Spyware
There is growing awareness of the threat that spyware represents but precious little agreement as to what to do about it. At a session this week, the US House Select Committee on Intelligence took evidence from a succession of experts and spyware victims. They called on the US intelligence community to use its power to cut off the supply of vulnerabilities on which spyware tools depend. The problem is that this would involve exposing the same vulnerabilities and exploits used by intelligence agencies themselves.
The harm caused by spyware was demonstrated by Carine Kanimba, a US citizen who was born in Rwanda and targeted by the powerful Pegasus spyware last year. The infection came after her father, a vocal opponent of Rwanda's government, was lured to Rwanda where he was sentenced to 25 years in jail. But it's not just activists who are targets. In 2019, it emerged that Pegasus was used against US diplomats connected to Uganda. The chairman of the House committee said spyware posed a serious threat to national security and warned its use could be much more widespread than anyone realises. “We are very likely looking at the tip of the iceberg,” he said.
Also this week, Microsoft published details about a little known spyware manufacturer in Austria. It said it had linked a number of cyber attacks to the Vienna-based intelligence-gathering company, Decision Supporting Information Research Forensic. Its tool, dubbed Subzero, enables its customers to remotely and silently access a victim’s computer, phone, network infrastructure and internet-connected devices. Victims are said to include law firms, banks, and strategic consultancies in Austria, Panama, and the United Kingdom.
Threats
A report from email security company, Tessian, paints a dismal picture of cybersecurity training and its impact on organisations and their employees. Tessian says 85% of the workers it surveyed take part in security awareness programmes but 64% don't pay full attention and 36% found the sessions boring. 30% of the employees said they didn't think they had any personal responsibility for their organisation's cybersecurity. As Tessian points out, it's hardly surprising that 75% of the organisations it talked to had experienced a security breach in the last year.
Ransomware and Business Email Compromise attacks cause nearly 70% of cyber incidents, according to research by Palo Alto Networks. The data comes from more than 600 incident response cases over the past 12 months. "Cybercrime is an easy business to get into because of its low cost and often high returns. As such, unskilled, novice threat actors can get started with access to tools like hacking-as-a-service becoming more popular and available on the dark web," the company said. To put this in context, the FBI says global attacks targeting business emails (i.e. BEC) raked in nearly $17 billion from 2016-2021.
MFA: Multi-factor authentication isn't foolproof but it works. Europol says it has seen cases in which it was monitoring criminals. As soon as they saw MFA in use, they gave up and moved on to the next target. ZDNet
USB: It's an age-old trick but it's still in use. Security company, KnowBe4, explains how a booby-trapped USB stick arrived in the mail in a Microsoft-branded package.
Facebook business: A new phishing campaign is targeting professionals on LinkedIn in an attempt to take over Facebook business accounts that manage advertising for their organisations. Bleeping Computer
Exchange servers: Microsoft is warning of attacks targeting its Internet Information Services (IIS) web server. The warning is directed at Outlook on the Web and Exchange Server customers.
Artificial Intelligence: The FBI is worried that AI will increasingly be used in cyber attacks in the next few years and that deepfakes will become indiscernible from real content within the same timeframe. Cyberscoop