Top news stories this week
- LOBSHOT. Novel covert info stealing trojan detected in the wild.
- Call it off. T-Mobile suffers second data breach this year.
- ‘The new crypto’. Security concerns over generative AI chatbots continue.
- Class dismissed. Dozens of US and UK schools hit with ransomware.
- Watch out. Hackers exploit exposed digital video recorders to gain initial access.
- Game over. Law enforcement takes action against dark web markets and crypto exchanges.
- Stolen at checkout. Fake payment forms used to steal customers’ credit card details.
1. LOBSHOT: new covert info stealing trojan detected in the wild
Cyber criminals are using malicious adverts on search engines to distribute a new malware variant named LOBSHOT. Disguised as legitimate software, the malware can bypass defence measures and provide full remote control of the infected device without the victim knowing. The trojan has been connected to data theft and financial fraud.
So what?
Organisations should verify the source of any new software installations and prevent installations from unauthorised sources.
2. T-Mobile experiences second data breach of 2023
T-Mobile has confirmed a recent data breach resulted in personal and account data of several hundred customers being exposed. This marks T-Mobile's second security incident of 2023 and has put its customers at a greater risk of identity theft and phishing scams.
So what?
Security managers often use cyber security incidents to justify increasing their budgets. Additional funding should be directed appropriately to avoid the reputational impact of multiple breaches.
3. Privacy and security concerns relating to ChatGPT continue
Samsung has joined the growing number of companies banning its employees from using generative AI, such as OpenAI’s ChatGPT, after employees revealed sensitive information to the chatbot in order to check for errors. This decision follows JPMorgan, Verizon, and Citigroup, who also banned the use of ChatGPT due to privacy concerns relating to sensitive information being stored on OpenAI’s servers.
Separately, Meta’s CISO Guy Rosen recently described ChatGPT as ‘the new crypto’ given the surge in scams referencing the tool. In a recent security report, Meta stated it has discovered new malware strains posing as ChatGPT browser extensions and tools.
So what?
Sharing personal or professional information with AI chatbots is a security risk. It is vital to be mindful of what information is disclosed with such platforms, and ensure such tools are only accessed through legitimate portals.
4. Ransomware gangs continue to target educational institutions
Ransomware attacks have recently forced dozens of schools and colleges across the US and UK to shut down their networks. Recent targets in the US included Bluefield University and Truman State University, while Hardenhuish School in Wiltshire was hit in the UK. These incidents continue a trend of ransomware groups targeting educational institutions, with at least 27 confirmed attacks on US colleges and universities in 2023 so far.
So what?
Schools with limited cyber security budgets can be prime targets for opportunistic cyber criminals. Cost effective solutions such as regular patching and multi-factor authentication can help reduce the likelihood of such incidents.
5. Hackers exploit exposed digital video recorders to gain initial access
Hackers are currently taking advantage of an unpatched vulnerability in TBK DVR (Digital Video Recording) devices to gain initial access into corporate networks. The DVR servers, which are used to store sensitive security footage from CCTV cameras, are typically located on the internal networks and provide a back door for entry.
So what?
Organisations must ensure that their Internet of Things (IoT) devices are secure and isolated from the main corporate network and that their vulnerabilities are reviewed on a regular basis.
6. Law enforcement takes action against dark web markets and crypto exchanges
In a major operation coordinated by Europol and involving nine countries, 288 dark web vendors were arrested, and the illegal marketplace ‘Monopoly Market’ was seized. Law enforcement seized over EUR 50.8 million in cash and virtual currencies, 850kg of drugs, and 117 firearms.
Separately, the FBI and Ukrainian police have seized nine cryptocurrency exchange websites used to launder ransomware payments and assist cyber criminals in obscuring the trace of money. The seized infrastructure will be analysed to identify cyber criminals and may lead to future arrests.
So what?
These operations show the ongoing efforts of law enforcement agencies to combat cybercrime and the use of cryptocurrency in illicit activities.
7. Hackers display fake payment forms to obtain customers' credit card details
Hackers are using advanced skimming attacks to steal customers’ credit card details through realistic looking fake checkout forms on legitimate online stores. To further divert suspicion, the customer is shown a fake error and is then redirected to the real payment URL.
So what?
As fake payment forms become more realistic, online customers should be wary of suspicious payment errors. Consider single-use virtual cards which hackers cannot re-use.