Global News: Git users urged to update software to prevent remote code execution attacks (5/2023)

May 22, 2023

The maintainers of the Git source code version control system have released updates to remediate two critical vulnerabilities that could be exploited by a malicious actor to achieve remote code execution.

The flaws, tracked as CVE-2022-23521 and CVE-2022-41903, impacts the following versions of Git: v2.30.6, v2.31.5, v2.32.4, v2.33.5, v2.34.5, v2.35.5, v2.36.3, v2.37.4, v2.38.2, and v2.39.0.

Global News: Notorious cyber gang FIN7 returns with Cl0p ransomware in new wave of attacks (5/2023)

May 20, 2023

The notorious cybercrime group known as FIN7 has been observed deploying Cl0p (aka Clop) ransomware, marking the threat actor's first ransomware campaign since late 2021.

Microsoft, which detected the activity in April 2023, is tracking the financially motivated actor under its new taxonomy Sangria Tempest.

"In these recent attacks, Sangria Tempest uses the PowerShell script POWERTRASH to load the Lizar post-exploitation tool and get a foothold into a target network," the company's threat intelligence team said. "They then use OpenSSH and Impacket to move laterally and deploy Clop ransomware."

FIN7 (aka Carbanak, ELBRUS, and ITG14) has been linked to other ransomware families such as Black Basta, DarkSide, REvil, and LockBit, with the threat actor acting as a precursor for Maze and Ryuk ransomware attacks.

Global News: This cybercrime syndicate pre-infected over 8.9 million Android phones worldwide (5/2023)

May 18, 2023

A cybercrime enterprise known as Lemon Group is leveraging millions of pre-infected Android smartphones worldwide to carry out their malicious operations, posing significant supply chain risks.

"The infection turns these devices into mobile proxies, tools for stealing and selling SMS messages, social media and online messaging accounts and monetization via advertisements and click fraud," cybersecurity firm Trend Micro said.

The activity encompasses no fewer than 8.9 million compromised Android devices, particularly budget phones, with the highest concentration of the infections discovered in the U.S., Mexico, Indonesia, Thailand, Russia, South Africa, India, Angola, the Philippines, and Argentina.

The findings were presented by researchers Fyodor Yarochkin, Zhengyu Dong, Vladimir Kropotov, and Paul Pajares at the Black Hat Asia conference held in Singapore last week.

Global News: U.S. offers $10 million bounty for capture of notorious Russian ransomware operator (5/2023)

May 17, 2023

A Russian national has been charged and indicted by the U.S. Department of Justice (DoJ) for launching ransomware attacks against "thousands of victims" in the country and across the world.

Mikhail Pavlovich Matveev (aka Wazawaka, m1x, Boriselcin, and Uhodiransomwar), the 30-year-old individual in question, is alleged to be a "central figure" in the development and deployment of LockBit, Babuk, and Hive ransomware variants since at least June 2020.

Aditya Paul Joins MIT as a Campbell L. Searle Fellow and a NSF Graduate Research Fellow (5/2023)

May 12, 2023

Congratulations to Center for Information and Cyber Security (CICS) member Aditya Paul who will be pursuing his graduate studies in electrical engineering and computer science at the Massachusetts Institute of Technology as a Campbell L. Searle Fellow and a NSF Graduate Research Fellow! He will be working to engineer the next generation of quantum technologies at one of the world's top research institutes.

Here are some remarks he gave thanking those who contributed to his academic career: "I couldn't have done any of this without the support of my mentors Dr. Crystal Noel, Dr. Jeff Thompson, Colin Smith and Dr. Ram Dantu. They've been invaluable throughout my intellectual journey, and have taught me so much about how to be a good researcher. In addition, I'm indebted to all my friends and family that helped me through this journey."

UNT CSE department awards (5/2023)

May 10, 2023

We want to congratulate both faculty/staff and students who recently received awards from the CSE Department!

Faculty/Staff Awards:

  • Cihan Tunc: CSE Junior Faculty Research Award

Student Awards:

  • Syed Badruddoja (Outstanding PhD Student)
  • Kritagya Upadhyay (Outstanding PhD Student)
  • Tyler Parks (Outstanding Master's Student, MSCS)
  • Thomas McCullough (Outstanding Undergraduate in Computer Science)
  • Leslie Delval Quinonez (Outstanding Undergraduate in Computer Engineering)

Congratulations again to all who received awards. Keep up the good work!

Global News: Hunting Russian Intelligence “Snake” malware (5/2023)

The Snake implant is considered the most sophisticated cyber espionage tool designed and used by Center 16 of Russia’s Federal Security Service (FSB) for long-term intelligence collection on sensitive targets. To conduct operations using this tool, the FSB created a covert peer-to-peer (P2P) network of numerous Snake-infected computers worldwide. Many systems in this P2P network serve as relay nodes which route disguised operational traffic to and from Snake implants on the FSB’s ultimate targets. Snake’s custom communications protocols employ encryption and fragmentation for confidentiality and are designed to hamper detection and collection efforts.

We have identified Snake infrastructure in over 50 countries across North America, South America, Europe, Africa, Asia, and Australia, to include the United States and Russia itself. Although Snake uses infrastructure across all industries, its targeting is purposeful and tactical in nature. Globally, the FSB has used Snake to collect sensitive intelligence from high-priority targets, such as government networks, research facilities, and journalists. As one example, FSB actors used Snake to access and exfiltrate sensitive international relations documents, as well as other diplomatic communications, from a victim in a North Atlantic Treaty Organization (NATO) country. Within the United States, the FSB has victimized industries including education, small businesses, and media organizations, as well as critical infrastructure sectors including government facilities, financial services, critical manufacturing, and communications.

This Cybersecurity Advisory (CSA) provides background on Snake’s attribution to the FSB and detailed technical descriptions of the implant’s host architecture and network communications. This CSA also addresses a recent Snake variant that has not yet been widely disclosed. The technical information and mitigation recommendations in this CSA are provided to assist network defenders in detecting Snake and associated activity. For more information on FSB and Russian state-sponsored cyber activity, please see the joint advisory Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure and CISA’s Russia Cyber Threat Overview and Advisories webpage.

URL: https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-129a

Global News: Amazon Prime Video team throws AWS Serverless under a bus (5/2023)
Global News: CISA issues advisory on critical RCE affecting ME RTU Remote Terminal Units (5/2023)
Global News: Chinese hackers spotted using Linux variant of PingPull in targeted cyberattacks (4/2023)
Global News: Security News This Week: Criminals are using tiny devices to hack and steal cars (4/2023)
Global News: Supply Chain Attacks and Critical Infrastructure: How CISA helps secure a nation's crown jewels (4/2023)
Congratulations to CSE students winning the Spirit of Innovation Competition (3/2023)
Global News: Additional supply chain vulnerabilities uncovered in AMI MegaRAC BMC software (2/2023)