Cyber Security Today, August 14, 2023 — A huge insurance company hack, presentations at the Black Hat conference, and more

Share post:

A huge insurance company hack, presentations at the Black Hat conference, and more.

Welcome to Cyber Security Today. It’s Monday, August 14th, 2023. I’m Howard Solomon, contributing reporter on cybersecurity for ITWorldCanada.com and TechNewsday.com in the U.S.

Cyb er Security Today on Amazon Alexa Cyber Security Today on Google Podcasts Subscribe to Cyber Security Today on Apple Podcasts

Over 400,000 Canadian and American customers and current and former employees of insurance broker Hub International are being notified their data was stolen eight months ago. The billion-dollar Chicago-based company, which offers a wide range of products including cyber and errors and omissions insurance, is ranked the world’s fifth-largest brokerage. It has 530 offices across North America. On January 17th Hub detected suspicious activity on its IT network. An investigation into the data breach finished last month. It found that the attacker got into the network sometime between December 2022 and January. Data stolen could have included names, Social Insurance or Social Security numbers, driver’s licence numbers, medical information and more. In a filing with Maine’s attorney general’s office the company said just over 479,000 people were affected. It isn’t clear if that number includes Canadians. In a statement on the company’s Canadian website Hub says a limited number of people here were affected.

The U.S. Cybersecurity and Infrastructure Security Agency has published an additional analysis of the malware used recently to compromise Barracuda Networks ESG email gateways. The report includes a look at the third newly-discovered backdoor that has been used by attackers on these devices. This comes after Barracuda began replacing ESG devices rather than issuing software updates following the revelation in May that a suspected pro-China group had discovered and exploited a zero-day vulnerability. Any network administrator that is still using Barracuda ESG devices bought before May is opening their organization to a lot of risk.

The Cyclops ransomware gang has a new name: It’s now calling itself Knight ransomware (with a “K”). And to kick off the new branding it launched a phishing campaign with emails carrying the subject line, ‘Tripadvisor Complaint.’ It tries to trick people who may have used Tripadvisor into clicking on a file about a complaint that might lead to their suspension of use. If you get a message like this and are worried, contact Tripadvisor directly. Don’t click on the link, which leads to the installation of ransomware.

U.S. President Joe Biden’s administration is working on an executive order giving guidance to federal departments on how to safely use artificial intelligence applications. That’s according to the news site Cyberscoop, which interviewed the director of the White House Office of Science Technology. Meanwhile in Canada, the Innovation department has quietly announced a consultation to develop a voluntary code of practice for companies using generative AI. This was discovered by Internet law professor Michael Geist. How quiet was this announcement? Well, there’s no link to details on the government’s website announcing the consultation. All of those other consultation announcements listed on the site have links to details. So while I can tell you submissions are due September 14th, I can’t yet tell you where to send them.

One of the presentations at last week’s Black Hat USA security conference showed the advantages of setting up a honeypot to lure and then record the activities of hackers. Two researchers from GoSecure said they captured 100 hours of videos over three years showing the techniques threat actors use to access and exfiltrate data. Your IT and security team may want to do the same to learn more about how cyber attacks work. There’s a link here to a blog describing how the GoSecure people did it.

In another presentation, an executive of satellite internet provider Viasat explained how Russia knocked out modems used by European customers prior to its attack last February on Ukraine. It’s been known for a while that the attackers deployed wiper malware. What wasn’t divulged until now is Viasat servers were also impaired so modems kicked off the network couldn’t reconnect.

And there was a presentation about the discovery earlier this year of a hole in Microsoft Defender. Researchers at SafeBreach discovered the vulnerability. It was patched in April. Now that Windows administrators and home users have had four months to install the security update the researchers felt they could discuss the details at Black Hat.

Washington is looking for ideas on how the federal government can improve open-source software security. Topics include how to encourage the use of memory-safe application development languages, reducing vulnerabilities at scale, strengthening the software supply chain and fostering open-source software development best practices. Comments of no longer than 10 pages should be submitted in writing by October 9th to www.regulations.gov.

Finally, the next report of the U.S. Cyber Safety Review Board will be on making cloud computing more secure. It will focus on Microsoft’s admission last month that a threat actor recently forged Exchange authentication tokens to access emails of approximately 25 organizations. The board’s report will include recommendations on how the tech sector and cloud service providers should strengthen identity management and authentication in the cloud. No date for the release of the report was announced. Last week the board released a devastating analysis of how the Lapsus$ extortion gang was so successful.

That’s it for now. Follow Cyber Security Today on Apple Podcasts, Google Podcasts or add us to your Flash Briefing on your smart speaker.

The post Cyber Security Today, August 14, 2023 — A huge insurance company hack, presentations at the Black Hat conference, and more first appeared on IT World Canada.
Howard Solomon
Howard Solomonhttps://www.itworldcanada.com
Currently a freelance writer, I'm the former editor of ITWorldCanada.com and Computing Canada. An IT journalist since 1997, I've written for ITBusiness.ca and Computer Dealer News. Before that I was a staff reporter at the Calgary Herald and the Brampton (Ont.) Daily Times.

SUBSCRIBE NOW

Related articles

North Korean hacker infiltrates US security vendor, loads malware

KnowBe4, a US-based security vendor, unknowingly hired a North Korean hacker who attempted to introduce malware into the...

Security company accidentally hires a North Korean state hacker: Cybersecurity Today for Friday, July 26, 2024

A security company accidentally hires a North Korean state actor posing as a software engineer. CrowdStrike issues its...

CrowdStrike releases an update from initial Post Incident Review: Hashtag Trending Special Edition for Thursday July 25, 2024

Security vendor CrowdStrike released an update on from their initial Post Incident Review today. The first, and most surprising...

Security vendor CrowdStrike issues an update from their initial Post Incident Review

Security vendor CrowdStrike released an update from their initial Post Incident Review (PIR) today. The company's CEO has...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways