Cybersecurity News: iLeakage threatens Apple, CISA’s catastrophic cuts, HTTP DDoS surge

iLeakage attack steals emails, passwords from Apple devices and browsers

A team of academics from Georgia Tech, University of Michigan, and Ruhr University Bochum, have created a new speculative side-channel attack they call iLeakage that according to Bleeping Computer, not only works on all recent Apple devices, but can also extract information from the Safari browser, as well as Firefox, Tor, and Edge on iOS. “At core, it is a timerless Spectre attack that bypasses standard side-channel protections implemented by all browser vendors.” More details on the methods used for bypassing Apple’s mitigations are available in the technical paper the researchers published. A link is available in the show notes to this episode.

(Bleeping Computer and iLeakage.com)

CISA protests potential 25% budget cut as “catastrophic”

This from Eric Goldstein, executive assistant director for cybersecurity at CISA, speaking at a House Homeland Security cybersecurity and infrastructure protection subcommittee hearing on federal cybersecurity, held Wednesday. The 25% cut to CISA’s budget has been proposed by House Republicans. Goldstein said that CISA will effectively be “in a period of stasis where even as our adversaries evolve,” adding that such cuts would “federal networks more vulnerable to attacks from U.S. adversaries like Russia, China, Iran and North Korea.”

(Cyberscoop)

Surge in hyper-volumetric HTTP DDoS attacks

The threat landscape has entered a new chapter, says Cloudflare, noting that “the number of hyper-volumetric HTTP DDoS attacks recorded in the third quarter of 2023 surpasses every previous year.” This is according to a report that the company shared with Bleeping Computer. It says, “over 89 of these attacks exceeded 100 million requests per second (rps), and the largest one peaked at 201 million rps, three times larger than the previous record, which occurred in February 2023.” The report also explains that the increase in severity of these attacks is due to a new technique named ‘HTTP/2 Rapid Reset,’ which threat actors have leveraged as a zero-day since August 2023.

(Bleeping Computer)

Google expands bug bounty program to include generative AI attacks

Google has announced an expansion of its Vulnerability Rewards Program to place greater focus on AI based attacks. Its newly published guidelines seek to address the difficulties involved in determining the sources of data in extraction issues, as well as topics such as model manipulation and bias. Google also stated, they are also “expanding our open source security work to make information about AI supply chain security universally discoverable and verifiable.”

(Engadget

Huge thanks to this week’s episode sponsor, Vanta

Growing a business? That likely means more tools, third-party vendors, and data sharing — AKA, way more risk. Vanta’s market-leading trust management platform brings GRC and security efforts together. Integrate information from multiple systems and reduce risks to your business and your brand — all without the need for additional staffing. And by automating up to 90% of the work for SOC 2, ISO 27001, and more, you’ll be able to focus on strategy and security, not maintaining compliance. Join 5,000 fast-growing companies that leverage Vanta to manage risk and prove security in real-time. Our listeners get $1,000 off Vanta. Go to vanta.com/ciso to claim this discount.

Seiko’s August ransomware attack lost 60,000 items

Following up on a story we brought you in August, the watchmaking company Seiko is now stating that the ransomware incident that occurred in that month has resulted in the breach of “60,000 items of personal data from customers, employees, business partners and job applicants.” The company says the items include basic customer PII, but not credit card information, also, standard contact information for parties involved in B2B operations, and finally job applicant information. The company is in the process of restoration and making contact with all affected parties. BlackCat/ALPHV took credit for the August attack.

(The Record)

Grammarly fixes sign-in vulnerabilities

The writing and editing tool Grammarly has stated that is has fixed some user login vulnerabilities that were affecting its social sign-in service through an Open Authentication (OAuth), a common protocol. The company was alerted to the vulnerabilities by researchers at Salt Security. No Grammarly accounts were compromised. According to The Record, “Salt Labs, the security company’s research team, noted that thousands of other websites using widely seen social sign-in mechanisms are likely vulnerable to the same type of attack, putting billions of individuals around the globe at risk.”

(The Record)

Leica adds content credentials to camera technology

In an effort to compete with AI-generated issues and protect photographers’ intellectual property, camera manufacturer Leica has announced the inclusion of what it calls a “nutritional label” on images taken by the camera. This label contains metadata on images taken, with a digital signature that can be listed on its Content Credentials site. Participation with the Content Credentials feature is on an opt-in basis.

(ZDNet)

Microsoft’s Scattered Spider warning

Microsoft has described the group as “one of the most dangerous financial criminal groups,” pointing to its “operational fluidity and its ability to incorporate SMS phishing, SIM swapping, and help desk fraud into its attack model.” The group has been seen using impersonation techniques, with members posing as newly hired employees in its target firms in order to blend in. The group is also known by other names, including Octo Tempest, 0ktapus, Scatter Swine, and UNC3944.

(The Hacker News)

Steve Prentice
Author, speaker, expert in the area where people and technology crash into each other, viewed from the organizational psychology perspective. Host of many podcasts, voice actor and narrator for corporate media and audiobooks. Ghost-writer for busy executives.