Tag: cyber attack

  • Amazon, Google companions with White House to safe units from cyberattack

    On Tuesday, the White House, in collaboration with corporations like Amazon, Google, and Best Buy (BBY.N), will introduce an initiative aimed toward enabling Americans to determine units which have a decrease vulnerability to cyberattacks.

    According to an announcement from the White House, this new certification and labeling program will set up increased cybersecurity requirements for good units similar to fridges, microwaves, televisions, local weather management techniques, and health trackers.

    Manufacturers and retailers will affix a “U.S. Cyber Trust Mark” brand to their units, and this system is ready to be operational by 2024.

    An unnamed senior administration official acknowledged that the initiative seeks to boost the safety of networks and their utilization, as it’s essential for each financial and nationwide safety.

    Prior to implementing the labeling program, the Federal Communications Commission will invite public enter and subsequently register a nationwide trademark with the U.S. Patent and Trademark Office, as acknowledged by the White House.

    Other members in this system embrace LG Electronics U.S.A., Logitech, Cisco Systems, and Samsung.

    In March, the White House unveiled its nationwide cyber technique, emphasizing the necessity for software program builders and corporations to imagine larger duty in safeguarding their techniques towards hacking.

    Additionally, efforts by companies just like the Federal Bureau of Investigation and the Department of Defense have been intensified to fight the actions of hackers and ransomware teams worldwide.

    Last week, Microsoft and U.S. officers revealed that state-linked hackers from China had covertly accessed e-mail accounts in roughly 25 organizations, together with at the least two U.S. authorities companies since May.

    (With inputs from Reuters)

    Catch all of the Technology News and Updates on Live Mint.
    Download The Mint News App to get Daily Market Updates & Live Business News.

    More
    Less

    Updated: 19 Jul 2023, 12:12 PM IST

    Topics

  • Pakistan-based risk actors attacking IITs, Indian Army: Modus operandi, motive, and different particulars

    A brand new wave of cyber assaults towards the Indian Army and the schooling sector organised by a Pakistan-based group has come to gentle. According to a report by Seqrite, the enterprise arm of Pune-based Quick Heal Technologies, the risk group is known as Transparent Tribe. It has been concentrating on Indian army entities and academic establishments within the nation, akin to IITs and NITs. The group is believed to have originated in 2013. 

    Aim of those assaults? The risk group targets to deceive unsuspecting victims into divulging delicate info via this subtle tactic.

    According to the researchers, the group is utilizing a malicious file titled “Revision of Officers posting policy” to lure the Indian Army into compromising their programs. The file is disguised as a legit doc, nevertheless it accommodates embedded malware designed to use vulnerabilities.

    The cybersecurity researchers additionally noticed an alarming improve within the concentrating on of the schooling sector. According to it, Transparent Tribe has been concentrating on India’s prestigious instructional establishments such because the Indian Institutes of Technology (IITs), National Institutes of Technology (NITs), and enterprise colleges since May 2022. These assaults intensified within the first quarter of 2023, reaching their peak in February, the group notes.

    “The subdivision of the Transparent Tribe, known as SideCopy, has also been identified targeting an Indian defence Organisation. Their modus operandi involves testing a domain hosting malicious file, potentially to serve as a phishing page,” mentioned the researchers.

    The safety group notes that the group dubbed as APT36 has cleverly utilised malicious PPAM recordsdata masquerading as “Officers posting policy revised final”. For these unaware, a PPAM file is an add-in file utilized by Microsoft PowerPoint. “These files exploit macro-enabled PowerPoint add-ons (PPAM) to conceal archive files as OLE objects, effectively camouflaging the presence of malware,” mentioned the report.

    In its report, Seqrite is recommending some preventive measures akin to exercising warning whereas downloading recordsdata and opening electronic mail attachments from unsolicited or untrusted sources.

    “Regularly update security software, operating systems, and applications to protect against known vulnerabilities. It is also important to implement robust email filtering and web security solutions to detect and block malicious content,” the group suggested.

    Catch all of the Technology News and Updates on Live Mint.
    Download The Mint News App to get Daily Market Updates & Live Business News.

    More
    Less

    Updated: 26 Jun 2023, 11:46 AM IST

    Topics

  • How cyber chiefs lower by way of advertising and marketing noise

    In a crowded cybersecurity market, tech suppliers make primary errors in attempting to win enterprise, CISOs say

  • 64% of companies in Asia have been impacted by cyberattacks: Survey

    In Asia, practically 7 in 10 firms are assured about their cyber resilience regardless of fast digital transformation, rising variety of cyberattacks, and growing modes of cyber threats. However, practically half (48%) admit that there’s nonetheless room for enchancment in relation to cyber hygiene measures important to managing cyber dangers. This is in keeping with the Asia Insights of The State of Cyber Resilience, printed Tuesday by Marsh, the world’s main insurance coverage dealer and threat advisor, and Microsoft Corp., a number one platform and productiveness firm for the mobile-first, cloud-first world.

    The report revealed that over 3 in 5 firms (64%) in Asia have been impacted by cyber-attacks. Among varied types of cyber threats, practically 7 in 10 respondents (68%) referred to as out privateness breach as their prime concern, adopted by ransomware (58%).

    Marsh India lately launched a report – The State of Cyber Resilience – Marsh Microsoft cyber survey findings report. This report relies on survey carried out by Marsh and Microsoft, which had 660 respondents this 12 months.

    How did their perceptions differ from their world counterparts, particularly in relation to their blind spots? While 69% expressed confidence of their organisations’ cyber resilience, virtually half (48%) admitted that their cyber hygiene practices might be improved.

    Although most in Asia understand privateness breaches and knowledge loss as the highest cyber threats (ransomware is the highest world menace), 26% haven’t made enhancements to the safety of their computer systems, units, and techniques, whereas 31% haven’t improved their knowledge safety capabilities.

    35% consider new expertise for cyber dangers solely when an assault or incident has occurred, double the worldwide 17%.

    Critical cyber controls are additionally missing, with 34% not having endpoint detection and response, in comparison with 22% globally.

    Notably, solely 12% of Asian firms quantify their monetary publicity to cyber threat, lower than half the worldwide 26%.

    Beyond simply sharing knowledge highlights, our report goes additional to look at the implications and recommend the options to beat these challenges. You can learn extra within the Asia version connected.

    Subscribe to Mint Newsletters

    * Enter a sound e mail

    * Thank you for subscribing to our publication.

    First article

  • Safe Security launches predictive safety device for CISOs

    Cyber safety firm Safe Security has launched a predictive safety device referred to as CRQ Calculator that may allow CISOs, threat groups, C-Suites, and board members to design and implement an ROI-driven enterprise cyber threat administration plan.

    The firm stated in an official launch that it has developed a predictive analysis mannequin that may allow organizations to “actually handle cyber threat” by addressing two questions- firstly, “What is the probability of an attack happening?” and secondly, “If an assault occurs, what’s the potential monetary loss for my firm?”

    Safe Security’s analysis reveals that within the subsequent 12 months the likelihood of a healthcare firm falling sufferer to a profitable cyber assault is 25% and 20% for a monetary providers firm.

    The analysis stated that there’s a 10% likelihood {that a} healthcare or a monetary providers firm will face an assault leading to a knowledge breach, and round 8% likelihood of those organizations going through a ransomware assault.

    It additional stated that industries like manufacturing and retail face lower than 15% likelihood of a profitable cyber assault.

    Also, in a ransomware assault, the price of the ransom itself makes up solely 10% of the entire monetary influence the assault would have towards a corporation. Other prices akin to incident response and enterprise interruption could have a a lot greater monetary influence on a corporation.

    The monetary influence of a profitable breach on retail and manufacturing sectors, whereas solely a 15% likelihood, may very well be extra vital than different industries because of doubtlessly excessive enterprise interruption prices.

    Leveraging this analysis, Safe Security stated that it has developed the CRQ Calculator, a free benchmarking device that gives outputs in regards to the cyber well being and potential monetary dangers of a selected business.

    These outputs could be tuned particularly to an organization primarily based on its inner indicators.

    The calculator can be utilized by CISOs to know business benchmarks and their baseline cyber threat to run personalized cyber threat assessments utilizing the Safe Platform, to quantify their very own threat, create a Cyber Risk Management plan and observe ROI.

    Cyber insurance coverage firms and brokers can use the calculator to evaluate their portfolio-level cyber threat, and modify their pricing and protection accordingly.

    Also, portfolio administration firms or personal fairness firms can estimate the monetary threat because of the cybersecurity posture of their portfolio firms.

    “As people, we love predicting the longer term. Everything from which staff will win tomorrow’s sport, to the likelihood of rain subsequent week. The Safe Security staff feels simply as captivated with serving to organizations perceive their cybersecurity threat by likelihood fashions,” stated Saket Modi, co-founder and CEO of Safe Security.

    Modi talked about that like monetary threat, cyber threat must be managed in real-time primarily based on knowledge coming from inner and exterior environments.

    Earlier this 12 months, Infosys and Safe Security have entered right into a collaboration to get an enterprise-wide view of total cyber dangers and predict breaches. Safe Security’s SaaS platform SAFE works because the device to anticipate the potential monetary influence of every cyberattack earlier than it happens.

    Subscribe to Mint Newsletters

    * Enter a sound e-mail

    * Thank you for subscribing to our e-newsletter.

    First article

  • Transparent Tribe targets Indian authorities entities

    The Transparent Tribe hackers are again with a vengeance, this time focusing on India’s authorities and navy entities with a brand new malware arsenal.

    Transparent Tribe, also called APT36 and Mythic Leopard, is a sophisticated persistent risk (APT). Active since 2013, it operates in 30 international locations and continues to create pretend domains mimicking reliable navy and protection organisations as a core element of their operations.

    Transparent Tribe, suspected to be of Pakistani origin, has been attributed to yet one more marketing campaign designed to backdoor targets of curiosity with a Windows-based distant entry trojan named CrimsonRAT since not less than June 2021.

    “Transparent Tribe has been a highly active APT group in the Indian subcontinent,” Cisco Talos researchers stated in an evaluation. “Their primary targets have been government and military personnel in Afghanistan and India. This campaign furthers this targeting and their central goal of establishing long term access for espionage.”

    The previous themes included subjects equivalent to Covid-19, the APT strikes with instances and adapts varied traits and developments. The newest samples embrace a pretend model of Kavach, an Indian government-mandated two-factor authentication resolution required for accessing e mail companies, with the intention to ship the malicious artifacts.

    In the most recent marketing campaign performed by the risk actor, Cisco Talos researchers noticed a number of supply strategies, supply autos and file codecs indicating that the group is aggressively attempting to contaminate their targets with their implants equivalent to CrimsonRAT, alongside two beforehand unobserved strains of malware.

    These an infection chains led to the deployment of different variants equivalent to a beforehand unknown Python-based stager that results in the deployment of NET-based reconnaissance instruments and RATs that run arbitrary code on the contaminated system.

    They have continued using pretend domains masquerading as authorities and quasi-government entities, in addition to using generically themed content-hosting domains to host malware. Although not very subtle, that is a particularly motivated and protracted adversary that continually evolves ways to contaminate their targets.

    “The use of multiple types of delivery vehicles and new bespoke malware that can be easily modified for agile operations indicates that the group is aggressive and persistent, nimble, and constantly evolving their tactics to infect targets,” the researchers stated.

    Last month, the superior persistent risk expanded its malware toolset to compromise Android gadgets with a backdoor named CapraRAT that reveals a excessive “degree of crossover” with CrimsonRAT, which is used to assemble delicate information and set up long-term entry into sufferer networks, the researchers stated.

    Subscribe to Mint Newsletters

    * Enter a legitimate e mail

    * Thank you for subscribing to our e-newsletter.

    Download
    the App to get 14 days of limitless entry to Mint Premium completely free!

  • How the pc chip scarcity might incite a US battle with China

    The battle recreation state of affairs carried out by a Washington assume tank started with a sudden failure at three Taiwanese semiconductor foundries that make high-end pc chips utilized in such objects as smartphones, vehicles and army gear.
    The halt in manufacturing raised questions of whether or not a cyberattack by Beijing was accountable — touching off a global disaster between China and the United States that the researchers mentioned might grind the worldwide financial system to a halt and incite a army confrontation.
    The battle recreation and research by the Center for a New American Security, which is ready to be launched Thursday, illustrate how dependent the world is on Taiwanese pc chips — and the way that dependence might draw the United States and China into numerous sorts of battle.
    The report comes as Congress has put new vitality into payments to extend home manufacturing of semiconductors within the United States. Diversifying the worldwide provide chain for pc chips is a key suggestion within the report.
    Last week, President Joe Biden urged Congress to move these payments and promised he would work to deliver manufacturing of semiconductor chips again to the United States.

    “Today we barely produce 10% of the computer chips, despite being the leader in chip design and research,” Biden mentioned. “And we don’t have the ability to make the most advanced chips now — right now. But today, 75% of production takes place in East Asia. Ninety percent of the most advanced chips are made in Taiwan. China is doing everything it can to take over the global market so they can try to outcompete the rest of us and have a lot of applications — including military applications.”
    Even if Congress approves new authorities investments in America’s microchip manufacturing capacities, matching Taiwanese experience is years away, whether it is even doable, the report’s authors say. The United States is already extra depending on Taiwan’s high-end microchips than it was on Middle Eastern oil in many years previous, the report mentioned.
    China, the battle recreation predicts, might use financial coercion, cyberoperations and hybrid ways to attempt to seize or hurt Taiwan’s semiconductor trade — and the United States should grow to be higher capable of determine and counter Chinese ways that would threaten the microchip provide.
    War video games like this one contain present and former officers, lecturers and different specialists sitting round a desk taking part in numerous roles. After an preliminary state of affairs is offered, the groups take turns making strategic choices. Such workouts are presupposed to yield insights about how completely different gamers would act and lay plain what kind of strikes every group would possibly make.
    Becca Wasser, who helped design and lead the state of affairs, mentioned whereas many battle video games have been carried out to check China, most give attention to typical army threats, giving brief shrift to the numerous methods China might exert stress on Taiwan.
    And countering these stress factors is troublesome, particularly if the United States and Taiwan are at odds over the most effective technique. In the state of affairs, the US crew presumed the Taiwan crew would associate with its methods to counter China. But Taiwan’s curiosity typically led it to cross-purposes. For instance, when the United States wished to deliver semiconductor engineers to the protection of America, Taiwan resisted, apprehensive a couple of mind drain.
    “Whatever the United States tried to do by itself in the game really fell flat,” Wasser mentioned. “We have seen a variety of examples of that in real life.”
    As a end result, multilateral responses and world efforts to construct resiliency within the provide chain for pc chips are more than likely the most effective technique, the report mentioned.
    Taiwan has relied on its dominance of the microchip trade for its protection. The “silicon shield” principle argued that as a result of its semiconductor trade is so vital to Chinese manufacturing and the US shopper financial system, actions that threaten its foundries can be too dangerous.
    Martijn Rasser, a co-author of the research and a former CIA analyst, mentioned it was essential for the worldwide group to steer Taiwan that its defend technique wanted to be internationalised. “The long-term play has to be a geographic dispersal of those capabilities out of Taiwan in exchange for enhanced security guarantees for the island,” he mentioned.
    The Biden administration has made clear that within the case of Ukraine, whereas the United States would economically punish Russia for any invasion, it could not commit troops to combat alongside Kyiv to cease any intervention by Moscow. The long-standing US coverage towards Taiwan requires shoring up its defenses and practising strategic ambiguity over whether or not Washington would militarily intervene in a battle over the island.
    But Taiwan and its semiconductors are way more vital to America’s financial system than Ukraine is — which means it could very probably be far harder for the United States to remain out of a battle involving Taiwan.
    Taiwan accounts for half of the general manufacturing of microchips which might be essential to the functioning of cellphones, shopper electronics, automobiles, army gear and extra. South Korea, the closest competitor, has about 17% of the general market. But Taiwanese chips are the smallest and quickest, and its foundries account for 92% of essentially the most superior designs.
    “It’s almost impossible to duplicate Taiwan’s manufacturing capability of high-end chips, of low-end chips,” mentioned Dan Blumenthal, a scholar on the American Enterprise Institute. “It’s just the manufacturing hub of the world.”
    Although the United States and Europe are attempting to spice up their very own home design and manufacturing of semiconductors, they don’t have the skills to mass produce essentially the most superior designs that the Taiwan Semiconductor Manufacturing Company could make.
    “If the semiconductor supply chain is infringed upon by China in some way, all of the sudden the things that Americans look to in their daily lives, to get to and from work, to call their loved ones, to do a variety of different things, those disappear,” Wasser mentioned.
    Other specialists mentioned it could be an overstatement to say that the United States can be dragged right into a battle over microchips. China would determine what sorts of coercive measures it could take in opposition to the Taiwanese primarily based on the perceived menace to its sovereignty and the anticipated worldwide backlog, mentioned Bonny Lin of the Center for Strategic and International Studies.
    “China is not going to base their Taiwan policy, or any decision to use force against Taiwan, based on chips,” Lin mentioned. “China thinks about the costs of an invasion of Taiwan — there are significant political and military costs. That is why I don’t think chips would figure among the top three factors of using military force against Taiwan.”
    This article initially appeared in The New York Times.

  • Post experiences of CoWin leak, IT Min asks CERT-In to probe

    A day after experiences of an alleged leak of CoWin database being put up on the market on dark-web emerged, the Empowered Group on Vaccine Administration and the Ministry of Electronics and Information Technology (MeitY) have requested Indian Computer Emergency Response Team (CERT-In) to analyze the matter.
    “We have taken all steps and continue to take all steps to ensure the security of our database and our system. We are aware of all kinds of threats and attacks which are being tried on the system to penetrate the database and we shall continue to thwart them,” stated National Health Authority CEO Dr RS Sharma, who has been in command of the CoWin platform.
    Sources on the IT Ministry stated although the difficulty had been dealt with for now, CERT-In, with assist of different home and international cybersecurity consultants, was checking your complete CoWin platform as soon as once more to make sure there have been no vulnerabilities.

    “Over the past several months ever since CoWin went live, there have been repeated attempts by several state and non-state parties. Sometimes, it is in the form of SQL (structured query language) injection attack while others we observed repeated DDOS (distributed denial-of-service) attack. We are alert to them,” an IT Ministry official stated.
    A SQL injection assault consists of insertion of a question into the database to switch and exploit delicate knowledge. It permits the attacker to tamper with current knowledge, or steal somebody’s id or turn out to be the general administrator of the stated database. On the opposite hand, a DDOS assault in an try to disrupt the traditional working of an internet site or an utility’s server by abnormally growing the web visitors on that web site or utility’s community.
    On Thursday, experiences claimed that your complete database of CoWin, the platform being utilized by the central authorities to register individuals for vaccination in opposition to Covid-19, had been allegedly hacked and the information of about practically 150 million Indians, who had already been vaccinated, had been put up on the market for $800. The stated leak allegedly contained names, cellular quantity, Aadhaar card quantity, location, state and different particulars of people that had been vaccinated.
    The Central authorities had stated the stated message, claiming they’d the main points, “prima facie appeared to be fake”. “Our attention has been drawn towards the news circulating on social media about the alleged hacking of CoWin system. In this connection we wish to state that CoWin stores all the vaccination data in a safe and secure digital environment. No CoWin data is shared with any entity outside the CoWin environment,” the federal government had stated.
    In March, the IT Ministry stepped up its vigil of cyberattacks on Indian companies within the vaccine, logistics, pharmaceutical and energy sector. It had then requested corporations in these sectors to report “any and all major cybersecurity” incidents to the Ministry and CERT-In.

  • IT Min steps up cyberattack vigil, asks cos to boost defence

    The Ministry of Electronics and Information Technology (MeitY) has stepped up its vigil of cyberattacks on Indian corporations within the vaccine, logistics, pharmaceutical and energy sector, and has requested these to report “any and all major cybersecurity” incidents to the Computer Emergency Response Team (CERT-In) workforce each week, senior authorities officers stated.
    “The frequency of such attacks has definitely increased over the last one year. But for each such attack that gets reported or is flagged by some external agency, at least 10 others are stopped in track before they can do any harm. CERT-In has been in touch with all these companies,” an official stated.
    Over the previous four-five months, particularly after cyberattacks on Dr Reddy’s Laboratories and Lupin Ltd in October and November final yr, the IT Ministry and its nodal physique on cybersecurity, CERT-In, carried out conferences with crucial corporations within the vaccine, logistics, pharmaceutical and energy sectors and assisted them in shoring up their defence, officers stated.
    “They are helping in many different ways,” stated the manager of one of many vaccine corporations that has obtained help. This contains coaching of the corporate’s employees for cover towards cyber assaults, assessing weaknesses in its IT programs, strengthening these and trying to find assault makes an attempt, the manager informed The Indian Express requesting anonymity.
    The train was initiated in the direction of the top of final yr over triggers like rising potential cyber threats from nations like China, Russia and Uzbekistan, based on the manager.
    “We were told that it (the threat) is primarily (from) China,” the manager added.
    Another vaccine agency govt informed The Indian Express {that a} authorities official had come to their workplace final month “to verify whether we have enough security from an IT perspective as well as general security for vaccine manufacturers.” According to this govt, the official had regarded for measures like whether or not the corporate had enough firewalls in place to thwart cyber assault makes an attempt. “There is a lot of renewed interest in Indian vaccine companies,” the manager stated.
    Following the assaults on Dr Reddy’s Laboratories and Lupin in October and November final yr, prescribed drugs and healthcare corporations have been on excessive alert, based on some trade executives. The variety of cyber threats towards vaccine makers, particularly, has exponentially risen within the final six months alone, they stated.
    The govt of 1 such vaccine agency stated that it now has to battle “thousands” of makes an attempt to assault its programs each month. “Depending on the day, we get anywhere between 4-6 cyberattack attempts to as many as 100 attempts. Around 6-8 months ago, we would get 3-4 attack attempts in a month,” stated the manager, requesting anonymity.
    Towards the top of February, Goldman Sachs-backed cyber intelligence agency Cyfirma had stated a Chinese hacker group referred to as Stone Panda had “identified gaps and vulnerabilities in the IT infrastructure and supply chain software of Bharat Biotech and the Serum Institute of India,” based on a Reuters report. These corporations have developed Covaxin and Covishield, that are presently getting used within the nationwide vaccination marketing campaign.

    Apart from corporations within the vaccine and pharmaceutical house, corporations within the energy distribution house have additionally been on the radar of cybercriminals. On February 28, Recorded Future printed a report saying it had noticed a “steep rise” in the usage of assets like malware by a Chinese group known as Red Echo to focus on “a large swathe” of India’s energy sector.
    It stated 10 distinct Indian energy sector organisations have been focused, together with 4 Regional Load Despatch Centres which can be accountable for easy operation of the nation’s energy grid. Recorded Future stated the group additionally focused two Indian seaports.