Newsletters

Written content from the Risky Business Media team

Risky Bulletin: US seizes Chaos ransomware funds

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

The FBI has seized around $2.4 million worth of Bitcoin from the relatively new Chaos ransomware group.

According to the US Justice Department, the funds were seized back in April, but only now announced. The funds were taken from a crypto-wallet owned by a Chaos member going by the name of Hors.

This seizure is interesting for one very particular reason—namely, that the Chaos ransomware is a new group. We have rarely seen the FBI crack down and go after a group within months of its launch.

Risky Bulletin: Old exploit database finds its way online again

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Security researchers have managed to recover and mirror the vast majority of exploits stored in 0day.today, a notorious old-school exploits database that went down earlier this year.

The site is not the go-to portal to get your exploits these days, but it has a historical and educational value to the infosec community, storing PoCs and exploits for some of the internet's oldest bugs.

At the time it went down, it was hosting more than 38,000 exploits dating back almost two decades before a mysterious incident took it out for months.

Risky Bulletin: Microsoft rolls out linkable token identifiers to help IR teams

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Microsoft has released this week a new Entra security feature designed to help incident responders track down compromised accounts and malicious activity across organizations.

The new feature is named Linkable Identifiers, sometimes also referred to as Linkable Token Identifiers in some of the Microsoft documentation pages—because, of course, anything Microsoft has to also be confusing.

It is a newly designed mechanism that generates multiple unique identifiers that are embedded inside user access tokens after users authenticate via Entra ID.

Risky Bulletin: Three Chinese APTs are behind the recent SharePoint zero-day attacks

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Over the past weekend, Microsoft disclosed a zero-day vulnerability that was being exploited in the wild against its SharePoint servers.

Since then, there have been dozens of reports published on the same attacks, and details have come at us from different sources, with varying degrees of information, depending on what was available at the time of each report.

Below, I've tried to gather and simplify all the major points about this attack, so we have a clear picture of what's what. Tbh, I'm doing this more for myself than my readers, since I've also kind of lost track of all the reporting surrounding this topic.

Risky Bulletin: SMS blasting incidents are rising

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

The number of public SMS blasting incidents has slowly increased over the past year, in a clear sign of a rising problem.

SMS blasters are devices that mimic a mobile base station to trick nearby phones into connecting to them. They are a variation of IMSI catchers (aka cell-site simulators, fake base stations, or stingrays), but instead of intercepting mobile traffic to snoop on a target and track their location, SMS blasters are designed to automatically send SMS messages to all users trapped in the fake base station's coverage.

The devices have been used to mass-spam mobile devices over the past decade, typically at organized events, such as concerts, political rallies, or other mass gatherings, and for silly marketing purposes.

Risky Bulletin: New phishing technique bypasses FIDO keys

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

At least one cybercrime group is using a new phishing technique that bypasses FIDO keys and grants attackers access to user accounts.

The new technique has been used in the wild by a threat actor known as PoisonSeed.

Earlier this year, the group was involved in phishing campaigns targeting the cryptocurrency community and designed to steal assets from their crypto-wallets.

Spain Leaves Key Under Mat for Huawei

Presented by

Tom Uren
Tom Uren

Policy & Intelligence

Recent reporting that the Spanish government had awarded  €12.3 million to Huawei to manage storage for the government's lawful intercept (LI) system struck us as a terrible idea. 

Digging a bit deeper, it turns out the truth is more understandable but far worse. These contracts were awarded over the last few years and were a continuation of an existing arrangement. Huawei has been involved in Spain's lawful intercept (LI) system since 2004. 

It is time to rip the bandaid off. 

Risky Bulletin: Microsoft blocks filesystem redirection attacks in new security feature

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Microsoft has added a new security feature to Windows 11 that will mitigate an entire class of filesystem redirection attacks.

The new RedirectionGuard feature is currently under testing in Windows 11 Insider builds.

It works by blocking a type of file redirection known as a junction, or a soft link. This allows users to create a link between two folders, so when users or processes access that folder, they get automatically redirected to the target directory somewhere else on the same system.

Risky Bulletin: Major EoT/HoT vulnerability can bring trains to sudden stops

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

More than 12 years after the issue was first reported, the Association of American Railroads is replacing an insecure railroad protocol that can be abused to engage brakes and bring trains to sudden stops anywhere across North America.

The issue impacts a radio protocol that links locomotives (Head-of-Train) to devices mounted on the last wagon, a flashing red light known in the industry as an End-of-Train device or a FRED (Flashing Red End Device).

This device is primarily used to collect telemetry from the back of trains. It is useful especially for long freight trains that can often go over one or two miles in length and which cannot be easily inspected.

Risky Bulletin: Two billion eSIMs receive crucial security patch

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Security updates are being shipped out to mobile operators across the world to fix vulnerabilities in more than two billion eSIMs.

The vulnerabilities impact Kigen's eUICC (embedded Universal Integrated Circuit Card), a software package provided to mobile network operators to support eSIM technology.

eSIMs allow mobile operators to ship a software-based SIM to a device. The technology is mainly used for issuing temporary SIMs to travelers and to add mobile connectivity to IOT devices that can't fit a SIM card slot.