drives, and other software used for personnel matters were also affected. Even with all of that, dispatchers are still able to send officers where they are needed, he said.

The Dallas Fire Department has also been forced to manually dispatch over the radio because of the outage.

While a Friday update from the city lauded the heroic teamwork by our first responders, one group of officers spoke out on Twitter, indicating rank-and-file officers havent received an explanation from city leaders either.

Thank goodness for the leadership of the unnamed few that came up with a few workarounds. This is a serious issue for officer safety in patrol. We are flying blind out there, the Dallas Police Womens Association said Friday night. We have not heard a whisper from the chief of police, the mayor, or the city manager. This *should be* unacceptable, but here we are. The citizens of Dallas deserve better. The employees of Dallas deserve better.

Cybersecurity company TrendMicro said that Royal attacks were first reported last September. Since then, its data has detected a total of 764 attack attempts by the group across its customer base.

In March, the Federal Bureau of Investigation and the Cybersecurity and Infrastructure Security Agency issued a joint report warning that since September 2022, use of a new Royal ransomware variant had come to the forefront. This new variant has a new custom-made file encryption program that criminals use to encrypt vulnerable systems after extracting large amounts of data. That encryption basically locks down the users system until the ransomor royalty is paid. The agencies dont recommend paying those ransoms.

Royal actors have made ransom demands ranging from approximately $1 million to $11 million USD in Bitcoin, the agencies said. In observed incidents, Royal actors do not include ransom amounts and payment instructions as part of the initial ransom note. Instead, the note, which appears after encryption, requires victims to directly interact with the threat actor via a .onion URL.

The city isnt saying if this is true, but the site bleepingcomputer.com claims to have a copy of a note it says appeared on city printers Wednesday morning that directs the city to reach out to an .onion URL, which are Royals sites on the dark web.

It may seem complicated, but it is not, the note says. Most likely what happened was that you decided to save some money on your security infrastructure. The note then directs the city to pay a royalty to unencrypt the data and also to not release what was found by the hackers to the public.

Because of its fairly ordinary ways of obtaining cooperation and access, the group is often able to exploit the one vulnerability most difficult for IT personnel to patch up: the human part.

It is believed that hackers are able to access systems in several ways, but the most prevalent method seems to be through callback phishing emails, which impersonate some kind of service (meal delivery kits, software licensing, and the like), claiming that the recipient has had their service renewed. When the victim calls the telephone number in the email to dispute or cancel, they are led through a series of tasks that ultimately allow the person on the other end to remotely access their computer, unlocking the door to their company (or citys) network.

The group has also been known to use internet search advertising to deliver malicious software that will allow the user on the other end to have remote access to a system when someone clicks on the ad. Researchers have also reported that the group will also hijack an existing and innocent email thread and insert an HTML file that, when opened, will release a pop-up that tells the user that the file couldnt be correctly displayed, so they should download it to view it.

All of that means that its not hard to fall victim to ransomware. What is hard is getting it back.

Late last year, the Dallas Central Appraisal District was also hit by a Royal ransomware attack that left its website and other operations (including email) encrypted for more than two months. In that attack, the demand was for $1 million, but the Dallas Morning News reported that the district eventually paid $170,000 in bitcoin. In that case, it is believed that an employee clicked on a phishing email that appeared to have come from a vendor.

Why are local governments falling prey to ransomware? Experts say there are a variety of reasons, including a lack of investment in more robust cybersecurity, as well as city websites and systems that are often a cobbled-together collection of legacy programs and networks and newer elements.

Local governments may face higher rates of encryption during ransomware attacks due to a lack of financial and cybersecurity resources, StateTechs Mol Doak explained. Constrained budgets and small teams pressure organizations to divert funds away from cybersecurity, leaving gaps in their platform protection.

Its unlikely that well know anytime soon how the citys cybersecurity measures were breached. But we do know that the citys IT department has had a few high-profile incidents in the past two years. In March 2021, a massive amount of police data was accidentally deleted by an IT Services employee, and an audit into that deletion uncovered another accidental deletion, according to a report published in September 2021. That deletion happened when an employee attempted to migrate data from a cloud service to an on-site archive.

That report, authored by the citys IT Services department, explained problems its staff had with oversight and data governance and management.

Without proper, fully implemented Data Governance in place, the city is at risk of further loss of data, inability to recover from onsite failures causing loss of data, disaster recovery requiring recovery of data, liabilities from inappropriate exposure of data, and inability to fully realize the analytical value of the data due to a lack of quality or inability to aggregate across departments and data sets, the report said.

The report detailed a lack of scrutiny into how data was being handled and poor planning, scheduling, detail, and documentation. The report also noted that the employee was using an administrator account that gave them more access than they should have been allowed. The citys data management strategy had also not been in place at the time, or was out of date.

The department had 13 recommendations to improve these processes and had promised a plan of action with benchmarks to meet. The report said the city had picked a data management framework and a steering committee to create policies and standards, but its unclearthanks to the outagehow far along the city is in meeting those benchmarks.

In 2022, StateScoop named Dallas Chief Information Officer William Zielinski one of its City Executive of the Year. Zielinski has focused on optimizing the citys infrastructure to remove technological debt and improve the citys cybersecurity to best in class for the region, the organization said.

Dallas most important news stories of the week, delivered to your inbox each Sunday.

Bethany Erickson is the senior digital editor for D Magazine. She's written about real estate, education policy, the stock market, and crime throughout her career, and sometimes all at the same time. She hates lima beans and 5 a.m. and takes SAT practice tests for fun.

See original here:
Dallas City Hall Giving Few Details on Ransomware Attack - D Magazine

Read More..