Cybersecurity News: Easterly’s AI warning, Ex-Uber Sullivan sentenced, Play’s Massachusetts ransomware

Jen Easterly warns AI may be the ‘most powerful weapon of our time’

CISA Director Jen Easterly, speaking on Friday at a security summit at Vanderbilt University in Nashville warned, that artificial intelligence may be both the most “powerful capability of our time” and the “most powerful weapon of our time.” She highlighted a scenario in which how-to guides, AI-generated imagery, auto-generated shopping lists are available for terrorist and for criminals, providing the capability to develop things like cyber weapons, chemical weapons, bio weapons,” adding that those are not even the worst case scenario. She suggested that AI companies should break that “decades-long vicious cycle of technological innovation at the expense of security.”

(Cyberscoop)

Ex-Uber CSO gets three-year probation sentence, with no prison for guilty verdict

Joe Sullivan, former Uber chief of security for Uber, received three years probation from a U.S. federal judge on Thursday in relation to a conviction last year over his handling of a data breach. According to The Record, “a federal jury convicted Sullivan of two charges related to his attempted cover-up of a 2016 security incident at Uber, where hackers stole the personal details of 57 million customers and the personal information of 600,000 Uber drivers.” Sullivan had paid off the hackers with $100,000 and had them sign nondisclosure agreements but did not inform the FTC as required, describing the payments as a “bug bounty.: U.S. District Judge William Orrick noted Sullivan’s significant past work in protecting people from the sort of crime he later concealed. He also said that Sullivan’s steps had succeeded in keeping the stolen data from being exposed.

(Washington Post and The Record)

Ransomware group behind Oakland attack hits Massachusetts city

The cybercrime group that attacked the city of Oakland has now made Lowell, Massachusetts its latest victim. The city, situated near Boston, announced a “cyber-related incident” on April 24 that disrupted its network and impacted “a variety of systems.” Despite segmenting the affected technology, servers, networks, phones and other systems throughout the city became inaccessible. The city’s 9-1-1, fire and emergency phone systems were not affected. The Play ransomware group has taken responsibility for the attack, and according to The Record, they are “claiming to have stolen an undisclosed amount of data that includes personal data, passports, government IDs, financial documents, budgets, departmental files and more.” The gang said it would release the stolen data on May 10.

(The Record)

Windows admins can sign up for ‘known issue’ email alerts

Microsoft announced last week that Windows administrators can now opt to be emailed when “new known issues are added to the Windows release health section of the Microsoft 365 admin center.” The emails will alert admins to known issues that are added or updated with new information such as changes in status, workarounds, or resolutions. Microsoft emphasizes this service is only available for people “with admin roles in organizations with eligible Windows or Microsoft 365 for Business subscriptions that provide access to Windows release health in the Microsoft 365 admin center.”

(Bleeping Computer)

Thanks to this week’s episode sponsor, Trend Micro

Cybersecurity is not just about protection, it’s about foresight, agility, and resilience. Navigating a new era of cyber risk demands evolved strategies, new frameworks, and integrated tools to equip security teams to anticipate and defend against even the most advanced attacks. Trend Micro, the global leader in cybersecurity is bringing the cyber risk conversation to more than 120 cities around the world in their latest “Risk to Resilience World Tour” — The largest cybersecurity roadshow of its kind. Find the closest city to you and register today to take a leap towards a more resilient future. Head to TrendMicro.com/cisoseries.

Dragon Breath APT group targets gambling industry with using double-clean-app technique

Dragon Breath, an advanced persistent threat (APT) actor, is adding new layers of complexity to its attacks by adopting a novel DLL side-loading mechanism. “The attack is based on a classic side-loading attack, consisting of a clean application, a malicious loader, and an encrypted payload, with various modifications made to these components over time,” said Sophos researcher Gabor Szappanos, quoted in The Hacker News. “The latest campaigns add a twist in which a first-stage clean application ‘side’-loads a second clean application and auto-executes it. The second clean application side-loads the malicious loader DLL. After that, the malicious loader DLL executes the final payload.”

(The Hacker News)

Fortinet warns of a spike in attacks against TBK DVR devices

FortiGuard Labs is warning of a spike in attacks targeting TBK DVR devices. According to Security Affirs, “TBK Vision is a video surveillance company that provides network CCTV devices and other related equipment, including DVRs for the protection of critical infrastructure facilities.” The core of the activity is the exploitation of a five-year-old authentication bypass issue, tracked as CVE-2018-9995 (CVSS score of 9.8), in TBK DVR devices, which points to “an error when handling a maliciously crafted HTTP cookie.” A remote attacker can obtain administrative privileges and gain access to camera video feeds. According to the company, they have over 600,000 cameras and 50,000 recorders installed all over the world in multiple sectors such as banking, retail, and government under a range of brand names.

(Security Affairs)

Decoy Dog malware targets enterprise networks

The appropriately named Decoy Dog is evasive and according to The Hacker News, “employs techniques like strategic domain aging and DNS query dribbling, wherein a series of queries are transmitted to the command-and-control (C2) domains so as to not arouse any suspicion.” In an an advisory published late last month, Infoblox described Decoy Dog as a “cohesive toolkit with a number of highly unusual characteristics that make it uniquely identifiable, particularly when examining its domains on a DNS level,” adding that its atypical characteristics allowed it to map additional domains that are part of the attack infrastructure.

(The Hacker News)

Last week in ransomware

Last week’s ransomware news was been dominated by a Royal ransomware attack on the City of Dallas as well as extortionists that taunted Western Digital by leaking emails and documents of their response to its cyberattack. Pediatric mental health provider BrightLine disclosed they suffered a Clop GoAnywhere breach. ALPHV/BlackCat claiming to have attacked Constellation Software. AvosLocker hijacked Bluefield University’s emergency campus alert system to send SMS texts and email alerts to staff and students about their data being stolen.

(Bleeping Computer and Cyber Security Headlines

Steve Prentice
Author, speaker, expert in the area where people and technology crash into each other, viewed from the organizational psychology perspective. Host of many podcasts, voice actor and narrator for corporate media and audiobooks. Ghost-writer for busy executives.