Cybersecurity News Week in Review: supply-chain attack on 3CX, AI pause request,  WiFi protocol flaw

This week’s Cyber Security Headlines – Week in Review, March 27-31, is hosted by Rich Stroffolino with our guest, Brett Conlon, CISO, American Century Investments

Cyber Security Headlines – Week in Review is live every Friday at 12:30pm PT/3:30pm ET. Join us each week by registering for the open discussion at CISOSeries.com

Supply-chain attack on business phone provider 3CX could impact thousands of companies

Hackers may have compromised the networks of thousands of businesses due to a supply-chain attack on the enterprise phone company 3CX, which confirmed on Thursday its desktop app had been bundled with malware. 3CX provides office phone systems to more than 12 million daily users at over 600,000 companies, as it claims on its website, including Mercedes-Benz, Coca-Cola, American Express and the United Kingdom’s National Health Service. The company’s chief information security officer, Pierre Jourdan, said the intrusion was the work of highly skilled hackers, stating, “this appears to have been a targeted attack from an Advanced Persistent Threat, perhaps even state sponsored.”

(The Record)

Open letter calls for AI “pause”

Over 1,000 people signed an open letter calling on “all AI labs to immediately pause for at least 6 months the training of AI systems more powerful than GPT-4.” Signees include Elon Musk, Steve Wozniak, Stability AI founder and CEO Emad Mostaque, and Tristan Harris of the Center for Humane Technology, as well as some engineers from Google and Meta. The letter argues a “level of planning and management” isn’t happening, with the industry instead “locked in an out-of-control race” to develop ever-more powerful models. No one from OpenAI or Anthropic signed the letter. 

(TechCrunch)

Over 70% of employees keep work passwords on personal devices

Roughly four out of five employees store sensitive work passwords on their personal phones, and 66% use their personal texting apps for work. This information comes from SlashNext’s latest mobile bring your own device (BYOD) security report, which also suggests 95% of security leaders are increasingly concerned about phishing attacks via private messaging apps. SlashNext CEO Patrick Harr suggests this is because threat actors know there are fewer security controls on personal mobile devices than on corporate ones. The report also highlights a mirrored trend with a majority (89%) of IT and security leaders acknowledging legal concerns about having access to employees’ private data.

(InfoSecurity Magazine)

17% of security leaders consider cybersecurity team fully-staffed

Security leaders’ perception of their own cyber resilience was analyzed in a recent study by Immersive Labs. Despite high confidence in overall resilience, the study found that teams are insufficiently prepared for threats, as 82% agree they could have mitigated some to all of the damage of their most significant cyber incident in the last year if they were better prepared, and more than 80% don’t think, or are unsure, their teams have the capabilities to respond to future attacks. Seventeen percent of respondents consider their cybersecurity team to be fully-staffed and almost half of respondents admit they aren’t able to measure cyber capabilities, further eroding confidence in the organization’s preparedness. 

(Security Magazine)

Inaudible ultrasound attack can stealthily control your phone, smart speaker

American university researchers have developed a novel attack called “Near-Ultrasound Inaudible Trojan” (NUIT) that can launch silent attacks against devices powered by voice assistants, like smartphones, smart speakers, and other IoTs. Professor Guenevere Chen of the University of Texas in San Antonio (UTSA), her doctoral student Qi Xia, and professor Shouhuai Xu of the University of Colorado (UCCS) demonstrated NUIT attacks against modern voice assistants found inside millions of devices, including Apple’s Siri, Google’s Assistant, Microsoft’s Cortana, and Amazon’s Alexa, showing the ability to send malicious commands to those devices. The main principle that makes NUIT effective and dangerous is that microphones in smart devices can respond to near-ultrasound waves that the human ear cannot, thus performing the attack with minimal risk of exposure while still using conventional speaker technology.

(Bleeping Computer)

Thanks to today’s episode sponsor, Trend Micro

Cybersecurity is not just about protection, it’s about foresight, agility, and resilience. Navigating a new era of cyber risk demands evolved strategies, new frameworks, and integrated tools to equip security teams to anticipate and defend against even the most advanced attacks. Trend Micro, the global leader in cybersecurity is bringing the cyber risk conversation to more than 120 cities around the world in their latest “Risk to Resilience World Tour” — The largest cybersecurity roadshow of its kind. Find the closest city to you and register today to take a leap towards a more resilient future. Head to TrendMicro.com/cisoseries.

Panera Bread will use palm-scanning technology for its loyalty program

Panera Bread is rolling out palm scanners that will link customers’ handprints to their loyalty accounts — a move the company paints as convenient but that privacy advocates have decried. The biometric-gathering technology, developed by Amazon, will hit stores in the next few months, Panera said on Wednesday. The gadgets will help suggest menu items based on customers’ order histories and allow employees to greet customers by their names and share customers’ available rewards, the company said. Panera Bread CEO Niren Chaudhary described the move as a “frictionless, personalized, and convenient” evolution of Panera’s loyalty program, which boasts 52 million members. However, digital rights activists worry that information could be tapped by federal agencies or accessed by hackers. 

(CBS News)

Debt servicing giant exposes financial data

The firm NCB Management Services sent out breach notification letters, disclosing a cyberattack it detected on February 4th. According to documents filed with Maine’s Attorney General, the attack exposed personal data on just under 495,000 people. This included names, addresses, phone numbers, driver’s license numbers, Social Security numbers, credit card numbers, and routing numbers. The company claims it “obtained assurances that the third party no longer has any of the information on its systems,” indicating it paid a ransom. This appeared to target closed credit cards originating with Bank of America. Bank of America will provide victims with two years of identity theft protection. 

(The Record)

A million pen tests show companies’ security postures are getting worse

On Tuesday, analysis from 1 million pen tests revealed that data-exfiltration risk increased to an average score of 44 out of 100 in 2022, from an average risk score of 30 the prior year. This from a report from Cymulate, who said one key reason for the increased risk is attackers improving tactics to circumvent network and group policies. Additionally, the company found issues with patching hygiene, with four of the top-10 CVEs identified in customer environments being more than two years old. On a positive note, companies have improved malware detection across major platforms with many attacks being blocked by Web gateways. 

(Dark Reading)

Over 70% of employees keep work passwords on personal devices

Roughly four out of five employees store sensitive work passwords on their personal phones, and 66% use their personal texting apps for work. This information comes from SlashNext’s latest mobile bring your own device (BYOD) security report, which also suggests 95% of security leaders are increasingly concerned about phishing attacks via private messaging apps. SlashNext CEO Patrick Harr suggests this is because threat actors know there are fewer security controls on personal mobile devices than on corporate ones. The report also highlights a mirrored trend with a majority (89%) of IT and security leaders acknowledging legal concerns about having access to employees’ private data.

(InfoSecurity Magazine)

Steve Prentice
Author, speaker, expert in the area where people and technology crash into each other, viewed from the organizational psychology perspective. Host of many podcasts, voice actor and narrator for corporate media and audiobooks. Ghost-writer for busy executives.