Cyber Security Today, Sept. 16, 2022 – Queen’s death exploited by phishing scam, new Linux backdoor found, and more

Share post:

Queen’s death exploited by phishing scam, new Linux backdoor found, and more.

Welcome to Cyber Security Today. It’s Friday, September 16th, 2022 I’m Howard Solomon, contributing reporter on cybersecurity for ITWorldCanada.com.

Cyb er Security Today on Amazon Alexa Cyber Security Today on Google Podcasts Subscribe to Cyber Security Today on Apple Podcasts

The death of Queen Elizabeth is being exploited by crooks. That’s according to researchers at Proofpoint. Someone is sending email messages pretending to be from Microsoft inviting victims to a so-called “interactive AI memory board” to honour the late monarch. The memory board supposedly organizes millions of words and photos to commemorate the Queen. To take part, victims are asked to log in with their Microsoft usernames and passwords — which are promptly captured by the crooks. The scam can bypass multifactor authentication.

Here’s another sign that cyber attacks are getting worse: Fifty-six per cent of 300 cybersecurity professionals recently surveyed said they’ve seen a doubling in threat levels in the past year. Forty-eight per cent said the level of threat activity has increased since Russia’s invasion of Ukraine. The survey was done by security vendor DomainTools. It also showed more than 60 per cent of respondents said active threat hunting — rather than being defensive — helped them identify indicators of compromise for immediate response or blocking of attacks.

Researchers at Necrium Security have found vulnerabilities in two models of WiFi access points from Japanese manufacturer Contec. The FX3000 and FX2000 devices are used by a number of companies, including airlines. Exploiting the hole could lead to data plagiarism, falsification and system destruction. IT administrators with these devices in their networks should install the latest firmware.

The Los Angeles public school district has given its superintendent the temporary power to hire anyone without public tender to help deal with the aftermath of a ransomware attack that started over the Labour Day weekend. The emergency power will last 12 months. The hackers left behind tripwires with the potential to set off another chain of damage or compromised information, the school board says.

Finally, a Linux variant of the SideWalk backdoor implant has been discovered. Researchers at ESET believe it’s being used by an advanced threat group it calls SparklingGoblin. This particular backdoor has been used to compromise a Hong Kong university earlier this year, researchers say. It differs from the Windows version in that it leaves some unique fingerprints and is therefore easier to detect. There’s a link in the text version of this podcast to the ESET report with more details.

That’s it for now. But later today the Week in Review edition of the podcast will be out. This week’s guest commentator is Terry Cutler of Montreal’s Cyology Labs. We’ll talk about ransomware, what IT security leaders can do if they are told to cut costs and why a British bank asked iPhone customers to turn off automatic iOS updates.

Remember links to details about podcast stories are in the text version at ITWorldCanada.com.

Follow Cyber Security Today on Apple Podcasts, Google Podcasts or add us to your Flash Briefing on your smart speaker.

The post Cyber Security Today, Sept. 16, 2022 – Queen’s death exploited by phishing scam, new Linux backdoor found, and more first appeared on IT World Canada.

Howard Solomon
Howard Solomonhttps://www.itworldcanada.com
Currently a freelance writer, I'm the former editor of ITWorldCanada.com and Computing Canada. An IT journalist since 1997, I've written for ITBusiness.ca and Computer Dealer News. Before that I was a staff reporter at the Calgary Herald and the Brampton (Ont.) Daily Times.

SUBSCRIBE NOW

Related articles

Anthropic Warns: AI “Virtual Employees” Could Pose Security Risks Within a Year

Anthropic, a leading artificial intelligence company, anticipates that AI-powered virtual employees could begin operating within corporate networks as...

Hertz Data Breach Exposes Customer Information via Supply Chain Hack

Hertz has disclosed a data breach resulting from a cyberattack on its vendor, Cleo Communications, which compromised sensitive...

Google’s New Security Feature – Automatic Reboot

Google is introducing a new security feature in its latest Android update that will automatically reboot phones and...

Cybersecurity Firm Prodaft Buys Hacker Forum Accounts to Monitor Cybercriminal Activity

Swiss cybersecurity company Prodaft has initiated a program to purchase verified and aged accounts on hacking forums, aiming...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways