Security News > 2022 > January

FTC threatens “legal action” over unpatched Log4j and other vulns
2022-01-05 19:37

It is critical that companies and their vendors relying on Log4j act now, in order to reduce the likelihood of harm to consumers, and to avoid FTC legal action. The FTC's brief but blunt warning makes an example of the infamous Equifax breach of 2017, where the US credit reporting behemoth was compromised via an unpatched Apache Struts vulnerability with the unassuming bug identifier CVE-2017-5638.

US Army journal's top paper from 2021 says Taiwan should destroy TSMC if China invades
2022-01-05 19:01

A top US Army War College paper suggests Taiwan should credibly threaten to eradicate, or eradicate, its semiconductor industry if threatened by China so that Beijing would no longer be interested in unification. The US Army War College showed the paper was its most popular of the year, when it revealed it topped a list of the most downloaded papers of 2021 from its quarterly academic journal Parameters.

FTC to Go After Companies that Ignore Log4j
2022-01-05 19:00

The Federal Trade Commission will muster its legal muscle to pursue companies and vendors that fail to protect consumer data from the risks of the Log4j vulnerabilities, it warned on Tuesday. "The FTC intends to use its full legal authority to pursue companies that fail to take reasonable steps to protect consumer data from exposure as a result of Log4j, or similar known vulnerabilities in the future," according to the warning.

NY OAG: Hackers stole 1.1 million customer accounts from 17 companies
2022-01-05 17:42

The New York State Office of the Attorney General has warned 17 well-known companies that roughly 1.1 million of their customers have had their user accounts compromised in credential stuffing attacks. NY OAG discovered these compromised online accounts after a "Sweeping investigation" over several months after monitoring multiple online communities dedicated to sharing validated credentials harvested in previously undetected credential stuffing attacks.

MalSmoke attack: Zloader malware exploits Microsoft's signature verification to steal sensitive data
2022-01-05 17:05

A new malware campaign is taking advantage of a vulnerability in the way Microsoft digitally signs a specific file type. As described on Wednesday by cyber threat intelligence firm Check Point Research, an attack using the infamous Zloader banking malware aims to steal account credentials and other private data and has already infected 2,170 unique machines that downloaded the malicious DLL file involved in the exploit.

Crypto platform ARBIX flagged as a rugpull, transfers $10 million
2022-01-05 16:55

Arbix Finance, an audited and supposedly trustworthy yield farming platform, has been flagged as a 'rugpull,' deleting its site, Twitter, and Telegram channel and transferring $10 million worth of deposited cryptocurrency. Rugpulls, otherwise known as "Exist scams," are when pseudo-anonymous platforms or cryptocurrencies are created twith the ultimate goal of collecting funds for an allegedly legitimate "Service" and then disappear with deposited funds.

Behind the scenes: A day in the life of a cybersecurity curriculum director
2022-01-05 16:39

The Kennedy Space Center kick-started Andee Harston's career in cybersecurity. Here's how she worked her way up to overseeing the cybersecurity curriculum for Infosec.

Remember Norton 360's bundled cryptominer? Irritated folk realise Ethereum crafter is tricky to delete
2022-01-05 15:56

Norton antivirus's inbuilt cryptominer has re-entered the public consciousness after a random Twitter bod expressed annoyance at how difficult it is to uninstall. Exe, Norton 360's signed cryptocurrency-mining binary, to installations of Norton antivirus isn't new - but it seems to have taken the non-techie world a few months to realise what's going on.

iOS malware can fake iPhone shut downs to snoop on camera, microphone
2022-01-05 14:54

Historically, when malware infects an iOS device, it can be removed simply by restarting the device, which clears the malware from memory. When an iPhone is shut off, its screen naturally goes dark, the camera is turned off, 3D touch feedback does not respond to long presses, sounds from calls and notifications are muted, and all vibrations are absent.

‘Malsmoke’ Exploits Microsoft’s E-Signature Verification
2022-01-05 13:00

Threat actors are exploiting Microsoft's digital signature verification to steal user credentials and other sensitive information by delivering the ZLoader malware, which previously has been used to distribute Ryuk and Conti ransomware, researchers have found. Researchers at Check Point Research discovered the cybercriminal group Malsmoke delivering the campaign, which they traced back to November 2021, according to a report posted online Wednesday.