More stories

  • in

    Google: After using Rust, we slashed Android memory safety vulnerabilities

    Google’s decision to use Rust for new code in Android in order to reduce memory-related flaws appears to be paying off. Memory safety vulnerabilities in Android have been more than halved — a milestone that coincides with Google’s switch from C and C++ to the memory-safe programming language, Rust. This is the first year that […] More

  • in

    Eufy's security cameras send data to the cloud without consent, and that's not the worst part

    Illustration: Maria Diaz | ZDNET – Photo: MaryAnnShmueli via Getty Images Eufy’s claims to keep “privacy in your own hands” have been rendered null, after a researcher caught the security camera company uploading local-only footage to the cloud without user authorization or knowledge. To top it all off, users have also been made aware that […] More

  • in

    How to add a credit card as a Bitwarden vault item and why you should

    SARINYAPINNGAM/Getty Images/iStockphoto Bitwarden is one of many password managers on the market, most of which include a bevy of features. As more and more people start using a password manager in their daily life, the creators of the tools add extra features to make them more appealing. ZDNET Recommends One such feature you might find […] More

  • in

    These file types are the ones most commonly used by hackers to hide their malware

    Image: Getty ZIP and RAR files have overtaken Office documents as the file most commonly used by cyber criminals to deliver malware, according to an analysis of real-world cyber attacks and data collected from millions of PCs.  The research, based on customer data by HP Wolf Security, found in the period between July and September […] More

  • in

    Medibank hackers reportedly release all data on dark web

    Hackers who breached Medibank’s systems have dumped another batch of data on the dark web, along with claims the files contain all of the data they took in a heist that impacted 9.7 million customers. The Australian insurance group confirms six zipped files of data have been released, while government officials reiterate the overdue need to overhaul the country’s cyber strategy. Medibank on Thursday said it was analysing the data, which was released overnight on the dark web, but added that the files appeared to comprise customer information compromised in the breach. First announced in October, the security incident affected 9.7 million current and former customers as well as some of their authorised representatives. Amongst those impacted were 1.8 million international customers. Before the latest data dump, hackers involved in the theft had released the files in batches along with demands for ransom. Medibank had said it would not pay any ransom.In its statement Thursday, the insurance company said there was no indication financial or banking details had been compromised and the stolen data alone was insufficient to facilitate identity or financial fraud. It further noted that the raw data, so far, had been determined to be incomplete and difficult to understand. This remained so for the latest six zipped files, which were released in a folder tagged “full”, Medibank said, adding that the health data released was not matched up with customer and contact details. Australia’s Attorney-General Mark Dreyfus said the government was aware of the latest data dump and confirmed “agencies” were looking into it. A review of the country’s Privacy Act also was slated to be completed by year-end, Dreyfus said when asked about how legislation should be further updated, following the recent increase in penalties for data breaches. Speaking in an interview with ABC Radio Melbourne, he said: “This is a really outdated piece of legislation. We need to have a wholesale reform of it.”Dreyfus added that he would be working on a “complete revision” of the Privacy Act next year. Until then, he noted that the significant increase in financial penalties should serve as an incentive for local organisations that stored personal information of Australian residents to ensure they took better care of the data and adopted better security measures. The government last month passed a legislation to push up maximum financial penalties for serious or repeated data breaches to AU$50 million ($32.34 million), from its previous AU$2.22 million, or three times the value of any benefit obtained through the data misuse, or 30% of the company’s adjusted turnover in the relevant period, whichever is greater. RELATED COVERAGE More

  • in

    Google shares details of newly-found commercial spyware threats

    Image: Getty Images Google on Wednesday shared the details of newly exposed exploitation frameworks capable of deploying spyware to targeted devices. Dubbed the “Heliconia” exploits, they appear to have ties to the Spanish company Variston IT, according to Google Threat Analysis Group (TAG).  Heliconia targets n-day vulnerabilities, meaning that there are already patches available for […] More

  • in

    Singapore releases blueprint to combat ransomware attacks

    Singapore has released what it says is a blueprint to combat growing ransomware threat and offer guidelines on how to mitigate such attacks. These include a reference ransomware “kill chain” and recommendations on whether to pay ransom demands. Ransomware risks had increased significantly in scale and impact, becoming an “urgent” problem that countries including Singapore must address, said Cyber Security Agency (CSA) in a statement Wednesday.  “It is inherently an international problem, as attackers conduct their operations across borders and jurisdictional lines to evade justice” the government agency said. “Fuelled by illicit monetary gains, ransomware has raised a criminal ecosystem, offering criminal services from unauthorised access to targeted networks to money laundering services.”To effectively address the challenge, it underscored the need to coordinate cybersecurity, law enforcement, and financial regulatory agencies as well as support global collaboration. This had prompted Singapore to establish an inter-agency task force early this year, comprising senior representatives from various ministries and government agencies including CSA, Government Technology Agency, Ministry of Defence, Monetary Authority of Singapore, and Singapore Police Force.  The task force focused on three primary outcomes encompassing a reference model for a ransomware kill chain, which would serve as the foundation for government agencies to coordinate and develop counter-ransomware solutions. It also reviewed the country’s policies towards making ransom payments and established recommendations of operational plans and capabilities needed to combat ransomware effectively. The kill chain outlines five stages of a ransomware attack, starting from the phases before it is activated and when attackers gain access to the targeted system and and execute preparatory steps, such as data exfiltration and removal of backups. Stealth is a priority here and attackers have been known to carry out these stages months before activation, according to the blueprint. It highlighted that “prevention is better than cure”, the report noted, adding that cutting the skill chain at the initial two stages should be the priority. “Having a common reference model of a ransomware kill chain will allow countries to better understand each other, facilitate information sharing, benchmark counter-ransomware best practices, and identify gaps in existing national measures,” the task force said in the report. The blueprint also supported Singapore’s stance that payment of ransoms should be “strongly discouraged”, as doing so would further fuel the ransomware problem since that was the attacker’s main objective.Furthermore, paying the ransom neither guaranteed the decryption of data nor that the data would not be published by the hackers. The task force noted that organisations that opted to pay the ransom could be identified as “soft” targets and be hit again. In addition, payment of ransoms in such attacks under certain circumstance may breach the Terrorism Act 2002, which criminalises the financing of terrorist acts. With this in mind, the task force recommended government agencies and owners of critical information infrastructures (CII) consider the risk and notify CSA and law enforcement, in the event of a ransomware attack, before making any ransom payment.it also suggested the government looked at four key action plans, including strengthening the cyber defence of high-risk targets, such as CIIs and government agencies, as well as supporting recovery so victims of ransomware attacks did not feel pressured to pay the ransom. According to CSA, the number of reported ransomware cases totalled 137 last year, up 54% from 2020, with SMBs from sectors such as manufacturing and IT mostly falling victims to such attacks. It added that ransomware groups targeting SMBs in Singapore tapped the ransomware-as-a-service model, which made it easier for amateur hackers to use existing infrastructure to push out ransomware payloads. RELATED COVERAGE More