cybersecurity

4540 readers
1 users here now

An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!

Community Rules

Enjoy!

founded 2 years ago
MODERATORS
1
 
 

cross-posted from: https://lemmy.sdf.org/post/37950350

Archived

  • [Security firm] Silent Push Threat Analysts followed a tip from Mexican journalist Ignacio Gómez Villaseñor about a threat actor targeting “Hot Sale 2025,” an annual sales event similar to “Black Friday” in the U.S.
  • The team pivoted from that Mexico-centric campaign into thousands of websites that broadly targeted a more global audience with abundant waves of fake marketplace scams.
  • We identified a private technical fingerprint associated with this infrastructure, which contains Chinese words and characters to strongly indicate that the developers of this network are from China.
  • Our analysts observed this threat actor group building multiple phishing websites with pages spoofing well-known retailers, including Apple, Harbor Freight Tools, Michael Kors, REI, Wayfair, and Wrangler Jeans.
  • The threat actor has also been caught abusing online payment services, including MasterCard, PayPal, and Visa, as well as payment security techniques such as Google Pay, across the campaign’s network of scam websites.

[...]

2
3
 
 
  • GitHub Archive logs every public commit, even the ones developers try to delete. Force pushes often cover up mistakes like leaked credentials by rewriting Git history. GitHub keeps these dangling commits, from what we can tell, forever. In the archive, they show up as “zero-commit” PushEvents.
  • I scanned every force push event since 2020 and uncovered secrets worth $25k in bug bounties.
  • Together with Truffle Security, we're open sourcing a new tool to scan your own GitHub organization for these hidden commits (try it here).
4
 
 

cross-posted from: https://lemmy.sdf.org/post/37887750

Archived

Here is the report (pdf).

The French National Agency for Information Systems Security, or ANSSI, said Tuesday it observed French organizations affected by activity using a slew of security flaws to break into an end-of-life version of the Utah company's Cloud Services Appliance applications. The campaign affected government agencies, telecoms and firms in the media, finance and transport sectors. ANSII dubs the intrusion set "Houken".

[...]

The hacker used a wide number of open-source tools "mostly crafted by Chinese-speaking developers," were active during Chinese working hours and exhibited behaviors consistent with intelligence collection. The threat actor also sought self-enrichment, installing a cryptominer on one victim system. Chinese nation-state hacking is an unusual combination of intelligence agencies and private sector companies. Some hackers choose their own targets and sell exfiltrated data or access to government agencies - or may do for-profit hacking on the side. "Nevertheless, the use of cryptominers remains uncommon for this threat actor," ANSSI wrote.

[...]

5
6
7
8
9
10
11
12
 
 

cross-posted from: https://lemmy.sdf.org/post/37703162

Archived

[...]

A patient’s death has been officially connected to a cyber attack carried out by the Qilin ransomware group that crippled pathology services at several major NHS hospitals in London last year. The cyber attack on Synnovis, a key pathology provider, caused widespread disruption to vital diagnostic services, delaying critical blood test results and impacting patient care significantly.

King’s College Hospital NHS Foundation Trust confirmed that a patient unexpectedly died during the cyber-incident. A spokesperson for the trust revealed that a detailed review of the patient’s care found multiple contributing factors, including “a long wait for a blood test result due to the cyber attack impacting pathology services at the time.”

The findings of this safety investigation have been shared with the patient’s family. Synnovis CEO, Mark Dollar, expressed deep sadness, stating, “Our hearts go out to the family involved.”

[...]

The attack occurred on June 3, 2024, targeting Synnovis, which provides diagnostics, testing, and digital pathology in southeast London. This incident brought blood testing across multiple NHS trusts, including King’s College, Guy’s and St Thomas’, and Lewisham and Greenwich hospitals, along with GP practices, to a halt.

The disruption was extensive, affecting more than 10,000 outpatient appointments and leading to the postponement of 1,710 operations at King’s College and Guy’s and St Thomas’ NHS Foundation Trusts.

[...]

13
 
 

A colleague was discussing an option to use different vendors either side of a DMZ and suggested StormShield... I'd not heard of them before.

Looks interesting, albeit an old Gartner "magic quadrant" showed their firewalls as being in the bottom left corner... so I thought I'd ask here for real-life opinions on them... if any?

14
 
 

cross-posted from: https://lemmy.sdf.org/post/37599025

Archived

The Canadian government has ordered Chinese surveillance camera manufacturer Hikvision to cease operations in Canada over national security concerns, Industry Minister Melanie Joly said late on Friday.

[...]

"The government has determined that Hikvision Canada Inc's continued operations in Canada would be injurious to Canada's national security," Joly said on X, adding that the decision was taken after a multi-step review of information provided by Canada's security and intelligence community.

[...]

Canada said last year it was reviewing an application to impose sanctions against Chinese surveillance equipment companies, including Hikvision, after rights advocates alleged the firms were aiding repression and high-tech surveillance in Xinjiang.

Joly said Canada was also banning the purchase of Hikvison's products in government departments and agencies, and reviewing existing properties to ensure that legacy Hikvision products were not used in the future.

She said the order does not extend to the company's affiliate operations outside Canada but "strongly" encouraged Canadians "to take note of this decision and make their own decisions accordingly."

15
16
17
18
 
 

cross-posted from: https://lemmy.sdf.org/post/37521781

Historically, Western assessments of cyber threats have concentrated on state adver­saries. More than 600 state-backed groups are tracked globally. Yet, for more than a decade, Western analyses and discussions of cyber threat concerns have focused mainly on four states: China, Iran, Russia and North Korea. Based on open-source report­ing evaluated by the European Repository of Cyber Incidents (EuRepoC), these coun­tries account for more than 70 per cent of the state-backed threats that Europe and its partners have faced since 2000.

[...]

Critically, in the current climate of heightened geopolitical tension, the opera­tional divide between state and non-state actors shows signs of collapsing, as states seek to assert control over cyber capabilities both inside and outside their borders. A closer examination of EuRepoC data under­scores the need for a more integrated understanding in the analysis of state and non-state actor threats. These trend lines are particularly pronounced in the case of the authoritarian states that have been dominating Western threat perceptions, drawing attention to the reinforcement that long-standing nation state threats derive from non-state capabilities. Russia, China and North Korea have developed their own distinct approaches. While Russia has pro­vided sanctuary for criminal groups, Chi­na’s state programmes have served to accel­erate the emergence of a domestic hacking industry. Charting its own path, North Korea has sought to create bridgeheads extra­territorially for its operators.

[...]

Russia: The safe haven blueprint

Russian cyber criminals make up nearly half of the most wanted list published by Germany’s Federal Criminal Police Office (BKA). That list typically includes individ­uals accused of high-profile crimes, such as members of the far-left terrorist organi­sation RAF, those who collaborated in the 9/11 attacks and individuals such as Jan Marsalek, the former chief operating officer of the now bankrupt payment processor Wirecard. The BKA list has had a notable success rate. Close to 70 per cent of suspects included on it since 1999 were arrested. How­ever, in the case of the twenty-six people included on the list because of sus­pected links to the Russian criminal under­ground, there is little expectation of any breakthrough, despite German law enforce­ment and its international partners having collected a wealth of information on those individuals.

[...]

China: Command, control, deny

Unlike Russia, the People’s Republic of China (PRC) seeks to seize non-state cyber capabil­ities through the targeted development of a commercial ecosystem. This approach is part of the three-fold aim to establish com­mand, control and deniability within the PRC cyber portfolio. As regards the first goal, command efforts are designed to secure un­conditional authority over high-risk opera­tions entrusted to the military.

Meanwhile, initiatives to strengthen con­trol have centralised the coordination of cyber espionage objectives within the Minis­try of State Security (MSS). This arrangement is supported by the legally mandated report­ing of vulnerabilities and a network of hack­ing competitions that channel the findings of vulnerability research into offensive pro­grammes. The MSS 13th Bureau’s management of the Chinese National Vulnerability Database ensures near-seamless integration into this vulnerability discovery system.

[...]

North Korea: Breaking out of isolation

The cyber activities of the Democratic People’s Republic of Korea (DPRK) are both a strategic continuation of and operational departure from the political, economic and military self-reliance strongly emphasised in the country’s state ideology. While the DPRK is attempting to break out, at least partly, of its self-imposed isolation through its cyber programme – thereby demonstrat­ing the political will and the capability to innovate means of subverting internation­al sanctions – it is also making con­sider­able efforts to leverage non-state capa­bilities beyond its own borders. Despite its diplomatic isolation, the DPRK has been able to enlist foreign tools and know-how to steal cryptocurrency and use blockchain-based technologies developed by a global decentralised community of engineers to launder funds and thereby support the devel­opment of its military capabilities. To gen­erate revenue and alleviate the pressure of sanctions, the DPRK has sought to lever­age legitimate platforms and expertise, which be­come criminally liable – and thus a focus of interest – only when co-opted in this way.

[...]

Calibrating responses [by the EU and the West]

In the absence of an integrated understanding of how authoritarian actors lever­age non-state resources, the potential of tac­tics to slow down and fragment attribution efforts may weaken the response toolkit developed by EU member states. Currently, key cyber diplomacy tools – such as sanc­tions – remain closely tied to attribution. Addressing senior officials responsible for developing cyber policies/practices in May 2025, Germany’s cyber ambassador, Maria Adebahr, recognised that efforts to hold threat actors accountable are dependent on this link to attribution. Implicit in this recog­nition is the need to develop response options that are independent of attribution.

Capturing non-state capabilities allows authoritarian states to increase their capa­bilities pool and step up their operational tempo. Diplomatic measures that address the interweaving of state and non-state capabilities have a strong complementary potential. They include not only initiatives aimed at restricting access for threat actors to legitimate platforms and disrupting criminal tools; information sharing – as part of a regular exchange with friendly jurisdictions – with a view to developing a common threat perception could support due diligence efforts to constrain the room for manoeuvre overseas and facilitate the takedown of shadow infrastructure. A re­sponse framework that remains fit for pur­pose requires a range of tools that can match the changing scope of the threat.

19
 
 

Wanna chat about something non-infosec amongst those of us who frequent /c/cybersecurity? Here’s your chance! (Keep things civil & respectful please)

20
 
 

Weekly thread to discuss whatever you’re working on, big or small, at work or in your free time.

21
 
 
  • Amid ongoing tensions between Iran and Israel, the Iranian threat group Educated Manticore, associated with the Islamic Revolutionary Guard Corps, has launched spear-phishing campaigns targeting Israeli journalists, high-profile cyber security experts and computer science professors from leading Israeli universities.
  • In some of those campaigns, Israeli technology and cyber security professionals were approached by attackers who posed as fictitious assistant to technology executives or researchers through emails and WhatsApp messages.
  • The threat actors directed victims who engaged with them to fake Gmail login pages or Google Meet invitations. Credentials entered on these phishing pages are sent to the attackers, enabling them to intercept both passwords and 2FA codes and gain unauthorized access to the victims’ accounts.
22
23
24
 
 

cross-posted from: https://lemmy.sdf.org/post/37332256

Archived

On 14 May 2025 the Standing Committee of the National People’s Congress, China’s legislative body, published its 2025 work plan, including plans to deliberate draft amendment to the 2017 Cybersecurity Law proposed by the Cyberspace Administration of China (CAC). ARTICLE 19 warns that the proposed amendment doubles down on China’s repressive digital norms, further illustrating the human rights concerns inherent in China’s model of cybersecurity governance.

[...]

The most concerning changes proposed by the amendment involve significant increases in penalties, including greater liability for management personnel, and the reinforcement of censorship and surveillance as core elements of cybersecurity governance.

[...]

Revised Article 59 increases fines for network and CII operators’ non-compliance with varied cybersecurity duties. It doubles the maximum penalty for actions that impact local CII, or cause other vaguely worded consequences to network security, to 2 million yuan ($278,186 USD) and introduces a new penalty for causing CII to ‘lose its main function and other particularly serious consequences for cybersecurity’, with a maximum fine of 10 million yuan ($1,390,930 USD).

Directly responsible personnel will face stricter liability, arguably as a means of outsourcing tighter oversight. In the 2017 Law, the harshest penalty for responsible personnel is 200,000 yuan ($27,818 USD). The amendment introduces a new fine for responsible management personnel carrying a maximum penalty of 1 million yuan ($139,093 USD).

[...]

A newly proposed Article 64 expands on the enhanced penalties for network or CII operators who fail to prevent certain prohibited acts. This includes activities vaguely deemed to endanger cybersecurity, or providing software, other technical support, or expenses for prohibited activities. This could impact cybersecurity researchers and digital security practitioners, and –considering the emphasis on controlling information as part of China’s approach to cybersecurity – could be extended to those who provide VPNs and other circumvention tools, already effectively criminalised in China.

Because the law in China is often weaponised in service of the Chinese Communist Party (CCP), increased penalties signal that non-compliance with Party priorities in digital governance will be met with ever-harsher penalties.

[...]

Unsurprisingly, the draft explicitly reiterates requirements on preventing ‘prohibited’ information from outside of China – a reminder that the epitome of internet fragmentation, the Great Firewall of China, is synonymous with the Party’s approach to CII governance. This in turn raises serious concerns around the dissemination of China’s model for cybersecurity governance.

[...]

The draft goes on to outline that, should network operators fail to block ‘prohibited’ content leading to further unspecified ‘particularly serious’ impacts or consequences, they will be subjected to a maximum fine of 10 million yuan ($1,390,930 USD), and administrative penalties. Directly responsible personnel will be fined upwards of 1 million yuan.

Moreover, the draft combines the language in previous provisions into a new Article 71, further citing obligations of strict control over ‘permissible’ expression and data localisation requirements.

[...]

The operation of network and critical information infrastructure requires provisions to prevent and respond to cyber-attacks. At the same time, cybersecurity measures must not infringe on human rights, and information infrastructure security cannot be conflated with the surveillance and control of information. The draft amendment to the Cybersecurity Law, rather than addressing new and emerging cybersecurity vulnerabilities, doubles down on existing freedom of expression concerns in the 2017 Law. These concerns are only magnified by China’s own stated ambition to expand its cyber power through the development and dissemination of cybersecurity governance norms around the world.

[...]

25
 
 

cross-posted from: https://lemmy.sdf.org/post/37319322

Archived

Full report (pdf)

Key Takeaways:

  • Over 1,000 actively infected nodes
  • Targets are highly localized in the United States and Southeast Asia, particularly Japan, South Korea, Hong Kong, and Taiwan
  • Victims in real estate, IT, networking, media and more
  • LapDogs leverages a custom backdoor named “ShortLeash,” which establishes a foothold on compromised devices and enables the hackers to act covertly
  • Small Office/Home Office (SOHO) devices are mainly targeted
  • Campaign growth is deliberate, beginning September 2023 and expanding with methodical tasking
  • LapDogs shares commonalities with some prolific China-Nexus ORB networks, most notably PolarEdge, while conclusively standing out as an independent ORB
view more: next ›