More stories

  • in

    Australian government looks to make Essential Eight essential

    The Australian government has flagged its intention to mandate the Essential Eight mitigation strategies, despite many entities not fully wrapping their heads around the Top Four. Since 2013, non-corporate Commonwealth entities (NCCEs) have been required to undertake an annual self-assessment against the Top Four strategies, which are mandated by the Attorney-General’s Department (AGD) Protective Security Policy Framework (PSPF). Entities report their overall compliance with mandatory requirements to AGD.The Joint Committee of Public Accounts and Audit (JCPAA) last year reviewed a pair of reports from the Australian National Audit Office (ANAO). A report on this probe from the JCPAA in December asked AGD whether it was feasible to mandate the Essential Eight, a call the committee made in October 2017, as well as report back on why any entities have yet to implement the Top Four mandated in April 2013.See also: ASD Essential Eight cybersecurity controls not essential: CanberraIn its response [PDF] to the JCPAA, AGD said it remains committed to maintaining robust protective security standards to ensure the PSPF supports entities to manage their risks.”The department has carefully considered … and has held detailed discussions with the [Australian Cyber Security Centre] on the cybersecurity settings in the PSPF,” AGD wrote.”On this basis, the department will recommend an amendment to the PSPF to mandate the Essential Eight.

    “This reflects the ACSC’s advice that entities should progress maturity across all eight strategies … rather than focusing efforts on a smaller subset like the Top Four, as this provides a greater level of protection.”AGD said such an approach has been endorsed by the Government Security Committee, which is an interdepartmental committee that provides strategic oversight of protective security policy.Although keen to make the Essential Eight essential, AGD said doing so would have an impact on the entities required to implement them.”As a result, the department has commenced consultation with the 98 NCCEs about the implications of this proposal,” it added. “The department expects responses from NCCEs by the end of June 2021.”It is also preparing draft amendments to the PSPF and said it is currently considering timeframes for implementation.Another one of the JCPAA’s recommendations was that AGD update the committee on its benchmarking process for Commonwealth entities’ reported compliance with cybersecurity requirements. See also: Labor wants to name and shame poor Commonwealth entity cyber postureANAO in March published findings of an investigation into the effectiveness of cybersecurity risk mitigation strategies implemented by seven government entities, and declared none have fully implemented all the mandatory benchmarks and that self-reporting was weak.AGD told the JCPAA it is “exploring options, including moderation, to further support entities to improve the accuracy of their self-assessments”.”In addition, the department is also reviewing the existing maturity model to ensure it is fit for purpose,” it said.HERE’S MORE More

  • in

    Health highlights challenges with genomic information under current Privacy Act

    The Australian Department of Health has asked for the government to provide more guidance on how to get de-identification right, hoping such advice will be provided when the Privacy Act 1988 receives a facelift.Health, in a submission [PDF] to a review of the Act underway by the Attorney-General’s Department, said the de-identification of data, given the risk of re-identification, is a complex area.”Particularly given the burgeoning demand for access to public sector data at very granular levels, and for linkage with other datasets,” it wrote. The department said that while the Office of the Australian Information Commissioner (OAIC) has published guidance materials on de-identification, data custodians may still need to seek specialist expertise in order to be satisfied that the likelihood of re-identification is low, “particularly in light of advances in data analytic technologies”.”The department is of the view that any changes in the Privacy Act that require additional protections in relation to de-identified, anonymised, and pseudonymised information … will need to be supported by appropriate guidance and expertise in order for implementation to be effective,” it said.See also: Nearly 12-months old COVIDSafe legislation cited as cause of Privacy Act review delaysThe department raised these concerns alongside the issue of genomic information.

    “Genomic information will only fall within the scope of the Privacy Act if it meets the definition of personal information in s 6(1) of the Privacy Act, which can be challenging particularly in the context of data sharing and linkage activities necessary for genomics,” it explained.”There is uncertainty and inconsistency in the application of the current test as to whether genomic information is ‘about’ an individual who is ‘reasonably identifiable’, in which case it falls within scope of Privacy Act.”Health said it is therefore difficult to assess when genomic information may render a person reasonably identifiable, particularly as data moves between different collections with different data linkage possibilities.”Such lack of clarity is likely to present a barrier to the uptake of clinical genomic research and services, as individuals may be unwilling to share their genomic information,” it said.On the idea of balancing the provision of adequate information to individuals and minimising regulatory burden, Health noted there are currently up to 10 different requirements that could be included in Australian Privacy Principle (APP) 5 — APP 5 requires an APP entity that collects personal information about an individual to take reasonable steps either to notify the individual of certain matters or to ensure the individual is aware of those matters.”The department would be broadly supportive of appropriate measures to simplify this process, including additional guidance about the scope of APP 5 notices, the role of overarching privacy notices in making individuals aware of APP 5 matters, and the development of a standard form of words to assist APP entities in complying with APP 5 obligations,” it wrote.”In addition, the department would further support any appropriate measures that assist in clarifying how the primary purpose of collection should be interpreted, particularly where there could be multiple purposes for which personal information is being collected.”The department said it would welcome any appropriate measures aimed at simplifying the notification process relevant to APP 5, in particular the development of a standardised framework of notice.It also said requirements to obtain more specific and explicit consent in relation to the purposes for which information is collected, used, or disclosed would provide the department with greater immediate clarity around obligations for the handling of personal information.”The ability to use or disclose personal information for secondary purposes unforeseen at the time of collection provides significant benefit to both government and the Australian public by, for example, facilitating continuous improvement and evaluation of policy implementation and reducing the risk of individuals being disadvantaged in service delivery by not having provided the appropriate consent,” it added. “The department is cognisant of the need to guard against function creep while at the same time offering some measure of flexibility with respect to unforeseen but beneficial secondary purpose uses or disclosures.”MORE FROM THE PRIVACY ACT REVIEW More

  • in

    Cryptojacking, reverse proxy phishing to list of cryptocurrency cyberthreats

    Crypto market capitalization reached nearly $2 trillion in March and there has never been more interest in cryptocurrency globally. But with the influx of investment has come a variety of cybersecurity risks to cryptocurrency wallets and evolving threats to exchanges. The most common attack methods dominating conversation in cybercriminal forums are reverse proxy phishing, cryptojacking, dusting and clipping, according to a new study from Digital Shadows. The company’s Photon Research Team scanned the dark web to sort out the most popular techniques used to either steal or mine for cryptocurrency. Many of the widely used tactics, like reverse proxy phishing, revolve around getting past two-factor authentication by effectively snooping in on traffic between two people. Cryptojacking has long been a popular scam leveraged by cybercriminals, allowing an attacker to use a victim’s device to mine cryptocurrency. Clipping is when attackers manage to steal cryptocurrency while it is being sent during a transaction and crypto dusting involves “deanonymizing your crypto wallet by sending tiny amounts of crypto ‘dust’ to multiple wallets,” the report described.All of the methods are riffs on brands of cyberattacks used in other contexts outside of cryptocurrency. Chris Morales, CISO for Netenrich said it was “the same game with a different name,” with attackers moving on from financial documents and bank accounts to digital wallets and crypto mining. “The method is still social engineering with phishing and malware for mining on your hardware. I see names like dusting and I think about credit card skimming,” Morales said. “I see clipping and I think of URL redirecting.”The study notes that even cybercriminals themselves deal with thefts from their own wallets. 

    “We’ve recently seen a few forum threads where threat actors complain about having their virtual currency stolen,” the report said.  “One user even held an ‘ask me anything’ session after they lost ‘100k’ due to ‘being phished’ in May 2021. Another wrote, ‘I want my currency back, this is god damn bad,’ after their Etherium was stolen.”A report from Atlas VPN in January found that cybercriminals stole “nearly $3.78 billion” in cryptocurrency throughout 2020. Other data from Slowmist Hacked listed 122 attacks in 2020, with most targeting cryptocurrency exchanges, Bitcoin wallets, and decentralized apps running on the Ethereum platform. Coalfire director Karl Steinkamp noted that software wallets will only be as strong as their software and security development processes, as well as how the end user secures it. “I wouldn’t be surprised to see vulnerabilities in some of the software wallet providers over time that allows these wallets to be accessed before being patched or updated. The same is not generally true for hardware wallets as these tend to be purpose built and would require a more sophisticated skill set to compromise,” Steinkamp added. James McQuiggan, security awareness advocate at KnowBe4, explained to ZDNet that using phishing to steal cryptocurrency will be the easiest way for cybercriminals to get money from a victim.  “Clicking the link in a phishing email is like having a high-tech security system at home and leaving the door open when you click on the link or open the attachment from the phishing email. Unfortunately, if you are not monitoring your crypto wallet or computer, you might overlook the cyber criminal rooting around on your computer,” McQuiggan said. “Cryptojacking is another attack method that cyber criminals utilize to make money without doing a lot of work. But, again, phishing becomes the easiest way for cyber criminals to work their way through a network and find servers to run their cryptomining to generate the currency.” More

  • in

    Constituent platform used by Congress hit with ransomware as NYC faces legal department hack

    News emerged on Tuesday morning that iConstituent, a platform built to facilitate communication between politicians and local residents, has been dealing with a ransomware attack. iConstituent did not respond to requests for comment, but Punchbowl News reported that almost 60 members of Congress use the platform. Chief Administrative Officer of the House Catherine Szpindor told the news outlet that they were notified of a ransomware attack on iConstituent’s e-newsletter system, which House members buy access to. 

    ZDNet Recommends

    But Szpindor added that no data from the House had been taken or accessed and the network used by the House was not affected. Sophos’ Senior Security Advisor John Shier said the attack was yet another example of the way ransomware actors use supply chains as a way of gaining access to bigger targets. “Regardless of what you do, you’re in somebody’s supply chain, whether you’re providing services directly to another party or you’re part of a larger organization or mechanism that provides services or products to other people,” Shier said. The platform is also used widely across state governments in Nevada, Georgia, Hawaii and cities like Los Angeles. The New York State Assembly also has a contract with the company for services. The attack was revealed as the White House and law enforcement agencies take a more forceful stance on ransomware after devastating attacks on the country’s biggest meat processor and one of the country’s largest oil and gas providers. 

    The tough rhetoric has done little to stop cybercriminals from levying a wide variety of attacks on institutions across state and city governments. The New York City Law Department was hacked on Sunday, forcing IT administrators to shut off access to certain systems for more than 1,000 employees. The organization handles all of the city’s legal matters and carries an enormous amount of personal information about the city’s employees, including Social Security numbers, addresses and more. Mayor Bill De Blasio appeared on television and said there has been no ransom request or compromise of city data, but investigators are still assessing the situation.Rajiv Pimplaskar, chief risk officer for Veridium, told ZDNet that New York has one of the nation’s top IT and cyber security infrastructure and organizations, demonstrating that no matter how good you are, no one is immune from breaches. Both Shier and Pimplaskar added that government agencies are ripe targets because of how much personal information they carry and because they are often using outdated systems and technology. “Departments that deal with sensitive information and customer data are prime targets for bad actors as they represent a honeypot of Personally Identifiable Information that can be a target in its own right or in turn be misused for social engineering and secondary attacks,” Pimplaskar said.  More

  • in

    Using computational tools for molecule discovery

    Discovering a drug, material, or anything new requires finding and understanding molecules. It’s a time- and labor-intensive process, which can be helped along by a chemist’s expertise, but it can only go so quickly, be so efficient, and there’s no guarantee for success. Connor Coley is looking to change that dynamic. The Henri Slezynger (1957) Career Development Assistant Professor in the MIT Department of Chemical Engineering is developing computational tools that would be able to predict molecular behavior and learn from the successes and mistakes.

    It’s an intuitive approach and one that still has obstacles, but Coley says that this autonomous platform holds enormous potential for remaking the discovery process. A reservoir of untapped and never-before-imagined molecules would be opened up. Suggestions could be made from the outset, offering a running start and shortening the overall timeline from idea to result. And human capital would no longer be a restriction, allowing scientists to be be freed up from monitoring every step and instead tackle bigger questions that they weren’t able to before. “This would let us boost our productivity and scale out the discovery process much more efficiently,” he says.

    Playing detective

    Molecules present a couple of challenges. They take time to figure out and there are a lot of them. Coley cites estimates that there are 1020 to 1060 that are small and biologically relevant, but fewer than 109 have been synthesized and tested. To close that gap and accelerate the process, his group has been working on computational techniques that learn to correlate molecular structures with their functions.

    One of the tools is guided optimization, which would evaluate a molecule across a number of dimensions and determine which will have the best properties for a given task. The aim is to have the model make better predictions as it runs through a technique called active learning, and Coley says that it might reduce the number of experiments it takes for a hypothetical new drug to go from initial stages to clinical trials “by an order of magnitude.”

    There are still inherent limitations. The guided optimization relies on models that are currently available, and molecules, unlike images, aren’t numerical or static. Their shapes change based on factors like environment and temperature. Coley is looking to take those elements into account, so the tool can learn patterns, and the result would be “a more nuanced understanding of what it means to have a molecular structure and how best to capture that as an input to these machine learning models.”

    One bottleneck, as he calls it, is having good test cases to benchmark performance. As an example, two molecules that are mirror images can still behave differently in different environments, one of those being the human body, but many datasets don’t show that. Developing new algorithms and models requires having specific tasks and goals, and he’s working on creating synthetic benchmarks that would be controlled but would still reflect real applications.

    More than selecting molecules, Coley is also working on tools that would generate new structures. The typical method is for a scientist to design property models and make a query. What comes out is a prediction of molecular function, but only for the molecule that was requested. Coley says that new approaches make it possible to ask the model to come up with new ideas and structures that would have a good set of properties, even though it hasn’t been specifically queried. In essence, it “inverts” the process.

    The potential is enormous, but the models are still data-inefficient. It could take more than 100,000 guesses before a “good” molecule is found, which is too many, says Coley, adding that the desire is to be able to discover molecules in a closed-loop fashion. An essential aspect of achieving that goal is to constrain generation to abide by the rules of synthetic chemistry; otherwise, it could take months to test what the model proposes. In the new approach, it would be able to “quality check” and propose both molecules and pathways. He also wants to get to the point where models will understand the variability in and uncertainty of real-world situations. Together, these capabilities would reduce the reliance on human intuition, giving chemists a head start and the time to take on higher level tasks.

    The upside of mistakes

    One limitation with improving any data-driven model is that it hinges on available literature. Coley would like to open that up through a collaborative effort he co-leads, the Open Reaction Database. It would be community-driven, synthetic chemistry-focused and encourage researchers to share experiments that haven’t worked and wouldn’t normally be published. That’s not the usual request, and it would entail a mindset shift in the chemistry field, but Coley says that there’s a value in looking at what weren’t “successes.” “It adds richness to the data we have,” he says.

    That’s the overarching theme to his work. The computational model would build on the last 100 years of chemistry and end up being a platform that keeps learning. The big-picture goal is to fully automate the process of research. Models and robotics could pick the solutions and mixtures and perform the heating, stirring, and purifying, and whatever product was made could be fed back in and be the start for the next experiment. “That could be hugely enabling in terms of our ability to efficiently make, test, and discover new chemical matter,” Coley says.

    And the end result is that restrictions on discovery would come down to the availability of platforms, not the availability of time, a question of capital rather than human resources. The missing piece is designing a computational approach that can identify new structures and have a better chance from the outset of success. In actuality, it’s not about automation. That approach goes through steps in a prescribed manner. What Coley wants is that extra component of being able to generate ideas, test hypotheses, respond to surprises, and adjust accordingly. “My goal is to achieve that full level of autonomy,” he says. More

  • in

    Microsoft June 2021 Patch Tuesday: 50 vulnerabilities patched, six zero-days exploited in the wild

    Microsoft has released 50 security fixes for software to resolve critical and important issues including six zero-days that are being actively exploited in the wild. In the Redmond giant’s latest round of patches, usually released on the second Tuesday of each month in what is known as Patch Tuesday, Microsoft has fixed problems including remote code execution (RCE) bugs, denial-of-service issues, privilege escalation, and memory corruption issues.  In total, when it comes to severity, five of the vulnerabilities are considered critical and 45 are deemed important.  Products impacted by June’s security update include Microsoft Office, .NET Core & Visual Studio, the Edge browser, Windows Cryptographic Services, SharePoint, Outlook, and Excel.  Also: The zero-day vulnerabilities that Microsoft has tracked as being actively exploited, now patched in this update, are:  CVE-2021-33742: Windows MSHTML Platform Remote Code Execution Vulnerability, CVSS 7.5CVE-2021-33739: Microsoft DWM Core Library Elevation of Privilege Vulnerability, CVSS 8.4CVE-2021-31199: Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability, CVSS 5.2CVE-2021-31201: Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability, CVSS 5.2CVE-2021-31955: Windows Kernel Information Disclosure Vulnerability, CVSS 5.5CVE-2021-31956: Windows NTFS Elevation of Privilege Vulnerability, CVSS 7.8Another zero-day reported by Microsoft, but not actively exploited in the wild, is CVE-2021-31968. Issued a CVSS score of 7.5, this flaw, now patched, could be exploited to trigger denial-of-service. 

    Eight of the vulnerabilities were reported by the Zero Day Initiative (ZDI). Microsoft has also acknowledged reports from Google’s Threat Analysis Group, Google Project Zero, Nixu Cybersecurity, Check Point Research, FireEye, Kaspersky, and others.  “While these vulnerabilities have already been exploited in the wild as zero-days, it is still vital that organizations apply these patches as soon as possible. Unpatched flaws remain a problem for many organizations months after patches have been released,” Tenable commented. Last month, Microsoft resolved 55 security flaws, four of which were deemed critical in the May batch of security fixes. Three zero-day vulnerabilities were also patched at the same time, but thankfully, none appear to have been exploited in the wild.  A month prior, the tech giant tackled 114 vulnerabilities during April’s Patch Tuesday. The US National Security Agency (NSA) was credited with reporting two remote code execution (RCE) vulnerability flaws (CVE-2021-28480 and CVE-2021-28481) in Exchange Server. More

  • in

    This is how fast a password leaked on the web will be tested out by hackers

    Half of accounts compromised in phishing attacks are manually accessed within 12 hours of the username and password being leaked, as cyber criminals look to exploit stolen credentials as quickly as possible.

    ZDNet Recommends

    Cybersecurity researchers at Agari planted thousands of credentials which were made to look like they belonged to real users, but were in fact of under the control of the researchers, onto websites and forums popular for dumping stolen usernames and passwords. The false credentials – seeded over the course of six months – were designed to look like compromised logins for well-known cloud software applications.Researchers found that the accounts are actively accessed within hours of the login credentials being posted online on phishing websites and forums.”About half of of the accounts were accessed within 12 hours of us actually seeding the sites. 20% are accessed within an hour and 40% are accessed within six hours. That really shows you how quickly a compromised account is exploited,” Crane Hassold, senior director of threat research at Agari told ZDNet. Almost all of the accounts were accessed manually. It might be a mundane task, but ultimately, it proves useful for cyber criminals, as they can accurately test if the credentials do really work.”It’s a pretty tedious process I’m sure on their end, but they’re getting a lot of good information from it and they’re using the accounts in a variety of different ways for different types of malicious activity,” said Hassold.

    For example, by accessing an account, an attacker can attempt to find sensitive information in people’s email inboxes, or even their cloud storage software, which could be stolen and either used to help further attacks or sold on.There’s also the possibility that the attackers could use the compromised accounts to conduct other attacks, such as phishing or Business Email Compromise (BEC) attacks, using the compromised account in order to launch further campaigns.One attacker attempted to use a compromised account to conduct BEC attacks against the real estate sector, launching emails that would have attempted to redirect victims to a website to steal login details of real estate companies. However, in this case, because the fake credentials were controlled by researchers, none of the attempted emails actually arrived at their intended destinations.

    ZDNet Recommends

    The best password manager

    Everyone needs a password manager. It’s the only way to maintain unique, hard-to-guess credentials for every secure site you and your team access daily.

    Read More

    However, it demonstrates how cyber criminals take compromised credentials and attempt to exploit them in order to gain access to additional accounts.”Where you have credential phishing, it leads to a compromised account, which leads to more credential phishing campaigns which leads to more compromised accounts and so on,” said Hassold.While compromised accounts are accessed quickly, the research found that they’re often abandoned after about a week – although by this time it’s likely that’s because the attackers have moved onto other accounts, perhaps after using the initial account as a stepping stone to get there. Organisations can take precautions to defend their users, cloud applications and the wider network from phishing and other attacks. One of these is having appropriate defences in place, like anti-virus software or spam filter. Meanwhile, using multi-factor authentication can help prevent compromised accounts from being exploited, as it makes it much harder for an attacker to use – while also alerting the victim that something is wrong. MORE ON CYBERSECURITY More

  • in

    AI transcription company becomes unicorn

    A transcription and captioning company is the latest to join the unicorn club. Verbit, which has developed an AI-centered speech-to-text process that’s highly accurate, has closed a Series D worth $157 million on a valuation in excess of $1 billion.

    “The transcription market has been ripe for innovation. That’s the initial reason why I founded Verbit. The shift to remote work and accelerated digitization amid the pandemic has been a major catalyst for this $30 billion industry and has further driven Verbit’s already-rapid development,” said Tom Livne, CEO and Founder of Verbit. “Securing this new funding is yet another milestone that brings us closer to becoming a public company, which will further fuel our expansion through strategic acquisitions and investments.” The company’s total funding is now over $250 million, perhaps a surprising vote of confidence for a company that focuses on the surprisingly mundane (and heretofore largely human-powered) task of translating speech to writing.If that sounds simple, it’s not. Spoken language is incredibly difficult for a machine to interpret accurately. The rise of voice recognition technology and the power of machine learning to parse spoken language with help from immense datasets has helped Verbit make important advances. AI-only transcription is still far from perfect, but companies are increasingly relying on AI for a first pass at transcribing audio.As we recently reported, Verbit has been making moves to corner the market through acquisition. Verbit recently acquired VITAC, a company focused on communication accessibility via captioning, which is responsible for captioning hundreds of thousands of programming hours each year, with clients including every broadcast company and most cable networks, as well as Fortune 1000 Corporations, educational institutions, and government agencies.That broad customer base points to the prolific market for transcription and captioning services, which helps explain Verbit’s eye-popping valuation. Verbit has seen 6x year-over-year revenue growth and close to $100 million in annual recurring revenue.”With their hybrid transcription platform bringing together innovative technology and a network of over 30,000 transcribers, Verbit has forged a winning combination of AI and human intelligence,” said Jai Das, president and partner at Sapphire Ventures. “The company has had unparalleled growth akin to some big, well-known companies out there and we’re very impressed by the team’s ability to achieve a unicorn valuation in just four years. We’re looking forward to continuing to be part of this exciting journey with Verbit.” More