Cybersecurity News Week in Review: TikTok invisible malware, Sandworm attacks Ukraine, patch gap warning

This week’s Cyber Security Headlines – Week in Review, November 28-December 2, is hosted by Rich Stroffolino with our guest, Terrance Cooley, CISO, Air Force JADC2 R&D Center.

Cyber Security Headlines – Week in Review is live every Friday at 12:30pm PT/3:30pm ET. Join us each week by registering for the open discussion at CISOSeries.com

Businesses hope to cut cyber turnover by encouraging volunteer work 

Companies are encouraging their cyber employees to volunteer at nonprofits, a nudge that managers say can help businesses retain in-demand technical experts despite high turnover in security roles. The CyberPeace Institute, a Geneva-based group that helps nonprofits, humanitarian and healthcare organizations address cybersecurity, set up a program last year to enlist professionals from the corporate world to explain things like email phishing to nonprofits that might lack the budget to hire their own experts.  Cyber volunteerism can also bolster the team as a whole, said Clair Rosso, chief executive of (ISC)2. Stepping away from day-to-day work and looking at a different organization as an outsider can give employees a fresh perspective on their own job, she said. “There’s a case that allowing employees to go and volunteer in other organizations is actually going to strengthen the security posture of your own organization,” she said.

(Wall Street Journal)

Hackers use trending TikTok ‘Invisible Challenge’ to spread malware

Threat actors are capitalizing on a popular TikTok challenge to trick users into downloading information-stealing malware, according to new research from Checkmarx. The scheme is based on a trend called Invisible Challenge, which involves applying a filter known as Invisible Body that just leaves behind a silhouette of the person’s body. This has led to a demand for an unfilter that would allow viewer to see the person within the silhouette. Attackers are now posting TikTok videos with links to rogue software dubbed “unfilter” that purports to remove the applied silhouette. This software deploys WASP stealer malware hiding inside malicious Python packages, and is designed to steal users’ passwords, Discord accounts, cryptocurrency wallets, and other sensitive information.

(The Hacker News)

Sirius XM unlocks smart cars thanks to code flaw

Sirius XM’s Connected Vehicle Services has fixed an authorization flaw that would have allowed an attacker to remotely unlock doors and start engines on connected cars knowing only the vehicle identification number (VIN). Yuga Labs’ Sam Curry detailed the exploit in a series of tweets and confirmed that the patch issued by SiriusXM has since fixed the security issue. Security researchers at Yuga Labs found the issues and explored attack surfaces in the SiriusXM “smart vehicle” platform used in models made by Hyundai, Toyota, Honda, Fiat Chrysler, Nissan, Acura, and Infinity that allowed them to “remotely unlock, start, locate, flash, and honk” them.(The Register and Bleeping Computer)

Thanks to today’s episode sponsor, Automox

Are you ready to ditch manual patching and all the complexity and hassle that comes with it? With Automox, you can automatically patch your Windows, macOs, and Linux devices with one easy-to-use, cloud-native platform. Modern patching should be easy. And now it is. With automated cross-OS patching, you’ll save time and sleep better at night knowing your IT environment is secure. Visit Automox.com to learn more and start a free trial today.

Project Zero warns of “patch gap”

The researchers at Google’s security team warned of this “patch gap” problem across the Android ecosystem. It claims that while Android security fixes often arrive in a timely fashion, downstream vendors lag in delivering fixes to devices. A recent post points to actively exploited vulnerabilities in the ARM Mali GPU driver. These were patched in August 2022, but not pushed out to impacted devices. Project Zero noted Samsung, Xiaomi, Oppo, and even Google’s Pixel team lagged in patches for this exploit. Researchers then looked at five recent ARM vulnerabilities, which were discovered between June and July 2022, and patched within a month. But it did not see the CVE for the vulnerabilities mentioned in any downstream security bulletins since. The Pixel security team said the ARM fixes were scheduled to be delivered “in the coming weeks.” 

(Security Week)

Businesses found to increase cybersecurity spend without clear strategy

According to a recent Fastly research study, most businesses surveyed were willing to spend more than their current cybersecurity budget. While 71% of businesses were confident in their current budgets, 73% wanted them to increase. In the US, 85% of IT leaders felt their current budget was inadequate and 79% wanted it to increase. Although increasing the budget may not be the solution, many businesses surveyed felt they experienced information overload and were blindly putting faith in the latest technology. Fastly also found that 39% of current cybersecurity tools were not fully deployed and active, and only 42% of those that are fully operational overlap.

(Infosecurity)

Intruders gain access to user data in LastPass incident

Following up on a story we brought you in August, intruders broke into a third-party cloud storage service that LastPass shares with affiliate company GoTo and gained access to “certain elements” of customers’ information, the companies have confirmed. LastPass did not define what it meant by “certain elements,” saying it was unsure what data was looked at. The statement confirmed that the attackers obtained the information to carry out the current intrusion using information stolen in an August attack. It did maintain, however, that services were unaffected and that customers’ passwords remained “safely encrypted” – without ruling out that some of the data was stolen. 

(The Register)

Ransomware group may have stolen customer bank details from British water company

In yet another follow-up story, South Staffordshire Water, which supplies water for more than 1.7 million people in England, has said that an attempted ransomware attack in August may have enabled cybercriminals to steal customer bank details. At the time of the incident the company stressed that the water supply was not affected, although its corporate network was experiencing disruptions. The company said in an update on Wednesday that customers who paid by direct debit may have had their bank details stolen. Water suppliers are required to report cybersecurity incidents to The Water Services Regulation Authority (Ofwat) under the U.K.’s Network and Information Systems (NIS) Regulations. However, the reporting obligation only applies to incidents which ultimately impact water supply, which the ransomware attack did not. The government announced yesterday it would update the legislation so that service providers would need to notify regulators “of a wider range of incidents.”

(The Record)

Steve Prentice
Author, speaker, expert in the area where people and technology crash into each other, viewed from the organizational psychology perspective. Host of many podcasts, voice actor and narrator for corporate media and audiobooks. Ghost-writer for busy executives.