Security News

Browser synchronization abuse: Bookmarks as a covert data exfiltration channel
2022-08-02 04:47

Two universal and seemingly innocuous browser features - the ability to create bookmarks and browser synchronization - make users' lives easier, but may also allow hackers to establish a covert data exfiltration channel. Some attackers have also recently managed to exploit Chrome's syncing feature and use an extension to connect their computer directly to a targeted workstation, creating a covert channel for remote data manipulation, but also for data exfiltration and C&C communication.

Security Experts Warn of Two Primary Client-Side Risks Associated with Data Exfiltration and Loss
2022-07-19 11:23

Two client-side risks dominate the problems with data loss and data exfiltration: improperly placed trackers on websites and web applications and malicious client-side code pulled from third-party repositories like NPM. Client-side security researchers are finding that improperly placed trackers, while not intentionally malicious, are a growing problem and have clear and significant privacy implications when it comes to both compliance/regulatory concerns, like HIPAA or PCI DSS 4.0. The government agency points out that sensitive health information combined with the shadowy data security practices used by technology companies is extremely problematic, with most customers having little or no knowledge of how their data is collected, what data is collected, how it is used, or how it is protected.

The Great Resignation meets the Great Exfiltration: How to securely offboard security personnel
2022-04-22 04:30

As a result, the Great Resignation has become the "Great Exfiltration," as people leaving their jobs may also be taking company data with them. Considering the Great Exfiltration, it is vital for organizations to create and implement a robust data loss prevention strategy during the offboarding process to prevent any destruction or loss of data.

Despite large investments in security tools, organizations are not confident they can stop data exfiltration
2021-10-29 03:00

Most notably, the research reveals data exfiltration remains a significant threat and despite large investments in security tools, organizations are not confident they can stop data exfiltration. "Existing tools are no longer a sufficient measure to prevent data exfiltration. Anti data exfiltration provides a new approach in the ongoing fight against cyberattacks."

Magecart Hackers Hide Stolen Credit Card Data Into Images for Evasive Exfiltration
2021-07-11 21:00

Cybercrime actors part of the Magecart group have latched on to a new technique of obfuscating the malware code within comment blocks and encoding stolen credit card data into images and other files hosted on the server, once again demonstrating how the attackers are continuously improving their infection chains to escape detection. "One tactic that some Magecart actors employ is the dumping of swiped credit card details into image files on the server [to] avoid raising suspicion," Sucuri Security Analyst, Ben Martin, said in a write-up.

Data Exfiltration: What You Should Know to Prevent It
2021-07-01 13:00

Many data leaks are the result of data exfiltration or the illegal transfer of data from a device containing sensitive information to unauthorized parties. Also known as data exportation, data extrusion or simply data theft, data exfiltration is one of the final stages of the cyber kill-chain and the most important objective of advanced persistent threats.

Code42 enhances Incydr with actionable prioritization of data exfiltration events
2021-05-15 01:30

Code42 announced that it has enhanced its Incydr data risk detection and response product with a prioritized view of the highest-risk data exposure and exfiltration events happening across organizations. The new prioritization model uses Incydr's extensive library of Insider Risk Indicators to transparently score data exfiltration with evidence and file, vector and user context.

Collaboration Platforms Increasingly Abused for Malware Distribution, Data Exfiltration
2021-04-09 08:46

Threat actors are increasingly abusing collaboration platforms for nefarious purposes, including malware delivery and data exfiltration, security researchers with Cisco's Talos division report. Attackers leveraged these platforms to deliver lures and infect victims with ransomware and other malware.

Attackers Leverage Locally-Loaded Chrome Extension for Data Exfiltration
2021-02-08 09:42

A recently investigated malicious attack was abusing a locally loaded Chrome extension to exfiltrate data and establish communication with the command and control server. While the use of malicious Chrome extensions in attacks is not something new, this attack stands out from the crowd due to the use of 'Developer mode' in the browser to enable loading of a malicious extension locally.

RAM-Generated Wi-Fi Signals Allow Data Exfiltration From Air-Gapped Systems
2020-12-16 11:34

Covert Wi-Fi signals generated by DDR SDRAM hardware can be leveraged to exfiltrate data from air-gapped computers, a researcher claims. In a newly published paper, Mordechai Guri from the Ben-Gurion University of the Negev in Israel details AIR-FI, a new data exfiltration technique in which malware installed on a compromised air-gapped system can generate Wi-Fi signals that a nearby device intercepts and sends to the attacker, over the Internet.