Cybersecurity Saturday

Cybersecurity Saturday

From the cybersecurity history, policy, and law enforcement fronts,

  • American Hospital Association (AHA) News reminds us,
    • “Nearly one year after the cyberattack on Change Healthcare, the AHA released a report highlighting the continued need for health care organizations to strengthen cybersecurity efforts and mitigate risk.  
    • “The cyberattack on Change Healthcare in February 2024 disrupted health care operations on an unprecedented national scale, endangering patients’ access to care, disrupting critical clinical and eligibility operations, and threatening the solvency of the nation’s provider network,” the report said.  
    • “Among other areas, the report highlights lessons learned, including how third-party cyber risk is the most significant and disruptive cyber threat to health care; actions health care organizations can take to mitigate cyber risk; and resources from the AHA and federal government that can assist organizations with strengthening cybersecurity efforts.”
  • Cyberscoop lets us know,
    • “Republican leaders on a key House committee are canvassing the public for input on how best to move forward in Congress’ longstanding quest to tackle national data privacy and security standards.
    • “House Energy and Commerce Committee Chair Brett Guthrie, R-Ky., and Vice Chair John Joyce, R-Pa., issued a Request for Information on Friday that seeks guidance on how to best develop legislation to protect the digital data of Americans across an ever-widening range of essential services.
    • “Leadership in digital technologies, including artificial intelligence, underpins U.S. economic and national security, provides American consumers with access to lower cost goods and services, and enables small businesses to reach markets around the world,” Guthrie and Joyce said in a statement. “However, the challenge of providing clear digital protections for Americans is compounded by the fast pace of technological advancement and the complex web of state and federal data privacy and security laws, which in some cases create conflicting legal requirements.”
    • “Both Guthrie and Joyce are part of a Republican committee working group on data privacy, and the request includes questions that could guide lawmakers as they eye potential legislation. They include how to account for different roles and services that collect personal data, when a company should disclose the collection, processing, or transfer of user data, and what lessons can be learned from existing privacy frameworks in other countries.”
  • and
    • “One of the most notable elements of the monumental hack of major telecommunications companies is just how “indiscriminate” it was in its pursuit of data, a top FBI official said Wednesday.
    • “The FBI has been investigating the breach, which it has blamed on Chinese government hackers commonly known as Salt Typhoon.
    • “What we found particularly remarkable in our investigation is the gigantic and seemingly indiscriminate collection of call records and data about American people, like your friends, your family, people in your community,” Cynthia Kaiser, deputy assistant director in the bureau’s cyber division, said at the 2025 Zero Trust Summit, presented by CyberScoop.
    • “Kaiser characterized the breach as “a different level of insidiousness” from Beijing, one that reflects its “ambition and reckless aggression in cyberspace.”
  • Cybersecurity Dive tells us,
    • “The Securities and Exchange Commission on Thursday unveiled a revamped anti-fraud unit to protect retail investors in emerging technologies, reflecting the Trump administration’s evolving approach to cryptocurrency and cybersecurity.
    • “The Cyber and Emerging Technologies Unit, led by Laura D’Allaird, will have about 30 fraud specialists from across the agency and replaces the Crypto Assets and Cyber Unit. The revised CETU will complement a crypto task force launched in January under the leadership of Commissioner Hester Peirce.
    • “The unit will not only protect investors, but will also facilitate capital formation and market efficiency by clearing the way for innovation to grow,” Acting SEC Chairman Mark Uyeda said in a statement. “It will root out those seeking to misuse innovation to harm investors and diminish confidence in new technologies.”
  • Per a Justice Department news release,
    • Health Net Federal Services Inc. (HNFS) of Rancho Cordova, California and its corporate parent, St. Louis-based Centene Corporation, have agreed to pay $11,253,400 to resolve [government] claims [under the federal False Claims Act] that HNFS falsely certified compliance with cybersecurity requirements in a contract with the U.S. Department of Defense (DoD) to administer the Defense Health Agency’s (DHA) TRICARE health benefits program for servicemembers and their families. In 2016, Centene acquired all of the issued and outstanding shares of Health Net Inc., HNFS’s corporate parent, and assumed the liabilities of HNFS.
  • Per an HHS news release,
    • “Today [February 20], the U.S. Department of Health and Human Services (HHS), Office for Civil Rights (OCR) announced a $1,500,000 civil money penalty against Warby Parker, Inc., a manufacturer and online retailer of prescription and non-prescription eyewear, concerning violations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Security Rule, following the receipt of a breach report regarding the unauthorized access by one or more third parties to customer accounts.” * * *
    • “OCR’s investigation found evidence of three violations of the HIPAA Security Rule, including a failure to conduct an accurate and thorough risk analysis to identify the potential risks and vulnerabilities to ePHI in Warby Parker’s systems, a failure to implement security measures sufficient to reduce the risks and vulnerabilities to ePHI to a reasonable and appropriate level, and a failure to implement procedures to regularly review records of information system activity.” * * *
    • “The Notice of Proposed Determination may be found at: https://www.hhs.gov/sites/default/files/ocr-warby-parker-npd.pdf – PDF
    • “The Notice of Final Determination may be found at: https://www.hhs.gov/sites/default/files/ocr-warby-parker-nfd.pdf – PDF

From the cybersecurity vulnerabilities and breaches front,

  • Cyberscoop lets us know,
    • “Salt Typhoon gained initial access to Cisco devices as part of the Chinese nation-state threat group’s sweeping attacks on U.S. telecom networks, the company confirmed Thursday [February 20] in a threat intelligence report.
    • “Cisco Talos, the networking vendor’s threat intelligence unit, said it observed one instance where Salt Typhoon likely exploited a seven-year-old critical vulnerability in Cisco IOS XE (CVE-2018-0171). Yet, researchers asserted Salt Typhoon gained initial access to Cisco devices with legitimate login credentials in all other incidents it’s investigated to date.
    • “The report marks the first time Cisco acknowledged the role its equipment played in Salt Typhoon’s attack spree on telecom networks. Recorded Future last week said five additional telecom networks were hit by Salt Typhoon via a pair of other vulnerabilities in Cisco IOS XE (CVE-2023-20198 and CVE-2023-20273) between early December and late January.
    • “Cisco Talos said it hasn’t identified any evidence to confirm Salt Typhoon’s exploitation of other known Cisco vulnerabilities. The company declined to answer questions.” 
  • The Cybersecurity and Infrastructure Security Agency added five known exploited vulnerabilities to its catalog this week.
    • February 18, 2025
      • CVE-2025-0108 Palo Alto PAN-OS Authentication Bypass Vulnerability
      • CVE-2024-53704 SonicWall SonicOS SSLVPN Improper Authentication Vulnerability
      • The Palo Alto KVE is discussed here, and the Sonicwall KVE is discussed here.
    • February 20, 2025
      • CVE-2025-23209 Craft CMS Code Injection Vulnerability
      • CVE-2025-0111 Palo Alto Networks PAN-OS File Read Vulnerability
      • The Craft KVE is discussed here, and the Palo Alto KVE is discussed here.
    • February 21, 2025
      • CVE-2025-24989 Microsoft Power Pages Improper Access Control Vulnerability
      • The Microsoft KVE is discussed here.
  • Cybersecurity Dive informs us
    • “Horizon3.ai researchers on Wednesday released technical details and a proof-of-concept (PoC) exploit for four critical Ivanti vulnerabilities that were first disclosed and patched last month.
    • “The absolute patch-traversal flaws impact Ivanti Endpoint Manager and, according to Horizon3.ai, could allow unauthenticated attackers to manipulate the Ivanti EPM machine account credential into being deployed in relay attacks, potentially leading to server compromise.
    • “Ivanti products have become popular targets for attackers in recent years, as a wide range of cyber threat actors have exploited both zero-day and known vulnerabilities to compromise devices at the network edge and gain access to victim.”
  • Security Week relates,
    • In a fresh report published Wednesday, Mandiant threat hunter Dan Black warns that several APT groups have perfected the abuse of Signal’s “linked devices” feature that enables the privacy-themed chat and voice messenger to be used on multiple devices concurrently.
    • By tricking users into scanning malicious QR codes embedded in phishing pages or disguised as group invite links, Mandiant says APT groups linked to the Kremlin are secretly adding their own device as a linked endpoint. 
    • Once this connection is established, every message sent by the user is duplicated to the attacker’s device in real time, effectively bypassing Signal’s heralded end-to-end encryption without having to break the underlying cryptography.
  • Dark Reading offers an oddball article about state-of-the-art phishing software Darcula version 3 that can be purchased.

From the ransomware front,

  • AHA News reports,
    • “A joint advisory released Feb. 19 by the FBI, Cybersecurity and Infrastructure Security Agency, and the Multi-State Information Sharing and Analysis Center warns of cybercriminal activity by the Ghost ransomware group. The agencies identified actions as recently as last month by the group, which originates from China. 
    • “Since 2021, Ghost actors have targeted victims with outdated software and firmware, compromising organizations in more than 70 countries. Their victims include critical infrastructure, health care, schools and technology companies, among other organizations. 
    • “Ghost actors exploit well-known vulnerabilities and target networks where available patches have not been applied,” said Scott Gee, AHA deputy national advisor for cybersecurity and risk. “They simply ‘hack before we patch.’ This group is also leveraging legitimate cybersecurity tools such as Cobalt Strike to enable access and other tools for privilege escalation. It is recommended that patching policies be reviewed to achieve maximum efficiency and speed. It is also recommended that network security tools be set to alert for activation of Cobalt Strike and privilege escalation applications.” 
  • Bleeping Computer reports,
    • “An unknown leaker has released what they claim to be an archive of internal Matrix chat logs belonging to the Black Basta ransomware operation.
    • “ExploitWhispers, the individual who previously uploaded the stolen messages to the MEGA file-sharing platform, which are now removed, has uploaded it to a dedicated Telegram channel.
    • I”t’s not yet clear if ExploitWhispers is a security researcher who gained access to the gang’s internal chat server or a disgruntled member.
    • “While they never shared the reason behind this move, cyber threat intelligence company PRODAFT said today that the leak could directly result from the ransomware gang’s alleged attacks targeting Russian banks.
    • “As part of our continuous monitoring, we’ve observed that BLACKBASTA (Vengeful Mantis) has been mostly inactive since the start of the year due to internal conflicts. Some of its operators scammed victims by collecting ransom payments without providing functional decryptors,” PRODAFT said.”

From the cybersecurity defenses front,

  • Security Week shares a conversation with Kevin Winter, Global CISO at Deloitte, and Richard Marcus, CISO at AuditBoard.
  • Here’s a link to Dark Reading’s CISO Corner.
  • HelpNet Security points out cyber hygiene habits that many still ignore.

Cybersecurity Saturday

From the cybersecurity policy and law enforcement front,

  • Cyberscoop lets us know,
    • “Cybercrimes could be punished more harshly under a new bill from a pair of senators that seeks to amend U.S. criminal code on computer fraud.
    • “The Cyber Conspiracy Modernization Act from Sens. Mike Rounds, R-S.D., and Kirsten Gillibrand, D-N.Y., would modify the Computer Fraud and Abuse Act (CFAA) to establish a specific penalty for conspiracy and boost penalties for violators. 
    • “As cyber technologies continue to rapidly evolve, we need more people working to secure cyberspace as well as harsher penalties for those perpetrating these crimes,” Rounds said in a statement. “As chairman of the Senate Armed Services Committee’s Subcommittee on Cybersecurity, I am committed to working on policies that strengthen the United States’ ability to respond quickly and decisively to cyberattacks which have been on the rise.”
    • “Under current law, the Department of Justice can only charge conspiracy to commit cybercrimes through a general statute unrelated to the CFAA. Individuals charged under the general conspiracy statute face a maximum five-year penalty.”
  • Cybersecurity Dive informs us,
    • “President Donald Trump plans to nominate Sean Cairncross, a former official at the Republican National Committee, as the next national cyber director, according to a list of planned nominees obtained by Cybersecurity Dive. 
    • “Those nominees are expected to be sent imminently to the Senate to be considered for the confirmation process. 
    • “Cairncross would be the first major nominee for a top cybersecurity role since the Trump administration took office. 
    • “He is founder and president of the Cairncross Group, a strategic consultancy based in Washington, D.C.
    • “Cairncross previously worked as CEO of the Millennium Challenge Corp., an independent government agency that works to reduce poverty by promoting economic growth across the globe.”
  • Federal News Network notes,
    • “A former cyber executive at the Department of Homeland Security and the Energy Department has joined the Cybersecurity and Infrastructure Security Agency.
    • “Karen Evans is now “senior advisor for cybersecurity” at CISA, an agency spokesman confirmed to Federal News Network today. Evans posted about joining CISA on LinkedIn last night.
    • “A CISA spokesman did not confirm whether Evans would be elevated to a permanent role at the agency. But multiple sources said Evans is likely to either be named as executive assistant director for cybersecurity at CISA or move on to a top position at DHS headquarters.
    • “During the first Trump administration, Evans was DHS CIO between June 2020 and January 2021. She also served as assistant secretary for cybersecurity, energy security and emergency response at the Energy Department between 2018 and 2020.”
  • NextGov/FCW offers background on OPM’s new Chief Information Officer, Greg Hogan.
  • Per a Justice Department news release,
    • The Justice Department today [February 10] unsealed criminal charges against Roman Berezhnoy, 33, and Egor Nikolaevich Glebov, 39, both Russian nationals, who allegedly operated a cybercrime group using the Phobos ransomware that victimized more than 1,000 public and private entities in the United States and around the world and received over $16 million in ransom payments. Berezhnoy and Glebov were arrested this week as part of a coordinated international disruption of their organization, which includes additional arrests and the technical disruption of the group’s computer infrastructure.
    • From May 2019, through at least October 2024, Berezhnoy, Glebov, and others allegedly caused victims to suffer losses resulting from the loss of access to their data in addition to the financial losses associated with the ransomware payments. The victims included a children’s hospital, health care providers, and educational institutions.

From the cybersecurity vulnerabilities and breaches front,

  • Cyberscoop reports,
    • Microsoft threat researchers discovered a series of what they are calling “device code” phishing attacks that allowed a suspected Russia-aligned threat group to gain access to and steal data from critical infrastructure organizations, the company said in research released Thursday.
    • The group, which Microsoft tracks as Storm-2372, has targeted governments, IT services and organizations operating in the telecom, health, higher education and energy sectors across Europe, North America, Africa and the Middle East.
    • Microsoft observed attackers generating a legitimate device code sign-in request and then duping targeted users to input the code into a login page for productivity apps. By exploiting the device code authentication flow, Storm-2372 has gained access to targeted systems, captured authentication tokens and used those valid tokens to achieve lateral movement and steal data.
    • “They’ve been successful in these attacks, though Microsoft itself is not affected,” Sherrod DeGrippo, director of threat intelligence strategy at Microsoft, said in a video summarizing the report’s findings.
  • and
    • “Salt Typhoon, the Chinese nation-state threat group linked to a spree of attacks on U.S. and global telecom providers, remains active in its intrusion and has hit multiple additional networks worldwide, including two in the United States, Recorded Future said in a report released Thursday [February 13].
    • “Recorded Future’s Insikt Group observed seven compromised Cisco network devices communicating with Salt Typhoon infrastructure on five telecom networks between early December and late January. The compromised companies include an unnamed U.S. internet service provider and telecom company, a U.S.-based affiliate of a U.K. telecom provider, a large telecom provider in Thailand, an Italy-based ISP and a South Africa-based telecom provider.
    • “Salt Typhoon’s ongoing attack spree underscores the enduring challenge global cyber authorities and network defenders confront in trying to thwart the nation-state group’s activities. U.S. and White House officials in December warned they may never know if the group has been completely booted from networks.” 
  • Cybersecurity Dive relates,
    • “The FBI and Cybersecurity and Infrastructure Security Agency on Wednesday [February 12] warned Ransomware gangs are adapting to stronger enterprise defenses and increased law enforcement pressure with more sophisticated tactics, according to Huntress’ 2025 Cyber Threat Report.
    • In 75% of the ransomware incidents Huntress observed in 2024, threat actors used remote access Trojans (RATs), while 17.3% of attacks featured abused of remote monitoring and management products like ConnectWise ScreenConnect, TeamViewer and LogMeIn.
    • In an effort to evade EDR protections, threat actors are shifting to data theft and extortion attacks instead of deploying ransomware and increasingly relying on “living off the land” techniques with legitimate system administrator tools. that hackers are abusing buffer overflow vulnerabilities to launch malicious attacks against organizations. 
    • “Buffer overflow vulnerabilities occur when a hacker gains access or writes information outside of the memory buffer, according to the advisory from the FBI and CISA. 
    • “Buffer overflow vulnerabilities are prevalent issues in memory-safety software design that can lead to data corruption, program crashes, exposure of sensitive data and remote code execution.
  • Per Bleeping Computer,
    • “Attackers are now targeting an authentication bypass vulnerability affecting SonicWall firewalls shortly after the release of proof-of-concept (PoC) exploit code.
    • “This security flaw (CVE-2024-53704), tagged by CISA as critical severity and found in the SSLVPN authentication mechanism, impacts SonicOS versions 7.1.x (up to 7.1.1-7058), 7.1.2-7019, and 8.0.0-8035, used by multiple models of Gen 6 and Gen 7 firewalls and SOHO series devices.
    • “Successful exploitation enables remote attackers to hijack active SSL VPN sessions without authentication, which grants them unauthorized access to targets’ networks.
    • “SonicWall urged customers to immediately upgrade their firewalls’ SonicOS firmware to prevent exploitation in an email sent before disclosing the vulnerability publicly and releasing security updates on January 7.”
  • CISA added seven known exploited vulnerabilities to its catalog this week.
  • The DC Health Link cybersecurity breach lawsuit settlement is explained here.

From the ransomware front,

  • Cybersecurity Dive reports,
    • “Ransomware gangs are adapting to stronger enterprise defenses and increased law enforcement pressure with more sophisticated tactics, according to Huntress’ 2025 Cyber Threat Report.
    • “In 75% of the ransomware incidents Huntress observed in 2024, threat actors used remote access Trojans (RATs), while 17.3% of attacks featured abuses of remote monitoring and management products like ConnectWise ScreenConnect, TeamViewer and LogMeIn.
    • “In an effort to evade EDR protections, threat actors are shifting to data theft and extortion attacks instead of deploying ransomware and increasingly relying on “living off the land” techniques with legitimate system administrator tools.”
  • Dark Reading tells us,
    • “A recent RA World ransomware attack utilized a tool set that took researchers by surprise, given that it has been associated with China-based espionage actors in the past.
    • “According to Symantec, the attack occurred in late 2024. The tool set includes a legitimate Toshiba executable named toshdpdb.exe that deploys on a victim’s device. It then connects to a malicious dynamic link library (DLL) that deploys a payload containing a PlugX backdoor.
    • “The threat actors in this case used the tool kit to ultimately deploy RA World ransomware inside an unnamed Asian software and services company, demanding a ransom of $2 million. No initial infection vector was found. However, the attacker claimed they compromised the victim’s network by exploiting a Palo Alto PAN-OS vulnerability (CVE-2024-0012), according to Symantec.”
    • “The attacker then said administrative credentials were obtained from the company’s intranet before stealing Amazon S3 cloud credentials from its Veeam server, using them to steal data from its S3 buckets before encrypting computers,” added the researchers, who hypothesized that based on tactics, techniques, and procedures, the attacker could be China-linked Emperor Dragonfly, aka Bronze Starlight, a group that has been known to deploy ransomware to obscure intellectual property theft in the past.”
  • Reuters reports,
    • “The United States joined Australia and Britain in targeting Russia-based Zservers service provider for its role in supporting the Lockbit ransomware attacks, the U.S. Department of Treasury said on Tuesday [February 11], citing national security concerns.
    • “U.S. Treasury’s Office of Foreign Assets Control also designated two Russian nationals who they said were key administrators for Zservers, a bulletproof hosting services provider or BPH, it added.
    • “Ransomware actors and other cybercriminals rely on third-party network service providers like Zservers to enable their attacks on U.S. and international critical infrastructure,” wrote Bradley Smith, acting Under Secretary of the Treasury for Terrorism and Financial Intelligence.
    • “The action follows joint U.S., UK and Australia cyber sanctions last year targeting the Evil Corp ransomware group, Treasury added.”

From the cybersecurity defenses and business front,

  • Per Cyberscoop,
    • “Identity security giant CyberArk has acquired Boston-based Zilla Security, a cloud-native identity governance and administration startup, in a deal worth up to $175 million.
    • “The acquisition, announced Thursday [February 13], includes $165 million in cash and a $10 million earn-out contingent on performance milestones. Zilla’s co-founders, CEO Deepak Taneja and Nitin Sonawane, along with their team, will join CyberArk. Zilla’s flagship products — Zilla Comply and Zilla Provisioning — will be integrated into CyberArk’s Identity Security Platform as standalone offerings.
    • Founded in 1999, CyberArk has traditionally built its reputation on securing privileged access across enterprise systems. In recent years, the company has bolstered its portfolio through a series of acquisitions, the most significant being the $1.54 billion purchase of machine identity firm Venafi last year. Together with this latest move, CyberArk seeks to expand its reach into modern identity security — an area increasingly critical as organizations shift toward hybrid and cloud-based environments.
  • An ISACA expert discusses how to define a security incident.
    • “[W]hat is a good definition of a security incident? In my opinion, I believe the NIST definition from NISTIR 8183A Vol. 3 is an amazing definition for small and medium-sized organizations. It states, “An occurrence that actually or potentially jeopardizes the confidentiality, integrity, or availability of an information system or the information the system processes, stores, or transmits or that constitutes a violation or imminent threat of violation of security policies, security procedures, or acceptable use policies.” The “or potentially” does a lot of heavy lifting here but is still a much better definition than those that allow people to more easily wiggle their way out of filling out a ticket for a potential incident. A common occurrence is cherry-picking more vague definitions that don’t have the built-in safeguards and controls around the definition such as the NIST SP 800-53 Rev. 5 for a non-federal system. 
    • “Besides the fact that leveraging this definition means that occurrences such as false positives and security investigations properly follow the ticketing process instead of being undocumented events, there are other helpful points to this definition. The terms “Confidentiality, Integrity and Availability” being in the definition ensures that incidents such as DDOS attacks are not reported as simply “outages” or “infrastructure changes.” The phrase “Constitutes a violation or imminent threat of violation of” expands the scope of what should be monitored and have alerts in place as well as points more eyes inward on internal incidents, which is a wonderful steppingstone toward zero trust.”
  • Here is a link to Dark Reading’s CISO Corner.

Cybersecurity Saturday

From the cybersecurity policy front,

  • Cyberscoop lets us know,
    • “Bipartisan legislation to close a loophole in federal cybersecurity standards by requiring vulnerability disclosure policies for government contractors is getting another shot at passage in this Congress.
    • “The Federal Contractor Cybersecurity Vulnerability Reduction Act, a bicameral, bipartisan bill that stalled out last year in the Senate, was reintroduced Friday [January 31] in the House by Reps. Nancy Mace, R-S.C., and Shontel Brown, D-Ohio. 
    • “The bill, whose 2024 companion in the upper chamber came from Sens. Mark Warner, D-Va., and James Lankford, R-Okla., calls on the Office of Management and Budget and the Defense Department to update federal acquisition policies to require all federal contractors to institute vulnerability disclosure policies (VDPs).
    • “This is a matter of national security,” Mace said in a press release. “Federal contractors handle some of the most sensitive information and critical infrastructure in the country. Without basic vulnerability disclosure policies, we are leaving a gaping hole in our cybersecurity defenses. This bipartisan bill ensures contractors uphold the same cybersecurity standards as federal agencies, reducing risks before they turn into catastrophic breaches.”
  • The Wall Street Journal reports,
    • “Lawmakers announced Thursday they planned to introduce a bill to ban DeepSeek’s chatbot application from government-owned devices, over new security concerns that the app could provide user information to the Chinese government. 
    • “The legislation written by Reps. Darin LaHood, an Illinois Republican, and Josh Gottheimer, a New Jersey Democrat, is echoing a strategy that Congress used to ban Chinese-controlled TikTok from government devices, which marked the beginning of the effort to block the company from operating in the U.S. 
    • “This should be a no-brainer in terms of actions we should take immediately to prevent our enemy from getting information from our government,” Gottheimer said.  
  • SC Media tells us,
    • “A U.S. cybersecurity agency issued a fresh set of guidance for organizations regarding best practices in securing their networks and data storage.
    • “The U.S. Cyber Security and Infrastructure Security Agency (CISA) posted a set of guidelines aimed at helping companies better secure the commonly used devices that sit at the edges of most networks.
    • “This set of guidance, led by international cybersecurity authorities, is intended to help organizations protect their network edge devices and appliances, such as firewalls, routers, virtual private networks (VPN) gateways, Internet of Things (IoT) devices, internet-facing servers, and internet-facing operational technology (OT) systems,” CISA explained.
    • “It’s thought that American organizations will be motivated in the new year to brush up on security and install updates for commonly exploited security vulnerabilities in their edge devices.”

From the cybersecurity vulnerabilities and breaches front,

  • CISA added eleven known exploited vulnerabilities to its catalog this week.
  • Supplemental Information on the additional KEVs.
    • Bleeping Computer provides background on the February 4 additions.
    • This Linux Security article explains the February 5 addition.
    • ACA Global explains the 7-Zip (a file compression) tool addition on February 6.
    • WNE Security explains the Dante Discovery addition also on February 6.
    • Bleeping Computer discusses the Microsoft Outlook addition also on February 6.
    • Hacker News delves into the Trimble Cityworks addition on February 7.
  • Cybersecurity Dive points out,
    • “Microsoft has identified more than 3,000 publicly exposed ASP.NET machine keys that could be used by threat actors in code injection attacks against enterprise servers.
    • “In a blog post Thursday, Microsoft Threat Intelligence said it observed “limited activity” in December, in which a threat actor used a publicly available ASP.NET machine key to inject malicious code and deploy the Godzilla post-exploitation framework. While Microsoft said the threat actor is “unattributed,” the U.S. government previously has tied the Godzilla framework, which creates malicious web shells that can be used as backdoors, to Chinese state-sponsored threat actor.
    • “In the course of investigating, remediating, and building protections against this activity, we observed an insecure practice whereby developers have incorporated various publicly disclosed ASP.NET machine keys from publicly accessible resources, such as code documentation and repositories, which threat actors have used to perform malicious actions on target servers,” Microsoft said in the blog post.”
  • and
    • “Security researchers warned about a surge in web login brute force attacks against edge devices from a suspected botnet since mid-to-late January, according to a post on X from the Shadowserver Foundation. 
    • “The threat activity targeted devices from several major vendors, including Palo Alto Networks, SonicWall and Ivanti, with more than 2.8 million source IPs per day, according to Shadowserver. The observed threat activity goes well beyond scanning and involves actual login attempts, researchers said.
    • “We do not know who is being targeted in particular, we can only observe attacks against our own honeypots,” Piotr Kijewski, CEO of Shadowserver, said via email.
  • Dark Reading reports
    • More than two weeks after China’s DeepSeek garnered worldwide attention with its low-cost AI model, threat actors have been busy capitalizing on the news by setting up phishing sites impersonating the company.
    • The fraudulent sites aim to deceive users into downloading malicious software or providing credentials and other sensitive information. Researchers at Israel-based Memcyco spotted at least 16 such sites actively impersonating DeepSeek earlier this week and believe the activity represents a coordinated attack campaign among threat actors.
  • Per SC Media,
    • “Infostealers were identified as the largest group of new macOS malware, having increased by 101% in the last two quarters of 2024, according to the Palo Alto Networks Unit42 research group.
    • “The Unit42 research team pointed to three prevalent macOS infostealers in the wild: Poseidon, Atomic and Cthulhu.
    • “While infostealers are often seen as limited in capability compared with trojans, the researchers said in a Feb. 4 blog post that by exfiltrating sensitive credentials, financial records and intellectual property, infostealers often lead to data breaches, financial losses and reputational damage.
    • “Most infostealers are indiscriminate, aiming to maximize data collection for impact and monetization,” wrote the researchers. “This broad range of information stealing capabilities exposes organizations to significant risks, including data leaks and providing initial access for further attacks, such as ransomware deployment.”

From the ransomware front,

  • Cyberscoop informs us,
    • “Ransomware payments saw a dramatic 35% drop last year compared to 2023, even as the overall frequency of ransomware attacks increased, according to a new report released by blockchain analysis firm Chainalysis
    • “The considerable decline in extortion payments is somewhat surprising, given that other cybersecurity firms have claimed that 2024 saw the most ransomware activity to date. Chainalysis itself warned in its mid-year report that 2024’s activity was on pace to reach new heights, but attacks in the second half of the year tailed off.
    • “The total amount in payments that Chainalysis tracked in 2024 was $812.55 million, down from 2023’s mark of $1.25 billion.
    • “Despite its small half-over-half (HoH) increase, we expected 2024 to surpass 2023’s totals by the end of the year,” the company wrote on its website. “Fortunately, however, payment activity slowed after July 2024 by approximately 34.9%. This slowdown is similar to the HoH decline in ransom payments since 2021 and the overall decline during H2 2024 in some types of crypto-related crime, such as stolen funds. Notably, the decline this year is more pronounced than in the last three years.”
    • “The disruption of major ransomware groups, such as LockBit and ALPHV/BlackCat, were key to the reduction in ransomware payments. Operations spearheaded by agencies like the United Kingdom’s National Crime Agency (NCA) and the Federal Bureau of Investigation (FBI) caused significant declines in LockBit activity, while ALPHV/BlackCat essentially rug-pulled its affiliates and disappeared after its attack on Change Healthcare. 
    • “As the industry has seen in past years, ransomware groups often fill the market after the heads of the pack have been dismantled by law enforcement. However, when LockBit and BlackCat disappeared, a well-known ransomware group did not immediately take the mantle. Instead, smaller groups took advantage of the situation, focusing on small to medium-sized targets and asking for small ransoms, according to Chainalysis’ report. 
    • “Additionally, the company says more organizations have become stronger against attacks, with many choosing not to pay a ransom and instead using better cybersecurity practices and backups to recover from these incidents.”
  • Per Bleeping Computer
    • “The North Korean hacking group known as Kimsuky was observed in recent attacks using a custom-built RDP Wrapper and proxy tools to directly access infected machines.
    • “This is a sign of shifting tactics for Kimsuky, according to AhnLab SEcurity Intelligence Center (ASEC), who discovered the campaign.
    • “ASEC says the North Korean hackers now use a diverse set of customized remote access tools instead of relying solely on noisy backdoors like PebbleDash, which is still used.”

From the cybersecurity defenses and business / history front

  • ISACA has released its 2025 State of Privacy Report.
  • Here’s a link to Dark Reading’s CISO Corner.
  • Cybersecurity Dive relates,
    • “Thoma Bravo-backed cybersecurity firm Sophos completed its acquisition of Secureworks Monday in an all-cash transaction valued at $859 million. 
    • “Sophos said the purchase of Secureworks positions Sophos as the largest pure-play provider of managed detection and response services, with a customer base of 28,000 organizations worldwide.
    • “The agreement also expands Sophos’s threat intelligence capabilities operating under the Sophos X-Ops name, with the addition of the Secureworks Counter Threat Unit and other security operations and advisory services.”
  • and
    • “SolarWinds Corp. has agreed to a $4.4 billion deal with Turn/River Capital whereby the private equity firm buys the software firm in an all-cash transaction at $18.50 per share. 
    • “The observability and IT management software provider will become a privately held company and no longer trade on the New York Stock Exchange. 
    • “We have built a great track record of helping customers accelerate business transformations through simple, powerful, secure solutions designed for hybrid and multicloud environments,” Sudhakar Ramakrishna, president and CEO of SolarWinds said in a statement. 
    • “The Austin, Texas-based firm took center stage in one of the most consequential cyberattack campaigns in history when state-linked hackers infected its Orion platform. The attack, disclosed in late 2020, led to massive reforms in how the industry developed software and attempted to secure IT systems against increasingly sophisticated state actors.”

Cybersecurity Saturday

From the cybersecurity policy and law enforcement front,

  • Cyberscoop reports,
    • “A bipartisan pair of House lawmakers are seeking to improve private-public coordination for financial institutions amid a surge of ransomware attacks on the sector.
    • “The Public and Private Sector Ransomware Response Coordination Act, introduced this week by Reps. Zach Nunn, R-Iowa, and Josh Gottheimer, D-N.J., would direct the Treasury secretary to deliver a report on existing collaboration between federal agencies and private financial companies, examining how those partnerships can be improved to better protect the industry from cyberattacks.
    • “The legislation from Nunn and Gottheimer, both members of the House Financial Services Committee, comes as global ransomware attacks jumped 67% from 2023 to 2024, according to the director of national intelligence. And according to Statista, approximately 65% of financial institutions globally reported experiencing a ransomware attack in 2024, up from 34% in 2021.”
  • Per a House of Representatives announcement,
    • On Wednesday, February 5, 2025, the Committee on Homeland Security will hold a hearing entitled, “Preparing the Pipeline: Examining the State of America’s Cyber Workforce.”
    • The Committee will meet at 10:00 a.m. EST in 310 Cannon House Office Building. Witnesses will be by invitation only.
    • This event will be streamed live at homeland.house.gov and on YouTube.
  • Cyberscoop adds
    • “The Federal Bureau of Investigation, along with several other international law enforcement departments, has seized control of several high-profile online platforms linked to cybercrime in a sweeping operation aimed at disrupting digital marketplaces for stolen credentials and hacking tools. The domains of forums Cracked[.]io and Nulled[.]to now redirect to FBI-controlled servers, signaling efforts to dismantle infrastructure that supports cybercriminal activity.
    • “As of Wednesday, visitors to the forums — long criticized as hubs for password theft, software piracy, and credential-stuffing attacks — encountered DNS error messages indicating federal intervention. Eagle-eyed cybersecurity researchers discovered Wednesday that the specialized servers that translate IP addresses into domain names redirected visitors to FBI-owned assets, effectively shutting down access. 
    • “Also seized were domains and services belonging to SellIX, which enabled users to create storefronts for illicit goods, and StarkRDP, a Windows remote desktop hosting service, which was allegedly leveraged by threat actors to anonymize attacks.
    • “According to the image on the Cracked and Nulled websites, law enforcement from Australia, France, Germany, Greece, Italy, Spain, and Romania were also involved. Europol also played a role, according to the image. 

From the cybersecurity vulnerabilities and breaches front,

  • Cyberscoop lets us know,
    • Cryptojacking, the tactic of breaking into a device to steal computing resources and mine crypto, is a pervasive, frustrating and expensive problem. But attacks like these can also raise cybersecurity concerns, especially when they happen to the federal government. 
    • Last fall, the U.S. Agency for International Development learned it was hit by a cryptojacking incident, according to documents viewed by Scoop News Group. The agency was notified by Microsoft that a global administrator account located in a test environment had been breached through a password spray attack — a brute force attempt to enter a system by guessing a series of passwords. 
    • That account was then used to create another account — and both were then deployed to begin crypto-mining processes through USAID’s Azure resources. The result was around half a million dollars in cloud service charges to the agency.
    • Using government resources to break into an agency’s resources for the purpose of mining crypto might sound strange, but it happens. 
  • Per Cybersecurity Dive,
    • “The Food and Drug Administration has released a safety communication about the cybersecurity vulnerabilities of certain patient monitors from Contec and Epsimed.
    • “The notice, which the FDA published Thursday [January 30], describes three vulnerabilities that can allow people to gain access to remote monitoring technology and potentially manipulate the devices.
    • ‘The FDA is not aware of cybersecurity incidents, injuries or deaths linked to the vulnerabilities but is advising patients, healthcare providers and IT staff to take steps to mitigate the risks.”
  • and
    • “Threat actors are exploiting a zero-day vulnerability in Zyxel CPE Series devices months after the security flaw was originally reported to the company, researchers at GreyNoise disclosed in a blog post Tuesday.
    • “The critical command-injection vulnerability, tracked as CVE-2024-40891, allows an attacker to execute arbitrary commands on a CPE Series device, which can lead to exfiltration of data, infiltration of a computer network or total system compromise. 
    • “Due to GreyNoise’s first-hand, confirmed mass exploitation attempts for this vulnerability, we chose to disclose this to raise awareness among those who may be impacted,” a spokesperson for GreyNoise said via email. “All decisions to move forward were made in conjunction with VulnCheck and its policies.”
  • Dark Reading informs us,
    • “Researchers have discovered two new ways to manipulate GitHub’s artificial intelligence (AI) coding assistant, Copilot, enabling the ability to bypass security restrictions and subscription fees, train malicious models, and more.
    • “The first trick involves embedding chat interactions inside of Copilot code, taking advantage of the AI’s instinct to be helpful in order to get it to produce malicious outputs. The second method focuses on rerouting Copilot through a proxy server in order to communicate directly with the OpenAI models it integrates with.
    • “Researchers from Apex deem these issues vulnerabilities. GitHub disagrees, characterizing them as “off-topic chat responses,” and an “abuse issue,” respectively. In response to an inquiry from Dark Reading, GitHub wrote, “We continue to improve on safety measures in place to prevent harmful and offensive outputs as part of our responsible AI development. Furthermore, we continue to invest in opportunities to prevent abuse, such as the one described in Issue 2, to ensure the intended use of our products.”
  • The Cybersecurity and Infrastructure Security Agency added one known exploited vulnerability to its catalog this week.
  • The CIS Center for Internet Security adds,
    • “Multiple vulnerabilities have been discovered in Apple products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged-on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
    • “THREAT INTELLIGENCE:
      • Apple is aware of a report that CVE-2025-24085 may have been actively exploited against versions of iOS before iOS 17.2.”

From the ransomware front,

  • Forbes reports,
    • “With LockBit already stating that Feb. 3 will see it restart operations, the threat is about as real as it gets. So, what do you need to do?
    • “The primary mitigations are:
      • Install updates for operating systems, software and firmware as soon as they are released.
      • Require phishing-resistant, non SMS-based multi-factor authentication.
    • “In the face of these challenges, businesses, governments, and individuals must stay vigilant and proactive,” Matt Hull, global head of threat intelligence at NCC Group, warned, and that’s good advice that you would be well-advised to action immediately before the ransomware threat becomes a reality for you.”
  • Dark Reading points out,
    • “Two healthcare institutions, Frederick [Maryland] Health and New York Blood Center Enterprises (NYBCe), are grappling with disruptions from separate ransomware attacks they faced this past week.
    • “Frederick Health posted an update to its website on Jan. 27 noting that it “recently identified a ransomware event” and is working to contain it with third-party cybersecurity experts to get its systems back online.
    • “Though most of its facilities remain open and are still providing patient care, Frederick Health reported that its Village Laboratory is closed and that patients may experience some operational delays.
    • “New York Blood Center Enterprises, a nonprofit made up of a collection of independent blood centers, first identified suspicious activity affecting its IT systems on Jan. 26. On Jan. 29, it alerted the public that it took its systems offline in an effort to contain the threat, which was attributed to a ransomware attack. NYBCe is working to restore its systems; however, it remains unclear when it will be fully operational again. The organization expects processing times for blood donations at its centers and offsite blood drives may take longer than usual.”
  • Bleeping Computer adds,
    • “Community Health Center (CHC), a leading Connecticut healthcare provider, is notifying over 1 million patients of a data breach that impacted their personal and health data.
    • “The non-profit organization provides primary medical, dental, and mental health services to more than 145,000 active patients.
    • “CHC said in a Thursday filing with Maine’s attorney general that unknown attackers gained access to its network in mid-October 2024, a breach discovered more than two months later, on January 2, 2025.
    • “While the threat actors stole files containing patients’ personal and health information belonging to 1,060,936 individuals, the healthcare organization says they didn’t encrypt any compromised systems and that the security breach didn’t impact its operations.”
  • Hackers News explains how Interlock Ransomware infects healthcare organizations.

From the cybersecurity defenses front,

  • Cyberscoop informs us
    • “Imagine, for a moment, that your network is hit with ransomware.
    • “One of your employees clicked on a malicious link and now your network is compromised, data is encrypted and most of the organization’s systems are locked or offline.
    • “Then imagine if instead of assembling an incident response team, notifying the board and contacting law enforcement, the forensic sensors in your device’s firmware spring to life. They begin healing your network, restoring locked files, and communicating with other systems to collect forensic data.
    • “The firmware then analyzes the data to identify how the attackers entered and exploited system weaknesses, then blocks those vulnerabilities to prevent future breaches through the same entry points. 
    • “While it sounds like science fiction, researchers at one of the Pentagon’s top cyber innovation hubs are attempting to prove the idea is more than a pipe dream.
    • “Red-C, a new project being rolled out by the Defense Advanced Research Projects Agency, seeks to build new defenses into bus-based computer systems, which are firmware-level systems used in everything from personal computers to weapons systems to vehicles.”
  • Cybersecurity Dive tells us,
    • “Organizations that have consolidated security spending into integrated platforms have experienced improved cyber resilience and stronger operational efficiencies, according to a study released Tuesday by IBM and Palo Alto Networks
    • “Managing security stacks has been a struggle for organizations, which juggle an average of 83 different security tools from 29 different vendors, according to the study.
    • “More importantly, the “platformization” model reduces the time it takes to identify and mitigate security incidents by an average of 74 days and 84 days, respectively, the study found.”
  • Per Dark Reading,
    • “When automated pen-testing tools appeared a few years ago they prompted an interesting question: How close are they to replacing human pen testers? While the short answer was “not that close — yet,” they definitely had potential and were worth keeping an eye on.
    • “As I’ve just had the chance to review the latest iteration of these tools, it’s interesting to see how they’ve evolved and how close are they now are to replacing the human pen tester for offensive security work.” * * *
    • “Overall, it’s good to see these tools evolve. The rate of change is glacial, but they now understand cloud environments and can target Web applications, though they are still temperamental, costly, and miss a few things. One could argue humans are the same. For now, however, humans maintain the advantage — but they aren’t mutually exclusive. Just like crowdsourced security and traditional pen testing, automated pen testing is now another tool that can be layered onto your offensive security testing, where it can help you find the exploits that matter to your organization.”
  • Here is a link to Dark Reading’s CISO Corner/

Cybersecurity Saturday

From the cybersecurity personnel front

  • Saturday morning, two term South Dakota Governor Kristi Noem received Senate confirmation of the President’s nomination of her to be Secretary of Homeland Security, which is the home of the Cybersecurity and Infrastructure Security Administration (CISA). The Senate vote was 59-34 in her favor.
  • Federal News Network reports in a January 24, article,
    • Greg Barbaccia seems to be the new federal chief information officer. Barbaccia updated his LinkedIn page just recently.
    • He replaces Clare Martorana, who was the federal CIO for the last three-plus years.
    • Emails to OMB and the White House seeking confirmation and comment was not immediately returned.
    • Barbaccia is a former Army intelligence sergeant and intelligence community analyst from 2003 to 2009. Since then, he’s worked in the private sector.
  • FedScoop lets us know in a January 22, 2025, article,
    • The Office of Personnel Management again has a new chief information officer. 
    • Greg Hogan will serve as CIO, an agency spokesperson confirmed to FedScoop on Wednesday [January 22]. His appointment comes roughly a week after Melvin Brown II took over that role following former CIO Guy Cavallo’s retirement from federal service. 

From the cybersecurity vulnerabilities and breaches front,

  • On January 16, 2025, HHS’s Health Sector Cybersecurity Coordination Center issued its report on December 2024 vulnerabilities of concern to the health sector.
  • MedCity News points out that “Cybersecurity Threats Continue to Rise for Healthcare Organizations, Research Shows. The vast majority of healthcare organizations have spotted a cyberattack and suffered financial consequences as a result in the past 12 months, according to new research. A separate report also found that overall cyberattacks on healthcare organizations have risen by 32% year-over-year.”
  • Cybersecurity Dive tells us,
    • “Conduent, a New Jersey-based government contractor that provides technology platforms to multiple social service agencies and transit systems across the U.S., confirmed Wednesday it was impacted by a cyberattack.
    • “The incident first became public after Wisconsin officials reported delays in child support payments. Wisconsin was one of four states impacted by the outage.
    • “A spokesperson for Conduent confirmed the disruption was due to a cyber incident, but did not elaborate on the details. Conduent did not provide any details about how the incident was initially discovered or a specific timeline about the response.”
  • and
    • “BeyondTrust determined 17 customers were impacted in a December attack spree related to the compromise of a Remote Support SaaS API key. 
    • “The attack, attributed to a state-linked threat actor, included the compromise of several offices of the U.S. Treasury Department, where hackers gained access to unclassified data. 
    • “BeyondTrust said it worked with its affected customers to support their respective investigations by providing them with artifacts, logs, indicators of compromise and other information.
  • and
    • “Hewlett Packard Enterprise said it is investigating claims a threat group gained access to a trove of sensitive company data. 
    • “The threat group, IntelBroker, posted a claim on BreachForums that it had access to a large trove of HPE data, according to researchers from Arctic Wolf. 
    • “The allegedly stolen data includes private GitHub repositories, Docker builds, source code and other information, according to the posting. 
    • “Upon learning of the claim Thursday [January 23], the company immediately activated cyber response protocols, disabled related credentials and launched an investigation to determine whether the claims were valid, a spokesperson said Tuesday via email. 
    • “There is no operational impact to our business at this time, nor evidence that customer information is involved,” the spokesperson said.”
  • The American Hospital Association informs us
    • “The Cybersecurity and Infrastructure Security Agency and FBI Jan. 22 released an advisory explaining how cyberthreat actors “chained” vulnerabilities — deploying multiple vulnerabilities in rapid succession — during attacks on certain versions of Ivanti Cloud Service Appliances in September. Threat actors used an administrative bypass, structured query language and remote code execution vulnerabilities during the attack. The agencies said the actors gained initial access, obtained credentials and implanted webshells on victim networks.
    • “These attacks serve as another reminder of the importance of patch management in defending networks,” said Scott Gee, AHA deputy national advisor of cybersecurity and risk. “Think of this as a thief using bolt cutters to get through a perimeter fence, using a pry bar to force the door to the building open, and then using a hammer to break the glass protecting the jewels they came to steal. The good news for network defenders in this instance regarding Ivanti is that each of these tools can be detected.”
    • “CISA and the FBI strongly encouraged network administrators to upgrade to the latest supported version of Ivanti CSA.
    • “Any hospitals still using outdated versions of Ivanti CSA should update their systems immediately,” Gee said. “If unable to remove the outdated version, network security teams should implement detections based on the indicators of compromise in the advisory and understand the risk posed by this vulnerable technology.”
  • Cyberscoop notes,
    • “Researchers at Black Lotus Labs have uncovered an operation where a back door is dropped onto enterprise-grade Juniper Networks routers and listens for specific network signals, known as “magic packets,” to execute malicious commands. 
    • “The campaign, which researchers at the cybersecurity wing of Lumen Technologies refer to as “J-Magic,” was active between mid-2023 and mid-2024. The malware uses a custom variant of the open-source backdoor ‘cd00r,’ which operates invisibly to lay the groundwork for a reverse shell attack. The malware scans for five different predefined parameters before activating. If any of these parameters or “magic packets” are received, the malware sends a confirmation request. Once confirmed, J-Magic establishes a reverse shell on the local file system, allowing operators to control the device, steal data, or deploy further malware.
    • “Although the specific method of transmission into these routers remains unclear, many targeted devices are configured as virtual private network (VPN) gateways. Lumen’s analysis found that approximately half of the routers affected during the campaign functioned as VPN gateways.  
    • “The strategic focus of J-Magic on routers underscores a level of stealth, given that routers are rarely monitored with security software. The malware specifically targets JunoOS, Juniper’s FreeBSD-based operating system.” 
  • Per Dark Reading,
    • Cisco has released a patch for a critical vulnerability found in its Cisco Meeting Management feature that could allow a remote, authenticated attacker to elevate themselves to administrator privileges on an affected device.
    • “Cisco Meeting Management is a management tool for Cisco’s on-premises meeting platform, Cisco Meeting Server. The management system allows users to monitor and manage meetings that are running on the platform through two user roles: the first is for administrators with full rein over the platform; and the second is for “video operators,” who only have access to the meetings and overview pages.
    • “The vulnerability, tracked as CVE-2025-20156 (CVSS score of 9.9), is located in the REST API and exists because “proper authorization” is not enforced on REST API users. Should an attacker send specially crafted API requests to a specific endpoint, they could exploit the vulnerability and allow an attacker to gain administrator-level control over edge nodes managed by Cisco Meeting Management.
    • “This poses a risk to businesses, as a threat actor with video operator access on the platform could exploit this vulnerability to give themselves administrator privileges, allowing them the ability to change configurations, add users, and more, according to the advisory.”
  • Per Bleeping Computer,
    • “SonicWall is warning about a pre-authentication deserialization vulnerability in SonicWall SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC), with reports that it has been exploited as a zero-day in attacks.
    • “The flaw, tracked as CVE-2025-23006 and rated critical (CVSS v3 score: 9.8), could allow remote unauthenticated attackers to execute arbitrary OS commands under specific conditions.
    • “The vulnerability affects all firmware versions of the SMA100 appliance up to 12.4.3-02804 (platform-hotfix). * * *
    • “We strongly advise users of the SMA1000 product to upgrade to the hotfix release version to address the vulnerability.”
    • “Microsoft’s Threat Intelligence Center discovered the flaw, so more details about the exploitation activity and when it started might be shared by Microsoft at a later date.”
  • The Hacker News adds,
    • “The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday placed a now-patched security flaw impacting the popular jQuery JavaScript library to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.
    • “The medium-severity vulnerability is CVE-2020-11023 (CVSS score: 6.1/6.9), a nearly five-year-old cross-site scripting (XSS) bug that could be exploited to achieve arbitrary code execution.
    • “Passing HTML containing <option> elements from untrusted sources – even after sanitizing them – to one of jQuery’s DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code,” according to a GitHub advisory released for the flaw.
  • Plus we learn friom Cyberscoop,
    • A critical security flaw has been identified and potentially exploited in SonicWall’s Secure Mobile Access (SMA) 1000 series appliances, sparking significant concern among cybersecurity experts and users worldwide. 
    • The vulnerability, registered as CVE-2025-23006, allows remote, unauthenticated attackers to execute arbitrary operating system commands under certain conditions. The issue specifically impacts the Appliance Management Console (AMC) and Central Management Console (CMC) used widely in enterprise and government networks for administrative functions.
    • SonicWall issued a warning Wednesday [January 22, 2025] saying the flaw has a severity rating of 9.8 out of 10 by the Common Vulnerability Scoring System (CVSS) and may have been exploited by malicious actors. Microsoft’s Threat Intelligence Center is credited with uncovering the flaw, although it remains unclear when the exploitation might have commenced. Despite this, SonicWall’s advisory urges all SMA1000 users to upgrade immediately to the patched software version to prevent potential security breaches.
    • SonicWall’s products provide secure remote access for a wide swath of organizations, often serving managed security service providers (MSSPs), enterprises, and government agencies.
  • Bleeping Computer relates,
    • “The FBI warned today [January 23] that North Korean IT workers are abusing their access to steal source code and extort U.S. companies that have been tricked into hiring them.
    • “The security service alerted public and private sector organizations in the United States and worldwide that North Korea’s IT army will facilitate cyber-criminal activities and demand ransoms not to leak online exfiltrated sensitive data stolen from their employers’ networks.
    • “North Korean IT workers have copied company code repositories, such as GitHub, to their own user profiles and personal cloud accounts. While not uncommon among software developers, this activity represents a large-scale risk of theft of company code,” the FBI said.

From the ransomware front,

  • Cyberscoop reports,
    • “Researchers at cybersecurity firm Sophos are tracking multiple clusters of hacking activity leveraging Microsoft 365 instances, Microsoft Teams and email bombing tactics to deliver ransomware.
    • “In new research released Tuesday [January 21], the company said it had identified at least two distinct clusters of hacking activity using the tactics to infect targets between November and December 2024.
    • “First, several individuals at an organization are inundated with emails — up to 3,000 in 45 minutes in some cases. The sheer volume of spam is designed to overwhelm the target’s inbox and “create a sense of urgency” that may push them to reach out to IT for assistance, the researchers said.
    • “Then, using an external account, the hackers will message one of the targets over Microsoft Teams, posing as the organization’s IT support or a “Help Desk Manager.” Under the guise of assistance, the actors push the victim to permit a remote screen control session through Teams or Microsoft Quick Assist, which is then used to create command shells, access an external Sharepoint file and deploy malware on the victim’s device.
    • “With a command-and-control channel established, the attackers then use the target’s credentials to disable multifactor authentication and antivirus protections, connect to other hosts on the network and move laterally to compromise other systems.”
  • Cybersecurity News lets us know,
    • “New ransomware strains are quietly infiltrating VMware ESXi hosts by setting up SSH tunnels and concealing malicious traffic within legitimate activity.
    • “This stealth tactic allows attackers to access critical virtual machine environments without triggering many of the standard alarms or detection systems that monitor more conventional network paths.
    • “Because ESXi appliances often remain unmonitored, cybercriminals have seized the opportunity to hide in plain sight, exfiltrate data, and lock down virtual machines with minimal interference.
    • “Virtualized infrastructures are attractive targets for ransomware actors due to the high value of virtual machines and the rapid damage attackers can inflict if they seize control.
    • “Instead of compromising each guest system individually, criminals can focus on the ESXi host itself, enabling them to encrypt all virtual disks in one coordinated attack.”
  • Per the SentinelOne blog,
    • “The previous six months have seen heightened activity around new and emerging ransomware operations. Across the tail-end of 2024 and into 2025, we have seen the rise of groups such as FunkSec, Nitrogen and Termite. In addition, we have seen the return of Cl0p and a new version of LockBit (aka LockBit 4.0).
    • “Within this period of accelerated activity, the Ransomware-as-a-Service offerings HellCat and Morpheus have gained additional momentum and notoriety. Operators behind HellCat, in particular, have been vocal in their efforts to establish the RaaS as a ‘reputable’ brand and service within the crimeware economy.
    • “As a result of this recent activity, we analyzed payloads from both HellCat and Morpheus ransomware operations. In this post, we discuss how affiliates across both operations are compiling payloads that contain almost identical code. We take a high-level look at two samples in particular and examine their characteristics and behavior.” Check it out.

From the cybersecurity defenses front,

  • CISA advises,
    • “If you’re an IT defender or a vulnerability management pro, CISA’s Vulnrichment project can make your life easier. It enriches basic CVE data with actionable insights like Stakeholder-Specific Vulnerability Categorization (SSVC) decision points, Common Weakness Enumeration (CWE) IDs, and Common Vulnerability Scoring System (CVSS), all bundled into the CVE records you’re already pulling. Think of it as a turbocharged upgrade to the CVE data you’re already consuming. Best part? You don’t need to set up anything new—this enriched data is automatically baked into the CVE feeds you’re already using.
    • You’re soaking in it! Today, all Vulnrichment data ends up in the Authorized Data Publisher (ADP) container for individual CVEs, so if you’re pulling CVE data from https://cve.org via the API, or from GitHub at https://github.com/CVEProject/cvelistV5 ,  you’re already collecting Vulnrichment data. It’s just a matter of parsing it out.”
  • Check out Dark Reading for an article about MITRE’s Latest ATT&CK Simulations Tackle Cloud Defenses. The MITRE framework’s applied exercise provides defenders with critical feedback about how to detect and defend against common, but sophisticated, attacks.”
  • Security Week discusses attack surface management.
    • “The attack surface of an organization represents all of the assets (physical, virtual or human) that a malicious actor can potentially use to breach an organization,” says Alex Hoff, co-founder and chief strategy officer at Auvik Networks.
    • “Traditionally,” continues Raj Samani, SVP and chief scientist at Rapid7, “the focus of attack surface management has been on securing the broader attack surface – but the emphasis is now on preventing the exploitation of assets within increasingly complex environments.”
    • “While we have traditionally considered the Attack Surface to be a part of the overall IT infrastructure that can be treated and managed discretely, our view now is that the AS includes anything and everything a threat actor can target for exploitation.” 
  • Per Beckers Health IT,
    • “Global IT spending is expected to grow 9.8% in 2025, to $5.6 trillion, with much of that increase going to price hikes, according to Gartner.
    • “And while CIOs’ expectations for generative AI are on the wane — what the IT consultant called a “trough of disillusionment” — their spending on the technology will continue to rise, Gartner predicted. Those hardware upgrades will drive double-digit growth in data center systems, devices and software this year.”
  • Here is a link to Dark Reading’s CISO Corner.

Cybersecurity Saturday

From the cybersecurity policy and law enforcement front,

  • Federal News Network tells us,
    • “President-elect Donald Trump’s pick to lead the Department of Homeland Security is signaling potential changes at the Cybersecurity and Infrastructure Security Agency.
    • “South Dakota Gov. Kristi Noem, nominated by Trump to serve as homeland security secretary, testified before the Senate Homeland Security and Governmental Affairs Committee on Friday. She fielded a range of questions, largely on border security and immigration enforcement.
    • “On the cybersecurity front, Noem in her opening statement said she would prioritize a “comprehensive, whole-of-government approach to cybersecurity,” without offering further specifics.
    • “I fully acknowledge that people in Washington, DC do not have all of the answers, and therefore I will leverage private, public partnerships,” Noem added as part of her opening statement. “I will advance cutting edge state of the art technologies to protect our nation’s digital landscape.”
  • Cybersecurity Dive lets us know,
    • “The White House rolled out a highly anticipated executive order on Thursday [January 16, 2025] to combat a rising level of sophisticated attacks targeting U.S. government agencies, critical infrastructure providers and high-profile individuals by state-linked threat groups and other malign actors. 
    • “The executive order will give the U.S. more authority to level sanctions against malicious actors that have disrupted hospitals and other critical providers. 
    • “Federal authorities also plan to leverage the government’s $100 billion in annual IT spending to make sure technology companies develop more secure software.” * * *
    • To help increase security in the public and private sector, the executive order aims to: 
      • Give the U.S. more authority to level sanctions against hackers that have critical providers, including hospitals. 
      • Require software vendors doing business with the federal government to prove they are using secure development practices. The federal government plans to validate that evidence and publish the information to help private sector buyers make informed decisions on secure software. 
      • The National Institute for Standards and Technology will develop guidance on how to deploy software updates in a secure and reliable manner. 
      • The General Services Administration will develop guidance on how cloud customers can securely use these products.  
      • Identify minimum cybersecurity standards for companies working with the federal government. Bureaucracy and cybersecurity requirements for using federal information systems will be streamlined for three years. 
      • Federal authorities will begin research into AI-based tools to search for software vulnerabilities, manage patching and detect threats. A public-private partnership will be developed to use AI to protect critical infrastructure in the energy sector. 
      • The U.S. will only buy internet-connected devices that meet Cyber Trust Mark standards starting in 2027.   
  • Cyberscoop adds,
    • “A sweeping executive order on cybersecurity released Thursday won largely positive reviews, with the main question being its timing — and what will come of it with the executive branch set to be handed over from president to president.”
  • NextGov/FCW informs us,
    • The Office of Personnel Management did not take long nor have to look too far to find its next chief information officer.
    • Melvin Brown II, who previously served as OPM’s deputy chief information officer, was named OPM’s chief information officer this week, according to a LinkedIn post he published Sunday January 12, 2025.
  • Cyberscoop relates,
    • “The Department of the Treasury has sanctioned a Chinese national and a cybersecurity company based in Sichuan, China, for taking part in the Salt Typhoon hacking campaign that has swept up data from at least nine U.S. telecommunications companies.
    • “The department’s Office of Foreign Assets Control (OFAC) named Yin Kecheng of Shanghai and the Sichuan Juxinhe Network Technology Co. Ltd., as entities that had “direct involvement” in the Salt Typhoon campaign. Kecheng is described as an affiliate of the Chinese Ministry of State Security with over a decade of hacking experience.
    • “Kecheng is also alleged to have been involved in a recent hack of the Treasury Department.”
  • Per HHS news releases,
    • “[On January 14, 2025,] the U.S. Department of Health and Human Services (HHS), Office for Civil Rights (OCR) announced a settlement with Solara Medical Supplies, LLC (Solara), a supplier and direct-to-patient distributor of continuous glucose monitors, insulin pumps, and other supplies to patients with diabetes, concerning potential violations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Security Rule and Breach Notification Rule following a [2019] breach of electronic protected health information (ePHI) caused by a phishing incident.” * * *
    • “In November 2019, OCR received a breach report concerning a phishing attack in which an unauthorized third party gained access to eight of Solara’s employees’ email accounts between April and June 2019, resulting in the breach of 114,007 individuals’ ePHI. In January 2020, OCR received notification of a second breach, when Solara reported that it had sent 1,531 breach notification letters to the wrong mailing addresses. OCR’s investigation determined that Solara failed to conduct a compliant risk analysis to identify the potential risks and vulnerabilities to ePHI in Solara’s systems; failed to implement security measures sufficient to reduce the risks and vulnerabilities to ePHI to a reasonable and appropriate level; and failed to provide timely breach notification to individuals, HHS, and the media.
    • “Under the terms of the resolution agreement, Solara agreed to implement a corrective action plan that will be monitored by OCR for two years and pay $3,000,000 to OCR.” * * *
    • “The resolution agreement and corrective action plan may be found here.”
  • and
    • “[On January 15, 2025,] the U.S. Department of Health and Human Services (HHS), Office for Civil Rights (OCR) announced a settlement with Northeast Surgical Group, P.C. (NESG), a provider of surgical services in Michigan, for a potential violation under the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Security Rule.” * * *
    • “In March 2023, OCR received a breach report concerning a ransomware incident that had affected NESG’s information system. NESG concluded that the protected health information of 15,298 patients had been encrypted and exfiltrated from its network. OCR’s investigation determined that NESG had failed to conduct a compliant risk analysis to determine the potential risks and vulnerabilities to ePHI in NESG’s systems.
    • “Under the terms of the resolution agreement, NESG agreed to implement a corrective action plan that OCR will monitor for two years and paid $10,000 to OCR.: * * *
    • “The resolution agreement and corrective action plan may be found here.”

From the cybersecurity vulnerabilities and breaches front,

  • Per Cybersecurity Dive,
    • “The Cybersecurity and Infrastructure Security Agency spotted Salt Typhoon on federal networks before defenders discovered the China-sponsored threat group intruded into U.S. telecom systems, Director Jen Easterly said Wednesday.
    • “CISA’s sleuthing “enabled law enforcement to unravel and ask for process on virtual private servers,” Easterly said during an onstage interview at the Foundation for Defense of Democracies. Details gathered from that investigation and response allowed CISA to discover Salt Typhoon and its activities, Easterly said.” * * *
    • “CISA’s observations didn’t prevent Salt Typhoon from attacking the telecom networks en masse, but Easterly presented the agency’s threat hunting and intelligence gathering capabilities as an example of intra-government and public-private collaboration improvements made under her stewardship of the agency.
    • “Easterly is scheduled to step down as CISA director when the President-elect Donald Trump takes office next week.”
  • and
    • Threat hunters are scrambling to determine the scope of damage and potential impact from a critical zero-day vulnerability that impacts a trio of Ivanti products, including Ivanti Connect Secure VPN appliances.
    • Shadowserver scans identified more than 900 unpatched Ivanti Connect Secure instances on Sunday [January 12, 2025] and said the devices are likely vulnerable to exploitation. The amount of unpatched and vulnerable instances found by Shadowserver scans is down from more than 2,000 on Thursday [January 9, 2025].
    • The nonprofit, which analyzes and shares malicious activity with more than 200 national computer security incident response teams covering 175 countries, was asked not to disclose how it knows these instances are unpatched, but has yet to receive any false positive feedback, Shadowserver CEO Piotr Kijewski told Cybersecurity Dive via email on Friday.
    • Researchers are especially concerned about widespread exploitation of the zero-day because of previous cyberattacks linked to software defects in Ivanti products.
  • CISA added seven more known exploited vulnerabilities to its catalog this week.
  • More details from
  • Cybersecurity Dive
    • “The Cybersecurity and Infrastructure Security Agency added a command injection vulnerability in BeyondTrust Remote Support and Privileged Access Products to its catalog of known exploited vulnerabilities on Monday [January 13, 2025]. 
    • “The medium-severity flaw, listed as CVE-2024-12686, allows an attacker with administrative privileges to inject commands into a computer network and run as if they are a site user. The vulnerability has a CVSS score of 6.6. 
    • “The CVE is the second vulnerability disclosed by BeyondTrust during its investigation into an attack spree in December. The attacker reset the passwords of numerous accounts after compromising a Remote Support SaaS API key. A limited number of RemoteSupport SaaS customers were impacted by the attacks.” 
  • CSO Online
    • Fortinet has confirmed the existence of a critical authentication bypass vulnerability in specific versions of FortiOS firewalls and FortiProxy secure web gateways. The flaw has been exploited in the wild since early December in what appears to be an indiscriminate and widespread campaign, according to cybersecurity firm Arctic Wolf.
    • The fix for this zero-day is part of a bigger patch cycle by Fortinet, which released updates for 29 vulnerabilities across multiple products, 14 of which impact FortiOS, the operating system used in Fortinet’s FortiGate firewalls. Some of the flaws impact multiple products that share the same code, which is the case for the zero-day now tracked as CVE-2024-55591.
    • Although Fortinet does not credit Arctic Wolf with discovering the vulnerability, the indicators of compromise listed in the advisory match the analysis of the attack campaign Arctic Wolf warned about in December and documented in more detail on Friday.
  • Security Week
    • “The software giant [Microsoft] on Tuesday called urgent attention to three separate flaws in the Windows Hyper-V NT Kernel Integration Virtualization Service Provider (VSP) and warned that malicious attackers are already launching privilege escalation exploits.
    • “An attacker who successfully exploited this vulnerability could gain SYSTEM privileges,” Microsoft said in a series of barebones advisories.
    • “As is customary, the company did not release technical details or IOCs (indicators of compromise) to help defenders hunt for signs of compromise.
    • “The three exploited zero-days — CVE-2025-21334CVE-2025-21333 and CVE-2025-21335 — affect the Windows Hyper-V NT Kernel Integration Virtualization Service Provider (VSP) that handles efficient resource management and communication between the host system and guest virtual machines (VMs).” 
  • and
    • Threat actors are exploiting a critical-severity remote code execution (RCE) vulnerability in Aviatrix Controller to deploy malware, cybersecurity firm Wiz reports.
    • The issue, tracked as CVE-2024-50603 (CVSS score of 10/10), exists because user-supplied input is not properly neutralized, allowing unauthenticated, remote attackers to inject arbitrary code that is executed with high privileges on the Aviatrix cloud networking platform.
    • The solution is designed to help organizations manage and secure their cloud infrastructure across multiple providers from a single place.
    • Impacting certain endpoints within the Aviatrix Controller’s API, which is implemented in PHP, the vulnerability was patched in December, but technical information on it was only published last week.

From the ransomware front,

  • Cybersecurity Dive reports on January 17, 2025,
    • Blue Yonder said it is investigating a threat after Clop listed the supply chain management company among nearly 60 companies the ransomware group claims it hacked. The attacks were linked to exploited vulnerabilities in Cleo file-transfer software, according to researchers from Zscaler and Huntress. 
    • A spokesperson for Blue Yonder on Friday confirmed the company uses Cleo to manage certain file transfers. Once the zero-day was confirmed, Blue Yonder said it immediately took steps to mitigate the threat.
    • “Like many Cleo Harmony customers across the globe, we are currently investigating any potential impact of this matter on our business and we continue to update our customers as we have additional information,” the spokesperson told Cybersecurity Dive via email.”
  • CISO Online alerts us on January 13, 2025,
    • CISOs are being warned to make sure employees take extra steps to protect their AWS access keys after word that a threat actor is using stolen login passwords for ransomware attacks.
    • The target is Amazon S3 buckets and the attack uses AWS’ own encryption to make data virtually unrecoverable without paying the attackers for a decryption key, said a report by researchers at Halcyon Tech.
    • “Unlike traditional ransomware that encrypts files locally or in transit, this attack integrates directly with AWS’s secure encryption infrastructure,” the report notes. “Once encrypted, recovery is impossible without the attacker’s key.” * * *
    • “There are, however, a few things AWS customers’ IT administrators can do:
      • “use the Condition element in IAM (identity and access management) policies to prevent the application of SSE-C to S3 buckets. Policies can be configured to restrict this feature to only authorized data and users;
      • “enable detailed logging for S3 operations to detect unusual activity, such as bulk encryption or lifecycle policy changes;
      • “regularly review permissions for all AWS keys to ensure they have the minimum required access;
      • ‘disable unused keys and rotate active ones frequently.
    • “In a statement accompanying the Halcyon report, AWS referred customers to this web page with information for administrators on how to deal with suspected unauthorized activity on their accounts.”
  • Per Industrial Cyber,
    • “The U.S. National Institute of Science and Technology (NIST) through its National Cybersecurity Center of Excellence (NCCoE) division published Monday draft Ransomware Community Profile reflects changes made to the Cybersecurity Framework (CSF) from CSF 1.1 to CSF 2.0 which identifies security objectives that support managing, detecting, responding to, and recovering from ransomware events. The NIST IR 8374 Rev. 1 (draft) comes as the agency is currently considering a more comprehensive revision to the profile to reflect recent ransomware policy developments and incorporate the results of collaborative activities in the ransomware prevention and response space. 
    • “NIST is seeking feedback by March 14, 2025, on the revised draft of the risk management framework, which will guide the future of its ransomware prevention guidance. General comments on the draft are also encouraged. The agency is also looking for input on which elements of the Ransomware Community Profile have been beneficial. Suggestions for improvements to the Community Profile are also welcome.”

From the cybersecurity defense front,

  • Here are CISA news releases from the last week of the Biden administration:
    • “The Cybersecurity and Infrastructure Security Agency (CISA) published today [January 14, 2025] the Joint Cyber Defense Collaborative (JCDC) Artificial Intelligence (AI) Cybersecurity Collaboration Playbook. Developed alongside federal, international, and private-sector partners through JCDC, this playbook provides the AI community—including AI providers, developers, and adopters—with essential guidance on how to voluntarily share actionable incident information and it describes how proactive information sharing can enhance operational collaboration and improve resilience of AI systems.” 
    • “The Cybersecurity and Infrastructure Security Agency (CISA), in close coordination with the Office of Management and Budget (OMB), Office of the National Cyber Director (ONCD) and Microsoft, announces today [January 15, 2025] the release of Microsoft Expanded Cloud Log Implementation Playbook. This guidance helps public and private sector organizations using Microsoft Purview Audit (Standard) to operationalize newly available cloud logs to be an actionable part of their enterprise cybersecurity operations.”
    • CISA Director Jen Easterly’s final CISA blog post concerns “Strengthening America’s Resilience Against the PRC Cyber Threats.”
  • Here is a link to Dark Reading’s CISO Corner.

Cybersecurity Saturday

From the cybersecurity policy and law enforcement front,

  • Bloomberg alerts us,
    • “The Biden administration is racing to put out an executive order meant to shore up US cybersecurity in its dwindling days in office, according to four people familiar with the matter.
    • “The executive order, which has cleared some internal hurdles and is close to being published, incorporates lessons from a series of major breaches during the Biden administration, including the most recent Treasury Department hack attributed to China, according to people familiar with the matter who didn’t want to be named to discuss information that hasn’t yet been made public.
    • “Among the measures, it directs the government to implement “strong identity authentication and encryption” across communications, according to an undated draft of the order seen by Bloomberg News. In the December Treasury hack, intruders accessed unclassified documents stored locally on laptops and desktop computers. Encrypting information sent by email and worked on in the cloud could help safeguard it from hackers who successfully access systems but then cannot open specific documents.” * * *
    • “Whether President-elect Donald Trump will leave the executive order in place when he takes office remains unclear, though he’s vowed to pare back federal regulation. Trump has signaled that he intends to repeal another Biden administration order intended to provide guardrails around artificial intelligence.” 
  • Federal News Network provides more details on the draft EO for those interested.
  • Dark Reading reports,
    • “Yesterday [January 7, 2025] the White House introduced a cybersecurity labeling program for wireless Internet-connected devices, intended to help Americans make more informed decisions about the products they buy and their security.
    • “As Americans continue to add Internet of Things (IoT) devices to their home networks — everything from baby monitors to security cameras — there are growing concerns about the safety of these devices and their vulnerability to hackers. The goal of this label is to guide consumers to more secure products as well as encourage vendors in their cyber practices.
    • “Known as the “US Cyber Trust Mark,” the label has been a long time coming, with the Federal Communications Commission gathering input over the past 18 months. In a bipartisan and unanimous vote, the FCC authorized the program and said 11 vendors will act as label administrators while UL Solutions will serve as the lead administrator.
    • “The White House launched this bipartisan effort to educate American consumers and give them an easy way to assess the cybersecurity of such products, as well as incentivize companies to produce more cybersecure devices, much as EnergyStar labels did for energy efficiency,” the White House brief read.”
    • “Though this new system has good intentions for both consumers and vendors, there are concerns and speculation as to how effective this cybersecurity label will be.” Read the article for those details.
  • Here’s a link to the Federal Register version of the recent proposed HIPAA Security Rule amendments which appears in the January 6, 2025, issue. The public comment deadline is March 7, 2025.
  • Fedscoop tells us,
    • “Guy Cavallo, the chief information officer of the Office of Personnel Management since July 2021, will retire from federal service on Jan. 13, he confirmed to FedScoop.
    • “Cavallo leaves federal service having held several top technology roles over the past decade, including as deputy CIO of the Small Business Administration and executive director of IT operations at the Transportation Security Administration. He also served as OPM’s principal deputy CIO and acting CIO before being named permanent CIO.
    • “As the longest-tenured CIO of OPM in recent memory, Cavallo led that charge on a two-year sprint replacing or migrating over 50 applications from legacy on-premises data centers to the cloud and the launch of the new Postal Health Benefits System last year for more than 1.7 million postal workers and retirees. He touted the system as fully operational 100% of the time with no unscheduled downtime throughout the Open Season.
    • “Cavallo also led OPM to winning several Technology Modernization Fund awards in recent years, the most recent of which came in late 2024 to support the use of artificial intelligence to update legacy mainframe programs for OPM’s retirement systems.
  • The National Institute of Standards and Technology announced on January 8,
    • NIST extends the public comment period on the initial public draft (ipd) of NIST Special Publication (SP) 800-172r3 (Revision 3)Enhanced Security Requirements for Protecting Controlled Unclassified Information (CUI) until January 17, 2025. 
    • NIST strongly encourages you to use the comment template and submit comments to 800-171comments@list.nist.gov. Comments received in response to this request will be posted on the Protecting CUI project site after the due date. Submitters’ names and affiliations (when provided) will be included, while contact information will be removed.
    • For more information, see the NIST Protecting CUI Project.
  • Per HHS press releases,
  • and
    • [Also on January 7, 2025], the U.S. Department of Health and Human Services (HHS), Office for Civil Rights (OCR) announced a $90,000 settlement with Virtual Private Network Solutions, LLC (VPN Solutions), a Virginia business associate that provides data hosting and cloud services to covered entities (health plans, health care clearinghouses, and most health care providers) and business associates, for a potential violation under the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Security Rule. OCR enforces the HIPAA Privacy, Security, and Breach Notification Rules, which set forth the requirements that covered entities (health plans, health care clearinghouses, and most health care providers), and business associates must follow to protect the privacy and security of protected health information (PHI). The HIPAA Security Rule establishes national standards to protect and secure our health care system by requiring administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of electronic PHI (ePHI). The settlement resolves an investigation concerning a ransomware attack on VPN Solutions’ information system.” * * *
    • “The resolution agreement and corrective action plan may be found at: https://www.hhs.gov/hipaa/for-professionals/compliance-enforcement/agreements/vpns-ra-cap/index.html
  • Per Cyberscoop,
    • “Microsoft is petitioning a Virginia [federal] court to seize software and shut down internet infrastructure that they allege is being used by a group of foreign cybercriminals to bypass safety guidelines for generative AI systems.
    • “In a filing with the Eastern District Court of Virginia, Microsoft brought a lawsuit against ten individuals for using stolen credentials and custom software to break into computers running Microsoft’s Azure OpenAI services to generate “harmful content.”
    • “In a complaint filed Dec. 19, 2024, the company accuses the group of violating the Computer Fraud and Abuse Act, the Digital Millennium Copyright Act, the Lanham Act and the Racketeer Influence and Corrupt Organizations Act, as well as trespass to chattels and tortious interference under Virginia state law.”

From the cybersecurity reminiscences department,

  • “HHS OCR Director Melanie Fontes Rainer reflects on 2024 as a historic year filled with tremendous activities and accomplishments for OCR on Health Insurance Portability and Accountability Act of 1996 (HIPAA) rulemakings, enforcement actions, and resources for the health care sector on HIPAA privacy and cybersecurity.”
  • In Cyberscoop, “National Cyber Director Harry Coker looks back (and ahead) on the Cyber Director office. It’s made real strides, but there’s a lot more that it could be doing, he said, and more that needs to be done.”
  • In a blog post, Valeria Colman, the Cybersecurity and Infrastructure Security Agency’s (CISA) chief strategy officer, looks back at “CISA Through the Years: Policy and Impact.”

From the cybersecurity vulnerabilities and breaches front,

  • Cybersecurity Dive reports,
    • “AT&T and Verizon, two of the nine U.S. telecom companies attacked by Salt Typhoon, said they evicted the China-government sponsored threat group from their networks. 
    • “We detect no activity by nation-state actors in our networks at this time,” an AT&T spokesperson said in a prepared statement. A Verizon spokesperson made a similar statement, asserting the carrier has “contained the cyber incident brought on by this nation-state threat actor. An independent and highly respected cybersecurity firm has confirmed the Verizon containment.”
    • “AT&T and Verizon did not say when they ejected the nation-state group from their networks, but declared their networks secure last week.”
  • Dark Reading adds,
    • “The Chinese threat actor group known as “Silk Typhoon” has been linked to the December 2024 hack on an agency that’s part of the US Department of the Treasury.
    • “In the breach, the threat actors were able to use a stolen Remote Support SaaS API key through third-party cybersecurity vendor BeyondTrust to steal data from workstations in the Office of Foreign Assets Control (OFAC).
    • “Silk Typhoon, also known as Hafnium, is well known for hitting targets in education, healthcare, defense, and non-governmental organizations.
    • “Using tools such as the China Chopper Web shell, the group’s cyber-espionage campaigns focus mainly on data theft.” * * *
    • “The Cybersecurity and Infrastructure Security Agency (CISA) has since confirmed that these exploits are limited to just the agency, and there is no indication that any other federal agencies have been impacted by the incident.” 
  • Bleeping Computer lets us know,
    • BayMark Health Services, North America’s largest provider of substance use disorder (SUD) treatment and recovery services, is notifying an undisclosed number of patients that attackers stole their personal and health information in a September 2024 breach.
    • The Texas-based organization provides medication-assisted treatment (MAT) services targeting both substance use and mental health disorders to more than 75,000 patients daily in over 400 service sites across 35 U.S. states and three Canadian provinces.
    • In data breach notification letters mailed to affected individuals, BayMark revealed that it learned of the breach on October 11, 2024, following an IT systems disruption. A follow-up investigation revealed that the attackers accessed BayMark’s systems between September 24 and October 14.
  • Per Dark Reading,
    • Cybercriminals have picked up a new tactic, impersonating CrowdStrike recruiters in order to distribute a crypto miner on their victims’ devices.
    • This malicious campaign starts with an email, inviting the victim to schedule an interview with a recruiter for a position as a junior developer.
    • The illegitimate email contains a link, alleging that it will take the recipient to a site so they can schedule their interview, but in reality, takes the victim to a malicious website containing links to download a purported “CRM application.”
  • CISA reminds us,
    • “In an era of increasingly sophisticated cyber threats, securing critical infrastructure has become a cornerstone of national security. CISA’s mission is to drive collaborative, proactive efforts to reduce risk and strengthen resilience for our nation’s critical infrastructure, federal civilian branch assets, and the private sector more broadly. While these efforts are many and varied, I’d like to highlight three particularly transformative initiatives—the Known Exploited Vulnerabilities (KEV) Catalog, Cybersecurity Performance Goals (CPGs), and the Pre-Ransomware Notification Initiative (PRNI)—to illustrate how we can collectively work to reshape the cybersecurity landscape.”
  • SC Media offers details on the January 7, 2025, KVEs while Cybersecurity Dive discusses the January 8, 2025, KVE.

From the ransomware front,

  • Axios gives us a primer on ransomware.
  • Here’s a link to a helpful September 2024 CISA PowerPoint presentation about its available tools such as the Pre-Ransomware Notification Initiative.
  • Security Week discusses “Temple University’s Critical Infrastructure Ransomware Attacks (CIRA)” database.
    • “The Critical Infrastructure Ransomware Attacks (CIRA) database currently covers more than 2,000 attacks documented since 2013 and includes nearly 300 entries for incidents that came to light in 2024. 
    • “It contains information such as name of the victim, date of the incident, country or US state, targeted critical infrastructure sector, name of the attacking threat group, duration of the incident, MITRE ATT&CK mapping, and — if known — the amount of money that was demanded by the attacker and the ransom paid by the victim.” * * * 
    • “The database is available for free upon request. To date it has been requested more than 1,500 times, mainly by researchers and other members of the cybersecurity industry (61%), as well as students, government entities, educators, and reporters.” 

From the cybersecurity defenses front,

  • Cybersecurity Dive identifies four cybersecurity trends to watch this year.
    • Critical industries are up against never before seen challenges to remain secure and operational, while regulatory pressures have completely upended the role of the CISO in corporate America.
  • Dark Reading considers current trends in artificial intelligence and cybersecurity.
  • CISA Director Jen Easterly discusses “Corporate Cyber Governance: Owning Cyber Risk at the Board Level.”
  • CISA also released its “Cybersecurity Performance Goals Adoption Report.”
  • TechTarget shares “Top 15 email security best practices for 2025.”
  • Here is a link to Dark Reading’s CISO Corner.

Cybersecurity Saturday

From the retrospection front,

  • Bleeping Computer reflects on the fourteen “biggest cybersecurity and cyberattack stories of 2024.
  • Dark Reading queries “What Security Lessons Did We Learn in 2024?”

From the cybersecurity policy and law enforcement front.

  • Beckers Hospital Review highlights
    • “six things the proposed changes to HIPAA would require of [HIPAA covered entities and business associates:
      • 1. “Encrypt electronic protected health information “with limited exceptions.”
      • 2. “Implement multifactor authentication “with limited exceptions.”
      • 3. “Deploy antimalware software.
      • 4. “Establish written procedures to restore EHR systems and data within 72 hours of a cyberattack.
      • 5. “Notify certain regulators within 24 hours when an employee’s electronic access to EHR data or systems is changed or terminated.
      • 6. “Develop and revise an inventory and network map that illustrates the movement of EHR data through the organization’s systems at least once every 12 months.”
  • Dark Reading summarizes themes of the proposed HIPAA Security Rule amendments (some of which are overkill in the FEHBlog’s opinion) and notes
    • “The changes to the security rule will cost approximately $9 billion in the first year and $6 billion for years two to five, said Anne Neuberger, deputy national security adviser for cyber and emerging technology, during a Dec. 27 press briefing.
    • “The cost of not acting is not only high, it also endangers critical infrastructure and patient safety, and it carries other harmful consequences,” Neuberger said.
    • “Stakeholders have 60 days after the nearly 400-page proposal is published to submit comments (early March 2025). HHS will issue the final version of the rule afterward, although a specific date has not yet been set, followed by a compliance date of 180 days. It is also not clear whether work on the changes will continue under the new presidential administration. Even so, healthcare organizations should review proposed requirements and evaluate their existing security programs to prepare.”
  • Another Dark Reading article goes into more detail about proposed rule which is fitting for a “nearly 400-page proposal.”
  • Dark Reading also reports,
    • “A US Army soldier was reportedly arrested Dec. 20 in Texas and charged with two counts of unlawful transfer of confidential phone records.  
    • “Cameron John Wagenius, 20, is suspected of leaking presidential call logs belonging to AT&T and Verizon under an online alias of “Kiberphant0m.”

From the cybersecurity breaches and vulnerabilities front,

  • The Wall Street Journal reports,
    • “The Treasury Department told lawmakers Monday [December 30, 2024] that a state-sponsored actor in China hacked its systems, accessing several user workstations and certain unclassified documents.
    • “The Treasury was informed on Dec. 8 by a third-party software service provider, BeyondTrust, that a threat actor used a stolen key to remotely access certain workstations and unclassified documents, according to a letter reviewed by The Wall Street Journal.
    • “Once alerted, the department said it immediately contacted the Cybersecurity and Infrastructure Security Agency and has since worked with law enforcement partners across the government to assess the incident.
    • “The compromised BeyondTrust service has been taken offline and there is no evidence indicating the threat actor has continued access to Treasury systems or information,” a spokesperson said.
    • “In response, the Chinese embassy in Washington, D.C., denied the Treasury Department’s allegations, and said that its government opposes what it described as U.S. smear tactics without any factual basis.”
  • Per Cybersecurity Dive,
    • “Weeks after BeyondTrust disclosed an attack spree against a limited number of customers, more than 8,600 instances of the company’s Privileged Remote Access and Remote Support products remain exposed, according to a blog post released Thursday [January 2, 2025] by Censys
    • “BeyondTrust in December warned that an attacker gained access to a limited number of Remote Support SaaS instances utilizing a compromised API key. This week, the U.S. Department of Treasury said a suspected state-linked attacker gained access to a number of workstations and stole unclassified information using a BeyondTrust key.
    • “Censys researchers, in the Thursday [January 2, 2025] blog, indicated that not all of the exposed instances are considered vulnerable, because the firm does not have access to the versions involved.”
  • The Cybersecurity and Infrastructure Security Agency added one known exploited vulnerability its catalog this week.
  • Palo Alto Network offers details on this CVS at this link.
  • An ISACA commentator cautions “Overreliance on Automated Tooling is A Big Cybersecurity Mistake.”
  • A Dark Reading commentator warns,
    • “Despite never-ending data breaches and ransomware attacks, too many companies still rely on the outdated “trust but verify” cybersecurity strategy. This approach assumes that any user or device inside a company’s network can be trusted once it has been verified. The approach has clear weaknesses: Many businesses are putting themselves at additional risk by verifying once, then trusting forever.
    • “There was a time when “trust but verify” made sense, namely when networks were self-contained and well-defined. But at some point, perhaps due to the overwhelming volume of devices on a network, the number of patches needing to be applied, user demands, and resource constraints in the cybersecurity team, things began to slip. Initial verification meant the asset was trusted, but no additional verification ever took place.”

From the ransomware front,

  • Cybersecurity Dive lets us know,
    • “Rhode Island officials said a ransomware group has begun to leak stolen information from a state social services database following a December attack. 
    • “In a Monday [December 30, 2024] press conference, Rhode Island Gov. Daniel McKee said the state was informed by Deloitte, which manages the RIBridges program, that hackers had begun to release data on a dark web leak site. 
    • “The contents of those files are still being analyzed by experts,” McKeetold reporters during the briefing. “Identifying what is in those files is a complex process, but they’re working right now to make those identifications.”
    • “RIBridges is a state program that administers several social services programs, including Medicaid, Temporary Assistance for Needy Families and other programs.”  * * *
    • “A threat group called Brain Cipher previously claimed credit for the attack, which was disclosed Dec. 5. The group has been active since June 2024 and leverages the LockBit 3.0 payload for their ransomware payloads, SentinelOne previously told Cybersecurity Dive.
    • “The group often uses phishing campaigns to gain initial access to targeted organizations, thus tricking users into downloading malicious files, according to Jon Miller, co-founder and CEO of Halcyon. 
    • “Once inside, they leverage tools and exploits to move laterally across networks, frequently targeting Windows domain administrator credentials to maximize their reach,” Miller said via email.
    • “Researchers from Sophos confirmed Brain Cipher posted detailed information on a leak site claiming credit for the RIBridges database incident.”
  • Per Security Week,
    • “The Richmond University Medical Center in New York has been investigating a ransomware attack since May 2023 and it recently determined that the incident resulted in a data breach affecting more than 670,000 people. 
    • “The healthcare facility, which serves residents in Staten Island, New York, suffered significant disruptions in May 2023 after being targeted in a ransomware attack. It took the organization several weeks to restore impacted services.
    • “An initial forensic investigation showed that the hospital’s electronic health record systems were not compromised, but it was later determined that other files may have been accessed or exfiltrated from Richmond University Medical Center’s network in early May. 
    • “Once the investigation determined what files may have been accessed or removed from our network, we located a copy of each file and then undertook a manual review process of those files to determine whether they contained any sensitive personal information or personal health information,” the hospital said in a security incident notice.”
  • Healthcare IT News adds,
    • “Ransomware attacks are having a severe impact on U.S. healthcare organizations, with an alarming escalation in incidents and their consequences, according to a Comparitech report.
    • “The study found that, since 2018, 654 ransomware attacks have targeted healthcare providers, with 2023 standing out as a record-breaking year, logging 143 incidents.
    • “These attacks compromised over 88.7 million patient records during this period, with more than 26.2 million breached in 2023 alone.
    • “Each day of downtime due to ransomware costs healthcare organizations an average of $1.9 million, culminating in an estimated $21.9 billion in downtime losses over six years.
    • “On average, medical organizations experienced 17 days of downtime per incident, with the highest disruptions reported in 2022, averaging 27 days.”

From the cybersecurity defenses front,

  • A Dark Reading commentator explains how to get the most out of your cybersecurity insurance policy.
    • “As cyber threats continue to evolve, so must our approach to mitigating them. Bolster your cybersecurity posture in a holistic manner — self-assessing your risk profile, addressing vulnerabilities, and striving for continuous improvement — and you can better safeguard your organization against threats and control your cyber-insurance costs.
    • “Prepare for increasingly rigorous risk assessments from [insurance] providers moving forward. Underwriters now have access to extensive data about cyber threats and protections. Expect them to ask more granular questions and do deeper inspections into the efficacy of controls, especially those around identity-related risks, such as privileged access and credential theft. Anticipate their questions, and be prepared with comprehensive, up-to-date answers.
    • “Cyber insurance should augment your cybersecurity strategy, not replace it. Prioritize implementing robust, ongoing cyber practices that protect your organization.”
  • Cybersecurity Dive informs us,
    • “Most cyber leaders are bullish on generative AI despite governance concerns, according to a CrowdStrike survey published in December. Nearly two-thirds say their organization would overhaul tooling in order to leverage better generative AI capabilities. 
    • “Leaders expect generative AI adoption to bring ROI through cost optimization, easier tool management, reduced incidents and shorter training cycles, according to the survey of more than 1,000 cybersecurity leaders and practitioners. 
    • “Respondents said the leading concern when weighing a generative AI purchase is how applications or services integrate with current tools. Around 70% intend to purchase access to the technology in the next year.”
  • Dark Reading discusses “6 AI-Related Security Trends to Watch in 2025. AI tools will enable significant productivity and efficiency benefits for organizations in the coming year, but they also will exacerbate privacy, governance, and security risks.”
  • Here is a link to Dark Reading’s CISO Corner.

Cybersecurity Saturday

From the cybersecurity retrospection and predictions front as we approach New Year’s Day,

  • CSO lists the “top 7 zero-day exploitation trends of 2024,” and “IT leaders’ top 9 takeaways from 2024.”
  • Dark Reading points out “Emerging Threats & Vulnerabilities to Prepare for in 2025. From zero-day exploits to 5G network vulnerabilities, these are the threats that are expected to persist over the next 12 months.”
  • Federal News Network offers a “2024 review: ‘Typhoons’ bookend [the Change Healthcare breach in a] busy year in cyber. From Volt Typhoon to Salt Typhoon, major cyber incidents in 2024 shined a spotlight on how agencies are managing cyber threats to critical infrastructure.”
  • Healthcare Dive recounts “seven of the biggest healthcare cyberattack and breach stories of 2024 Cyberattacks targeting the healthcare industry continued to rise this year. Here are some of the largest incidents, from Change Healthcare to Ascension.”

From the cybersecurity policy front,

  • Yesterday the Health and Human Services Department’s Office for Civil Rights announced its proposed amendments to the HIPAA Security Rule which is intended to protect electronic personal health information. The public comment deadline is March 7, 2025, sixty days from January 6, 2025, the date that proposed rule will be published in the Federal Register.
  • Here is a link to the OCR’s fact sheet for the proposed rule. The HIPAA Security Rule dates back to 2003, and its hallmark was flexibility in implementation. To that end, the HIPAA Security rule set forth required standards and addressable standards. Because a lot has changed since 2003, I expected standard changes, but I did not expect OCR to do away with the required / addressable standard distinction in favor of exceptions. Like many other regulations issued by the current administration, the proposed amendments are loaded with new paperwork and oversight requirements. Hopefully the next administration will pull back the proposed rule so that the changes focus on requiring tools that are known to work, e.g., multi factor authentication, encryption, adequate backups.
  • Cybersecurity Dive lets us know,
    • “Lax security controls played a significant role in allowing a China-government sponsored threat group to gain broad and full access to U.S. telecom networks, a senior White House official said Friday.
    • “From what we’re seeing regarding the level of cybersecurity implemented across the telecom sectors, those networks are not as defensible as they need to be to defend against a well-resourced, capable, offensive cyber actor like China,” Anne Neuberger, deputy national security advisor for cyber and emerging technology, said during a Friday media briefing.
    • “Neuberger’s remarks came as the White House confirmed a ninth telecom company was among those compromised by Salt Typhoon’s widespread intrusion of U.S. telecom networks. The unnamed company recently determined it was impacted after reviewing threat hunting and hardening guidance provided by the U.S. government, Neuberger said.
    • “Earlier this month, U.S. officials said at least 8 U.S. telecom providers or infrastructure companies were compromised in a campaign that went undetected for months and has been underway for up to two years.”
  • Per Federal News Network,
    • “The DoD’s big cybersecurity program advanced earlier this month. It’s a big rule to carry out if it becomes effective. For what the rule means and what comes next in the Cybersecurity Maturity Model Certification Program, Deltek cybersecurity researcher Michael Greenman joined the Federal Drive with Tom Temin for details.”
    • The article offers a transcript of this interview

From the cybersecurity breaches, ransomware, and vulnerabilities front,

  • The Cybersecurity and Infrastructure Security Agency (CISA) added one known exploited vulnerability to its catalog this week.
  • Here is a link to a Security Affairs explanation of the vulnerability.
  • Bleeping Computer pointed out on December 24,
    • The Clop ransomware gang started to extort victims of its Cleo data theft attacks and announced on its dark web portal that 66 companies have 48 hours to respond to the demands.
    • The cybercriminals announced that they are contacting those companies directly to provide links to a secure chat channel for conducting ransom payment negotiations. They also provided email addresses where victims can reach out themselves.
    • In the notification on their leak site, Clop lists 66 partial names of companies that did not engage the hackers for negotiations. If these companies continue to ignore, Clop threatens to disclose their full name in 48 hours.
    • The hackers note that the list represents only victims that have been contacted but did not respond to the message, suggesting that the list of affected companies may be larger.
    • “The Cleo data theft attack represents another major success for Clop, who leveraged leveraging a zero-day vulnerability in Cleo LexiCom, VLTransfer, and Harmony products to steal data from the networks of breached companies.” * * *
    • “The zero-day flaw exploited this time is now tracked as CVE-2024-50623 and it allows a remote attacker to perform unrestricted file uploads and downloads, leading to remote code execution.
    • “A fix is available for Cleo Harmony, VLTrader, and LexiCom version 5.8.0.21 and the vendor warned in a private advisory that hackers were exploiting it to open reverse shells on compromised networks.”
  • and
    • “The North Korean hacker group ‘TraderTraitor’ stole $308 million worth of cryptocurrency in the attack on the Japanese exchange DMM Bitcoin in May.
    • “In a short post, the FBI attributed the attack to the state-affiliated threat actor TraderTraitor, also tracked as Jade Sleet, UNC4899, and Slow Pisces.
    • “The crypto heist occurred in May 2024 and forced the platform to restrict account registration, cryptocurrency withdrawals, and trading until the completion of the investigations.”

From the cybersecurity defenses front,

  • Netxgov/FCW alerts us that “Government and private sector organizations have begun to recognize that physical and virtual assets must be protected from cyber threats in the same way as IT.”
  • Dark Reading discusses “Defining & Defying Cybersecurity Staff Burnout. Sometimes it feels like burnout is an inevitable part of working in cybersecurity. But a little bit of knowledge can help you and your staff stay healthy.”
  • Here is a link to Dark Reading’s CISO Corner, which was updated this week.

Cybersecurity Saturday

From the cybersecurity policy and law enforcement front,

  • The Wall Street Journal reports,
    • “Congress might pull in opposite directions on cybersecurity in its new two-year term, while President-elect Donald Trump’s position on key cyber topics remains a wild card.
    • “The agenda is packed: Corporate executives want regulatory harmonization, policymakers realize that key critical infrastructure sectors like healthcare need more support and oversight, and artificial intelligence continues to intrigue lawmakers.
    • “Despite partisan tensions over everything from taxes to immigration, cybersecurity is likely to remain an issue that brings Democrats and Republicans together on national security grounds. Still, Republicans are expected to go after regulation they see as burdensome, in particular the Securities and Exchange Commission’s incident-reporting rule.
    • “It’s important now more than ever that policymakers ensure advancing common-sense and bipartisan cybersecurity policy is a top priority for the 119th Congress,” said John Miller, senior vice president of policy, trust, data and technology at the Information Technology Industry Council, a trade group.”
  • NextGov/FCW discusses the Defense Department related cybersecurity and other provisions found in the Fiscal Year 2025 National Defense Authorization Act which Congress passed this week.
  • Security Affairs lets us know,
    • “According to the WSJ, the U.S. government is considering banning TP-Link routers starting in 2025.
    • “TP-Link holds 65% of the U.S. market and is the top choice on Amazon, powering internet communications for the Defense Department.
    • “In August, two U.S. lawmakers urged the Biden administration to investigate TP-Link over concerns its devices could be used in cyberattacks.
    • The Commerce, Defense and Justice departments have opened separate probes into the company, with authorities targeting a ban on the sale of TP-Link routers in the U.S. as early as next year, the report said.” reported Reuters. “An office of the Commerce Department has even subpoenaed the company while the Defense Department launched its investigation into Chinese-manufactured routers earlier this year, the newspaper reported, citing people familiar with the matter.” * * *
    • “[A] spokesperson for TP-Link’s U.S. subsidiary told the WSJ that the company welcomes any opportunities to engage with the U.S. government to demonstrate that its security practices align with industry standards and to show its ongoing commitment to the U.S. market, consumers, and addressing national security risks.”
  • The Office of Management and Budget’s Office of Information and Regulatory Affairs concluded its review of the HHS’s Office for Civil Rights proposed amendments to the HIPAA Security Rule on December 18.
  • The next step is publication of the proposed rule in the Federal Register.
  • Last Monday, the Cybersecurity and Infrastructure Security Agency released its “2024 Year in Review Highlights CISA’s Achievements in Reducing Risk and Building Resilience in Cybersecurity and Critical Infrastructure Security.”
  • Cyberscoop adds,
    • “Federal civilian agencies have a new list of cyber-related requirements to address after the Cybersecurity and Infrastructure Security Agency on Tuesday issued guidance regarding the implementation of secure practices for cloud services.
    • “CISA’s Binding Operational Directive (BOD) 25-01 instructs agencies to identify all of its cloud instances and implement assessment tools, while also making sure that their cloud environments are aligned with the cyber agency’s Secure Cloud Business Applications (SCuBA) configuration baselines.
    • “CISA Director Jen Easterly said in a statement that the actions laid out in the directive are “an important step” toward reducing risk across the federal civilian enterprise, though threats loom in “every sector.”
    • “Malicious threat actors are increasingly targeting cloud environments and evolving their tactics to gain initial cloud access,” Easterly said. “We urge all organizations to adopt this guidance. When it comes to reducing cyber risk and ensuring resilience, we all have a role to play.”
  • and
    • “The Cybersecurity and Infrastructure Security Agency unveiled a detailed set of guidelines Wednesday to safeguard the mobile communications of high-value government targets in the wake of the ongoing Salt Typhoon telecom breach.
    • The guide aims to help both political and federal leadership harden their communications and avoid any data interception by the Chinese-linked espionage group. As of earlier this month, government agencies were still grappling with the attack’s full scope, federal officials told reporters. Among the targets were officials from both presidential campaigns, including the phone of President-elect Donald Trump.
    • “The advisory details several key practices intended to mitigate risks associated with cyber threats and raise awareness on techniques that can thwart any type of malicious actor.
    • “I want to be clear that there’s no single solution that will eliminate all risks, but implementing these best practices will significantly enhance the protection of your communication,” said Jeff Greene, CISA’s executive assistant director for cybersecurity. “We urge everyone, but in particular those highly targeted individuals, to review our guidance and apply those that suit their needs.”
    • “Even with the guidance’s focus on high-value targets, the advice is good for anyone that wants to take actions to secure their mobile devices. One of the primary recommendations includes the exclusive use of end-to-end encrypted messaging applications for secure communication. CISA suggests adopting apps like Signal, which provide robust encryption for both Android and iPhone platforms, preventing unauthorized interception of messages.”
  • The American Hospital Association News tells us,
    • The Cybersecurity and Infrastructure Security Agency is seeking comments on its draft National Cyber Incident Response Plan Update. The plan describes how the federal government, private sector, and state, local, tribal and territorial government entities will coordinate to manage, respond to and mitigate the consequences of high-profile cyberattacks. The update addresses changes in the cyberthreat and operations landscape by incorporating feedback and lessons learned from stakeholders in previous incidents. Comments are being accepted in the Federal Register until Jan. 15.
  • Per a Justice Department press release,
    • “A superseding criminal complaint filed in the District of New Jersey was unsealed today charging a dual Russian and Israeli national for being a developer of the LockBit ransomware group.
    • “In August, Rostislav Panev, 51, a dual Russian and Israeli national, was arrested in Israel pursuant to a U.S. provisional arrest request with a view towards extradition to the United States. Panev is currently in custody in Israel pending extradition on the charges in the superseding complaint.
    • “The Justice Department’s work going after the world’s most dangerous ransomware schemes includes not only dismantling networks, but also finding and bringing to justice the individuals responsible for building and running them,” said Attorney General Merrick B. Garland. “Three of the individuals who we allege are responsible for LockBit’s cyberattacks against thousands of victims are now in custody, and we will continue to work alongside our partners to hold accountable all those who lead and enable ransomware attacks.”

From the cyber vulnerabilities and breaches front,

  • SC Media relates,
    • “A Chinese-backed malware operation is building a botnet out of smart cameras and video boxes.
    • “The FBI said [on December 16] that a group identified as HiatusRAT has been seeding internet-of-things (IoT) devices with malware that allows for remote access and control. Targets include smart cameras and DVR boxes.
    • “In addition to gathering video footage or traffic data from the compromised hardware, attackers can use the edge-facing devices as a foothold to gain access into other hardware on the network and perform further attacks and data exfiltration.
    • “In this case, the FBI believes that the attackers are trying to compromise U.S. government agencies and the private contractors that work with them. It is believed that the threat actors are working on behalf of the Chinese government to infiltrate networks and gather data that would benefit Beijing.”
  • The American Hospital Association adds,
    • “This recent campaign appears to have targeted vulnerable Chinese-branded webcams and DVRs for specific, published vulnerabilities and default passwords set by the vendor,” said Scott Gee, AHA deputy national advisor for cybersecurity and risk. “These devices are often used in security video monitoring systems. Several of these vulnerabilities impacting older, end-of-life devices have not been patched by the manufacturer and the FBI recommends replacing them with updated devices. The critical takeaway from this bulletin is that patch management programs must cover not only traditional computer systems, but also Internet of Things devices on your network.” 
  • On December 17, HHS’s Health Sector Cybersecurity Coordination Center issued an analyst note about credential harvesting.
  • Bleeping Computer lets us know,
    • “A new Microsoft 365 phishing-as-a-service platform called “FlowerStorm” is growing in popularity, filling the void left behind by the sudden shutdown of the Rockstar2FA cybercrime service.
    • “First documented by Trustwave in late November 2024, Rockstar2FA operated as a PhaaS platform facilitating large-scale adversary-in-the-middle (AiTM) attacks targeting Microsoft 365 credentials.
    • “The service offered advanced evasion mechanisms, a user-friendly panel, and numerous phishing options, selling cybercriminals access for $200/two weeks.
    • According to Sophos researchers Sean Gallagher and Mark Parsons, Rockstar2FA suffered from a partial infrastructure collapse on November 11, 2024, making many of the service’s pages unreachable.
    • Sophos says this does not appear to be the result of law enforcement action against the cybercrime platform but rather a technical failure.
    • A few weeks later, FlowerStorm, which first appeared online in June 2024, started quickly gaining traction.
  • CISA added eight known exploited vulnerabilities to its catalog this week.
  • Cybersecurity Dive adds,
    • “Attackers are actively exploiting a critical vulnerability in Apache Struts 2 just days after it was originally disclosed and patched, researchers warn.  
    • “The vulnerability, listed as CVE-2024-53677, involves a flaw in file upload logic, according to a bulletin from Apache. The vulnerability has a CVSS score of 9.5 out of 10, indicating the risk is considered critical.  
    • “An attacker can manipulate file upload parameters to enable path traversal. Apache urged users to upgrade to Struts 6.4.0 or greater and use the Action File Upload Interceptor. Security researchers warn the vulnerability can allow an attacker to conduct malicious actions.”\
  • and
    • “Researchers have now traced exploitation of a critical vulnerability in Cleo file transfer software back to October, Mandiant Consulting CTO Charles Carmakal said in a LinkedIn post Wednesday. Mandiant’s discovery puts active exploitation at least a month earlier than previously observed by other researchers.
    • “Mandiant identifies the cluster actively exploiting the two vulnerabilities, CVE-2024-50623 and CVE-2024-55956, as UNC5936. Researchers say the cluster has overlaps with FIN11, also known as Clop, which claimed responsibility for the attacks earlier this month. 
    • “There is currently no evidence of mass data theft, which was observed in prior campaigns by the threat group, Carmakal said. However, malicious backdoors including Beacon and Goldtomb have been deployed on exploited systems.”
  • and
    • “An attacker gained access to a limited number of BeyondTrust customers’ instances of Remote Support SaaS, an access-management tool, the company said in a Dec. 8 blog post, which was updated Wednesday. The attacker compromised a Remote Support SaaS API key and reset passwords of multiple accounts.
    • “The cybersecurity vendor initially detected anomalous activity on one customer instance of Remote Support SaaS on Dec. 2, according to the updated blog. Three days later, the company determined multiple customers were impacted, suspended those instances and revoked the compromised API key.
    • “Our initial investigation has found that no BeyondTrust products outside of Remote Support SaaS are impacted,” the company said in the blog post.”

From the ransomware front,

  • Cybersecurity Dive points out,
    • “Data from nearly 5.6 million people was exposed due to a ransomware attack on nonprofit health system Ascension this spring, according to a report to federal regulators.
    • “The attack compromised personal information from some current and former Ascension patients, senior living residents and employees, the system said on Thursday [December 19]. Personal details, medical information, payment information, insurance details and government ID numbers, including Social Security numbers, could have been exposed.
    • “The breach is the third largest reported to the HHS’ Office for Civil Rights’ healthcare data breach portal this year, trailing only incidents at Change Healthcare and Kaiser Foundation Health Plan.” * * *
    • “In June, Ascension reported that cybercriminals gained access to its systems after a worker accidentally downloaded a malicious file, and that personally identifiable and protected health information may have been exposed.
    • “Now, the health system has completed its review of what data may have been compromised. Ascension is mailing letters to affected people, which should be delivered over the next two to three weeks, the health system said in an update Thursday [December 19].
    • “Though patient data was involved, Ascension said it found no evidence that data was stolen from EHR and other clinical systems, where full patient records are stored.” 
  • Statescoop lets us know,
    • Hackers are threatening as early as this week to release the personal information of potentially hundreds of thousands of Rhode Islanders connected with RIBridge, the state’s health and social services system that suffered a cyberattack on Dec. 5, Gov. Dan McKee and state officials told media over the weekend.
    • Brian Tardiff, Rhode Island’s chief digital officer, said that the cybercriminals behind the attack threatened to release the data they claim to have obtained in the Dec. 5 cyberattack unless they receive a ransom payment. Tardiff did not specify the ransom deadline, amount of money demanded or if the hackers identified themselves.
    • “Any individual who has received or applied for state health coverage or health and human services programs or benefits could be impacted by this breach,” according to an update posted to the state’s website Friday after the cyberattack was detected.
    • The state’s benefits programs that may be impacted by the breach include Medicaid, Supplemental Nutrition Assistance Program, Temporary Assistance for Needy Families,  Child Care Assistance Program, health coverage purchased through HealthSource RI, Rhode Island Works, Long-Term Services and Supports, General Public Assistance and Program At HOME Cost Share.
  • Per TechTarget,
    • “Despite being taken down and humiliated by the National Crime Agency (NCA) coordinated Operation Cronos in February 2024, an unknown individual(s) associated with, or claiming to represent, the LockBit ransomware gang has broken cover to announce the impending release of a new locker malware, LockBit 4.0.
    • “In screengrabs taken from the dark web that have been widely circulated on social media in the past day, the supposed cybercriminal invited interested parties to “sign up and start your pen tester billionaire journey in 5 minutes with us”, promising them access to supercars and women. At the time of writing, none of the links in the post direct anywhere, while a countdown timer points to a ‘launch’ date of 3 February 2025.
    • “Robert Fitzsimons, lead threat intelligence engineer at Searchlight Cyber, said it was hard to say at this stage what LockBit 4.0 entailed – whether the gang was launching a new leak site, its old one having been seized, or whether it has made changes to its ransomware.
    • “It is worth noting that LockBit has already been through many iterations, its current branding is LockBit 3.0. It’s therefore not surprising that LockBit is updating once again and – given the brand damage inflicted by the law enforcement action Operation Cronos earlier this year – there is clearly a motivation for LockBit to shake things up and re-establish its credentials, keeping in mind that the LockBit 3.0 site was hijacked and defaced by law enforcement,” said Fitzsimons.”

From the cybersecurity defenses front,

  • Dark Reading discusses
    • “Managing Threats When Most of the Security Team Is Out of the Office. During holidays and slow weeks, teams thin out and attackers move in. Here are strategies to bridge gaps, stay vigilant, and keep systems secure during those lulls”
  • and
    • “To Defeat Cybercriminals, Understand How They Think. Getting inside the mind of a threat actor can help security pros understand how they operate and what they’re looking for — in essence, what makes a soft target.”
  • Here is a link to Dark Reading’s CISO Corner.
  • The Cyberscoop article on CISA’s mobile communications protection guide adds
    • “The guidelines advocate for the use of Fast Identity Online (FIDO) phishing-resistant authentication as a superior alternative to traditional multifactor authentication (MFA) methods. FIDO authentication, especially through hardware-based security keys such as Yubico or Google Titan, is recommended for enhancing the security of high-targeted accounts.
    • The guidance also emphasizes moving away from Short Message Service (SMS) messages as a form of MFA, advising that SMS-based authentication is not encrypted and can be easily intercepted by those with access to telecommunications infrastructure.
    • “Additional recommendations include the use of a password manager, regular software updates for both operating systems and applications to patch vulnerabilities and setting telecommunications account PINs to prevent SIM-swapping attacks — a common technique used by hackers to hijack phone numbers and intercept sensitive communications.
    • “Specific guidelines tailored for Apple iPhone and Android users were also included. iPhone users are advised to enable “Lockdown Mode” to restrict app access and deploy Apple iCloud Private Relay for secure internet browsing. Meanwhile, Android users are encouraged to choose devices with strong security records and long-term update commitments, and to ensure the use of encrypted Rich Communication Services (RCS) for messaging.”