Transcript
A (0:00)
From the CISO series, it's Cybersecurity Headlines.
B (0:06)
These are the cybersecurity headlines for Thursday, December 12, 2024. I'm Rich Stroffolino. Operation Power Off Hits DDoS Sites Europol announced that a coordinated law enforcement effort across Finland, Australia, Brazil, Canada, the UK and the US led to the shutdown of 27 popular DDoS attack platforms. Dubbed Operation Power Off. The effort identified over 300 users of these platforms and made arrests out of three administrators. Europol said it timed the takedowns ahead of the December holiday season to prevent the typical spike in DDoS attacks that caused severe financial loss, reputational damage and operational chaos for their victims. FCC proposes new Telco Cybersecurity rules FCC Chairwoman Jessica Rosenworsel shared these proposed rules as a declaratory ruling with the commission's other members. These seek to create a modern framework to help companies secure their networks. The rules would require submitting annual certification to the FCC confirming telcos implemented and regularly updated a cybersecurity risk management plan. This comes after the ongoing salt typhooned attacks that have compromised communications from several telcos and ISPs. CISA has already issued best practices and guidance for telcos. In light of the campaign, we covered yesterday that Senator Ron Wyden introduced legislation requiring the FCC to create digital security standards for these companies. Zloader returns Researchers at Zscaler Threat Labs documented a new version of Zloader malware, notably adding a custom DNS tunnel protocol for C2 communications and an interactive shell that supports more than a dozen commands. Zloader originated as an offshoot of the Zeus banking Trojan back in 2015, eventually having its infrastructure disrupted by law enforcement in April 2022. It resurfaced late last year, showing ties to Black Basta ransomware. The researchers also found Zlotr developers updated its environment checks and API import resolution algorithms to evade typical analysis tools. Links behind electricity supplier attack Electrica Group supplies power to over 3.8 million customers in Romania. Earlier this week, the company said it was investigating an ongoing ransomware attack but did not name a threat actor. The Romanian National Cybersecurity Directorate named the Lynx ransomware organization behind the incident, although Lynx itself did not name the company on its breach site. Romania's energy Minister, Sebastian Berduja, said the attack did not impact Electrica's SCADA and critical systems. Lynx has been active since July 2024, attacking over 20 entities from the energy, oil and gas sectors using an encryptor with nearly identical source code to Ink Ransom and now, thanks to Today's episode sponsor ThreatLocker do zero day exploits and supply chain attacks keep you up at night? Worry no more. You can harden your security with Threat Locker. Threat Locker helps you take a proactive default deny approach to cybersecurity and provides a full audit of every action allowed or blocked for risk management and compliance. Onboarding and operations are fully supported by their US based support team. To learn more about how ThreatLocker can help keep your organization running efficiently and protected from ransomware, visit threatlocker.com that's T H R E A T L O c k e r.comai voice generation likely Used an Influence campaign Researchers at Recorded Future cited the use of generative AI voice generation technology in a recent Russian tied campaign to weaken Europe's support for Ukraine. The researchers found it very likely the campaign used commercial AI voice generation products in their efforts, including tech from eleven labs. These voices were used over supposed news clips to present Ukrainian politicians as corrupted. The tech allowed the campaign to produce videos quickly in various languages across the EU using native speech patterns and dialects. Recorded Future concluded the actual impact of the campaign on public opinion was minimal. A call for clarity with the National Cyber Director A new report from the nonprofit center for Cybersecurity Policy and Law calls on the upcoming Trump administration to clarify the mission of the Office of the National Cyber Director with clear differentiation in mandate from CISA and the Office of Management and Budget. The report calls on the ONCD to serve as the government's top public facing cyber official, be given a senior role on the National Security Council, and bring more subject matter experts into the office. The report also calls for the Federal CIO to be made a direct report to the National Cyber Director, Snowflake to make MFA Mandatory Starting in November 2025, Snowflake will block sign ins using single factor passwords. Since October 2024, the company has made multifactor authentication the default for new accounts. Both moves come as part of its commitment to CISA's Secure by Design pledge. As part of the rollout in April 2025, Snowflake will require all human users to enroll in MFA on their next login attempt, excluding those with a custom authentication policy. In August, MFA will be required for all human password sign ins. Firefox removes Do Not Track Starting with Firefox version 135, Mozilla will remove do Not Track support from the browser. Firefox added the feature back in 2011, which sends an HTTP header to sites with a user's request to opt out of tracking. Mozilla said many sites do not respect this indication of a person's privacy preferences and suggested that users use the global privacy control setting instead. Both Google's Chrome and Microsoft's Edge browsers still offer Do Not Track settings. Breaking AMD processors for $10 an academic team from KU Leuven, the University of Lubeck and the University of Birmingham demonstrated how to use off the shelf equipment to get around AMD SEV SNP memory integrity protections with an attack method called badram. The researchers were able to tamper with an embedded SPD chip, misrepresenting the chip's size to the processor to show double the dram, letting the team manipulate memory mapping. This effectively fully compromises the processor's attestation feature. AMD released a firmware update to resolve the issue on impacted EPYC processors. The researchers also noted that DRAM vendors that leave serial presence detect metadata unlocked could open the door to a software only bad RAM Attack Krispy Kreme Hit with Cyber Attack in affront to all that is sacred news, the US Donut chain Krispy Kreme confirmed it suffered a cyberattack in an SEC filing. The attack began on November 29th with ongoing impacts on online ordering in the US as of this recording, the attack did not impact in person ordering and retail deliveries. In its Q3 earnings, the company reported digital orders represented 15.5% of all sales. Krispy Kreme immediately sought outside expertise after discovering the attack, but no other details have been released. So far, no threat actors have taken credit for the attack. Useful alerts are critical in cybersecurity, but getting inundated with useless alerts wastes resources and our attention. How do we build an alerting system that actually works? That's what we'll be trying to answer on this week's episode of Defense In Depth. Look for how can we fix alert fatigue in your favorite podcast app, or head on over to csoseries.com reporting for the CISO series, I'm Rich Strofolino, reminding you to have a super sparkly day.
