CYBERSECURITY / DEFENSE / INTELLIGENCE

  • The intelligence community frequently buys data that reveals personal details about individual U.S. citizens, a report found last year.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • AFSOC will expand on groundbreaking experiments this summer, Lt. Gen. Bauernfeind says in interview.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • The North Korean threat actor tracked as Kimsuky has been observed deploying a previously undocumented Golang-based malware dubbed Durian as part of highly-targeted cyber attacks aimed at two South Korean cryptocurrency firms. “Durian boasts comprehensive backdoor functionality, enabling the execution of delivered commands, additional file downloads and exfiltration of files,”

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • The latest Nexusguard DDoS Trend Report for 2024 has unveiled a significant escalation in the size of Distributed Denial of Service (DDoS) attacks throughout 2023, with an average increase of 233.33% compared to the previous year.

    Despite a 54.74% drop in the total number of attacks, the dramatic rise in attack size indicates a strategic shift towards more potent and disruptive cyber assaults.

    In 2023, the digital landscape witnessed a transformative wave of DDoS attacks, challenging the conventional understanding of cyber threats.

    Industries ranging from gaming to financial services were targeted in these attacks, underscoring the pervasive risk of DDoS across sectors.

    Notably, the most significant attack recorded peaked at an unprecedented 700 Gbps, marking a 93.42% increase from the year before.

    Hacktivism emerged as a key motivator behind these attacks, with political agendas driving the targeting of government and vital services.

    This politicization of cyber tactics highlights the growing intersection between cybersecurity and national security concerns.

    Free Webinar on Live API Attack Simulation: Book Your Seat | Start protecting your APIs from hackers

    The Prevalence of UDP-based Attacks

    Despite the overall decrease in attack frequency, UDP-based attacks remained the most predominant type in 2023, although they saw a 58.29% year-on-year decrease.

    Attack Vector Distribution
    Attack Vector Distribution

    The persistence of UDP-based attacks can be attributed to their simplicity and effectiveness in overwhelming target networks with a flood of packets, making them a favored choice among attackers.

    The Nexusguard report’s findings suggest a strategic shift among cybercriminals towards executing fewer but more devastating attacks.

    This is evidenced by the significant rise in the average size of DDoS attacks, which suggests attackers opt for quality over quantity.

    The focus on larger-scale assaults is likely aimed at maximizing disruption and achieving a more significant impact with each attack.

    The Role of Multi-Vector Attack Combinations

    The analysis also highlighted the role of multi-vector attack combinations, which leverage multiple attack vectors simultaneously, making them harder to defend against.

    The top three multi-vector attack vectors identified were HTTP Flood and HTTPS Flood, DNS Amplification and UDP Fragmentation, and TCP ACK and UDP Attack.

    Multi-Vector Attack Combinations
    Multi-Vector Attack Combinations

    These combinations underscore the evolving sophistication of DDoS attacks and the need for equally advanced defense mechanisms.

    The analysis reveals that Pakistan, Brazil, Libya, and the United States are the top countries targeted by Reflected DDoS attacks in 2023.

    Specifically, Pakistan leads with a significant margin, followed by Brazil, Libya, and the United States.

    Mitigation and Preparedness Strategies

    The report emphasizes the importance of enhanced preparedness against sophisticated DDoS attacks.

    Organizations are urged to invest in real-time threat intelligence, robust infrastructure resilience, and collaborative defense mechanisms.

    Public awareness and education, alongside comprehensive policy and regulatory frameworks, are critical components in combating the evolving threat landscape.

    The Nexusguard DDoS Trend Report for 2024 paints a concerning picture of the current state of cyber threats, with a notable increase in the size of DDoS attacks despite a decrease in their overall frequency.

    The persistence of UDP-based attacks and the emergence of complex multi-vector attack combinations call for a dynamic and adaptive approach to cybersecurity defenses.

    As the digital landscape continues to evolve, so must the strategies employed to protect against these disruptive and potentially devastating attacks.

    Is Your Network Under Attack? - Read CISO’s Guide to Avoiding the Next Breach - Download Free Guide

    The post DDoS Attack Size Increased by 233.33%, UDP-Based are Popular appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Artificial intelligence (AI) is transforming cybersecurity, and those leading the charge are using it to outsmart increasingly advanced cyber threats. Join us for an exciting webinar, “The Future of Threat Hunting is Powered by Generative AI,” where you’ll explore how AI tools are shaping the future of cybersecurity defenses. During the session, Censys Security Researcher Aidan Holland will

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Researchers have identified a new form of cyberattack termed “LLMjacking,” which exploits stolen cloud credentials to hijack cloud-hosted large language models (LLMs).

    This sophisticated attack leads to substantial financial losses and poses significant risks to data security.

    LLMjacking involves attackers gaining unauthorized access to cloud environments through compromised credentials, initially sourced from vulnerabilities in widely used frameworks like Laravel (CVE-2021-3129).

    Once inside, the attackers target LLM services such as Anthropic’s Claude models, manipulating these resources to incur excessive costs and potentially extract sensitive training data.

    If undetected, an LLMjacking attack can lead to daily costs upwards of $46,000, as attackers maximize the usage of LLM services to their financial benefit.

    This burdens the legitimate account holders with hefty bills and can disrupt normal business operations by maxing out LLM quotas.

    LLM training data
    LLM training data

    Beyond financial damage, there is a looming threat of intellectual property theft.

    Attackers could potentially access and exfiltrate proprietary data used in training LLMs, posing a severe risk to business confidentiality and competitive advantage.

    Broadening the Attack Surface

    Hosted LLM Models

    All major cloud providers offer LLM services, including Azure Machine Learning, GCP’s Vertex AI, and AWS Bedrock.

    These platforms let developers quickly access popular LLM-based AI models.

    The screenshot below shows that the user interface is simple, allowing developers to build apps rapidly.

    These models are disabled by default. To run them, the cloud vendor must be contacted.

    Some models automatically approve, but third-party models require a brief form.

    After a request, the cloud vendor usually grants access immediately.

    The request requirement is generally a speed barrier for attackers, not a security measure.

    LLM Reverse Proxy

    A reverse proxy like this could help attackers make money if they collected proper passwords and wanted to sell access to the LLM models.

    The Sysdig investigation revealed that the attack tools were configured to probe credentials across multiple AI platforms, indicating a systematic attempt to exploit any accessible LLM service.

    This broad approach suggests that the attackers are not just seeking financial gain but also possibly aiming to harvest a wide range of data from various sources.

    InvokeModel

    Below is a malicious CloudTrail event from the InvokeModel call. A valid request was received with β€œmax_tokens_to_sample” set to -1.

    Although this faulty error creates the β€œValidationException” error, it alerts the attacker that the credentials have access to the LLMs and are enabled.

    They would have gotten β€œAccessDenied” otherwise.

    {
    
        "eventVersion": "1.09",
    
        "userIdentity": {
    
            "type": "IAMUser",
    
            "principalId": "[REDACTED]",
    
            "arn": "[REDACTED]",
    
            "accountId": "[REDACTED]",
    
            "accessKeyId": "[REDACTED]",
    
            "userName": "[REDACTED]"
    
        },
    
        "eventTime": "[REDACTED]",
    
        "eventSource": "bedrock.amazonaws.com",
    
        "eventName": "InvokeModel",
    
        "awsRegion": "us-east-1",
    
        "sourceIPAddress": "83.7.139.184",
    
        "userAgent": "Boto3/1.29.7 md/Botocore#1.32.7 ua/2.0 os/windows#10 md/arch#amd64 lang/python#3.12.1 md/pyimpl#CPython cfg/retry-mode#legacy Botocore/1.32.7",
    
        "errorCode": "ValidationException",
    
        "errorMessage": "max_tokens_to_sample: range: 1..1,000,000",
    
        "requestParameters": {
    
            "modelId": "anthropic.claude-v2"
    
        },
    
        "responseElements": null,
    
        "requestID": "d4dced7e-25c8-4e8e-a893-38c61e888d91",
    
        "eventID": "419e15ca-2097-4190-a233-678415ed9a4f",
    
        "readOnly": true,
    
        "eventType": "AwsApiCall",
    
        "managementEvent": true,
    
        "recipientAccountId": "[REDACTED]",
    
        "eventCategory": "Management",
    
        "tlsDetails": {
    
            "tlsVersion": "TLSv1.3",
    
            "cipherSuite": "TLS_AES_128_GCM_SHA256",
    
            "clientProvidedHostHeader": "bedrock-runtime.us-east-1.amazonaws.com"
    
        }
    
    }

    GetModelInvocationLoggingConfiguration

    Interestingly, the attackers were interested in the service configuration.

    Calling β€œGetModelInvocationLoggingConfiguration” delivers S3 and Cloudwatch logging configuration if enabled.

    Our solution utilizes S3 and Cloudwatch to collect as much attack data as feasible.

    {
    
        "logging config": {
    
            "cloudWatchConfig": {
    
                "logGroupName": "[REDACTED]",
    
                "roleArn": "[REDACTED]",
    
                "largeDataDeliveryS3Config": {
    
                    "bucketName": "[REDACTED]",
    
                    "keyPrefix": "[REDACTED]"
    
                }
    
            },
    
            "s3Config": {
    
                "bucketName": "[REDACTED]",
    
                "keyPrefix": ""
    
            },
    
            "textDataDeliveryEnabled": true,
    
            "imageDataDeliveryEnabled": true,
    
            "embeddingDataDeliveryEnabled": true
    
        }
    
    }

    The victim pays more in LLMjacking attacks.

    It should be no surprise that LLMs are expensive and can pile up rapidly.

    A worst-case situation where an attacker utilizes Anthropic Claude 2.x and reaches the quota restriction in many locations might cost the victim over $46,000 per day.

    Prevention and Mitigation Strategies

    Given the sophistication and potential impact of LLMjacking, organizations are advised to adopt a multi-layered security strategy:

    • Vulnerability Management: Regular updates and patches are crucial to defend against the exploitation of known vulnerabilities.
    • Credential Management: Organizations must ensure that credentials are securely managed and not exposed to potential theft.
    • Cloud Security Tools:Β Utilizing Cloud Security Posture Management (CSPM) and Cloud Infrastructure Entitlement Management (CIEM) can help minimize permissions and reduce the attack surface.
    • Monitoring and Logging:Β Vigilantly monitoring cloud logs and enabling detailed logging of LLM usage can help detect suspicious activities early.

    The emergence of LLMjacking highlights a growing trend of cyberattacks targeting advanced technological frameworks.

    As organizations increasingly rely on AI and cloud services, the imperative to fortify cybersecurity measures has never been more urgent.

    By understanding the tactics employed by attackers and implementing robust security protocols, businesses can safeguard their digital assets against these evolving threats.

    Is Your Network Under Attack? - Read CISO’s Guide to Avoiding the Next Breach - Download Free Guide

    The post New LLMjacking Used Stolen Cloud Credentials to Attack Cloud LLM Servers appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Google on Thursday released security updates to address a zero-day flaw in Chrome that it said has been actively exploited in the wild. Tracked as CVE-2024-4671, the high-severity vulnerability has been described as a case of use-after-free in the Visuals component. It was reported by an anonymous researcher on May 7, 2024. Use-after-free bugs, which arise when a program

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • A guide to finding the right endpoint detection and response (EDR) solution for your business’ unique needs. Cybersecurity has become an ongoing battle between hackers and small- and mid-sized businesses. Though perimeter security measures like antivirus and firewalls have traditionally served as the frontlines of defense, the battleground has shifted to endpoints. This is why endpoint

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Malicious Android apps masquerading as Google, Instagram, Snapchat, WhatsApp, and X (formerly Twitter) have been observed to steal users’ credentials from compromised devices. “This malware uses famous Android app icons to mislead users and trick victims into installing the malicious app on their devices,” the SonicWall Capture Labs threat research team said in a recent report. The

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ