Microsoft Teams Used by Russia-Linked Hackers to Target Firms With Phishing Campaign, Microsoft Says

A Russian government-linked hacking group took aim at dozens of global organizations with a campaign to steal login credentials by engaging users in Microsoft Teams chats pretending to be from technical support, Microsoft researchers said on Wednesday.

These “highly targeted” social engineering attacks have affected “fewer than 40 unique global organizations” since late May, Microsoft researchers said in a blog, adding that the company was investigating.

The Russian embassy in Washington didn’t immediately respond to a request for comment.

The hackers set up domains and accounts that looked like technical support and tried to engage Teams users in chats and get them to approve multifactor authentication (MFA) prompts, the researchers said.

“Microsoft has mitigated the actor from using the domains and continues to investigate this activity and work to remediate the impact of the attack,” they added.

Teams is Microsoft’s proprietary business communication platform, with more than 280 million active users, according to the company’s January financial statement.

MFAs are a widely recommended security measure aimed at preventing hacking or stealing of credentials. The Teams targeting suggests hackers are finding new ways to get past it.

The hacking group behind this activity, known in the industry as Midnight Blizzard or APT29, is based in Russia, and the UK and US governments have linked it to the country’s foreign intelligence service, the researchers said.

“The organizations targeted in this activity likely indicate specific espionage objectives by Midnight Blizzard directed at the government, non-government organizations (NGOs), IT services, technology, discrete manufacturing, and media sectors,” they said, without naming any of the targets.

“This latest attack, combined with past activity, further demonstrates Midnight Blizzard’s ongoing execution of their objectives using both new and common techniques,” the researchers wrote.

Midnight Blizzard has been known to target such organizations, mainly in the US and Europe, going back to 2018, they added.

The hackers used already-compromised Microsoft 365 accounts owned by small businesses to make new domains that appeared to be technical support entities and had the word “Microsoft” in them, according to details in the Microsoft blog. Accounts tied to these domains then sent phishing messages to bait people via Teams, the researchers said. 

© Thomson Reuters 2023  


Samsung launched the Galaxy Z Fold 5 and Galaxy Z Flip 5 alongside the Galaxy Tab S9 series and Galaxy Watch 6 series at its first Galaxy Unpacked event in South Korea. We discuss the company’s new devices and more on the latest episode of Orbital, the Gadgets 360 podcast. Orbital is available on Spotify, Gaana, JioSaavn, Google Podcasts, Apple Podcasts, Amazon Music and wherever you get your podcasts.
Affiliate links may be automatically generated – see our ethics statement for details.

Check out our Latest News and Follow us at Facebook

Original Source

Parliamentary Panel Suggests Setting Up Framework to Deal With Cyber Crimes

A parliamentary panel on Thursday expressed concern over mushrooming of cyber crimes and increasing data vulnerability, and suggested that the government should come out with a framework to deal with such risks. 

The Standing Committee on Finance recommended setting up of Cyber Protection Authority (CPA) and advocated that the CPA engage ethical hackers to test ecosystem participants.

To enhance the prevention and detection of fraud in the banking sector, the committee headed by Jayant Sinha strongly suggested the establishment of a Central Negative Registry and that the CPA should maintain this registry.

Noting that current compensatory mechanism for victims of cybercrime in the financial sector has limited scope and coverage, the panel said financial institutions must play a supportive role as there is a fiduciary relationship between financial institutions and their customers.

The process of filing a compensation claim is complex and time-consuming, placing the burden of proof on the victims to establish the connection between the cyber crime incident and the resulting financial loss, which is particularly challenging due to the traceability issues associated with cyber crimes.

The committee strongly believes there should be an automatic compensation system as devised by RBI and it should be the financial institution’s sole responsibility to immediately compensate the hapless customer, pending further investigation and final traceability of funds, the report said.

This proactive approach aligns with the principle of safeguarding customer interests and ensuring rapid resolution in cases of cybercrime in the financial sector, it said.

Observing that India is indisputably one of the best regulated and safest digital financial ecosystems in the world, the panel expressed concern over the mushrooming of cyber crimes and increasing data vulnerabilities even as digitisation has rapidly expanded across the country.

Within a few years, it is likely that a billion Indian citizens will be conducting hundreds of billions transactions online mediated entirely through large-scale, pervasive computer networks, systems, and algorithms, the panel said.

Simultaneously, it said, criminals are getting more and more innovative and difficult to track since they can now utilise powerful new technologies and operate in lightly policed or hostile jurisdictions.

These new and threatening technologies include generative artificial intelligence (Al), chatbots, and quantum computing, which raises the threat level exponentially.

To maintain its status as one of the world’s best digital financial ecosystems, India should consider evolving its cyber security policy framework across five major dimensions to establish a more dynamic and proactive regulatory framework.

It should empower a centralized authority for cyber security which can work with all digital ecosystem participants in India and around the world; formulate fairer and more responsive consumer grievance redressal and compensation mechanisms: strengthen central and state cyber security enforcement capabilities; and achieve closer global cooperation with other leading countries.

Working simultaneously across all these 5 dimensions will ensure that India develops the world’s most innovative, secure and resilient digital financial ecosystem.

The panel said cyber security regulations will have to evolve rapidly to take into account various technological developments and to stay ahead of bad actors.

There have been challenges in exerting sufficient control over third-party service providers, including Big Tech and Telecom companies on cyber security matters. Secondly, downtime in critical payment systems is able to disrupt customer services, which is not currently regulated.

Besides, it said, there is no clear process to either continuously whitelist or blacklist apps and maintain a central registry of apps that have the ability to tap digital payment and settlement systems.

“Today’s regulatory frameworks are focused mostly on fire-fighting, but they need to be much more dynamic in anticipating and dealing with emerging threats and vulnerabilities of the digital financial ecosystem,” it said.

Specific threats today include misuse of SMS templates, telemarketer verification lapses, insufficient maker-checker processes, weak security controls in fund transfer systems, and vulnerabilities in ATM channel communication.

The situation is exacerbated by limited coordination among different agencies and inadequate incident response as well as enforcement mechanisms.

The committee, therefore, to strengthen cyber security measures, mitigate vulnerabilities, and ensure the integrity of the financial sector’s digital infrastructure recommended some concrete measures including regulation of service providers, maker-checker processes and ATM Channel security.

During the committee hearings, RBI provided evidence that Big Tech companies have refused to make various modifications to their mobile operating systems to make the OTP based two-factor authentication protocol even more secure.

It underlined the importance of the enforcement system in addressing cyber fraud and stressed the importance of local police to take effective action against cyber crimes.

The committee further said that promoting supervisory cooperation and knowledge exchange with global regulators will facilitate a collective response to the exponentially growing cyber threats.

The panel, therefore, strongly urged the government to adopt and go beyond global best practices — in short to develop ‘next practices’ based on India’s specific needs and requirements. 


Affiliate links may be automatically generated – see our ethics statement for details.

Check out our Latest News and Follow us at Facebook

Original Source

Apple reveals some devices vulnerable to hackers without update

Apple released a new security update Wednesday as the company revealed alarming vulnerabilities that could enable hackers to take control of certain devices, including iPhones.

The company said iPads and Macs operating on older software were also susceptible to hackers.

New security updates for iPhones dating bad to the 6s, all iPad Pro models, iPad Air 2, iPad 5th generation and later, iPad mini 4 and later, and the 7th generation iPod touch are meant to safeguard against such attacks.

The vulnerabilities affect iPhones dating back to the 6th generation.
AP/Richard Drew

Apple said hackers could potentially infiltrate devices through “maliciously crafted web content.”

This means hackers could get “full admin access” to the device, allowing intruders to impersonate the owner and run any software in their name, said Rachel Tobac, CEO of SocialProof Security.

The announcement has prompted security experts to advise users to update their Apple products, including computers.

“An attacker could exploit one of these vulnerabilities to take control of an affected device,” Cybersecurity & Infrastructure Security Agency said.

Apple did not disclose how, where or by whom the vulnerabilities were discovered.

With Post Wires



Check out our Latest News and Follow us at Facebook

Original Source

Hackers Flocking to RenBridge to Launder Stolen Crypto Funds, $540 Million Washed So Far

At a time when blockchain bridges have been struggling to safeguard their operations from hackers, one such bridge has become a tool-of-favour for crypto criminals. As per blockchain analytics provider Elliptic, hackers have been flocking to RenBridge to wash the funds they have obtained via hacks and scams. In the last two years, over $540 million (roughly Rs. 4,290 crore) have reportedly been laundered by RenBridge. The platform is a decentralised application (dApp) that allows the minting of real BTC, ZEC, and BCH on Ethereum as an ERC20 token (renBTC, renZEC, renBCH).

“Crypto assets stolen from exchanges and decentralised finance (DeFi) services worth at least $267.2 million (2,122 crore) have been laundered through RenBridge over the past two years. RenBridge is also an important facilitator for Russia-linked ransomware gangs, with over $153 million (roughly Rs. 1,215 crore) in ransom payments laundered through the service to date,” Elliptic said in its blog post.

Earlier this month, Nomad, a cross-chain bridge lost $200 million (roughly Rs. 1,570 crore) in a protocol exploit.

In its report, Elliptic has noted that $2.4 million (roughly Rs. 20 crore) in crypto assets stolen from Nomad have also been sent through RenBridge.

Decentralised cross-chain bridges such as RenBridge provide an unregulated alternative to exchanges for transferring value between blockchains and hence pose a challenge.

Transactions on these cross-chain bridges are processed by a network of thousands of pseudonymous validators known as “Darknodes”.

Malicious actors exploit these bridges by depositing their tokens from one chain to the bridge and then receiving the equivalent of a parallel token in another chain.

Back in July, the Financial Action Task Force (FATF) had published a special report, highlighting the rising number of cases showing misuse of DeFi tools such as cross-chain bridges.

The FATF is the global standard setter for anti-money laundering and countering the financing of terrorism (AML/CFT) measures.

In its report, the body has said that illicit activities involving cross-chain bridges will become an area of increasing regulatory focus as 2022 steps into its second-half.


Check out our Latest News and Follow us at Facebook

Original Source

Spain Warns of Possible Cyberattack at NATO Summit, Does Not Name the Country

Spain’s defence minister Margarita Robles warned on Friday of a possible cyberattack during the NATO summit in Madrid next week.

Asked if Spain feared Russia could launch such an attack, Robles told journalists “the possibility of a cyberattack exists”, without mentioning the country by name.

“There are many challenges and many threats,” she said, adding that there were “many people working… to prevent any situation that could affect security” at the summit on June 28-30.

According to the Barcelona daily La Vanguardia, Spanish intelligence services fear a Russian attack on strategic infrastructure such as airports, hospitals, or water and energy supply centres.

The Spanish capital will be under tight security.

Some 10,000 law enforcement officers have been deployed for the summit, which will be attended by US President Joe Biden, his French counterpart Emmanuel Macron, British Prime Minister Boris Johnson and German Chancellor Olaf Scholz.

Russia’s invasion of Ukraine is set to dominate talks.

Recently, Microsoft accused state-backed Russian hackers to have been engaged in “strategic espionage” against governments, think tanks, businesses and aid groups in 42 countries supporting Kyiv.

“Since the start of the war, the Russian targeting (of Ukraine’s allies) has been successful 29 percent of the time,” Microsoft President Brad Smith wrote, with data stolen in at least one-quarter of the successful network intrusions.

“As a coalition of countries has come together to defend Ukraine, Russian intelligence agencies have stepped up network penetration and espionage activities targeting allied governments outside Ukraine,” Smith said.

Nearly two-thirds of the cyberespionage targets involved NATO members. The United States was the prime target and Poland, the main conduit for military assistance flowing to Ukraine, was the second. In the past two months, Denmark, Norway, Finland, Sweden and Turkey have seen stepped-up targeting.


Check out our Latest News and Follow us at Facebook

Original Source

Exit mobile version