More stories

  • in

    Singtel sells off payment card compliance business

    Singtel has sold off its payment card compliance business Trustwave in a deal worth $80 million, as part of efforts to “optimise” the group’s resource allocation and growth focus. The move is part of the Singapore telco’s strategic review of its digital businesses that kicked off in May this year.Parked under its cybersecurity brand Trustwave, SecureTrust was sold off to Sysnet Global Solutions for a cash consideration of $80 million, Singtel said in a statement Monday. It added that some Trustwave assets deemed “complementary” to the telco’s telecommunications and systems integration business in Asia-Pacific would be transferred to Singtel as well as its subsidiaries NCS and Optus. This integration would allow for “closer alignment” with the respective business unit’s core products and services and enable each to focus on core competencies, Singtel said. 

    The SecureTrust sale would put Singtel’s cybersecurity revenue in the region at SG$350 million ($259.57 million), the telco said.Singtel Group CEO Yuen Kuan Moon said: “This divestment is the first step following an extensive review of the Trustwave business and serves to sharpen its focus and reposition it for growth. With enterprises pivoting fast to hybrid, multi-cloud environments, the cyber threat landscape has changed considerably and the need for a focused set of services centred on managed threat detection and response has grown.”Trustwave would focus its core offerings on managed detection and response, managed security services, and consulting services, Yuen added.Singtel’s systems integration business NCS in July announced a “strategic reset” to pivot from a traditional ICT company primarily based in Singapore, to become a pan-Asia digital and technology services player. With expansion plans targeted for Australia and Greater China, NCS said it planned to add 2,000 new roles over two years and had earmarked earmarked six key sectors to drive its growth into the enterprise space, including healthcare and financial services.

    Singtel, alongside joint bidder, Grab secured one of four digital bank licences in Singapore last December. In their pitch for the licence, the two partners said they would look to target “digital-first” consumers and small and midsize businesses, offering products and services to address the “unmet and underserved” of these market segments. Grab owns a 60% stake in the partnership. Digital bank licensees were expected to begin operations in the country from early-2022. RELATED COVERAGE More

  • in

    Jio Platforms net profit jumps almost 25% to $502 million

    Jio Platforms’ Q2 net profit grew almost 25% year-on-year to ₹3,728 crore, around $502 million, with the company saying customer demand is slowly returning to pre-COVID levels. “As the pandemic retreats, I am pleased that Reliance has posted a strong performance in 2Q FY22. This demonstrates the inherent strengths of our businesses and the robust recovery of the Indian and global economies. All our businesses reflect growth over pre-COVID levels,” Reliance Industries chairman and managing director Mukesh Ambani said. The holding company for India’s biggest telco, Reliance Jio, also reported gross revenue was ₹23,222 crore, $3.1 billion, which is around 15% higher than last year’s performance. Earnings before interest, tax, depreciation, and amortisation (EBITDA) rose 16.6% to ₹9,294 crore, or $1.3 billion.As of the end of September, Jio Platforms said it has just shy of 430 million users. Of that customer base, almost 23.8 million are new users. The monthly average revenue per user during the quarter was ₹143.60 per subscriber, with total data traffic increasing by almost 51% to reach 23 billion GB and voice minutes increasing by 17.6% to 1.09 trillion minutes. On a per-user basis, this translates to monthly data usage of 17.6 GB and 840 minutes.Jio Platforms added that JioFiber now has over 4 million connected premises, with Jio’s optical-fibre network now physically present outside of 16 million premises.In providing its Q2 financial results, Jio Platforms said the JioPhone, which it is working to create alongside Google, is still set to be released during Diwali. The JioPhone’s release date was originally set to be launched earlier, but the company said last month it was facing semiconductor supply issues. Related Coverage More

  • in

    Telstra buying Digicel Pacific thanks to $1.3 billion in Commonwealth funds

    South Sea Island in Fiji, looks nice, but the internet is not.
    Image: Getty Images
    Telstra announced on Monday morning it would be acquiring Digicel Pacific, ending months of speculation that a deal between the telco and the Australian government was in the works. For a total cost of $1.6 billion, Telstra said it would be contributing $270 million, with the Commonwealth to stump up $1.33 billion via “combination of non-recourse debt facilities and equity like securities”. Telstra said it would have 100% control of the entity. Telstra said the Commonwealth made the initial approach. See also: Blaming China is handy when trying to keep telco infrastructure away from Beijing “The Australian government is strongly committed to supporting quality private sector investment infrastructure in the Pacific region. We previously said that if Telstra were to proceed with a transaction it would be with financial and strategic risk management support from the government,” Telstra CEO Andy Penn said. “We also said that in addition to a government funding and support package, any investment would also have to be within certain financial parameters with Telstra’s equity investment being the minor portion of the overall transaction. I am pleased that we have been able to achieve both of those outcomes.” Under Telstra’s proposed restructure, Digicel Pacific would be under Telstra International when the deal closes in three to six months. The telco said it would not exit the deal for at least six years, and has bought political risk insurance for “certain political and regulatory interventions for six years”.

    Digicel Pacific has 2.5 million customers and 1,700 employees, with $431 million in service revenue for the year to March 31, the majority of which location-wise comes from Papua New Guinea, with prepaid mobile being its best selling product. For its fiscal year, the company reported earnings before interest, tax, depreciation, and amortisation of $233 million. Average monthly revenue per user sits at $11.20. Current Digicel owner Denis O’Brien will remain on a Telstra-controlled board. Related Coverage More

  • in

    These are the 10 best bargains on VPN subscriptions

    As the world opens up again to travel, so you may want to get a head start and learn a new language or two. But you also need to remember to protect yourself with a maximum-strength VPN, both at home and abroad. Here are 10 great deals on some of the best VPN services on the market:KeepSolid VPN Unlimited: Lifetime SubscriptionDo you want a VPN that has it all? KeepSolid offers unlimited speed and bandwidth on over 400 servers, plus ultimate security that includes military-grade encryption, a kill switch, zero-logging, and more. This one is tough to beat.For a limited time only, get KeepSolid VPN Unlimited: Lifetime Subscription for $39.99 (reg. $199).FastestVPN: Lifetime Subscription (5 Devices)Get a lifetime of ultimate VPN protection for up to five devices. In addition to military-grade encryption, you get a NAT firewall, kill switch, zero logging, anti-malware, ad blocker, and much more.For a limited time only, get FastestVPN: Lifetime Subscription (5 Devices) for $19.99 (reg. $24.99).BulletVPN: Lifetime SubscriptionThis is a VPN bargain for new users with fast servers in 51 countries. According to The VPN Guru:”If you are looking for a reliable, fast, and secure VPN provider, I would definitely recommend BulletVPN.”

    For a limited time only, get BulletVPN: Lifetime Subscription for $38.99 (reg. $540).Disconnect VPN Premium: Lifetime Subscription (5 Devices)Get a VPN that keeps you safe without slowing you down. The New York Times says:”We researched and tested four tracker blockers and found their results varied widely. In the end, the app Disconnect became our anti-tracking tool of choice”For a limited time only, get Disconnect VPN Premium: Lifetime Subscription (5 Devices) for $39.99 (reg. $700).SlickVPN: Lifetime SubscriptionIf you’re looking for the best VPN for blazing-fast anonymous torrenting, look no further. It has 125 gateways, all with mega-secure encryption.For a limited time only, get SlickVPN: Lifetime Subscription for $19.99 (reg. $1200).WifiMask VPN Unlimited Devices: 3-Year SubscriptionUsers new to WiFiMask can get a deal on speedy, secure VPN protection on all of their devices. Access 21 servers spread over eight countries.For a limited time only, get WifiMask VPN Unlimited Devices: 3-Year Subscription for $39.99 (reg. $143).Hop VPN: Lifetime SubscriptionHop is offering new users a lifetime of VPN protection from snooping, firewalls, and blocking. Turn your entire home into a VPN server.For a limited time only, get Hop VPN: Lifetime Subscription for $39.99 (reg. $148).BelkaVPN: Lifetime SubscriptionFirst-time Belka subscribers can get a great deal on a lifetime of zero-latency VPN protection. Access to over 120 servers, encryption, no logging, and much more are all included.For a limited time only, get BelkaVPN: Lifetime Subscription for $39.99 (reg. $719).VPN.asia: 10-Year SubscriptionVPN coverage in Asia can be hard to come by. But new users can get VPN protection in Asia at a huge discount for a full 10 years.For a limited time only, get VPN.asia: 10-Year Subscription for $79.99 (reg. $1080).AdGuard VPN: 1-Year SubscriptionNow new users can get convenient VPN protection from AdGuard for up to five devices. In addition to all the usual protection, the service will automatically show you the closest and fastest servers.For a limited time only, get AdGuard VPN: 1-Year Subscription for $$19.99 (reg. $71). More

  • in

    CISA awards $2 million to cybersecurity programs for rural, diverse communities

    CISA has announced awards of $2 million to two organizations training underserved communities in cybersecurity. The funding will go to NPower and CyberWarrior, two programs helping to train veterans, military spouses, women and people of color for cybersecurity positions. These are the first awards of their kind handed out by CISA. CISA Director Jen Easterly said addressing the cyber workforce shortage requires the agency to proactively seek out, find and foster prospective talent from nontraditional places. “CISA is dedicated to recruiting and training individuals from all areas and all backgrounds with the aptitude and attitude to succeed in this exciting field,” Easterly said. “It’s not just the right thing to do; it’s the smart thing to do — for the mission and the country. We’re best positioned to solve the cyber challenges facing our nation when we have a diverse range of thought bringing every perspective to the problem.”The organizations are targeting communities with high unemployment as well as those who are underemployed and underserved in both rural and urban areas. CISA explained that they are looking to support programs that benefit communities and populations that may not have access to training programs centered around cybersecurity. CISA, CyberWarrior and NPower will work with them to “develop a scalable and replicable proof of concept to successfully identify and train talented individuals around the country.

    They noted that the effort will help address the “staggering” shortage of cybersecurity talent facing the country. “CyberWarrior is honored to take part in the Cybersecurity Workforce Development and Training Pilot for Underserved Communities,” said Reinier Moquete, founder of the CyberWarrior Foundation. “Working with CISA and other stakeholders, our 28-week bootcamp program will train persons from underserved populations for a career in cybersecurity. We encourage prospective students, employers and workforce stakeholders to reach out and join us in building opportunities for these individuals.”According to CISA, the three-year program seeks to establish a cybersecurity pathways retention strategy while also providing entry-level cybersecurity training and hands-on professional development experience through apprenticeships.Bertina Ceccarelli, CEO of NPower, said her organization’s cybersecurity program offer young adults and veterans the opportunity to advance their careers and deepen their specialties. “This is particularly important for individuals coming from underrepresented communities that systemically lack access to those specialized skills,” Ceccarelli said. “We are honored for the support from CISA, which will enable NPower to expand our reach to trainees across the country.”The award is part of a larger effort by CISA and other agencies to diversify the cybersecurity industry. On Friday, Easterly, NSA cybersecurity director Rob Joyce and Institute for Security and Technology CEO Philip Reiner handed their Twitter accounts over to three Black women, who spoke about their experiences in the tech industry while urging other women of color to join in.CISA has also created a CYBER.org initiative and Cyber Education and Training Assistance Program to promote cybersecurity among young people.  More

  • in

    Hackers somehow got their rootkit a Microsoft-issued digital signature

    Cybersecurity researchers at Bitdefender have detailed how cyber criminals have been using FiveSys, a rootkit that somehow made its way through the driver certification process to be digitally signed by Microsoft.  The valid signature enables the rootkit – malicious software that allows cyber criminals to access and control infected computers – to appear valid and bypass operating systems restrictions and gain what researchers describe as “virtually unlimited privileges”. It’s known for cyber criminals to use stolen digital certificates, but in this case, they’ve managed to acquire a valid one. It’s a still a mystery how cyber criminals were able to get hold of a valid certificate. “Chances is that it was submitted for validation and somehow it got through the checks. While the digital signing requirements detect and stop most of the rootkits, they are not foolproof,” Bogdan Botezatu, director of threat research and reporting at Bitdefender told ZDNet. It’s uncertain how FiveSys is actually distributed, but researchers believe that it’s bundled with cracked software downloads. SEE: A winning strategy for cybersecurity (ZDNet special report) Once installed, FiveSys rootkit redirects internet traffic to a proxy server, which it does by installing a custom root certificate so that the browser won’t warn about the unknown identity of the proxy. This also blocks other malware from writing on the drivers, in what’s likely an attempt to stop other cyber criminals from taking advantage of the compromised system. 

    Analysis of attacks shows that FiveSys rootkit is being used in cyber attacks targeting online gamers, with the aim of stealing login credentials and the ability to hijack in-game purchases. The popularity of online games means that a lot of money can be involved – not only because banking details are connected to accounts, but also because prestigious virtual items can fetch large sums of money when sold, meaning attackers could exploit access to steal and sell these items. Currently, the attacks are targeting gamers in China – which is where researchers also believe that the attackers are operating from.  The campaign started slowly in late 2020, but massively expanded during the course of summer 2021. The campaign is now blocked after researchers at Bitdefender flagged the abuse of digital trust to Microsoft, which revoked the signature. ZDNet contacted Microsoft but hadn’t received a response at the time of publication. While the rootkit is currently being used to steal login credentials from gaming accounts, it’s possible that it could be directed at other targets in future. But by taking some relatively simple cybersecurity precautions, it’s possible to avoid falling victim to this or similar attacks. “In order to stay safe, we recommend that users only download software from the vendor’s website or from trusted resources. Additionally, modern security solutions can help detect malware – including rootkits – and block their execution before they are able to start,” said Botezatu. MORE ON CYBERSECURITY More

  • in

    Illinois candy giant hit with ransomware weeks before Halloween

    Ferrara Candy — the candy giant behind Nerds, Laffy Taffy, Now and Laters, SweetTarts, Jaw Busters, Nips, Runts and Gobstoppers — announced that it was hit with a ransomware attack just weeks before it prepares for one of its biggest holidays: Halloween.The Illinois-based company told ZDNet in a statement that on October 9, they “disrupted a ransomware attack” that encrypted some of their systems. “Upon discovery, we immediately responded to secure all systems and commence an investigation into the nature and scope of this incident. Ferrara is cooperating with law enforcement, and our technical team is working closely with third-party specialists to restore impacted systems as expeditiously fully and as safely as possible,” Ferrara said in a statement to ZDNet. “We have resumed production in select manufacturing facilities, and we are shipping from all of our distribution centers across the country, near to capacity. We are also now working to process all orders in our queue. We want to assure consumers that Ferrara’s Halloween products are on shelves at retailers across the country ahead of the holiday.”Ferrara did not say if it paid a ransom or what ransomware group attacked their systems.The Chicago Tribune and Crain’s Chicago were the first to report the attack. Danny Lopez, CEO of cybersecurity company Glasswall, said it was likely no coincidence that attackers hit a candy company’s supply chain just before Halloween — knowing full well the urgency and demand at this time of year would have increased the likelihood that they would get the payment desired. 

    Cerberus Sentinel vice president Chris Clements added that the situation was more evidence that every company needs to plan for a “worst-case scenario” like a ransomware attack. But even as organizations beef up their defenses, ransomware actors are changing their methods as well. “One such tactic is understanding when is likely to be the victim’s busiest season that can least afford systems downtime and waiting until that has begun to launch their ransomware attack.  After all, a compromised business that doesn’t detect the attacker on day 1 is unlikely to detect the attacker on day 90, especially if the attacker is simply waiting for the opportune time to launch their ransomware,” Clements said. “By doing so, cybercriminals can make any service disruptions and restoration delays maximally painful to their victim to further coerce them to pay the extortion demand rather than attempt to restore systems or data themselves.” More

  • in

    This monster of a phishing campaign is after your passwords

    Microsoft has detailed an unusual phishing campaign aimed at stealing passwords that uses a phishing kit built using pieces of code copied from other hackers’ work.A “phishing kit” is the various software or services designed to facilitate phishing attacks. In this case, the kit has been called ZooToday by Microsoft after some text used by the kit. Microsoft also described it as a ‘Franken-Phish’ because it is made up of different elements, some available for sale through publicly accessible scam sellers or reused and repackaged by other kit resellers.

    ZDNet Recommends

    Microsoft said TodayZoo is using the WorkMail domain AwsApps[.]com to pump out email with links to phishing pages mimicking the Microsoft 365 login page.SEE: Ransomware: Looking for weaknesses in your own network is key to stopping attacksMicrosoft says the attackers have been creating malicious AWS WorkMail accounts “at scale” but are just using randomly generated domain names instead of names that would represent a legitimate company. In other words, it’s a crude phishing product likely made on a thin budget, but large enough to be noticeable. It caught Microsoft’s attention because it impersonated Microsoft’s brand and used a technique called “zero-point font obfuscation” – HTML text with a zero font size in an email – to dodge human detection. Microsoft detected an uptick in zero-font attacks in July.  TodayZoo campaigns in April and May of this year typically impersonated Microsoft 365 login pages and a password-reset request. However. Microsoft found that campaigns in August used Xerox-branded fax and scanner notifications to dupe workers into giving up credentials. 

    Microsoft’s threat researchers have found that most of the phishing landing pages were hosted within cloud provider DigitalOcean. Those pages were identical to the Microsoft 365 signin page.Another unusual trait was that after harvesting credentials, the stolen information was not forwarded to other email accounts but stored on the site itself. This behaviour was a trait of the TodayZoo phishing kit, which has previously focussed on phishing credentials from Zoom video-meeting accounts.SEE: These stealthy hackers avoid Windows but target Linux as they look to steal phone dataBut Microsoft researchers believe this phishing group is a single operation rather than a network of agents. “While many phishing kits are attributed to a wide variety of email campaign patterns and, conversely, many email campaign patterns are associated with many phishing kits, TodayZoo-based pages exclusively utilized the same email campaign patterns, and any of those subsequent email campaigns only surfaced TodayZoo kits. These lead us to believe that the actors behind this specific TodayZoo implementation are operating on their own,” Microsoft said. Microsoft says it informed Amazon about the TodayZoo phishing campaign and that AWS “promptly took action”.  More