Newsletters

Written content from the Risky Business Media team

Risky Bulletin: New phishing technique bypasses FIDO keys

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

At least one cybercrime group is using a new phishing technique that bypasses FIDO keys and grants attackers access to user accounts.

The new technique has been used in the wild by a threat actor known as PoisonSeed.

Earlier this year, the group was involved in phishing campaigns targeting the cryptocurrency community and designed to steal assets from their crypto-wallets.

Spain Leaves Key Under Mat for Huawei

Presented by

Tom Uren
Tom Uren

Policy & Intelligence

Recent reporting that the Spanish government had awarded  €12.3 million to Huawei to manage storage for the government's lawful intercept (LI) system struck us as a terrible idea. 

Digging a bit deeper, it turns out the truth is more understandable but far worse. These contracts were awarded over the last few years and were a continuation of an existing arrangement. Huawei has been involved in Spain's lawful intercept (LI) system since 2004. 

It is time to rip the bandaid off. 

Risky Bulletin: Microsoft blocks filesystem redirection attacks in new security feature

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Microsoft has added a new security feature to Windows 11 that will mitigate an entire class of filesystem redirection attacks.

The new RedirectionGuard feature is currently under testing in Windows 11 Insider builds.

It works by blocking a type of file redirection known as a junction, or a soft link. This allows users to create a link between two folders, so when users or processes access that folder, they get automatically redirected to the target directory somewhere else on the same system.

Risky Bulletin: Major EoT/HoT vulnerability can bring trains to sudden stops

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

More than 12 years after the issue was first reported, the Association of American Railroads is replacing an insecure railroad protocol that can be abused to engage brakes and bring trains to sudden stops anywhere across North America.

The issue impacts a radio protocol that links locomotives (Head-of-Train) to devices mounted on the last wagon, a flashing red light known in the industry as an End-of-Train device or a FRED (Flashing Red End Device).

This device is primarily used to collect telemetry from the back of trains. It is useful especially for long freight trains that can often go over one or two miles in length and which cannot be easily inspected.

Risky Bulletin: Two billion eSIMs receive crucial security patch

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Security updates are being shipped out to mobile operators across the world to fix vulnerabilities in more than two billion eSIMs.

The vulnerabilities impact Kigen's eUICC (embedded Universal Integrated Circuit Card), a software package provided to mobile network operators to support eSIM technology.

eSIMs allow mobile operators to ship a software-based SIM to a device. The technology is mainly used for issuing temporary SIMs to travelers and to add mobile connectivity to IOT devices that can't fit a SIM card slot.

Four Key Players Drive Scattered Spider

Presented by

Tom Uren
Tom Uren

Policy & Intelligence

A small number of key individuals are organising the activities of the group known as Scattered Spider, according to researchers at security firms. If it's true, there is hope that targeted approaches might bring some respite from the group's carnage. 

Scattered Spider is responsible for a number of significant, high-impact hacks that have left many victim organisations struggling to recover, sometimes for months. The group first achieved notoriety in 2023 for the hacks of Caesars Entertainment and MGM Resorts International. Since May this year the group is believed to have struck retailers in the UK and the US, insurance companies, and then airlines in quick succession. Overall, it's responsible for the compromise of hundreds of companies since 2022. It is financial cybercrime's apex predator. 

Its cybercrime activity is characterised by the use of highly effective social engineering to gain initial access to victims. This is followed up by brutally efficient post-compromise activities to steal data, deploy ransomware and cause mayhem in double-quick time.

Risky Bulletin: Browser extensions hijacked for web scraping botnet

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

More than one million users have installed browser extensions that turn their browsers into proxies for a web scraping botnet.

The extensions contain a library named Mellowtel that waits for users to go inactive, disables page security protections, and then loads a remote website inside a hidden iframe. The parsed/scraped website is then sent to a remote URL for analysis.

SecureAnnex found the Mellowtel library in 245 extensions for Chrome, Edge, and Firefox.

Risky Bulletin: Chinese researchers claim to find new North American APT

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Chinese security firm QiAnXin claims it discovered a new cyber-espionage group targeting China's high-tech sectors and operating out of North America.

QiAnXin's PanGu and RedDrip teams presented their findings at the CYDES security conference in Malaysia last week and published a technical report on GitHub on Friday.

Researchers describe the new NightEagle group (aka APT-Q-95 and APT-C-78) as extremely stealthy and very sophisticated.

Risky Bulletin: Hunters International ransomware shuts down and releases decryption keys

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

The Hunters International ransomware operation has shut down and promised to release free decryption keys for all past victims.

The group announced the shutdown in a message posted on its dark web leak site on Thursday, July 3, after removing all past victims.

The operation launched at the end of 2023 and was a rebrand of the Hive ransomware, which had its infrastructure seized earlier that year.

Why Iran Is a Scaredy Cat Cyber Chicken

Presented by

Tom Uren
Tom Uren

Policy & Intelligence

US authorities and security firms have spent the last few weeks pumping out non-stop warnings about an increased threat of Iranian cyber attacks targeting US critical infrastructure. At the time of writing these attacks have not materialised. Given the US has already dropped very real bombs, we think Iran has good reason to avoid escalatory cyber attacks.

Disruptive cyber attacks can be useful because they cause harm and they are also hard to stop or deter. Iranian groups have carried out these kinds of irritating attacks in the past. But there's a caveat. These types of attacks are useful and worthwhile before bickering between states escalates to armed conflict.

Back in December 2023, for example, an Iran-linked group calling itself the Cyber Av3ngers disrupted water facilities across the US by hacking Israeli-made Unitronics programmable logic controllers. These devices are important because they are used to control and monitor operations at water processing plants. Still, in this case, the incidents were annoying rather than destructive or disastrous.