Cybersecurity News Week in Review: Amazon Ring privacy violations, Gigabyte firmware problems, AI extinction threat

This week’s Cyber Security Headlines – Week in Review, May 29-June 2, is hosted by Sean Kelly with our guest, Howard Holton, CTO, GigaOm

Cyber Security Headlines – Week in Review is live every Friday at 12:30pm PT/3:30pm ET. Join us each week by registering for the open discussion at CISOSeries.com

Amazon Ring, Alexa accused of privacy violations by FTC

America’s Federal Trade Commission on Wednesday charged, via the US Dept of Justice, two Amazon outfits with various privacy snafus. The Ring home security cam subsidiary was accused of “compromising its customers’ privacy by allowing any employee or contractor to access consumers’ private videos and by failing to implement basic privacy and security protections.” The FTC also took on Amazon over its Alexa devices’ data-retention policies, stating, “Amazon retained children’s recordings indefinitely—unless a parent requested that this information be deleted,” adding “even when a parent sought to delete that information, Amazon failed to delete transcripts of what kids said from all its databases.”

(The Register)

Gigabyte firmware update system insecure

Researchers at the security firm Eclypsium published finding that 271 motherboards from the computer OEM Gigabyte include a UEFI firmware update utility that runs on bootup. This system can go online and download updates without any user notification or authorization. However the researchers say this update system doesn’t properly authenticate code, often sending over an unencrypted HTTP connection, letting it be easily spoofed by a malicious actor. It also looks for updates available from network attached storage, which could easily be intercepted by an attacker on the same network. Eclypsium said it notified Gigabyte and the company plans to fix the issues.

(Wired)

Leading experts warn of a risk of extinction from AI

On Tuesday, AI experts issued a dire warning saying, “Mitigating the risk of extinction from AI should be a global priority alongside other societal-scale risks such as pandemics and nuclear war.” Sam Altman, CEO of OpenAI and Geoffrey Hinton, also known as the godfather of AI who recently left Google, were among the hundreds who signed the statement posted on the Center for AI Safety’s website. The call for AI guardrails has intensified as companies have rushed to adopt new tech. This point was underscored Tuesday when chipmaker Nvidia briefly became worth over $1 trillion dollars after share prices surged due to its AI advances.

(NPR and BBC)

Attackers use encrypted RPMSG messages in Microsoft 365 targeted phishing attacks

Researchers at Trustwave have observed threat actors using encrypted RPMSG attachments sent via compromised Microsoft 365 accounts in a phishing campaign aimed at stealing Microsoft credentials. RPMSG files are used to deliver emails with Rights-Managed Email Object Protocol enabled. This protocol controls e-mail access and usage permissions. Instead of a plain text, e-mails via RPMSG files are sent with content encrypted and stored as encrypted file attachment. The recipients can read the encrypted messages only after being authenticated with their Microsoft account or obtaining a one-time passcode. The message attempts to trick recipients into clicking the “Read the message” button to decrypt the protected message. Upon clicking the link, the recipients are redirected to an Office 365 webpage with a request to sign into their Microsoft account. Once authenticated with the Microsoft service, the recipients are redirected to a page displaying the attackers’ phishing email. The message contains a “Click here to continue” button that points to a fake SharePoint document hosted on Adobe’s InDesign service.

(Security Affairs)

Thanks to today’s episode sponsor, Barricade Cyber

Have you fallen victim to a ransomware attack? Don’t worry! Barricade Cyber Solutions has helped thousands of customers in situations just like yours. Their proprietary ransomware recovery services are designed to quickly get your business back on track. Their team of experts will identify the source of the attack and provide a comprehensive solution to prevent it from happening again. You can count on them for the security of your data and systems. Visit barricadecyber.com

Lender OneMain fined $4.25 million for cybersecurity lapses

OneMain Financial Group, which specializes in issuing loans to people with “non-prime” credit histories, will pay a $4.25 million penalty in New York state for cybersecurity lapses found during a government investigation. The DFS investigation found, for example, that the company allowed local administrative users to share accounts and permitted those accounts to use the default password that users got when they were onboarded. The department also noted, it used a non-formalized project administration framework developed in-house that failed to address certain key software development life cycle phases, it did not assess third-party vendors properly, despite having a risk policy in place, and further failed to appropriately adjust several vendors’ risk scores even after the occurrence of multiple cybersecurity events. OneMain has responded by saying it has “long since addressed” problems found in the investigation, which examined its policies from 2017 to early 2020.

(The Record)

The human factor fuels industrial APT attacks

Kaspersky has issued a report identifying the primary factors contributing to advanced persistent threat (APT) attacks in industrial sectors. The first is the absence of isolation in operational technology (OT) networks which can allow attackers to better manage malware traffic. The report also highlights disgruntled employees and contractors as well as those accessing OT networks without adequate attention to information security measures as a significant driver of cyber-criminal activities in industrial settings. Finally, the report asserts that outdated, misconfigured and unpatched systems contribute to exacerbating the spread of security threats. (Pair with Kaspersky iOT APT discovery)

(Infosecurity Magazine)

The dangers of Salesforce “ghost sites”

Researchers at Varonis sounded the alarm on these so-called “ghost sites.” These can occur when an organization sets up a Salesforce “Communities” service, where customers, vendors, and other partners can collaborate within an organizations Salesforce environment. If an organization migrates from Salesforce, often these Communities remain online. This can occur when organizations point DNS records to a short convenient URL, and then migrate that to a new service. Since Salesforce also supports autonomous dataflows into Communities, these can continue to receive fresh data, potentially exposed to anyone with the internal domain. Varonis warns that organizations should delete these sites entirely, not simply ending URL redirects.  

(Dark Reading)

Steve Prentice
Author, speaker, expert in the area where people and technology crash into each other, viewed from the organizational psychology perspective. Host of many podcasts, voice actor and narrator for corporate media and audiobooks. Ghost-writer for busy executives.