Cybersecurity News: Canada bans WeChat, no ransom pledge, India’s opposition sees state-sponsored attacks

Canada bans WeChat on government devices

The Treasury Board of Canada announced the move, saying that the country’s chief information officer determined the Chinese messaging app presents “an unacceptable level of risk to privacy and security.” It also banned Kaspersky’s antivirus solutions on the same grounds. The government said neither app compromised government data, but that the access to a device’s content represented obvious risks. China’s foreign ministry said the ban lacked any real evidence and called it an abuse of national power. 

(Reuters)

40 countries sign no ransom pledge 

A White House official announced that forty countries signed on to a US-led International Counter Ransomware Initiative to not pay cybercrime-related ransoms. As part of the initiative, the alliance will create two information-sharing platforms about ransom payment accounts, one created by Lithuania, the other jointly run by Israel and the United Arab Emirates. The countries will also share a list of digital wallets used to process ransom payments. This alliance means the governments agree not to pay ransoms in the attacks. 

(Reuters)

Apple warns Indian opposition leaders about iPhone attacks

Several Indian opposition leaders, two journalists, and the President of the Observer Research Foundation announced Apple recently contacted them about being targets of state-sponsored attacks. Apple confirmed these notifications but did not attribute attacks to any actor. India’s IT Minister Ashwini Vaishnaw said the government will investigate the notification, but said the notifications represented “estimations.” Earlier this year, researchers found NSO Group spyware on Indian opposition phones, and the Financial Times reported in March that the Indian government began looking for new spyware contracts. 

(TechCrunch)

Palo Alto Networks buys Dig Security

Back in September, we covered reports that Palo Alto Networks planned some major acquisitions before the end of the year. One of those shoes dropped with the security giant acquiring the Israeli firm Dig Security. No official word on the terms, but TechCrunch’s sources say it cost around $400 million. Dig provides services to understand where organizational assets reside across clouds. These assets will integrate with Palo Alto’s Prisma business. TechCrunch’s sources say the company continue to work on a deal to acquire the Israeli firm Talon, in a deal estimated worth $1 billion. 

(TechCrunch)

Huge thanks to our sponsor, Hunters

If your SIEM is causing an endless cycle of noisy alerts, manually writing generic detection rules, and limited data ingestion & retention, your SOC might need an upgrade. Hunters is a SaaS platform, purpose built for your Security Operations team. Solaris Group, a leading German FinTech, implemented Hunters to replace their SIEM eliminating the burden of redundant detection engineering and manual event correlation. Solaris Group’s SOC analysts can now focus their time and energy on higher-value tasks. Visit hunters.security to learn how to replace your SIEM today.

Citrix Bleed under exploitation

Citrix issued a patch for this vulnerability on October 10th. This impacts Citrix’s NetScaler Application Delivery Controller and NetScaler Gateway, opening to the door to disclosing information that includes session tokens that can be used to crack MFA. Security researcher Kevin Beaumont recently posted that it appears the vulnerability is “now under mass exploitation” with many organizations seeing widespread attacks. Beaumont estimates that 20,000 instances have seen session tokens stolen. The takeaway: all organizations should consider unpatched Netscaler devices compromised at this point and credentials should rotate to ensure leaked tokens no longer pose a threat.  

(Ars Technica)

Crypto theft tied to LastPass breach

The cryptocurrency researcher ZachXBT announced that they found evidence of $4.4 million in cryptocurrency stolen from over 25 victims directly coming from the 2022 breach of the popular password manager. This comes from actively approaching victims seen on-chain as well as victims reaching out to ZachXBT on X. It’s believed stolen password vaults of the attack are being cracked using GPU to brute force weaker passwords. It’s recommended that impacted users reset all passwords and move crypto assets to new wallets as a precaution. 

(Bleeping Computer)

MOVEit breach hits US government

According to documents received from a Freedom of Information Act request, Bloomberg reports that the MOVEit breach over the summer saw the Clop threat group access emails from the government. This saw the threat actors access emails on roughly 632,000 federal employees at the Department of Justice and Defense. The govenrment already disclosed some agencies were compromised from that breach, but this is the first indication of the scope. The breach occurred on May 28th and 29th, but compromised data was of “low sensitivity” and not classified. 

(Bloomberg)

Atlassian releases urgent Confluence patch

The company issued a security advisory, warning of a critical “improper authorization vulnerability in Confluence Data Center and Server” impacting on-prem versions. The company said it didn’t observe active exploitation yet, with the advisory light on any technical details for now. It recommends patching all versions now to resolve the issue. And disconnecting all Confluence instances from public internet until deploying the patches. This marks a different critical Confluence exploit from the one announced October 4th, which was under active exploitation. 

(The Register)

Rich Stroffolino
Rich Stroffolino is a podcaster, editor and writer based out of Cleveland, Ohio. Since 2015, he's worked in technology news podcasting and media. He dreams of someday writing the oral history of Transmeta.