This page, Cybersecurity News and Events, is offered by

Cybersecurity News and Events

Keeping you up-to-date on all things cyber, information security and privacy.

Table of Contents

Ongoing Cyber Threats to U.S. Water and Wastewater Systems Sector Facilities

Original release date: October 14, 2021

CISA, the Federal Bureau of Investigation (FBI), the Environmental Protection Agency (EPA), and the National Security Agency (NSA) have released a joint Cybersecurity Advisory (CSA) that details ongoing cyber threats to U.S. Water and Wastewater Systems (WWS) Sector. This activity—which includes cyber intrusions leading to ransomware attacks—threatens the ability of WWS facilities to provide clean, potable water to, and effectively manage the wastewater of, their communities. The joint CSA provides extensive mitigations and resources to assist WWS Sector facilities in strengthening operational resilience and cybersecurity practices.

CISA has also released a Cyber Risks & Resources for the Water and Wastewater Systems Sector infographic that details both information technology and operational technology risks the WWS Sector faces and provides select resources.


Ongoing Cyber Threats to U.S. Water and Wastewater Systems Sector Facilities | US-CERT

Apple silently fixes iOS zero-day, asks bug reporter to keep quiet

Apple has silently fixed a 'gamed' zero-day vulnerability with the release of iOS 15.0.2, on Monday, a security flaw that could let attackers gain access to sensitive user information.

The company addressed the bug without acknowledging or crediting software developer Denis Tokarev for the discovery even though he reported the flaw seven months before iOS 15.0.2 was released. In July, Apple also silently patched an 'analyticsd' zero-day flaw with the release of 14.7 without crediting Tokarev in the security advisory, instead promising to acknowledge his report in security advisories for an upcoming update. Since then, Apple published multiple security advisories (iOS 14.7.1, iOS 14.8, iOS 15.0, and iOS 15.0.1) addressing iOS vulnerabilities but, each time, they failed to credit his analyticsd bug report.

Other bug bounty hunters and security researchers have also reported having similar experiences when reporting vulnerabilities to Apple's product security team via the Apple Security Bounty Program. Others weren't paid the amount listed on Apple's official bounty page or haven't received any payment at all, while some have been kept in the dark for months on end with no replies to their emails.

Apple has not replied to emails from tech website and blog BleepingComputer sent since September 24, asking for an official statement and more details.


Apple silently fixes iOS zero-day, asks bug reporter to keep quiet | BleepingComputer

Google AI department sued for using the health data of 1.6 million NHS patients

A class-action lawsuit has been launched against DeepMind, the Google-owned AI research company, over its use of the personal records of 1.6 million patients from the UK's National Health Service. DeepMind was quietly given the records of patients at the Royal Free London NHS Foundation Trust.

DeepMind said that it was using the data to create a potentially life-saving app called Streams. The app was designed to alert, diagnose, and detect when patients were at risk of developing acute kidney injury. It’s currently in the process of being decommissioned.

The handing-over of patient records to one of the world's biggest technology companies was exposed by New Scientist in 2017, in a report showing that DeepMind had access to far more data than had been publicly announced. The UK Information Commission launched an investigation that ruled the Royal Free hospital hadn't done enough to protect patients' privacy: following which, DeepMind apologized. "Our investigation found a number of shortcomings in the way patient records were shared for this trial," Information Commissioner Elizabeth Denham said at the time. "Patients would not have reasonably expected their information to have been used in this way."

The new case is being handled by law firm Mishcon de Reya on behalf of the lead plaintiff Andrew Prismall and the over 1.5 million other affected patients.

The case is just one of a growing number of high-profile cases around data collection in recent years. In April, Anne Longfield, the former Children’s Commissioner for England, filed a case against TikTok on behalf of millions of UK children over how the app collected and used their data.


DeepMind hit with class-action lawsuit over NHS health data scandal | Artificial Intelligence News

Microsoft says it mitigated one of the largest DDoS attacks ever recorded

Microsoft says it was able to mitigate a 2.4Tbps Distributed Denial-of-Service (DDoS) attack in August. The attack targeted an Azure customer in Europe and was 140 percent higher than the highest attack bandwidth volume Microsoft recorded in 2020. It also exceeds the peak traffic volume of 2.3Tbps directed at Amazon Web Services last year, though it was a smaller attack than the 2.54Tbps one Google mitigated in 2017.

Microsoft says the attack lasted more than 10 minutes, with short-lived bursts of traffic that peaked at 2.4Tbps, 0.55Tbps, and finally 1.7Tbps. DDoS attacks are typically used to force websites or services offline, thanks to a flood of traffic that a web host can’t handle. They’re usually performed through a botnet, a network of machines that have been compromised using malware or malicious software to control them remotely. Azure was able to stay online throughout the attack, thanks to its ability to absorb tens of terabits of DDoS attacks.

The attack is one of the biggest in recent memory. Last year, Google detailed a 2.54Tbps DDoS attack it mitigated in 2017, and Amazon Web Services (AWS) mitigated a 2.3Tbps attack. In 2018, NetScout Arbor fended off a 1.7Tbps attack.


Microsoft says it mitigated one of the largest DDoS attacks ever recorded | The Verge

New report reveals majority of online consumers have poor security practices

Bitdefender, a global cybersecurity leader, today released the 2021 Bitdefender Global Report: Cybersecurity and Online Behaviors, which reveals how consumers across various age groups and socio-demographic backgrounds behave on popular platforms, applications and devices, affecting cybersecurity risk. Findings show basic practices for securing data, protecting identity and sharing information are lacking despite increased threats and heightened concern over cybercrime.

The report examines the use of popular online platforms and services, personal cybersecurity practices, level of exposure to threats and more.

Key findings from the report include…

  • Poor password practices are still common
  • Many don't use cybersecurity protection software on mobile phones
  • Mobile phone scams lead the threats
  • Lack of child supervision poses significant security risks
  • Majority of consumers are highly exposed

A total of 10,124 internet users between the ages of 18 and 65 years old were polled online. Surveys were conducted across 11 countries in North America, Europe and Australia, with total data weighted according to the size of online population in each country. Data was collected and analyzed from June 2021 to August 2021.


New Bitdefender Report Reveals Majority of Online Consumers Practice Risky Behavior for Data Protection, Digital Identity and Device Management | Bitdefender

Amazon-owned Twitch has entire source code stolen

Amazon-owned video game streaming site Twitch has been the victim of a devastating hack, having its entire source code, including unreleased software, SDKs, financial reports, internal red-teaming tools, and payout rates for top streamers stolen.

An anonymous poster on the 4chan messaging board has released a 125GB torrent, which they claim includes the entirety of Twitch and its commit history. The poster claims the leak is designed to “foster more disruption and competition in the online video streaming space.” The leak has been confirmed to be legitimate and includes code that is as recent as this week. The leak is labelled as “part one,” suggesting there could be more to come.

Twitch has officially confirmed the veracity of the breach and now says it was caused by a "server configuration change" that caused "some data" to be exposed but has yet to confirm if all the data posted online is genuine, though multiple industry publications have confirmed the stolen data is indeed authentic.

The leak does not appear to include password or address information on Twitch users, but that does not mean this information has not been obtained as part of this breach. The leaker seems to have focused on sharing Twitch’s own company tools and information, rather than code that would include personal accounts.


Twitch source code and creator payouts part of massive leak | The Verge

Twitch blames server error for massive data leak | BBC News

Updates on the Twitch Security Incident | Twitch Blog

Facebook has finally given a reason for the six-hour outage Monday

Facebook said in a blog post Monday night that the six-hour outage that took it offline, along with Instagram, Messenger, Whatsapp, and OculusVR, was the result of a configuration change to its routers — not of a hack or attempt to get at user data. A subsequent blog post on Tuesday went into deeper detail, saying that the outage was due to a routine maintenance mistake that disconnected Facebook’s datacenters from the internet.

The outage began around 11:40AM ET Monday and led to widespread problems for the company. It was Facebook’s worst outage since 2019, when the site was down for more than 24 hours. Employees were unable to connect with each other on company message boards, and some told publication The Verge they were using work-provided Outlook email accounts to communicate.

The problems cascaded to affect the servers that advertise Facebook’s DNS and BGP information. That failure wiped out the DNS routing information that Facebook needs to allow other networks to find its sites.

Facebook’s outage came a day before whistleblower Frances Haugen was set to testify before Congress about her experiences at the company. Haugen, a former Facebook product manager who worked on its Civic Integrity group, provided a trove of internal Facebook documents to reporters at the Wall Street Journal. She told 60 Minutes on Sunday that Facebook “pays for its profits with our safety.”


Facebook has finally given a reason for the six-hour outage Monday | The Verge

Update about the October 4th outage | Facebook Engineering

More details about the October 4 outage | Facebook Engineering

The Facebook Files | WSJ

Whistleblower: Facebook is misleading the public on progress against hate speech, violence, misinformation | 60 Minutes

Hospital ransomware attacks now have deadly consequences

A recent lawsuit filed against an Alabama hospital is alleging that a patient died because of a ransomware attack, a risk that cybersecurity experts have been warning about.

The suit, first reported by The Wall Street Journal, says a baby died in April 2020 because of inadequate care given during a ransomware attack.

While ransomware gangs have been targeting hospitals for several years, the issue has received renewed attention during the Covid-19 pandemic. A report last month from the Ponemon Institute found that 43 percent of healthcare organizations experienced a ransomware attack in the last two years, and among them, 70 percent faced delays in procedures and test results and 65 percent had to transfer patients more frequently. One in five also had increased mortality rates.

The lawsuit puts the blame on Springhill Medical Center for not telling the then-expecting mother that it was dealing with a ransomware attack. Because the typical electronic monitoring systems were down, the mother is alleging that her doctors didn’t spot that her daughter’s umbilical cord was wrapped around the baby’s neck during delivery.


Hospital ransomware attacks now have deadly consequences | Politico Weekly Cybersecurity

A Hospital Hit by Hackers, a Baby in Distress: The Case of the First Alleged Ransomware Death | WSJ

Statement by President Joe Biden on Cybersecurity Awareness Month

Cyber threats can affect every American, every business regardless of size, and every community. That’s why my administration is marshalling a whole-of-nation effort to confront cyber threats.

I am committed to strengthening our cybersecurity by hardening our critical infrastructure against cyberattacks, disrupting ransomware networks, working to establish and promote clear rules of the road for all nations in cyberspace, and making clear we will hold accountable those that threaten our security. In May, I issued an executive order to modernize our defenses and position the Federal government to lead, rather than lag, in its own cybersecurity. By using the power of Federal technology spending, we are improving the software available for use to all Americans. Our 100-day action plan to improve cybersecurity across the electricity sector has already resulted in more than 150 utilities serving 90 million Americans committing to deploy cybersecurity technologies, and we are working to deploy action plans for additional critical infrastructure sectors. Both the public and private sectors have a role to play in strengthening cybersecurity, which is why we also issued a National Security Memorandum outlining the cybersecurity practices that responsible owners and operators of critical infrastructure should put in place and brought together leading American executives to expand public-private cooperation on cybersecurity.

We are also partnering closely with nations around the world on these shared threats, including our NATO allies and G7 partners. This month, the United States will bring together 30 countries to accelerate our cooperation in combatting cybercrime, improving law enforcement collaboration, stemming the illicit use of cryptocurrency, and engaging on these issues diplomatically. We are building a coalition of nations to advocate for and invest in trusted 5G technology and to better secure our supply chains. And, we are bringing the full strength of our capabilities to disrupt malicious cyber activity, including managing both the risks and opportunities of emerging technologies like quantum computing and artificial intelligence. The Federal government needs the partnership of every American and every American company in these efforts. We must lock our digital doors — by encrypting our data and using multifactor authentication, for example—and we must build technology securely by design, enabling consumers to understand the risks in the technologies they buy. Because people – from those who build technology to those to deploy technology – are at the heart of our success.

This October, even as we recognize how much work remains to be done and that maintaining strong cybersecurity practices is ongoing work, I am confident that the advancements we have put in place during the first months of my Administration will enable us to build back better – modernizing our defenses and securing the technology on which our enduring prosperity and our security rely.


Statement by President Joe Biden on Cybersecurity Awareness Month | The White House Briefing Room

October is Cybersecurity Awareness Month

Now in its 18th year, Cybersecurity Awareness Month—previously known as National Cybersecurity Awareness Month—continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have the resources they need to be safer and more secure online.

This year’s theme, “Do Your Part. #BeCyberSmart.”, encourages individuals and organizations to own their role in protecting their part of cyberspace, stressing personal accountability and the importance of taking proactive steps to enhance cybersecurity.

In 2021, CISA and NCSA will focus on the following areas in our promotions and outreach:

  • Week of October 4 (Week 1): Be Cyber Smart.
  • Week of October 11 (Week 2): Phight the Phish!
  • Week of October 18 (Week 3): Explore. Experience. Share. – Cybersecurity Career Awareness Week
  • Week of October 25 (Week 4): Cybersecurity First

CISA encourages the use of the hashtag #BeCyberSmart before and during October to promote your involvement in raising cybersecurity awareness.

During October, use CISA’s Cybersecurity Awareness Month Resources to help your stakeholders learn how to reduce their cybersecurity risks and protecting themselves online. Use these resources in your communities and share them with your stakeholders throughout the year to encourage strong, nationwide cybersecurity. These materials are free and may be modified to meet your needs.


Cybersecurity Awareness Month | CISA

CISA, FBI, and NSA Release Joint Cybersecurity Advisory on Conti Ransomware 

CISA, the Federal Bureau of Investigation (FBI), and the National Security Agency (NSA) have released a joint Cybersecurity Advisory (CSA) alerting organizations of increased Conti ransomware attacks. Malicious cyber actors use Conti ransomware to steal sensitive files from domestic and international organizations, encrypt the targeted organizations’ servers and workstations, and demand a ransom payment from the victims.

CISA, FBI, and NSA encourage network defenders to examine their current cybersecurity posture and apply the recommended mitigations in the joint CSA, which include:  

  • Updating your operating system and software, 
  • Requiring multi-factor authentication, and  
  • Implementing network segmentation.

Additionally, review the U.S. government resource for more guidance on ransomware protection, detection, and response.


CISA, FBI, and NSA Release Joint Cybersecurity Advisory on Conti Ransomware | US-CERT

Netgear patches serious bug found in several popular routers

Netgear has fixed a high severity remote code execution (RCE) vulnerability in the Circle parental control service, on several of Netgear’s Small Offices/Home Offices (SOHO) routers.

What makes this vulnerability particularly interesting, is that even though it exists in a third-party component included in the firmware, it is just as damaging as a vulnerability that exists in the Netgear core’s firmware, because of the fact that Circle runs with root permissions.

“The Circle update daemon that contains the vulnerability is enabled to run by default, even if you haven’t configured your router to use the parental control features. While it doesn’t fix the underlying issue, simply disabling the vulnerable code when Circle is not in use would have prevented exploitation on most devices,” notes Adam Nichols, researcher with cybersecurity experts GRIMM.

While Netgear has issued patches to fix the issue, GRIMM recommends the use of VPN to mitigate the risk posed by compromisable network routers.


Netgear patches serious bug found in several popular routers | TechRadar

Commission on breach liabilities hits roadblocks in Washington

A Cyberspace Solarium Commission proposal to allow Americans to sue companies for cyber incidents resulting from product vulnerabilities is hitting a familiar dilemma in Washington: Is it better to punish companies for their shoddy practices or exempt them from liability to encourage information-sharing? Or can you do both?

The proposal would make “final goods assemblers,” rather than intermediaries, liable for breaches and hacks resulting from known vulnerabilities. But skeptics of this approach say it’s still going to be difficult for Congress to determine which company should be open to lawsuits for a particular breach, or when that liability should apply. For example, how strenuously does a company have to try to alert its customers that a patch for a software flaw is available?

Getting companies on board with the idea is a tough sell, especially when Congress has been using liability protections as a bargaining chip to get the private sector on board with other possible new cybersecurity measures. For instance, proposed breach-reporting mandates in both a Senate Intelligence Committee bill and a House Homeland Security draft would exempt those reports from liability to ease the industry’s nerves about sharing information about hacks and data breaches.

Although there hasn’t been a huge public pushback to this proposal, the U.S. Chamber of Commerce, one of the most influential industry groups, still isn’t on board: Matthew Eggers, the group’s vice president of cybersecurity policy, told Eric it would prefer “not to impose liability.”


Diving into lawmakers’ data breach liability quandary | Politico

UN computer networks breached by hackers earlier this year

Hackers breached the United Nations’ computer networks earlier this year and made off with a trove of data that could be used to target agencies within the intergovernmental organization.

The hackers’ method for gaining access to the UN network appears to be unsophisticated: They likely got in using the stolen username and password of a UN employee purchased off the dark web.

“We can confirm that unknown attackers were able to breach parts of the United Nations infrastructure in April of 2021,” Stéphane Dujarric, spokesman for the UN Secretary-General, said in a statement on Thursday. “The United Nations is frequently targeted by cyberattacks, including sustained campaigns. We can also confirm that further attacks have been detected and are being responded to, that are linked to the earlier breach.”

“Traditionally, organizations like the United Nations have been targeted by nation state actors, but as cybercriminals are finding ways to more effectively monetize stolen data and as access to these organizations is more frequently available for sale by initial access brokers, we expect to see them increasingly targeted and infiltrated by cybercriminals,” said Allan Liska, a senior threat analyst at Recorded Future.


UN Computer Networks Breached by Hackers Earlier This Year | Bloomberg

FBI-CISA Advisory on Ransomware Awareness for Holidays and Weekends

Original release date: August 31, 2021

Today, the Federal Bureau of Investigation (FBI) and CISA released a Joint Cybersecurity Advisory (CSA) to urge organizations to ensure they protect themselves against ransomware attacks during holidays and weekends—when offices are normally closed.

Although FBI and CISA do not currently have any specific threat reporting indicating a cyberattack will occur over the upcoming Labor Day holiday, malicious cyber actors have launched serious ransomware attacks during other holidays and weekends in 2021. The Joint CSA identifies both immediate and longer term actions organizations can take to protect against the rise in ransomware, including:

CISA and the FBI encourage users to examine their current cybersecurity posture and implement the recommended mitigations in the Joint CSA to manage the risk posed by all cyber threats, including ransomware.

FBI-CISA Advisory on Ransomware Awareness for Holidays and Weekends | US Cert

Purported thief says T-Mobile’s security is “awful”

On Thursday, a 21-year-old US citizen claiming to be the attacker who stole data on more than 50 million T-Mobile customers called the telecom’s security “awful.”

On Friday, a “humbled” T-Mobile CEO Mike Sievert apologized for the incident, the repercussions of which have affected a total of more than 50 million customers. As of August 18th, T-Mobile had estimated the total number of affected records to be approximately 40 million, a number that rose to 50 million by August 20th and could double if statements from the purported thief are accurate.

When the breach was widely reported 11 days ago, the purported thief was offering to sell 30 million records for 1 penny each on an underground forum, claiming this was just a subset of the 100 million customer records he obtained.

The breach is the third major customer data leak that T-Mobile has disclosed in the past two years. The Bellevue, Wash., company is the second-largest U.S. mobile carrier with roughly 90 million cellphones connecting to its networks.

The Seattle office of the Federal Bureau of Investigation is investigating the T-Mobile hack, according to a person familiar with the matter. “The FBI is aware of the incident and does not have any additional information at this time,” the Seattle office said in a statement Wednesday.


T-Mobile Hacker Who Stole Data on 50 Million Customers: ‘Their Security Is Awful’ | WSJ

Cyber-awareness hits a snag on TikTok

Well-intentioned hackers trying to teach online hygiene and safety are running into a problem on TikTok: the newer social media platform’s algorithms can’t distinguish between videos about criminal and ethical hacking.

Marcus Hutchins, who rose to fame after temporarily stopping the WannaCry ransomware attack in 2017, knows this problem well. Whenever he posts an educational video demonstrating hacking techniques bad actors use, TikTok’s content moderation algorithm immediately removes it for seemingly violating policies against promoting criminal activity. The platform also bans Hutchins from posting for a couple of days.

Each time he’s appealed the removals, TikTok has reinstated the video. And Hutchins says he’s not the only one. “Everyone in cybersecurity is having this issue,” he told MC. TikTok spokesperson Jamie Favazza pointed MC to a section in the platform’s guidelines that says educational content like Hutchins’ should be allowed: “We recognize that some content that would normally be removed per our Community Guidelines could be in the public interest,” the guidelines say. “Therefore, we may allow exceptions under certain circumstances.” (This is most likely why Hutchins’ videos are reinstated following appeal.)

Hutchins said he ran into the same problems with content moderation in the early days of YouTube. But while YouTube, Instagram and Twitter don’t flag his videos anymore, TikTok remains a problem. But TikTok’s speed and mostly Gen Z and millennial audience makes it too valuable to creators like Hutchins to completely abandon, despite the headaches.

“Even if I do get banned for a week after every single post, I’m probably still going to be getting more views than on any other [social media] channel,” Hutchins said. “I'm guessing at some point my ban becomes permanent, at which point I guess I'm forced to stop.”


Weekly Cybersecurity | Politico

CISA warns of hurricane-related scams

CISA has warned users to remain on alert for malicious cyber activity targeting potential disaster victims and charitable donors following a hurricane. Fraudulent emails—often containing malicious links or attachments—are common after major natural disasters. Exercise caution in handling emails with hurricane-related subject lines, attachments, or hyperlinks. In addition, be wary of social media pleas, texts, or door-to-door solicitations relating to severe weather events.

To avoid becoming victims of malicious activity, users and administrators should review the following resources and take preventative measures.

  • Staying Alert to Disaster-related Scams
  • Before Giving to a Charity
  • Staying Safe on Social Networking Sites
  • Avoiding Social Engineering and Phishing Attacks
  • Using Caution with Email Attachments

If you believe you have been a victim of cybercrime, file a complaint with the Federal Bureau of Investigation’s Internet Crime Complaint Center (IC3) at


Hurricane-Related Scams | CISA

“Breach Fatigue” sets in

A data breach that affected more than 40 million current, former and prospective T-Mobile customers is a massive cybersecurity incident that is bound to spark a public backlash. Or, then again, maybe it will be forgotten in a week…

The proliferation of ever-larger breaches during the past decade has left the public so inured to such news that it has become increasingly less likely that a breach will make any public splash at all, no matter how big it is. It’s an effect security researchers describe as “breach fatigue.” This phenomenon has made it harder for any single data breach to galvanize action in Washington or state legislatures.

“I think the public is already at the point of seeing tens of millions of customer accounts compromised as a non-story,” Maurice Turner, cybersecurity fellow at the German Marshall Fund’s Alliance for Securing Democracy, told me.

“The sheer volume of this latest breach … can make it difficult to appreciate the tremendous damage being done to individuals when their information is seized by hackers,” Rep. Jim Langevin, co-chair of the Congressional Cybersecurity Caucus, told me.

It has also made it far more difficult for cyber educators to persuade people to adopt better behavior, such as adding extra authentication procedures to access accounts and not clicking on suspicious-looking links.

Perhaps most concerning, it has become clear that as the public has become numb to the endless onslaught of ransomware attacks, Washington has become far less likely to focus on breaches that affect only tens of millions of victims.


There was another massive data breach. People will probably forget it in a week. | Washington Post

Ransomware attacks on schools remain a serious concern

The Delta Covid variant isn’t the only thing threatening the safety of school reopenings this month. A wave of ransomware attacks targeting school systems could also keep students from having a “normal” school year, once again.

So far this year, ransomware attacks have disrupted 58 United States education organizations and school districts, including 830 individual schools, according to Emsisoft threat analyst Brett Callow last month. Compare that with 2020, when Emsisoft estimates that 84 incidents disrupted learning at 1,681 individual schools, colleges and universities.

“Back to school time, particularly for ransomware, is a challenging time — especially over the last couple of years when the ransomware actors have really started to focus on state and local government agencies, including school districts,” says Doug Levin, the national director of the K-12 Security Information Exchange.

Among school district IT leaders, the threat of ransomware has become a growing concern, Levin said, but institutional problems pose a challenge in making major changes to security protocols. “Just because IT is concerned, doesn’t mean that superintendents and school board members are concerned,” he said. “They are the ones who set the priorities for the district and they’re the ones in charge of the purse strings.”

The growth of cyber insurance is forcing some schools to make security a priority. If districts want a policy or lower premiums, they have to meet certain security standards — such as implementing multi-factor authentication.

“If these major corporations can’t defend themselves, and even folks in the federal government get affected by this kind of stuff, school districts really have no chance against a motivated skilled actor,” Levin said.


Batesville School District blocks ransomware attack | KAIT8 Local News

The State of Ransomware in the US: Report and Statistics 2020 | Emisoft

US and allies accuse China of global hacking spree

The United States and its allies accused China on Monday of a global cyberespionage campaign, mustering an unusually broad coalition of countries to publicly call out Beijing for hacking.

The United States was joined by NATO, the European Union, Britain, Australia, Japan, New Zealand and Canada in condemning the spying, which U.S. Secretary of State Antony Blinken said posed "a major threat to our economic and national security."

Simultaneously, the U.S. Department of Justice charged four Chinese nationals - three security officials and one contract hacker - with targeting dozens of companies, universities and government agencies in the United States and abroad.

While Washington and its close allies such as the United Kingdom and Canada held the Chinese state directly responsible for the hacking, others were more circumspect.

The campaign targeted trade secrets in industries including aviation, defense, education, government, health care, biopharmaceutical and maritime industries, the Justice Department said.


US and allies accuse China of global hacking spree | Reuters

UK and White House blame China for Microsoft Exchange Server hack | ZDNet

Washington sanctions Russia's cybersecurity industry in wake of Kaseya ransomware attack

The United States on Friday took a new stab at Russia's cybersecurity industry, restricting trade with four information technology firms and two other entities over "aggressive and harmful" activities - including digital espionage - that Washington blames on the Russian government.

A Commerce Department posting said the six entities were sanctioned by the U.S. Treasury Department in April, which targeted companies in the technology sector that support Russian intelligence services. Their addition to the Commerce Department's blacklist means U.S. companies cannot sell to them without licenses, which are seldom granted.

They come as the United States is responding to a drumbeat of digital intrusions blamed on Russian government-backed spies and a spate of increasingly disruptive ransomware outbreaks blamed on Russian cybercriminals.

The United States adds entities to the Commerce Department's trade blacklist that it says pose a risk to U.S. national security or foreign policy interests.


Biden battles Russian hacking groups with restrictions on IT firms | Reuters

Up to 1,500 businesses infected in one of the worst ransomware attacks ever

Cybersecurity teams are working feverishly to stem the impact of the single biggest global ransomware attack on record. As many as 1,500 businesses around the world have been infected by highly destructive malware that first struck software maker Kaseya. The malware, in turn, used that access to fell Kaseya’s customers.

The attack struck on Friday afternoon in the lead-up to the three-day Independence Day holiday weekend in the US. Hackers affiliated with REvil, a private ransomware-as-a-service (RaaS) group believed to be affiliated with Russia, exploited a zero-day vulnerability in the Kaseya VSA remote management service, which the company says is used by 35,000 customers. The REvil affiliates then used their control of Kaseya’s infrastructure to push a malicious software update to customers, who are primarily small-to-midsize businesses.

According to Kaseya CEO Fred Voccola, less than 0.1% of the company's customers were embroiled in the breach -- but as their clientele includes MSPs, this means that smaller businesses have also been caught up in the incident.

Mr. Biden suggested Saturday the U.S. would respond if it was determined that the Kremlin is at all involved. Less than a month ago, he pressed Russian President Vladimir Putin to stop giving safe haven to REvil and other ransomware gangs whose unrelenting extortionary attacks the U.S. deems a national security threat.


REvil hackers demand $70 million to end biggest ransomware attack on record | CBS News

Up to 1,500 businesses infected in one of the worst ransomware attacks ever | Ars Technica

Cybersecurity for State Leaders brings cyber trainings to Massachusetts

On Tuesday, June 29th, Cybersecurity for State Leaders, a nationwide initiative led by the National Cybersecurity Center and supported by Google, will host a high-level cybersecurity briefing for state elected and appointed leaders and their staff. The briefing will educate state officials on the threat environment and arm them with best practices on how to avoid cyber attacks.

“The threat posed to all levels of government by cyber attacks continues to increase year after year,” said Governor Charlie Baker. “Equipping government employees with the training and knowledge to assist in the fight against bad actors remains one of the best ways to improve the Commonwealth’s cybersecurity.”

“End point user cybersecurity training is a vital component in improving the overall cybersecurity posture of state government,” said Secretary of Technology Services and Security Curtis M. Wood. “I thank the National Cybersecurity Center, Google, and our partners in the Legislature for their collaboration in providing this important training to the Commonwealth.”

The briefing will also feature remarks by famed cybersecurity executive, Investor on ABC’s Shark Tank and founder and CEO of the Herjavec Group, Robert Herjavec, Chief People Hacker from IBM’s X-Force Red Team and Career White Hat Hacker Stephanie Carruthers, and senior experts and researchers from Google, Microsoft, and more.

Register for the ON DEMAND Cybersecurity for State Leaders Training here at

For more information on Cybersecurity for State Leaders, visit


Cybersecurity for State Leaders Brings Cyber Trainings to Massachusetts | Cybersecurity for State Leaders

Electronic Arts hacked and source code stolen

Hackers have stolen valuable information from major game publisher Electronic Arts (EA), the company said.

The attackers claimed to have downloaded source code for games such as FIFA 21 and for the proprietary Frostbite game engine used as the base for many other high-profile games.

News of the hack was first reported by news site Vice, which said some 780GB of data was stolen. EA said no player data had been stolen in the breach.

The firm is one of the largest games companies in the world. It counts major series such as Battlefield, Star Wars: Jedi Fallen Order, The Sims, and Titanfall among the titles it develops or publishes - as well as a vast array of annual sports games.

Electronic Arts has tightened security since the incident and is “actively working with law-enforcement officials and other experts as part of this ongoing criminal investigation,” the company said.


Electronic Arts Hit by Hackers Who Took Source Code, Tools | Bloomberg

EA hacked and source code stolen | BBC News


Mass. Steamship Authority Hit by Ransomware Attack; Ferries Delayed

A ransomware attack on the Steamship Authority of Massachusetts hampered operations Wednesday morning. The largest ferry service to the islands of Martha's Vineyard and Nantucket, the Steamship Authority issued a statement warning that traveling customers may be delayed as a result.

"The Woods Hole, Martha’s Vineyard and Nantucket Steamship Authority was the target of a ransomware attack early Wednesday, June 2, 2021," the company said. "The Authority continues to work internally, as well as with federal, state and local authorities, to determine the extent and origin of the attack."

The company said there was no impact to the safety of vessel operations, saying the issue was not affecting radar or GPS functionality. "Scheduled trips to both islands continue to operate, although customers may experience some delays during the ticketing process," the company said. "The Authority continues to work internally, as well as with federal, state and local authorities, to determine the extent and origin of the attack."


Massachusetts Steamship Authority hit by ransomware attack | WCVB

Ransomware Attack on Steamship Authority of Massachusetts Causing Delays to Nantucket, Martha’s Vineyard | NBC Boston

U.S. meat supply hit by suspected Russian ransomware attack on JBS, world's top meat processor

A ransomware attack on the world’s largest meat processing company disrupted production around the world just weeks after a similar incident shut down a U.S. oil pipeline.

Brazil’s JBS SA, however, said late Tuesday that it had made “significant progress” in dealing with the cyberattack and expects the “vast majority” of its plants to be operating on Wednesday.

“Our systems are coming back online and we are not sparing any resources to fight this threat,” Andre Nogueira, CEO of JBS USA, said in a statement.

Earlier, the White House said JBS had notified the U.S. of a ransom demand from a criminal organization likely based in Russia. White House principal deputy press secretary Karine Jean-Pierre said the White House and the Department of Agriculture have been in touch with the company several times this week.

Mark Jordan, who follows the meat industry as the executive director of Leap Market Analytics, said the disruption could be minimal assuming JBS recovers in the next few days. Meat processers are used to dealing with delays because of a host of factors, including industrial accidents and power outages, and they make up lost production with extra shifts, he said.


Meat producer JBS says expects most plants working Wednesday | AP News

CNA Financial paid $40 Million in ransom after March cyberattack

CNA Financial Corp., among the largest insurance companies in the U.S., paid $40 million in late March to regain control of its network after a ransomware attack, according to people with knowledge of the attack.

The Chicago-based company paid the hackers about two weeks after a trove of company data was stolen, and CNA officials were locked out of their network, according to two people familiar with the attack who asked not to be named because they weren’t authorized to discuss the matter publicly.

In a statement, a CNA spokesperson said the company followed the law. She said the company consulted and shared intelligence about the attack and the hacker’s identity with the FBI and the Treasury Department’s Office of Foreign Assets Control, which said last year that facilitating ransom payments to hackers could pose sanctions risks.

“CNA is not commenting on the ransom,” spokeswoman Cara McCall said. “CNA followed all laws, regulations, and published guidance, including OFAC’s 2020 ransomware guidance, in its handling of this matter.”

In a security incident update published on May 12, CNA said it did “not believe that the systems of record, claims systems, or underwriting systems, where the majority of policyholder data – including policy terms and coverage limits – is stored, were impacted.”

Ransomware attacks -- and particularly payments -- are rarely disclosed so it’s difficult to know what the biggest ransoms have been. The average payment in 2020 was $312,493, according to Palo Alto Networks, a 171% increase over the previous year. The $40 million payment is bigger than any previously disclosed payments to hackers, according to three people familiar with ransomware negotiations.


CNA Financial Paid Hackers $40 Million in Ransom After March Cyberattack | Bloomberg

Cybersecurity firms may have inadvertently aided hackers in Colonial Pipeline attack

On January 11, antivirus company Bitdefender said it was “happy to announce” a startling breakthrough. It had found a flaw in the ransomware that a gang known as DarkSide was using to freeze computer networks of dozens of businesses in the US and Europe. Companies facing demands from DarkSide could download a free tool from Bitdefender and avoid paying millions of dollars in ransom to the hackers.

But Bitdefender wasn’t the first to identify this flaw. Two other researchers, Fabian Wosar and Michael Gillespie, had noticed it the month before and had begun discreetly looking for victims to help. By publicizing its tool, Bitdefender alerted DarkSide to the lapse, which involved reusing the same digital keys to lock and unlock multiple victims. The next day, DarkSide declared that it had repaired the problem, and that “new companies have nothing to hope for.”

“Special thanks to BitDefender for helping fix our issues,” DarkSide said. “This will make us even better.”

DarkSide soon proved it wasn’t bluffing, unleashing a string of attacks. This month, it paralyzed the Colonial Pipeline Co., prompting a shutdown of the 5,500-mile pipeline that carries 45% of the fuel used on the East Coast—quickly followed by a rise in gasoline prices, panic buying of gas across the Southeast, and closures of thousands of gas stations. Absent Bitdefender’s announcement, it’s possible that the crisis might have been contained, and that Colonial might have quietly restored its system with Wosar and Gillespie’s decryption tool.

Instead, Colonial paid DarkSide $4.4 million in Bitcoin for a key to unlock its files. “I will admit that I wasn’t comfortable seeing money go out the door to people like this,” CEO Joseph Blount told the Wall Street Journal.

The missed opportunity was part of a broader pattern of botched or half-hearted responses to the growing menace of ransomware, which during the pandemic has disabled businesses, schools, hospitals, and government agencies across the country. The incident also shows how antivirus companies eager to make a name for themselves sometimes violate one of the cardinal rules of the cat-and-mouse game of cyberwarfare: Don’t let your opponents know what you’ve figured out.


The Colonial pipeline ransomware hackers had a secret weapon: self-promoting cybersecurity firms | MIT Technology Review

DC Police victim of massive data leak by ransomware gang

The police department in the nation’s capital has suffered a massive leak of internal information after refusing to meet the blackmail demands of Russian-speaking ransomware syndicate. Experts say it’s the worst known ransomware attack ever to hit a U.S. police department.

The gang, known as the Babuk group, released thousands of the Metropolitan Police Department’s sensitive documents on the dark web Thursday. A review by The Associated Press found hundreds of police officer disciplinary files and intelligence reports that include feeds from other agencies, including the FBI and Secret Service.

Some of the documents include security information from other law enforcement agencies related to President Joe Biden’s inauguration, including a reference to a “source embedded” with a militia group.

The police department did not immediately return a request for comment, but has previously said some officers’ personal information was stolen.

The department has not said whether it made the offer. Any negotiations would reflect the complexity of the ransomware problem, with police finding themselves forced to consider making payments to criminal gangs. The FBI, which is assisting in this case, discourages ransomware payments.

The group revealed the attack last month, threatening then to leak the identities of confidential informants. The data release revealed Thursday is massive and it was not immediately clear if it included informants’ names.


DC Police victim of massive data leak by ransomware gang | AP News

Updated - Colonial Pipeline victim of ransomware attack

Update II: 

Colonial Pipeline Co. paid nearly $5 million to Eastern European hackers on Friday, contradicting reports earlier this week that the company had no intention of paying an extortion fee to help restore the country’s largest fuel pipeline, according to two people familiar with the transaction.

The company paid the hefty ransom in difficult-to-trace cryptocurrency within hours after the attack, underscoring the immense pressure faced by the Georgia-based operator to get gasoline and jet fuel flowing again to major cities along the Eastern Seaboard, those people said. A third person familiar with the situation said U.S. government officials are aware that Colonial made the payment.


Colonial Pipeline Paid Hackers Nearly $5 Million in Ransom | Bloomberg


Colonial Pipeline said Wednesday "it initiated the restart" of operations after having to shut off the conduit following a cyberattack last week.

The pipeline was set to resume operations around 5 p.m. ET, but the company said "it will take several days for the product delivery supply chain to return to normal." Colonial Pipeline Co. had to shut it down Saturday following a ransomware attack. 


Colonial pipeline update: Operations restart as gas prices top $3| USA Today

Original Story:

Top U.S. fuel pipeline operator Colonial Pipeline has shut its entire network after a ransomware attack, the company said in a statement on Friday.

Colonial's network supplies fuel from U.S refiners on the Gulf Coast to the populous eastern and southern United States. The company transports 2.5 million barrels per day of gasoline, diesel, jet fuel and other refined products through 5,500 miles of pipelines. The company says it transports 45 percent of East Coast fuel supply.

"We have since determined that this incident involves ransomware," Colonial Pipeline said. "In response, we proactively took certain systems offline to contain the threat, which has temporarily halted all pipeline operations, and affected some of our IT systems."

The private cybersecurity firm FireEye said it's been hired to manage the incident response investigation.

In response to the scale and scope of the incident, the US government has relaxed rules on fuel being transported by road, allowing drivers in 18 states to work extra or more flexible hours when transporting refined petroleum products.

The government is planning for various scenarios and working with state and local authorities on measures to mitigate any potential supply issues, officials said Saturday. The attack is unlikely to affect gasoline supply and prices unless it leads to a prolonged shutdown, experts said.


Cyberattack on U.S. pipeline is linked to criminal gang | NBC News

Hack Idles Pipeline for Third Day as Supply Concerns Mount | Bloomberg

US passes emergency waiver over fuel pipeline cyber-attack | BBC News

Homeland Security Secretary backs call for mandatory disclosure of ransomware payments

The Department of Homeland Security will work with a private-sector think tank to implement a report of recommendations for slowing the scourge of ransomware, including one that would require victims to report when they give in and make a payment, according to DHS Secretary Alejandro Mayorkas.

The report reflects the work of a ransomware task force convened by the Silicon Valley-based Institute for Security and Technology that included 60 experts from software companies, cybersecurity vendors, government agencies, non-profits, academic institutions, cybersecurity insurers and international organizations, according to the document.

“The task force's report provides a vision for what we can do to better address this urgent problem,” Mayorkas said. “DHS looks forward to working closely with the task force to turn its recommendations into action.”

Last year saw an exponential increase in the number and size of ransomware payments entities—often schools, hospitals and other critical service providers and local governments—made to hackers who encrypt or threaten to publicly release their data unless they’re paid not to.

Jen Ellis, a task force member and vice president of cybersecurity firm Rapid 7, stressed the importance of the recommendation to mandate the disclosure of payments so that law enforcement can have a better understanding of the threat and to discourage ransom payment. She said the information would be anonymized to prevent organizations from being “re-victimized.”


Homeland Security Secretary Backs Call for Mandatory Disclosure of Ransomware Payments | Nextgov

Combating Ransomware - A Comprehensive Framework for Action: Key Recommendations from the Ransomware Task Force |

Biden prepping cybersecurity executive order in response to SolarWinds attack

President Biden is preparing a cybersecurity executive order focused on helping the country protect itself from future cyberattacks following the sophisticated SolarWinds hack that was discovered in December.

The order, which is still being drafted, lays out a series of new requirements for companies that do business with the government. The initiative includes plans for more systematic investigations of cyber events and standards for software development. The idea is to use the federal contracting process to force changes that will eventually trickle down to the rest of the private sector.

"So essentially, federal government procurement allows us to say, 'If you're doing business with the federal government, here's a set of things you need to comply with in order to do business with us,'" said Anne Neuberger, the deputy national security adviser for cyber and emerging technology at the White House.

The SolarWinds attack, believed to be perpetrated by Russian hackers, was discovered last year. The hackers exploited software from the IT group SolarWinds, which helped them gain access to as many as 18,000 customers. A smaller number of the customers' systems, however, were compromised by follow-on activity.

As a result, nine federal agencies and 100 private-sector groups were compromised during the months-long operation.


After SolarWinds Hack, Biden Plans Executive Order Strengthening Cybersecurity | NPR

Biden prepping cybersecurity executive order in response to SolarWinds attack | The Hill

D.C. Police Department Victim Of Apparent Ransomware Attack

Potentially sensitive information from the Washington, D.C., police department was allegedly breached by a ransomware attack from a group seeking a payout.

A group called Babuk claimed to be behind the attack. Babuk is known for ransomware attacks, which hold victims’ data hostage until they pay a ransom, often in Bitcoin. On a post made on its website, the group threatened to release information pulled from the department's systems if they were not paid an undisclosed amount. The group also hit the Houston Rockets N.B.A. team this month.

In their post to the dark web, Babuk’s cybercriminals claimed they had downloaded 250 gigabytes of data and threatened to leak it if their ransom demands were not met in three days. They also threatened to release information about police informants to criminal gangs, and to continue attacking “the state sector,” including the F.B.I. and the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency. The information already released appeared to include chief’s reports, lists of arrests and lists of persons of interest.

Targeting an organization like the Metropolitan Police Department makes sense, says Rob Pritchard, founder of, as police can't tolerate a long outage and are more likely to pay to take back control of their data and systems.

If the police department did pay to regain control of its data, it may mean other law enforcement agencies could become similar targets, Pritchard said.

"Expect more local police groups to be targeted," he said.


D.C. Police Department Data Is Leaked in a Cyberattack | The New York Times

D.C. Police Department Victim Of Apparent Ransomware Attack | NPR

Biden administration kicks off 100-day effort on to beef up cybersecurity of nation's power grid

The Biden administration kicked off a 100-day effort on Tuesday to beef up cybersecurity in the nation's power grid, calling for industry leaders to install technologies that could thwart attacks on the electricity supply.

The plan, a joint effort between the Energy Department and the Cybersecurity and Infrastructure Security Agency, focuses on helping operators in the electricity industry modernize their security systems and implement new technologies to detect and mitigate threats.

“The United States faces a well-documented and increasing cyber threat from malicious actors seeking to disrupt the electricity Americans rely on to power our homes and businesses,” Secretary of Energy Jennifer M. Granholm said in a statement. “It’s up to both government and industry to prevent possible harms — that’s why we’re working together to take these decisive measures so Americans can rely on a resilient, secure, and clean energy system.”

Recent attacks on SolarWinds and Microsoft Exchange software, both of which ensnared the electric industry, have renewed the urgency to modernize and secure America's electric grid. Some owners and operators still rely on decades-old equipment that was not designed with modern cybersecurity risks in mind.

The new initiative follows criticism from some industry members that funding for grid security was snubbed in Biden's recent infrastructure package.


The Cybersecurity 202: The Biden administration rolls out a 100-day plan to improve electric grid cybersecurity | The Washington Post

Biden Rushes to Protect Power Grid as Hacking Threats Grow | Bloomberg

Remote work software compromised by China in yet another hack on U.S.

China is behind a newly discovered series of hacks against key targets in the U.S. government, private companies and the country’s critical infrastructure, cybersecurity firm Mandiant said Wednesday.

The hack works by breaking into Pulse Secure, a program that businesses often use to let workers remotely connect to their offices. The company announced Tuesday how users can check to see if they were affected but said the software update to prevent the risk to users won’t go out until May. There is no indication the identified backdoors were introduced through a supply chain compromise of the company’s network or software deployment process.

The campaign is the third distinct and severe cyberespionage operation against the U.S. made public in recent months, stressing an already strained cybersecurity workforce. The U.S. government accused Russia in January of hacking nine government agencies via SolarWinds, a Texas software company widely used by American businesses and government agencies. In March, Microsoft blamed China for starting a free-for-all where scores of different hackers broke into organizations around the world through the Microsoft Exchange email program.

CISA, the U.S. Cybersecurity and Infrastructure Security Agency, activated its strictest emergency powers Tuesday evening, mandating that every civilian government agency scan to see if they were affected by the hack and to take actions to fix it. Though it is historically rare for it to do so, it is the second time in seven weeks the agency has issued an emergency directive after the Exchange hack.


China behind another hack as U.S. cybersecurity issues mount | NBC News

Check Your Pulse: Suspected APT Actors Leverage Authentication Bypass Techniques and Pulse Secure Zero-Day | FireEye Inc

Defense Department kicks off pilot program to root out digital weaknesses in defense industry

The Pentagon’s Cyber Crime Center and bug bounty vendor HackerOne today launched an effort to share vulnerability data and boost digital hygiene within the defense industrial base, a frequent target for hackers that has been rocked by a number of high-profile breaches over the years. The Defense Industrial Base Vulnerability Disclosure Program (DIB-VDP) Pilot — started in collaboration with the Defense Counterintelligence and Security Agency — will invite security researchers to hunt for vulnerabilities in more than 100 DIB assets across several different organizations.

The 12-month program aims to apply the lessons learned from the existing 28,000 reports made through the Pentagon’s Vulnerability Disclosure Program, which was established in 2016, to vendors and contractors within the DIB. The pilot program’s structure was informed by the Carnegie Mellon University’s Software Engineering Institute, which conducted a feasibility study ahead of the initiative.

“To have a comprehensive view of where you're most vulnerable in order to protect against evolving threats, you need to remain open to vulnerability findings at all times. It's a best practice and a regulatory expectation,” HackerOne Co-founder Michiel Prins said in a statement. “With the DIB VDP, learnings from this best-in-class program can be extended to many of the government's most vital suppliers.”


New DoD vulnerability effort launched - POLITICO

Broward County Public Schools, sixth largest U.S. school district, targeted by massive ransomware

Broward County Public Schools, the sixth largest school district in the United States, said Thursday it had been the target of a massive ransomware attack. This comes just weeks after a high-profile attack on the Buffalo Public Schools as well as a water treatment facility in Oldsmar, Florida.

The hackers were able to encrypt some of the Fort Lauderdale-based district's data in March and initially demanded a $40 million cryptocurrency payment or they would erase the files and publish the personal information of students and employees online. Broward said Thursday it made no extortion payment and that no personal information had been published online. The district added that it is working with cybersecurity experts to shore up its computer systems and restore affected systems.

Screenshots of negotiations between Broward County Public Schools and the hackers show that at one point the school district offered $500,000 to restore the data, according to WPTV, an NBC-affiliated television station.

The attack briefly shutdown the district’s computer system in early March, but classes were not disrupted.

Broward County Public Schools, the sixth largest U.S. school district, targeted by massive ransomware attack | Yahoo News

Ransomware attacks on the rise in the trucking industry

Bitdefender, a cybersecurity research organization and anti-malware developer, reports ransomware attacks were up 715% year over year in the first half of 2020 — and truck fleets were among the victims.

“Just about every month there was a transportation-related company that had experienced some form of ransomware or cyberattack,” says Sharon Reynolds, chief information security officer (CISO) of Omnitracs, a trucking fleet intelligence platform.

Advances in telematics, an interdisciplinary field that encompasses telecommunications, vehicular technologies, electrical engineering, and computer science, has seen the trucking industry become increasingly interconnected, bringing with it a sharp increase in the number of mobile phone applications that connect with trucks and the software-as-a-service (SaaS) offerings that power backend systems.

But Reynolds points to basic email messages as one of the most widely exploited tools when it comes to launching malware, particularly ransomware – the malware that encrypts computer files until someone pays a ransom. “Right now, it feels like transportation is definitely being targeted. These groups have figured out that distraction to the supply chain is a cause for concern,” Reynolds says. Truck fleets aren’t necessarily more vulnerable. It’s just appears to be this sector’s turn.”

As for fleets that have questioned whether having a security leader or other cyber support is worth the investment?

“It might be time to re-evaluate that,” she says.


Ransomware on the rise in trucking, says Omnitracs CISO | Truck News

Chinese cyber-attack on Microsoft morphs into global crisis

A sophisticated attack on Microsoft Corp.’s widely used business email software is morphing into a global cybersecurity crisis, as hackers race to infect as many victims as possible before companies can secure their computer systems.

The attack, which Microsoft has said started with a Chinese government-backed hacking group, has so far claimed at least 60,000 known victims globally, according to a former senior U.S. official with knowledge of the investigation. Many of them appear to be small or medium-sized businesses caught in a wide net the attackers cast as Microsoft worked to shut down the hack.

One U.S. cybersecurity company which asked not to be named said its experts alone were working with at least 50 victims, trying to quickly determine what data the hackers may have taken while also trying to eject them.

Some of the initial infections appear to have been the result of automated scanning and installation of malware, said Alex Stamos, a cybersecurity consultant. Investigators will be looking for infections that led to hackers taking the next step and stealing data -- such as e-mail archives -– and searching them for any valuable information later, he said.

“If I was running one of these teams, I would be pulling down email as quickly as possible indiscriminately and then mining them for gold,” Stamos said.


Hackers Breach Microsoft Customers Becomes Global Cybersecurity Crisis | Bloomberg

HAFNIUM targeting Exchange Servers with 0-day exploits

Microsoft has detected multiple 0-day exploits being used to attack on-premises versions of Microsoft Exchange Server in limited and targeted attacks. In the attacks observed, the threat actor used these vulnerabilities to access on-premises Exchange servers which enabled access to email accounts, and allowed installation of additional malware to facilitate long-term access to victim environments. Microsoft Threat Intelligence Center (MSTIC) attributes this campaign with high confidence to HAFNIUM, a group assessed to be state-sponsored and operating out of China, based on observed victimology, tactics and procedures.

More details from Microsoft can be viewed at these links.

HAFNIUM targeting Exchange Servers with 0-day exploits - Microsoft Security

Multiple Security Updates Released for Exchange Server – Microsoft Security Response Center

Big chains look to monetize data gained through vaccine distribution

Chains such as CVS Health Corp., Walmart Inc. and Walgreens-Boots Alliance, Inc. are collecting data from millions of customers as they sign up for shots, enrolling them in patient systems and having recipients register customer profiles.

The retailers say they are using the information to promote their stores and services, tailor marketing and keep in touch with consumers. The companies also say the information is critical in streamlining vaccinations and improving record-keeping, while ensuring only qualified people are receiving shots.

CVS executives say they plan to stay in touch with vaccine recipients beyond receiving their second shot and use information gleaned in the process to better market to them. The company said about eight million people who received coronavirus tests from the chain hadn’t filled a prescription at a CVS in the previous year, signaling that Covid-19 services promise to bring in new customers. A CVS spokesman declined to comment on the chain’s use for marketing purposes of medical information gleaned through the vaccine process.


CVS, Walgreens Look for Big Data Reward From Covid-19 Vaccinations | WSJ

Massachusetts-based payroll/HR giant hit by ransomware

Prism HR, a Hopkinton, Massachusetts-based company that sells human resources software to more than 80,000 small businesses, has suffered what appears to be an ongoing ransomware attack that is disrupting many of its services.

The company handles everything from human sources and payroll processing to health insurances and tax forms for hundreds of “professional employer organizations” (PEOs) that serve more than two million employees. The company processes more than $80 billion payroll payments annually on behalf of PEOs and their clients. Countless small businesses turn to PEOs in part because they simplify compliance with various state payroll taxes, and because PEOs are the easiest way for small businesses to pool their resources and obtain more favorable health insurance rates for their employees.

PrismHR has not yet responded to requests for comment. In a template email it suggested PEO partners share with their customers, Prism explained “the outage may extend throughout today and possibly later, with potential impact on payroll processing”.

The company has yet to reveal the exact nature of the service disruptions, but their actions so far align with industry standard recommendations for responding to a ransomware outbreak.

Ransomware renders any files it touches unreadable unless and until a victim pays for a digital key needed to unlock the encryption on them. Worse, it has become almost a best practice among ransomware criminal groups to steal as much data as possible from the victim organization prior to unleashing the ransom malware within a target environment.

PrismHR said in a statement to its PEO customers that while its investigation and response to the incident is ongoing, the company “is not aware of any sensitive data being breached or compromised.”


Payroll/HR Giant PrismHR Hit by Ransomware? | Krebs on Security

Senate Intel Committee to conduct open hearing on SolarWinds Hack

The Senate Intelligence Committee on Tuesday will hold the first public congressional hearing on the SolarWinds hack. The panel previously received a closed-door briefing about the incident from the NSA, the FBI, CISA and ODNI, and held an informal session with FireEye CEO Kevin Mandia, whose company discovered the compromise.

The hearing will take place today, Tuesday, February 23rd at 2:30PM ET.


Senate Intelligence Hearing on SolarWinds Hacking |

New strain of malware discovered on 30,000 Macs

A previously undetected piece of malware found on almost 30,000 Macs worldwide is generating intrigue in security circles, and security researchers are still trying to understand precisely what it does and what purpose its self-destruct capability serves.

The malware, dubbed Silver Sparrow, forces infected Macs to check a control server once an hour to see if there are any new commands the malware should run or binaries to execute. Researchers have yet to observe delivery of any payload on any of the infected 30,000 machines, leaving the malware’s ultimate goal unknown. The lack of a final payload suggests that the malware may spring into action once an unknown condition is met.

Curiously, the malware contains a mechanism to completely remove itself, a capability typically reserved for high-stealth operations. There are no signs as of yet that the self-destruct feature has been used, raising the question of why the mechanism exists.

The malware has been found in 153 countries with detections concentrated in Germany, France, the UK, Canada, and the United States.

“To me, the most notable [thing] is that it was found on almost 30K macOS endpoints... and these are only endpoints the MalwareBytes can see, so the number is likely way higher,” Patrick Wardle, a macOS security expert, wrote in an Internet message. “That’s pretty widespread... and yet again shows the macOS malware is becoming ever more pervasive and commonplace, despite Apple’s best efforts.”

Red Canary, the security firm that discovered the malware, has provided indicators of compromise in a blog post report located on its website.


New malware found on 30,000 Macs has security pros stumped | Ars Technica

Silver Sparrow macOS malware with M1 compatibility | Red Canary

Social media companies crack down on hijacked accounts

Twitter, Instagram, TikTok, and Facebook all took steps last week to crack down on users involved in trafficking hijacked accounts across their platforms. The coordinated action has seized hundreds of accounts the companies say have played a major role in facilitating the trade and often lucrative resale of compromised, highly sought-after usernames.

The wave of account bans centered around OGUsers, a forum that caters to thousands of people selling access to hijacked social media and other online accounts. Particularly prized by this community are short usernames, which can often be resold for thousands of dollars to those looking to claim a choice vanity name.

Facebook said it seized hundreds of accounts — mainly on Instagram — that have been stolen from legitimate users through a variety of intimidation and harassment tactics, including hacking, coercion, extortion, sextortion, SIM swapping, and swatting.

Two bitcoin wallets seized from one of OGUsers’ most notorious traffickers, a Canadian by the name of Noah Hawkins, recorded in excess of 6,700 transactions totaling more than 243 bitcoins — or roughly $8.5 million by today’s valuation (~$35,000 per coin). Beam would have earned roughly $425,000 in commissions on those sales.

As a reminder, any accounts that you value should be secured with a unique and strong password, as well the most robust form of multi-factor authentication available. Usually, this is a mobile app that generates a one-time code, but some sites like Twitter and Facebook now support even more robust options — such as physical security keys.


Facebook, Instagram, TikTok and Twitter Target Resellers of Hacked Accounts | Krebs on Security

Hackers target Florida town’s water supply

Hackers remotely accessed the water treatment plant of a small Florida city last week and briefly changed the levels of lye in the drinking water, in the kind of critical infrastructure intrusion that cybersecurity experts have long warned about.

The attack in Oldsmar, a city of 15,000 people in the Tampa Bay area, was caught before it could inflict harm, Sheriff Bob Gualtieri of Pinellas County said at a news conference on Monday. He said the level of sodium hydroxide — the main ingredient in drain cleaner — was changed from 100 parts per million to 11,100 parts per million, dangerous levels that could have badly sickened residents if it had reached their homes.

The authorities said the plot unfolded last Friday morning, when an employee noticed that someone was controlling his computer. He initially dismissed it because the city has software that allows supervisors to access computers remotely. But about five and a half hours later, the employee saw that different programs were opening and that the level of lye changed.

In a tweet, Senator Marco Rubio, Republican of Florida, said the attempt to poison the water supply should be treated as a “matter of national security.”

No suspects have been identified in the Oldsmar attack, and it was unclear on Monday whether the hackers were in the United States or abroad. The F.B.I. and the U.S. Secret Service have been notified.

The process of attributing the attack could take months — or longer.


‘Dangerous Stuff’: Hackers Tried to Poison Water Supply of Florida Town | The New York Times

Video game and digital entertainment studios remain prime targets for ransomware attacks

Another video game studio has revealed they were the victim of a ransomware attack. CD Projekt S.A., creator of AAA digital products including The Witcher 3 and Cyberpunk 2077, said on Tuesday that the perpetrators of the attack were threatening to sell or leak proprietary source code and share internal documents with their “contacts in gaming journalism”. The attack comes after several high-profile stories alleging an unhealthy work culture within CD Projekt S.A and the company’s demands on its staff. The ransom note left by the attackers alludes to these allegations.

The attackers have also dumped or threatened to dump “documents related to accounting, administration, legal, HR, investor relations and more.”

“We will not give in to the demands nor negotiate with the actor, being aware that this may eventually lead to the release of the compromised data,” CD Projekt Red wrote in response. It added that although some devices in its network have been encrypted, “our backups remain intact,” and it has secured its IT infrastructure and started restoring data.

This follows a similar ransomware attack in November against Capcom, a Japanese multi-national studio responsible for a number of multi-million-selling game franchises including Resident Evil and Street Fighter.


Cyberpunk 2077: CD Projekt Slides After Corporate Hack | Bloomberg

‘Cyberpunk 2077’ Developer Says Hacker Has Threatened to Release Sensitive Data | WSJ

Microsoft Warns of Windows Win32k Privilege Escalation

Microsoft has released a security advisory to address an escalation of privileges vulnerability, CVE-2021-1732, in Microsoft Win32k. A local attacker can exploit this vulnerability to take control of an affected system. This vulnerability was detected in exploits in the wild.

CISA encourages users and administrators to review Microsoft Advisory for CVE-2021-1732 and apply the necessary patch to Windows 10 and Windows 2019 servers.


Microsoft Warns of Windows Win32k Privilege Escalation | CISA

January 28th is International Data Privacy Day

Data Privacy Day aims to inspire dialogue and empower individuals and companies to take action and stay aware and informed about how their personal information is being used, collected or shared in our digital society.

Data Privacy Day began in the United States and Canada in January 2008 as an extension of the Data Protection Day celebration in Europe. Data Protection Day commemorates the Jan. 28, 1981, signing of Convention 108, the first legally binding international treaty dealing with privacy and data protection. Data Privacy Day is observed annually on Jan. 28. On Jan. 27, 2014, the 113th U.S. Congress adopted S. Res. 337, a non-binding resolution expressing support for the designation of Jan. 28 as “National Data Privacy Day.”

The National Cyber Security Alliance (NCSA) officially leads the Data Privacy Day campaign and is advised by a distinguished advisory committee of privacy professionals to help the campaign align with the most current privacy issues in a thoughtful and meaningful way.

This year’s Data Privacy Day spotlights the value of information and how to “Own Your Privacy” and “Respect Privacy”.

You can learn more about Data Privacy Day at the Mass Cyber Center or at the additional resources listed below.


Data Privacy Day | CSIAC

Data Privacy Day | Stay Safe Online

Changes to Apple App Store could benefit privacy advocates

Apple has updated the terms of their App Store to require software developers to include so-called “privacy labels” which list the types of data collected by an app in an easily scannable format. The labels, which resemble a nutrition marker on food packaging, were implemented in December of last year.

Apple’s privacy labels are the latest attempt by tech developers to make understanding security terms of service easier for the average consumer to understand. The locked or unlocked padlock icon in internet browsers for instance, long a basic indicator of a site’s overall security, is an earlier iteration of this trend. It remains to be seen whether Apple’s new labels will demonstrably influence the choices its user’s make. “After they read it or look at it, does it change how they use the app or stop them from downloading the app?” asked Stephanie Nguyen, a research scientist who has studied user experience design and data privacy.

After researching dozens of apps with a focus on their privacy labels and use of a user’s data, the New York Times discovered that apps that appear identical in function can vastly differ in how they handle our information. The comparison of two popular encrypted messaging apps, WhatsApp and Signal, proved to illuminate this point. Though both apps basic functionality is to allow users to communicate with each other over voice and text privately, how each app handled a user’s data was radically different. WhatsApp, for instance, shares a group chat’s name and group profile photos with its parent company, Facebook. Signal, on the other hand, developed a complex chat system that encrypts the entirety of a group conversation, including the people participating in the chat, and their avatars, effectively blocking Signal from access to this information entirely.

“In some instances it’s more difficult to not collect data,” Moxie Marlinspike, the founder of Signal, said. “We have gone to greater lengths to design and build technology that doesn’t have access.”

Ms. Nguyen, the researcher, said a lot had to happen for the privacy labels to succeed. Other than behavioral change, she said, companies have to be honest about describing their data collection. Most important, people have to be able to understand the information.

“I can’t imagine my mother would ever stop to look at a label and say, ‘Let me look at the data linked to me and the data not linked to me,’” she said. “What does that even mean?”


What We Learned From Apple’s New Privacy Labels - The New York Times

Related MassGov Stories:

Popular dating app fined $11.7 million under European law

Intelligence analysts reportedly use U.S. smartphone location data without warrants

Apple pushes out emergency patches for iOS and iPad OS platforms

Apple on Tuesday dropped emergency security patches for its flagship iOS and iPad OS platforms alongside a warning that hackers may already be exploiting three different security vulnerabilities.

The patches - contained in iOS 14.4 and iPadOS 14.4 - are currently being pushed to mobile users via the automatic updating mechanism.

Apple did not provide technical details of the vulnerabilities or the in-the-wild attacks, except to identify the flaws in the Kernel and in WebKit, the open-source web browser engine used in Safari, Mail, AppStore and a range of MacOS and iOS apps.

Apple has promised additional information is forthcoming.

Barebones details for the vulnerabilities, released by Apple, are listed below.

CVE-2021-1782 (Kernel) -- Impact: A malicious application may be able to elevate privileges. Apple is aware of a report that this issue may have been actively exploited. Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch (7th generation). Anonymously reported.

CVE-2021-1871 and CVE-2021-1870 (WebKit) -- Impact: A remote attacker may be able to cause arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch (7th generation). Reported by anonymous researchers.


About the security content of iOS 14.4 and iPadOS 14.4 | Apple Support

Apple Ships Emergency Fixes for Under-Attack iOS Zero-Day | SecurityWeek.Com

North Korean hackers use social media to target security researchers

Google has issued a warning that it has uncovered an “ongoing” state-backed hacking campaign run by North Korea targeting cyber security researchers.

The Silicon Valley search giant said its threat analysis team found that cyber attackers posing as researchers had created numerous fake social media profiles on platforms such as Twitter and LinkedIn. After establishing communication with an actual researcher, the attackers would ask the target to work together on cyber vulnerability research and then share collaboration tools containing malicious code to install malware on the researcher’s systems.

Of particular concern is Google’s claim that, in some cases, the attackers were able to create a backdoor to the victim’s computer even when their systems were running fully patched and up-to-date Windows 10 and Chrome browser versions.

Google attributed the latest campaign to “a government-backed entity based in North Korea” — one of the biggest state sponsors of hacking alongside Russia, Iran and China. The Wall Street Journal has previously reported on accusations against North Korea of carrying out cyber attacks to steal coronavirus vaccine-related research and data.

Belying perceptions of the country as a technological backwater, its hackers have a record of major cyber disruptions including hacking Sony Pictures in 2014 and the WannaCry malware attack in 2017. In 2019 a UN sanctions report estimated that $2bn had been raised for Kim Jong Un’s weapons programme via North Korean cyber actors.


North Korea hackers use social media to target security researchers | The Financial Times

Popular dating app fined $11.7 million under European law

The world’s most popular gay dating app, Grindr, has been fined 100 million Kroner, or roughly $11.7 million US dollars, by the Norwegian Data Protection Authority for illegally disclosing private details about its users to advertising companies.

The Norwegian agency said the app had transmitted users’ precise locations, user-tracking codes and the app’s name to at least five advertising companies, essentially tagging individuals as L.G.B.T.Q. without obtaining their explicit consent, in violation of European data protection law.

“We’re trying to make these apps and services understand that this approach — not informing users, not gaining a valid consent to share their data — is completely unacceptable,” said Tobias Judin, head of the Norwegian Data Protection Authority’s international department.

The fine comes one year after European nonprofit groups lodged complaints against Grindr and its advertising partners with data protection regulators. In tests last January, The New York Times found that the Android version of the Grindr app was sharing location information that was so precise, it pinpointed reporters on the side of the building they were sitting on.

Privacy experts say the ruling could have widespread repercussions beyond dating apps.


Grindr is fined $11.7 million under European privacy law | New York Times

Related MassGov Stories:

Intelligence analysts reportedly use U.S. smartphone location data without warrants

Internet outage hits East Coast causing issues for Verizon, Zoom, and remote learning

Reports of widespread outages and connectivity issues across the East Coast for several premier online services abounded Tuesday morning.

Users reportedly have had issues loading or navigating sites and apps critical to remote work and study, such as Gmail, Slack and Zoom. Downdetector, which tracks reports of outages, showed widespread issues with Verizon, Google, Zoom, YouTube, Slack, Amazon Web Services and others Tuesday just before noon.

Verizon’s Fios internet service has received widespread complaints of connectivity issues. The company’s customer support team said on Twitter Tuesday that a fiber had been cut in Brooklyn, which could possibly account for some of the issues. The support account on Twitter quickly became inundated with customers asking why their internet was slow and their connectivity intermittent.

Amazon Web Services’ status page showed its service, which provides computing power to large swaths of the Internet, was experiencing an issue with an “external provider”. On its status page, it said that it is “investigating connectivity issues with an internet provider, mainly affecting the East Coast of the United States, outside of the AWS Network.” Slack and Google said there were no issues with their own services.

The outage has disrupted school districts’ online teaching programs, bringing the virtual school day to a standstill.

The exact cause of the outages remains unclear.


Big Internet outages hit the East Coast, causing issues for Verizon, Zoom, Slack, Gmail | The Washington Post

Intelligence analysts reportedly use U.S. smartphone location data without warrants

An unclassified memo obtained by the New York Times alleges that a military arm of the U.S. intelligence community buys commercially available databases containing location data from smartphones apps and searches it for American’s past movements and does so without a warrant.

Defense Intelligence Agency analysts have searched for the movements of Americans within a commercial database in five investigations over the past two and a half years, agency officials disclosed in a memo they wrote for Senator Ron Wyden, Democrat of Oregon.

Such data is typically drawn from smartphone apps such as weather, games and other apps that get user permission to access a phone’s GPS location. A robust commercial market exists for such data for advertising and other commercial purposes.

The disclosure sheds light on an emerging loophole in privacy law during the digital age: In a landmark 2018 ruling known as the Carpenter decision, the Supreme Court held that the Constitution requires the government to obtain a warrant to compel phone companies to turn over location data about their customers. But the government can instead buy similar data from a broker — and does not believe it needs a warrant to do so.

The Wall Street Journal revealed last year that U.S. government agencies were also buying access to that data from commercial brokers without a warrant, raising questions about whether those agencies were adequately safeguarding the privacy and civil liberties of Americans. In particular, it found, two agencies in the Department of Homeland Security — Immigration and Customs Enforcement, and Customs and Border Protection — have used the data in patrolling the border and investigating immigrants who were later arrested.


Intelligence Analysts Use U.S. Smartphone Location Data Without Warrants, Memo Says | The New York Times

Military Intelligence Agency Says It Monitored U.S. Cellphone Movements Without Warrant | The Wall Street Journal

President orders sweeping assessment of SolarWinds hack

Senator Mark Warner, Democrat of Virginia, who will become the chairman of the Senate Intelligence Committee, said President Biden was ordering a broad new intelligence assessment on Russia, and, in particular, a better understanding of the SolarWinds hacking.

Evidence amassed thus far suggests the perpetrators used their covert access chiefly to conduct espionage – an act all nations, the United States included, engage in. This would therefore limit the administration’s options for retaliation.

“SolarWinds is one of the most sophisticated and deep hacks we’ve faced, and the president needs the best information he can get to not only lead the remediation of the penetration, but to understand how to prevent it in the future, and what actions might deter Russia going forward,” Mr. Warner said.

President Biden’s order for the investigation of the SolarWinds hack – named for the Texas software company whose widely used IT monitoring and management tools were one way the hackers gained access – comes as intelligence officials have concluded that more than a thousand Russian software engineers were most likely involved in it, according to people involved in the investigation. This suggests the intrusion was a far larger, and stealthier, operation than first known. The intruders were active for a full nine months before cybersecurity firm FireEye and Microsoft Corporation alerted the government.


Biden Orders Sweeping Assessment of Russian Hacking, Even While Renewing Nuclear Treaty | The New York Times

Can exercise equipment be a security risk?

White House personnel and cyber experts are weighing in on the potential security risks of President Biden’s Peloton exercise bike.

The Peloton, an indoor stationary exercise bike, integrates with a proprietary social media network allowing users to livestream their workouts or take on-demand classes with online instructors. The equipment’s online and social media features, which utilize built-in cameras and microphones to allow users to see and hear one another if they choose, are the potential areas of concern.

Consensus amongst security experts seems to point toward the President keeping the Peloton as part of his workout routine – though the bike itself may bear little resemblance to the off-the-assembly-line version after the Secret Service and the National Security Agency are finished with it. (There have been news reports that Michelle Obama has a modified Peloton, but her spokeswoman would not confirm them.)

Mr. Biden would not be the first occupant of the White House whose technological preferences clashed with the cybersecurity needs of being president. President Trump continued to prefer private calls to friends on his personal iPhone, while President Obama insisted on continued use of his BlackBerry. Security experts eventually found ways to accommodate both men’s preferences.

“Presidential security is always about balancing presidential needs and desires and the relative security risk of any single thing,” said Garrett Graff, the director of the cybersecurity initiative at the Aspen Institute, a research organization. “The threat is real, but it is presumably a manageable risk given enough thought and preparation.”


Biden Peloton Raises Security Risks | The New York Times

CISA releases new community cybersecurity resources

The Cybersecurity and Infrastructure Security Agency (CISA) has released two new personal/community cybersecurity and cyber-hygiene resources.

The Personal Security Considerations Fact Sheet encourages critical infrastructure owners and their personnel to remain vigilant and report suspicious behavior that individuals may exhibit in order to thwart an attack. It also contains several easily implementable security measures that can mitigate threats to personal safety.

The Houses of Worship Security Self-Assessment Tool provides the faith-based community with an easy to use assessment tool that produces a formatted report with resources which can be used to identify and address your facility’s security concerns.

Visit CISA’s page on Hometown Security for additional tools and resources to support community security and resilience.

Malwarebytes becomes fourth major security firm targeted by SolarWinds hackers

The creator of a popular anti-virus software, Malwarebytes, said on Tuesday that some of its emails were breached by the same hackers who used the software company SolarWinds to hack into a series of U.S. government agencies. This makes Malwarebytes the fourth major security firm, after Microsoft, FireEye, and CrowdStrike, to be targeted by this same group.

Malwarebytes said the intrusion is unrelated to the SolarWinds supply chain incident since the company doesn't use any of SolarWinds software in its internal network but rather that hackers breached its internal systems by exploiting a dormant email protection product within its Office 365 and Microsoft Azure environments. The company confirmed the hackers were able to gain access to a “limited subset of internal company emails” but found no evidence of unauthorized access or compromise of its production environments.

Mandiant, a cybersecurity research firm, recently released a report alleging the perpetrators behind the SolarWinds supply chain attack leveraged four separate techniques to bypass identity and access management protections and laterally move from victims’ on-premise networks to their cloud-based Microsoft 365 accounts.


Malwarebytes says some of its emails were breached by SolarWinds hackers | Reuters

Remediation and Hardening Strategies for Microsoft 365 to Defend Against UNC2452 | FireEye Inc

Growing "Big Tech" fears leads to boom in adoption of encrypted messaging

Millions of new users are making the jump to encrypted messaging apps in the wake of last week’s Capitol Hill riots. Growing anxiety surrounding the world’s largest tech companies and their control over user’s personal data has led to tens of millions of downloads of Signal and Telegram, two WhatsApp-competitors. Both are chat apps that offer end-to-end encryption outside of Big Tech’s grasp. Encrypted messaging apps can offer more security, privacy and features than plain text messaging—but their encryption methods and data collection vary.

Signal, which utilizes end-to-end encryption, estimates that it has gained over forty million new users in under a week. Telegram, which offers some encrypted messaging options but is largely popular for its group-based chat rooms, has also gained new users numbering in the tens of millions.

The rise of Telegram and Signal is sure to reignite the debate over encryption, which helps protect the privacy of people’s digital communications but can stymie the authorities in criminal investigations because conversations are hidden.

FBI investigation of SolarWinds hack widens to include project-management software from JetBrains

The FBI is investigating whether the hackers behind a series of intrusions at U.S. federal agencies and companies also broke into project-management software created by the company JetBrains to breach its customers. JetBrains, a privately held Czech-based company whose chief executive, Maxim Shafirov, is a Russian national, produces software called TeamCity that is used by tens of thousands of customers to construct other software.

Reporting suggests that US officials are looking at a scenario where Russian hackers breached JetBrains and then launched attacks on its customers, one of which was SolarWinds.

The company responded Thursday with a published statement denying reports from both the New York Times and the Wall Street Journal claiming that JetBrains is under investigation for possibly being involved in the SolarWinds hack that impacted thousands of companies across the globe. Safirov confirmed from St. Petersburg, Russia, where JetBrains has offices, that SolarWinds is amongst JetBrains’ many customers.

SolarWinds revealed last month that someone with access to its system for developing network-management software had inserted back doors into two updates of its flagship Orion products. Dozens of SolarWinds customers, including at least a half-dozen U.S. agencies, were then exploited by the same hackers. U.S. intelligence agencies said Tuesday that Russia was likely behind the damaging spree, though Russian officials denied it.

“We are not aware of any investigation nor have we been contacted by any agencies,” a JetBrains spokesman said. “We are not aware of any vulnerabilities in the product or breaches that would allow for this, nor that any of our customers were affected.”

Vulnerabilities in TeamCity have been publicly reported and rated “critical” in the past, as is true with most big software.


FBI probe of major hack includes project-management software from JetBrains: sources | Reuters

Widely Used Software Company May Be Entry Point for Huge U.S. Hacking | The New York Times (

SolarWinds Hack Breached Justice Department System | WSJ

SolarWinds hires former cyber security chief Chris Krebs to help navigate post-hack fallout

SolarWinds, the embattled network software firm, has hired former US government cyber security chief Chris Krebs to assist the company in navigating the fallout of what is quickly proving to be one of the most intrusive cyber attacks in our nation’s history. Krebs will spearhead the company’s crisis response efforts alongside his new business partner Alex Stamos, a Stanford University professor and Facebook’s former security chief.

Investigations on the full scale and scope of the campaign continue, but some experts have reported that it may stretch back years and remain ongoing. US intelligence officials confirmed this week that they had identified “fewer than 10” federal agencies that had been compromised, including the Commerce, Energy, and Justice departments. The electronic filing system used by the federal courts was also compromised, the US judiciary said on Thursday.

Speaking to the Financial Times, Krebs said there was “zero question” amongst the intelligence community that the SVR, Russia’s foreign intelligence service, was responsible for the attack.

Krebs, who has extensive experience in risk management and national and infrastructure security, oversaw the Cybersecurity & Infrastructure Security Agency until his ousting in November for challenging claims that the US presidential election had been widely compromised by fraud and foreign interference.


Hacking victim SolarWinds hires ex-Homeland Security official Krebs as consultant | Reuters

Sealed U.S. Court Records Exposed in SolarWinds Breach | Krebs on Security

DHS confirms state-sponsored cyberattack on public sector IT-service providers

SolarWinds, a major provider of network management systems (NMS), is said to be the victim of a highly sophisticated, state-sponsored cyberattack. The attackers, believed to be operating under the auspices of the Russian Federation’s Foreign Intelligence Service, were able to successfully deploy a malware-infected update to the company’s Orion Network Performance Monitor.

SolarWinds ubiquity in the field of NMS may turn out to be problematic - the company has more than 300,000 customers worldwide, including more than 400 of the US Fortune 500 companies and is utilized across five branches of the US military and the Departments of Defense, State and Justice, as well as the Office of the President. Intrusions have already been detected at the US Treasury Department as well the US Department of Commerce's National Telecommunications and Information Administration (NTIA). Though not officially confirmed, major US publications have cited sources claiming that multiple other government agencies have been impacted in the attack.

Late Sunday night, following confirmation of the successful attack on the Commerce Department, the cybersecurity arm of the Department of Homeland Security issued an Emergency Directive calling on "all federal civilian agencies to review their networks for indicators of compromise and disconnect or power down SolarWinds Orion products immediately."

Sources speaking with the Washington Post linked the intrusion to APT29, a codename used by the cyber-security industry to describe hackers associated with the Russian Foreign Intelligence Service (SVR).


Active Exploitation of SolarWinds Software | CISA

ALERT: Commonwealth Employees Targeted by Phishing Campaign


As many of you are aware, the Commonwealth has recently been the target of an aggressive phishing and smishing campaign. The malicious actors are using free e-mail services, such as g-mail, to create fake e-mail accounts designed to impersonate Commonwealth Leadership and are using social engineering tactics to elicit a sense of urgency. In addition to e-mail, the scammers have started using text messages as another way to phish our community. This technique, often referred to as smishing or SMS phishing, is a text-message based variation of traditional phishing scams, and a growing cyber threat. This particular campaign does not contain any links or malicious documents, but rather requests that the user purchase a gift card on behalf of the executive.

The EOTSS Messaging and Security Teams are aware of the situation and are working to block incoming messages. However, we ask that you remain vigilant. If you receive an e-mail or a text message requesting you to purchase a gift card, to pay by gift card, or to wire money – for any reason – that’s a sure sign of scam. Any correspondence, whether e-mail or SMS-based, imploring (or even threatening) the need for an immediate response, should be treated with healthy skepticism.

Remember to pay attention to key warning signs:

  • False sense of urgency
  • External e-mail address as either the sender or the reply-to address
  • Misspellings and Typos
  • Consider the purpose; is this someone you’d typically correspond with?
  • Be wary of suspicious attachments and links
Sample Gift Card Phishing Email
Text Phishing Sample

As always, suspicious messages or phishing e-mails can be reported to the EOTSS End User Service Desk or your local Agency IT Support via the contact information below.


EOTSS End User Service Desk
Log in to ServiceNow


EOTSS End User Service Desk (844) 435-7629
24x7x365 support for Commonwealth end users

CommonHelp IT Service Desk (866) 888-2808
for agency/Secretariat IT help desks and support personnel

We appreciate your continued cooperation. Please do not hesitate to reach out with any questions or concerns.



John Merto
Commonwealth Chief Information Security Officer
Executive Office of Technology Services and Security

Ransomware Activity Targeting the Healthcare and Public Health Sector (CISA Alert AA20-302A)

The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the U.S. Department of Health and Human Services (HHS) have credible information of an increased and imminent cybercrime threat to U.S. hospitals and healthcare providers. 

CISA, FBI, and HHS have released AA20-302A Ransomware Activity Targeting the Healthcare and Public Health Sector that details both the threat and practices that healthcare organizations should continuously engage in to help manage the risk posed by ransomware and other cyber threats. The advisory references the joint CISA MS-ISAC Ransomware Guide that provides a ransomware response checklist that can serve as a ransomware-specific addendum to organization cyber incident response plans. 

It is suspected that the attacks are being launched by Eastern European hackers that targeted U.S. hospitals, media reported Wednesday. Experts said the likely group behind the attacks was known as Wizard Spider or UNC 1878. They warned that such attacks can disrupt hospital operations and lead to loss of life. Federal authorities said the recent attacks include incidents in Oregon, California, and New York.  

CISA, FBI, and HHS are sharing this information in order to provide a warning to healthcare providers to ensure that they take timely and reasonable precautions to protect their networks from these threats. CISA encourages users and administrators to review CISA’s Ransomware webpage for additional information. 

Additional Resources

October is National Cybersecurity Awareness Month

October is National Cybersecurity Month (NCSAM), a time for us to focus on how cybersecurity affects all Americans and to remind us of our shared responsibility. NCSAM is a collaborative effort between the U.S. Department of Homeland Security (DHS) and its public and private partners, including the National Cyber Security Alliance, to raise awareness about the importance of cybersecurity and individual cyber hygiene. 

Now in it's 17th year, Cybersecurity Awareness Month has grown exponentially, reaching consumers across the nation.

For more information on Commonwealth sponsored events throughout the month, please visit the MassCyberCenter webpage.

Additional Resources

Tyler Technologies Ransomware

Tyler Technologies, the nation’s largest provider of software and technology services for the public sector, has reportedly been the victim of a ransomware attack. Notably, the company is responsible for the development of software used to display state and local election results. 

Though initially hesitant to discuss the exact nature of the disruption, Tyler Technologies released the following public statement Wednesday afternoon:  

“Based on the evidence available to-date, all indications are that the impact of this incident is limited to our internal corporate network and phone systems, and that there has been no impact on software we host for our clients. Our hosted environment is separate and segregated from our internal corporate environment.” 

The company, based out of Plano, Texas, employs some 5,300 employees and brought in a reported annual revenue of more than $1 billion for fiscal year 2019. It sells a broad range of services to state and local governments, including appraisal and tax software, integrated software for courts and justice agencies, enterprise financial software systems, public safety software, records/document management software solutions and transportation software solutions for schools. 

By Tuesday, Tyler Technologies’ normal landing page was replaced with notice saying the site was offline. At the time of the original change, the message contained no further details regarding the breach. Tyler’s Chief Information Officer Matt Bieri provided a statement to popular security blog KrebsOnSecurity only after markets that day closed, stating 

“Upon discovery and out of an abundance of caution, we shut down points of access to external systems and immediately began investigating and remediating the problem. We have since engaged outside IT security and forensics experts to conduct a detailed review and help us securely restore affected equipment. We are implementing enhanced monitoring systems, and we have notified law enforcement.” 

Tyler Technologies has thus far declined to state how the intrusion might be affecting its customers. Several IT staffers affiliated with state and local governments throughout the nation have reported interruptions of various natures, with one anonymously stating that the outage has disrupted the ability of people to pay their water bills or court payments. 

Depending on how long it takes for Tyler Technologies to recover from this incident, it could have a broad impact on the ability of many states and localities to process payments for services or provide various government resources online. 

Additional Resources

Bipartisan Digital Identity Legislation introduced in Congress

A draft bipartisan bill designed to modernize the country’s lagging digital identity infrastructure has been introduced in Congress.

The Improving Digital Identity Act of 2020 would help to bolster secure methods of validating identities in government agencies' digital infrastructure. In its current form, the bill would utilize a three-pronged approach:

  • It would establish a task force to bring together key federal agencies with state and local government representatives to develop secure methods for government agencies to validate identity attributes to protect the privacy and security of individuals and support reliable, interoperable digital identity verification tools in the public and private sectors.
  • It would direct the National Institute of Standards and Technology (NIST) to create a new framework of standards to guide government agencies when providing digital identity verification services – placing an emphasis on privacy and security.
  • It would establish a grant program within the Department of Homeland Security to allow states to upgrade the systems they use to issue drivers’ licenses and other types of identity credentials, and to support the development of secure, interoperable state systems that enable digital identity verification in accordance with the framework developed by NIST. 

Additional Resources

Bill to improve the federal government's use of IoT devices reaches House floor

After languishing in Congressional limbo for nearly a year and a half, the IoT (Internet of Things) Cybersecurity Improvement Act (H.R. 1668) will finally reach the House floor.

The bill would task NIST (the National Institute of Standards and Technology) with the development of standards for agencies’ use of IoT devices and their handling of vulnerabilities in those devices.

The Internet of Things describes the network of physical objects—"things"—that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet.

NIST is one of the nation's oldest physical science laboratories, tasked with promoting "promote innovation and industrial competitiveness".

Additional Resources

Third annual CISA National Cybersecurity Summit begins on Wednesday

Third Annual National Cybersecurity Summit event banner

Subject matter and discussion dates for the Third Annual National Cybersecurity Summit have been announced.

The event, in its third year, brings together infrastructure stakeholders from around the world and provides a forum for meaningful conversations and collaboration on cybersecurity.

The 2020 Cybersummit will be held virtually as a series of webinars every Wednesday for four weeks beginning September 16 and ending October 7. Each series will have a different theme that focuses on CISA’s mission to “Defend Today, Secure Tomorrow,” with presentations from targeted leaders across government, academia, and industry.

This year’s themes are:

  • Sept 16: Key Cyber Insights
  • Sept 23: Leading the Digital Transformation
  • Sept 30: Diversity in Cybersecurity
  • Oct 7: Defending our Democracy

The event is facilitated by the Cybersecurity and Infrastructure Security Agency (CISA), a federal agency within the US government with its operational component under Department of Homeland Security (DHS) oversight.

Additional Resources

Spyware Labeled ‘TikTok Pro’ Exploits Fears of US Ban

Researchers have discovered a new Android spyware campaign pushing a “Pro” version of the TikTok app that is exploiting fears that the popular social media app is on the cusp of being banned in the United States. The malware can take over basic device functions as well as uses a phishing tactic to steal victims’ Facebook credentials.

Malicious actors urge users via SMS and WhatsApp messages to download the spyware version of the application, called TikTok Pro, from a specific web address, said Zscaler CISO and VP of security Shivang Desai in a report published Tuesday.

Desai warned Android users not to trust unknown links received in SMS or other messages and to only install apps from official stores like Google Play.

Additional Resources

How a Teenager Hacked One of the Largest Social Media Platforms in America

After months of digital reconnaissance, 17-year-old Florida resident Graham Ivan Clark managed to convince a Twitter employee he was co-worker. Prosecutors say this ultimately allowed him to hack the accounts of numerous high profile people including former President Barrack Obama and Tesla CEO Elon Musk.

Despite what you may have recently seen on your Twitter feed recently, dozens of notable, high-profile Americans including former President Barrack Obama, Tesla CEO Elon Musk, and Amazon CEO Jeff Bezos are not in fact, giving away tens of thousands of dollars in cryptocurrency to random Americans.

The tweets were allegedly sent by 17-year-old Florida native Graham Ivan Clark. After months of digital reconnaissance, the high school aged hacker was able to convince an employee of Twitter, one of the world's largest social media platforms, that he was a co-worker who worked in the company's IT department.

He was charged with compromising more than 100 social media accounts and scamming both the Twitter account holders, and the approximately 400 people from whom Mr. Clark allegedly received money in a scam. Two others were also charged—Mason Sheppard, of Bognor Regis, U.K., and Nima Fazeli, 22, of Orlando, Fla.—in connection with the hack. 

Additional Resources

Cyber Actor Spoofing COVID-19 Loan Relief Webpage

The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) recently warned that a ‘malicious cyber actor’ is targeting the Small Business Administration (SBA) webpage used to generate loans to businesses during the COVID-19 pandemic.

“The Cybersecurity and Infrastructure Security Agency (CISA) is currently tracking an unknown malicious cyber actor who is spoofing the Small Business Administration (SBA) COVID-19 loan relief webpage via phishing emails. These emails include a malicious link to the spoofed SBA website that the cyber actor is using for malicious re-directs and credential stealing.”

CISA reminds users to remain vigilant and exercise caution when opening email attachments, even if the attachment is expected and the sender appears to be known.

Twitter Says It Was The Victim Of A 'Coordinated Social Engineering Attack'

Barack Obama, Joe Biden, Elon Musk, Apple and others appear to be part of a widespread hacking operation affecting several major companies and highly-visible individuals. Impacted users appeared to be offering to double any bitcoin set to them. 

Twitter acted quickly by locking down accounts, compromised or not. 


As Twitter investigates what appears to be the largest and most coordinated hack in Twitter's history, the company has vowed to examine what "other malicious activity" the hackers may have committed. The company admits that internal tools were compromised and likely used in the attack, which may explain how malicious actors gained access to the accounts that presumably have enhanced security protections.

"We all feel terrible this happened", said Jack Dorsey, Twitter CEO. "We're diagnosing and will share everything we can when we have a more complete understanding of exactly what happened."

Hacking attacks on hospitals for patient data increase during coronavirus pandemic

During "normal" times, hospitals are often targeted with 80% of medical practices reporting that they have been victims of cyberattacks, according to a national survey. The situation has only gotten worse during the COVID-19 pandemic. Between March and April, IBM saw a 6,000% increase in spam attacks on information technology systems, leveraging COVID-19, many of them at health care facilities, outlines Wendi Whitmore, a cybersecurity expert and vice president of IBM X-Force, a commercial security research team. She goes on to describe the situation as a continuous “cat and mouse” game between criminals and institutions. 

Electronic health records are often the target, and according to the FBI, can “be used to file fraudulent insurance claims, obtain prescription medication, and advance identity theft.” Health record theft also is more difficult to detect, taking almost twice as long to recognize as normal identity theft, the report found.

Colin Zick, a partner and co-chair of the privacy and data security practice at Foley Hoag, has some practice advice for patients. Zick requests his medical file periodically to be sure he has access to his own records if they were ever permanently lost. And he said if he saw a provider acting carelessly with his data – such as not using two-factor authentication – he would offer them some free advice.

Apple’s next iPhone update adds new privacy protections — and you won’t be able to miss them

The next version of iOS for iPhones will give new visual notifications when apps are accessing the device’s microphone, camera, clipboard, or other sensitive data. 

The moves this year are in character for Apple, which has prioritized privacy engineering on a product level and privacy more generally as a key selling point for its products.

DDoS Activity Targeting State of Minnesota Resources

A cyberattack temporarily disabled certain Minnesota systems and websites last week. The cyberattack comes amid protests over the police killing of George Floyd last week.

MNIT issued the following statement regarding these cyber-attacks:

“Keeping our communications systems secure during times of crisis is critical to protecting the Minnesotans that we serve, and we work to meet the challenging and evolving threat to those systems every day. At this time, these attacks have not successfully disrupted the state services that Minnesotans depend upon, and MNIT is working in close coordination with partners at the Department of Public Safety and with the federal government to share intelligence and stay proactive on cyber threats."

Nationwide Unemployment Scam Targets Massachusetts Claimants

Criminal enterprises in possession of stolen personal information from earlier national data breaches have been attempting to file large amounts of illegitimate unemployment claims through the Massachusetts Department of Unemployment Assistance (DUA) system. This is part of a national unemployment fraud scheme.

The Department of Unemployment Assistance (DUA) has begun implementing additional identity verification measures that will temporarily delay the payment timeframe for many unemployment claims in Massachusetts.

For more information, please visit

Be aware of a recent increase in scam blackmail emails

Reports of Bitcoin blackmail scams have taken a big jump in the last few weeks. The emails say they hacked into your computer and recorded you visiting inappropriate websites. They threaten to tell others, unless you pay into their Bitcoin account. To complicate matters, they claim to know one of your password - and they include it in the message to prove it. 

These e-mails are fake and are a scam. You are likely receiving one because your account and password were involved in a recent data breach. You should take precautions to update the password associated with that account, and others as well. 

Students create a bot that tells you when a grocery delivery slot opens up

Having a hard time getting a time slot for grocery delivery? A computer science student at Georgetown University created a simple computer program that automatically notifies you when an Amazon Fresh or Whole Foods delivery slot opens up, letting you place your order. But, he's not the only one. Another developer had their website shut down after getting a cease-and-desist order from Instacart for claiming the site could automatically hunt for delivery slots.

Face ID doesn’t work when you’re wearing a mask—Apple’s about to address that

This week, Apple released the third beta of iOS 13.5, the next major feature release for its mobile operating system. Among other things, the release introduces new Face ID behavior when users are wearing protective masks.

U.S. senators to introduce privacy bill for COVID-19 contact tracing

A group of U.S. senators said they would introduce legislation to address consumer privacy concerns surrounding technology companies’ building contact tracing apps to fight the coronavirus outbreak.

The bill would allow technology companies to develop “platforms that could trace the virus and help flatten the curve and stop the spread – and maintaining privacy protections for U.S. citizens.”

Apple says 'no evidence' iPhone mail flaw used against customers

The default Mail app on Apple's iPhones may be vulnerable to sophisticated email hacks, according to a report Wednesday from The Wall Street Journal. 

The vulnerability, which was detected by cybersecurity firm ZecOps, reportedly lets hackers install malicious software on an iPhone by sending a specially crafted email, the Journal reported. 

Apple acknowledged the vulnerability existed in its software for email on iPhones and iPads and said the company had developed a fix that will be introduced in a forthcoming update. The company also indicated it has found “no evidence” a flaw in its email app has been used against customers, and that it believes the flaw does “not pose an immediate risk to our users”.

Google moves to open up its Healthcare API to making it easier to share health info

As of Monday, health care providers can build new systems using the new Google Healthcare API to translate and convert data stored in different types of systems, from imaging systems to medical records software. It also said it will offer a range of other services to help health care organizations during the Covid-19 pandemic. 

500,000 Hacked Zoom Accounts Given Away For Free On The Dark Web

More bad news for Zoom...

The cyber firm, Cyble, recently uncovered hackers selling Zoom credentials on the Dark Web, often even giving them away for free!

The good news? This wasn't a hack on Zoom but rather a case of users repurposing passwords. This is a great reminder to use a unique password for each account. Sites such as have i been pwned can also be helpful in seeing if your accounts have been involved in a data breach. 

Is 5G Cell Phone Technology Linked to the Cause of Coronavirus?

FEMA has started a webpage to discuss this and other COVID-19 rumors. Do your part to the stop the spread of disinformation by doing three easy things:

  1. Don’t believe the rumors.
  2. Don’t pass them along.
  3. Go to trusted sources of information to get the facts about the federal (COVID-19) response.

Apple and Google Team Up to ‘Contact Trace’ the Coronavirus

The technology giants said they would embed a feature in iPhones and Android devices to enable people to track the virus. With the tool, infected people would notify a public health app that they have the coronavirus, which would then alert phones that had recently come into proximity with that infected person’s device.

Be Alert: Phone scammers are taking advantage of the coronavirus pandemic

The FCC has received reports of scam and hoax text message campaigns and scam robocalls offering free home testing kits, promoting bogus cures, selling health insurance, and preying on virus-related fears. Coronavirus scam audio samples can be found on the FCC website. If you think you've been a victim of a coronavirus scam, contact law enforcement immediately.

A Must For Millions, Zoom Has A Dark Side — And An FBI Warning

Teams, WebEx, GoToMeeting, Zoom....If you are working from home, collaboration tools are a must. As we all adapt to a new normal, so are cyber criminals. In the midst of a world-wide pandemic, a new technique entitled "zoom-bombing" has been getting national attention (NPR). 

Instagram Draws Surge in Offers of Coronavirus Masks With Potential Risks

As more medical experts recommend wearing masks in public, it's no surprise that social media sites are struggling to keep up with ads and users claiming to sell medical masks. Social Media Researchers found at least 10,450 accounts on Instagram that have popped up in the past few months selling masks, some of which appear to be scams and most of which aren’t vetted for safety or price concerns. Always remember to validate companies before making a purchase. If it seems too good to be true, it likely is. Note: A subscription is required to read the complete WSJ article. However, the complete report is available for free

Scammers are creating Netflix lookalikes to target people staying at home, study finds

While it is not surprising that the pandemic has resulted in Netflix’s subscriber growth, the brand has been used as part of various web-based fraud schemes. The cybersecurity firm, Check Point recently reported an increase in fake steaming services spinning up. The complete article can be found on USAToday

Coronavirus surveillance poses long-term privacy threat, U.N. expert warns

From facial recognition to phone tracking, governments are turning to technology to trace Covid-19 infections and keep tabs on the population as they enforce lockdowns and quarantines. China, South Korea and Israel are among the countries rolling out such technologies and experts say the effects could long outlast the current crisis. 



McCormack Building
1 Ashburton Place, 8th Floor
Boston, MA 02108