Enhance customer experiences with Generative AI

The advent of Generative AI and its application in real-life use cases has been on the cards for…

Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – ​Read More

DocuSign Abused to Deliver Fake Invoices

Cybercriminals are abusing DocuSign APIs to send bogus email messages that bypass protections such as spam and phishing filters.

The post DocuSign Abused to Deliver Fake Invoices appeared first on SecurityWeek.

SecurityWeek – ​Read More

Cybersecurity and Influence Operations Threaten Integrity of U.S. Elections, Warns FBI, CISA, and ODNI

CISA

Overview

As the United States nears another election cycle, the nation faces an increased risk of influence operations targeting the democratic process. In a joint statement, the Office of the Director of National Intelligence (ODNI), the Federal Bureau of Investigation (FBI), and the Cybersecurity and Infrastructure Security Agency (CISA) highlighted growing concerns about foreign interference—particularly from Russia and Iran—in efforts to undermine public trust in the integrity of the U.S. election system.

According to the intelligence community (IC), foreign adversaries, especially Russia, are intensifying their influence campaigns to sow distrust and division among American voters. These activities are expected to escalate as election day draws closer, with Russia’s influence actors primarily focusing on critical swing states, where their efforts could have the most significant impact.

The IC’s assessment reveals that Russian influence actors are engaging in the creation and dissemination of fake media content designed to manipulate public opinion. “Since our statement on Friday, we have observed additional influence operations that seek to stoke divisions and question the legitimacy of the election process,” stated the joint statement. The fabricated videos and articles are part of a broader strategy aimed at generating fear and confusion, particularly around voting procedures.

One recent example includes a video circulating online that falsely portrays an interview with an individual alleging election fraud in Arizona, involving bogus overseas ballots and tampering with voter rolls to favor Vice President Kamala Harris. The Arizona Secretary of State has already debunked this claim as entirely false.

In addition to spreading misinformation, CISA says that the Russian operatives are amplifying the false narrative that U.S. officials across several swing states are orchestrating widespread election fraud, such as ballot stuffing and cyberattacks. These fabricated stories have the potential to incite violence, particularly against election officials. As these false claims continue to spread, Russian influence actors are expected to release more of such content throughout election day and in the aftermath of the vote, exacerbating tensions across the nation.

Iran’s Role in Election Cybersecurity Threats

Iran, while less active than Russia, continues to pose a significant cybersecurity threat to the upcoming elections. As highlighted in previous reports, Iran has been involved in cyber activities targeting U.S. political figures, including former President Donald Trump’s campaign.

The U.S. intelligence community also notes that Iran’s influence operations are likely to include the creation of fake media content designed to suppress voter turnout or incite political violence. Additionally, Iran has maintained a desire for retribution against specific U.S. officials tied to the death of Iranian General Qassem Soleimani in 2020, and this could influence its approach to future election-related activities.

Iranian operatives, like their Russian counterparts, have long sought to manipulate public perception through false narratives, amplifying divisiveness and spreading misinformation. While the Iranian government’s influence operations may not be as widespread or sophisticated as Russia’s, they remain a persistent threat to election integrity.

FBI and CISA’s Call to Action for Election Security

Considering these growing threats, both the FBI and CISA are urging election stakeholders to remain vigilant and proactive in securing election infrastructure and preventing the spread of disinformation. “Voters should seek out information from trusted, official sources, particularly from state and local election officials,” the agencies recommended.

 CISA further emphasized the importance of reporting any suspicious or criminal activity related to election security. Election infrastructure stakeholders, as well as the public, can report cyber incidents or suspicious activity to CISA via its dedicated reporting channels, such as calling 1-844-Say-CISA or emailing report@cisa.dhs.gov.

The FBI and CISA also continue to encourage campaigns, election officials, and other stakeholders to remain in close contact with local Election Crime Coordinators to report potential security threats. These collaborative efforts are essential to counter the growing wave of influence operations and to ensure that the U.S. election process remains free from foreign manipulation.

CISA and EAC’s Support for State and Local Election Officials

In a related statement, CISA, along with the U.S. Election Assistance Commission (EAC), reiterated its support for state and local election officials as they prepare for the election. These officials, often working behind the scenes, play a critical role in ensuring that the election process runs smoothly and securely. “We are proud to support the hard work and dedication of election officials across the country,” CISA Director Jen Easterly said. “They are the heroes of our democracy, and we stand with them as they continue their tireless efforts to safeguard the integrity of our elections.”

The EAC also issued a joint statement, acknowledging the extensive preparation that has gone into ensuring the security of the 2024 election. “Planning for tomorrow’s election began four years ago,” said the EAC, emphasizing the comprehensive efforts made at both the state and local levels to address potential challenges. While operational issues may arise—such as delays at polling locations or power outages—election officials are prepared to handle such contingencies and ensure that every eligible vote is counted accurately.

The statement also addressed the importance of understanding that election night results are unofficial, as media outlets call the races based on preliminary results. “Accurately counting millions of ballots takes time, and we ask Americans to be patient during this process,” the EAC urged. It further emphasized that recounts and audits are standard procedures to ensure election accuracy, which will be conducted in accordance with state and territorial laws.

Fighting Disinformation: A Collective Effort

The growing sophistication of influence operations—especially those linked to Russia—has prompted the U.S. government to take proactive steps in combating foreign disinformation campaigns. The FBI, CISA, and other agencies are working around the clock to track and disrupt foreign interference in U.S. elections. In addition to technical defenses, these agencies are actively engaged in educating the public about the dangers of inauthentic content and misinformation.

The impact of influence operations, particularly in swing states, cannot be overstated. As foreign actors continue to amplify divisive rhetoric and fabricate stories about election fraud, it is essential that Americans rely on trusted sources for accurate information. State and local election officials, supported by CISA and the EAC, will continue to be the primary resources for election integrity.

Voters are encouraged to stay informed by consulting official channels, and to report any suspicious activity or potential cyber threats they encounter. “We are all in this together,” said Easterly. “It is up to every American to help protect the democracy that we all value.”

Conclusion

The U.S. elections are expected to be a critical test of the nation’s resilience against foreign influence operations and cyber threats. With Russia and Iran poised to continue their interference campaigns, it is important that the American public, election officials, and cybersecurity agencies work together to protect the electoral process. As foreign influence actors ramp up their activities, vigilance, awareness, and collaboration will be key to ensuring that the 2024 elections remain secure and free from foreign manipulation.

Sources: https://www.cisa.gov/news-events/news/joint-statement-cisa-and-eac-support-state-and-local-election-officials

https://www.cisa.gov/news-events/news/joint-odni-fbi-and-cisa-statement-1

The post Cybersecurity and Influence Operations Threaten Integrity of U.S. Elections, Warns FBI, CISA, and ODNI appeared first on Cyble.

Blog – Cyble – ​Read More

New Android Banking Malware ‘ToxicPanda’ Targets Users with Fraudulent Money Transfers

Over 1,500 Android devices have been infected by a new strain of Android banking malware called ToxicPanda that allows threat actors to conduct fraudulent banking transactions.
“ToxicPanda’s main goal is to initiate money transfers from compromised devices via account takeover (ATO) using a well-known technique called on-device fraud (ODF),” Cleafy researchers Michele Roviello, Alessandro Strino

The Hacker News – ​Read More

On Election Day, Disinformation Worries Security Pros the Most

A Dark Reading poll reveals widespread concern over disinformation about election integrity and voter fraud, even as Russia steps up deepfake attacks meant to sow distrust in the voting process among the electorate.

darkreading – ​Read More

Hackers Deploy CRON#TRAP for Persistent Linux System Backdoors

CRON#TRAP is a new phishing attack using emulated Linux environments to bypass security and establish persistent backdoors. Leveraging…

Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – ​Read More

Critical Vulnerabilities in PTZ Cameras: CISA Adds New Exploits to Its Catalog

PTZ Cameras

The Cybersecurity and Infrastructure Security Agency (CISA) has recently added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, spotlighting security flaws in Pan-Tilt-Zoom (PTZ) cameras.

The vulnerabilities, which affect specific PTZOptics camera models, pose a considerable risk to organizations that rely on these devices for surveillance, live streaming, and conference automation.

These flaws could be leveraged by malicious actors to execute OS command injections or bypass authentication controls, exposing sensitive systems to potential breaches.

Vulnerabilities in PTZOptics Cameras: CVE-2024-8956 and CVE-2024-8957

The two vulnerabilities—CVE-2024-8956 and CVE-2024-8957—affect the PT30X-SDI/NDI series of PTZ cameras from PTZOptics. These devices, which are also embedded in various white-label AV equipment, are vulnerable to critical security flaws that could allow attackers to gain unauthorized access and execute arbitrary commands. Here’s an overview of each vulnerability:

  1. CVE-2024-8956: Authentication Bypass Vulnerability

  1. CVSS Score: 9.1 (Critical)
    1. Description: This authentication bypass vulnerability affects the PTZOptics PT30X-SDI and PT30X-NDI-xx-G2 cameras running versions prior to 6.3.40. Due to improper authorization, attackers can remotely access the cameras without authentication. This allows them to leak sensitive data, including usernames, password hashes, and device configuration details. Additionally, attackers can modify or overwrite the configuration files, compromising the system’s integrity.

    1. Impact: The vulnerability provides attackers with the ability to access critical configuration files and potentially disrupt operations by altering camera settings.

  • CVE-2024-8957: OS Command Injection Vulnerability
    • CVSS Score: 9.8 (Critical)
    • Description: This OS command injection vulnerability arises from insufficient validation of the ntp_addr configuration value in the PTZOptics cameras. When the ntp_client service is started, the flaw allows remote attackers to execute arbitrary commands on the affected devices. When combined with the previous authentication bypass vulnerability (CVE-2024-8956), an attacker could leverage both vulnerabilities to perform even more damaging actions, such as executing malicious commands remotely.

    • Impact: Attackers can exploit this flaw to compromise the camera’s operating system, potentially allowing them to gain full control over the device and even spread their attack within a network.

CISA’s Action: Immediate Attention Required

PTZ cameras are widely used across various industries for surveillance, broadcasting, and remote monitoring, making them a prime target for cybercriminals. The authentication bypass vulnerability and OS command injection vulnerability in these cameras represent frequent attack vectors for malicious cyber actors, who often exploit such flaws to gain unauthorized access, exfiltrate sensitive data, or even take control of critical systems.

Organizations that utilize PTZ cameras in their infrastructure are strongly advised to patch these vulnerabilities immediately to mitigate potential security risks. The vulnerabilities disclosed in PTZOptics cameras are part of a broader trend of vulnerabilities in Pan-Tilt-Zoom (PTZ) cameras, which have increasingly become targets for attackers due to their prevalence in critical systems. OS command injection vulnerabilities and authentication bypass vulnerabilities in cameras expose organizations to severe security risks, especially when these devices are connected to the internet without proper safeguards.

PTZ cameras, like many IoT devices, often operate with limited built-in security measures. These devices typically have embedded software and firmware that can be vulnerable to attack, especially when manufacturers fail to release timely security updates. Additionally, the growing use of white-label AV equipment based on third-party camera firmware further complicates the security landscape, as these devices may not receive adequate vendor support.

Both CVE-2024-8956 and CVE-2024-8957 are acknowledged by ValueHD Corporation, the vendor behind the PTZOptics camera models. The company has released a patch for the affected camera models to address these vulnerabilities. Customers using PTZOptics PT30X-SDI and PTZOptics PT30X-NDI-xx-G2 cameras should immediately upgrade to version 6.3.40 or later to prevent exploitation.

Recommendations and Mitigating for PTZ Camera Vulnerabilities

To address the risks by vulnerabilities in PTZ cameras, organizations should implement several best practices to protect their systems from potential exploitation:

  1. As soon as a vendor releases a patch addressing critical vulnerabilities like authentication bypass or OS command injection, organizations should prioritize its installation. Delays in patching can expose devices to active attacks.
  2. Critical devices, including PTZ cameras, should not be exposed directly to the internet. Organizations should segment their networks to isolate critical assets and use firewalls and access controls to limit exposure.
  3. Implementing a patch management process that includes inventory management, patch assessment, testing, and deployment can help ensure that vulnerabilities are addressed in a timely manner across the entire infrastructure.
  4. Organizations should have a clear and tested incident response plan in place to quickly detect, respond to, and recover from security incidents. This plan should be aligned with current threat landscapes and should include procedures for addressing vulnerabilities like those found in PTZ cameras.
  5. Continuous monitoring and logging are essential for identifying suspicious activity and detecting potential threats. Security Information and Event Management (SIEM) systems can help aggregate and correlate logs for real-time threat detection.
  6. Organizations should assess the criticality of any End-of-Life (EOL) products, including PTZ cameras, and plan for timely upgrades or replacements. Using outdated devices increases the risk of exploitation, as they may no longer receive security patches.

Conclusion

The critical vulnerabilities in PTZ cameras, including the OS command injection and authentication bypass vulnerabilities, highlight the importance of securing embedded devices used in modern enterprise environments.

As PTZ camera vulnerabilities become a vector for cyberattacks, organizations must act quickly to patch affected devices and adopt stronger security practices. Timely patching, network segmentation, and comprehensive monitoring are key to protecing systems against the growing threat posed by such vulnerabilities in Pan-Tilt-Zoom cameras.

With active exploitation of these vulnerabilities in the wild, organizations that rely on PTZ cameras should prioritize security assessments and patch management to protect sensitive data and maintain system integrity.

Sources: https://ptzoptics.com/firmware-changelog/

https://www.cisa.gov/news-events/alerts/2024/11/04/cisa-adds-two-known-exploited-vulnerabilities-catalog

The post Critical Vulnerabilities in PTZ Cameras: CISA Adds New Exploits to Its Catalog appeared first on Cyble.

Blog – Cyble – ​Read More

Researcher Discloses 36 Vulnerabilities Found in IBM Security Verify Access 

Attackers could have exploited IBM Security Verify Access vulnerabilities to compromise the entire authentication infrastructure.

The post Researcher Discloses 36 Vulnerabilities Found in IBM Security Verify Access  appeared first on SecurityWeek.

SecurityWeek – ​Read More

Google Patches Two Android Vulnerabilities Exploited in Targeted Attacks

Google warns of the limited, targeted exploitation of two vulnerabilities resolved with the latest Android security update.

The post Google Patches Two Android Vulnerabilities Exploited in Targeted Attacks appeared first on SecurityWeek.

SecurityWeek – ​Read More

QNAP fixed NAS backup zero-day demonstrated at Pwn2Own Ireland 2024

In a way of working that looks like someone digging a trench while the other behind is covering it, and a third one is digging it yet again, this is another example of how bad software keeps cyber security in business. (Great read, by the way) Bad software may be too harsh and flaws may range from exposed credentials, and misconfiguration to more advanced issues like miss-after-use or implicit…

Source

TechSplicer – ​Read More