Edition #7
Table of Contents
Doxing Turns Violent: Executives at Risk
Safe AI for US Government: Mitre Unveils Testing Lab
US Plans Defense Against Satellite Cyberattacks
Millions of AT&T Customers' Data Exposed on Dark Web
Red Hat Warns of Backdoor Threat in XZ Tools for Linux Distributions
Apple Users Targeted in 'MFA Bombing' Phishing Attacks
CISA Purposes Mandated Reporting of Cyber Incidents and Ransom Payments
Doxing Turns Violent: Executives at Risk
What happened:
Domestic violent extremists (DVEs) in the US are increasingly doxing senior leaders from public and private sectors, exposing their personal information without consent.
What to know:
Those being doxed face a higher risk of physical threats like harassment, stalking, protests, physical attacks and cyber threats.
There was a notable surge in doxing in 2023, particularly against corporate leaders.
Factors driving DVE doxing include geopolitical events, US presidential elections, and private sector engagement in social justice issues.
Business Impact:
Doxing exposes both corporate executives and their companies to significant financial, reputational, and physical harm.
What to do:
Executives should boost their cyber hygiene, use threat monitoring services, and minimize digital footprints.
Regular audits of online presence, removal of personal information from public platforms, and preparation for potential doxing incidents recommended.
In case of doxing, document the incidents, assess risks, mitigate leaks, and engage with law enforcement if necessary.
For more information, check out this article.
Safe AI for US Gov: Mitre Unveils Testing Lab
What happened:
Mitre, a government-backed nonprofit, opened a lab to assess AI systems used by federal agencies for security flaws and risks, focusing on data leaks and explainability of AI decisions.
What to know:
The facility is called the AI Assurance and Discovery Lab, located in McLean, Virginia, and can host up to 50 people onsite and 4,000 remotely.
Concerns exist over the adoption of AI systems without fully understanding potential vulnerabilities.
The lab will conduct hacking tests and assess AI for biases to understand the risks better.
Business Impact:
Mitre enhances its role in overseeing national security and cybersecurity research.
For companies involved in AI development: Highlight the importance of rigorous testing and risk mitigation in AI systems.
What to do:
Mitre will continue its assessments of AI systems and collaborate with federal agencies to address any identified vulnerabilities.
Companies engaged in AI development should prioritize thorough testing and addressing potential biases to ensure system reliability and security.
For more information, check out this article.
US Plans Defense Against Satellite Cyberattacks
What happened:
The Biden administration and Congress are intensifying measures to counter cyberattacks targeting satellites and space infrastructure.
What to know:
Cyberattacks on satellites can lead to control loss, device shutdowns, communication disruptions, or even force the satellites to overheat and explode.
A widespread attack can disrupt multiple services such as stock trading, GPS navigation, text messaging, weather forecasting, and so on.
Cyberattacks in space are a low-cost, low-effort way to disrupt critical systems globally, with unpredictable consequences due to a lack of regulations.
Satellites' reliance on vulnerable networks makes them susceptible to attacks across various systems.
Past incidents involving Russian hackers targeting satellite provider Viasat, causing major disruptions to Ukrainian military communications.
US bolsters space security with Space Force's cyber focus, CISA collaboration, and proposed legislations.
Business Impact:
Increased government focus on space security may lead to regulatory changes impacting companies involved in space-related industries.
What to do:
Government agencies are planning to fortify cybersecurity resources and support for critical infrastructures reliant on space-based capabilities.
Companies in the satellite sector should prioritize cybersecurity measures and stay informed.
For more information, check out this article.
Millions of AT&T Customers' Data Exposed on Dark Web
What happened:
A data breach at AT&T has exposed information from over 7.6 million current customers and 65 million former customers.
Leaked data includes sensitive details like full name, date of birth, passcodes, social security numbers, and more.
What to know:
AT&T has reset security passcodes for affected active customers and is notifying them via email or letter.
TechCrunch notified AT&T in 2021 about vulnerabilities in its encrypted passcodes, which are typically 4-digit numerical PINs and simple to decrypt.
Customers are advised to set up fraud alerts from credit bureaus.
The leaked data does not appear to contain financial information or call history.
AT&T claimed that there hasn’t been evidence of unauthorized access to its systems.
AT&T previously announced two data leaks in 2021 and 2023.
Business Impact:
AT&T's reputation may be affected, leading to customer trust issues and loss of business.
Businesses partnering with AT&T or using their services may have their data compromised and should take actions to secure it.
What to do:
AT&T is collaborating with cybersecurity experts to analyze the breach.
Affected customers should set up fraud alerts and monitor their accounts for any suspicious activity.
Companies should review and enhance their data security measures, especially if they handle sensitive customer information.
For more information, check out this article.
Red Hat Warns of Backdoor Threat in XZ Tools for Linux Distributions
What happened:
Red Hat issued a warning advising users to cease using Fedora 41 and Fedora Rawhide versions due to a backdoor discovered in the latest XZ Utils compression tools, which allows potential unauthorized access to systems running affected Linux distributions.
What to know:
The compromised XZ versions 5.6.0 and 5.6.1 contain malicious code injected by contributor Jia Tan, potentially enabling remote code execution or unauthorized access.
The malicious code is obfuscated and can only be found in complete download packages, not in Git distributions, complicating detection.
Debian, Kali Linux, openSUSE, and Arch Linux have issued security advisories and rolled back affected versions in their distributions.
Linux administrators are urged to downgrade to an uncompromised XZ version (i.e., 5.4.6 Stable).
Business Impact:
Companies relying on systems running Fedora development and experimental versions should be mindful of potential breaches and must take immediate action to safeguard their systems.
What to do:
Users should downgrade to uncompromised XZ versions and monitor their systems for any signs of malicious activity.
For more information, check out this article.
Apple Users Targeted in 'MFA Bombing' Phishing Attacks
What happened:
Apple users have reported sophisticated phishing attacks involving overwhelming system prompts for password reset approvals.
What to know:
Victims experience a barrage of system notifications demanding password reset approvals, hindering device functionality until users choose “Allow” or “Don’t Allow”.
Clicking "Allow" displays a six-digit PIN necessary for changing the account password. Phishers will impersonate Apple support callers, attempting to extract these verification codes, change password and seize control of the Apple ID.
Clicking "Don't Allow" triggers even more notifications that persist for days.
Business Impact:
Apple's security reputation may suffer, leading to a loss of customer trust.
What to do:
Apple users should remain vigilant and avoid clicking "Allow" on unsolicited password reset prompts, as this could enable attackers to compromise their accounts.
Users should also consider changing account phone numbers and utilizing email aliases to reduce exposure to potential attacks.
For more information, check out this article.
CISA Purposes Mandated Reporting of Cyber Incidents and Ransom Payments
What happened:
The Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) proposed a comprehensive cyber incident reporting structure across 16 critical sectors.
Covered organizations are required to report cyber incidents under the Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA), within 18 months of the final rule.
What to know:
The proposed rule includes sector-based criteria, such as the Healthcare and Public Health sector, encompassing entities like manufacturers of Class II or III medical devices.
If a facility or function within an organization is considered a covered entity, then the entire organization will be a covered entity.
A cyber incident at any part (sector-defined or not) within a covered entity triggers reporting for the entire entity.
CISA considered various alternatives to the proposed rule, weighing costs and benefits, and explained the reasons why each alternative was rejected in the rule document.
Business Impact:
If implemented, the rule could enhance cybersecurity resilience across critical sectors but may increase compliance costs for affected organizations.
What to do:
Organizations falling under the proposed rule should closely monitor developments and prepare to comply with reporting requirements.
For more information, check out this article.