Normal view
-
Trend Micro Research, News, Perspectives
- Trend Micro launches new integration with Zscaler to deliver real-time, Risk-Based Zero Trust Access
Cloud, supreme
SonicWall: Firewall configs stolen for all cloud backup customers
Crimson Collective hackers target AWS cloud instances for data theft
-
Trend Micro Research, News, Perspectives
- A Cascade of Insecure Architectures: Axis Plugin Design Flaw Expose Select Autodesk Revit Users to Supply Chain Risk
A Cascade of Insecure Architectures: Axis Plugin Design Flaw Expose Select Autodesk Revit Users to Supply Chain Risk
$4.5 Million Offered in New Cloud Hacking Competition
Wiz has teamed up with Microsoft, Google and AWS and is inviting cloud security researchers to its Zeroday.Cloud competition.
The post $4.5 Million Offered in New Cloud Hacking Competition appeared first on SecurityWeek.
Zeroday Cloud hacking contest offers $4.5 million in bounties
Critical WD My Cloud bug allows remote command injection
Cloud Security in the CNAPP Era: Eight Important Takeaways
CSA Unveils SaaS Security Controls Framework to Ease Complexity
New framework from the Cloud Security Alliance helps SaaS customers navigate the shared responsibility model with confidence.
The post CSA Unveils SaaS Security Controls Framework to Ease Complexity appeared first on SecurityWeek.
CNAPP is the Solution to Multi-cloud Flexibility
New VMScape attack breaks guest-host isolation on AMD, Intel CPUs
OpenAI and Oracle Ink Historic $300 Billion Cloud Computing Deal
Read more of this story at Slashdot.
Whatโs Your Cybersecurity Maturity?
Chinaโs โTyphoonsโ changing the way FBI hunts sophisticated threats
Major cyber intrusions by the Chinese hacking groups known as Salt Typhoon and Volt Typhoon have forced the FBI to change its methods of hunting sophisticated threats, a top FBI cyber official said Wednesday.
U.S. officials, allied governments and threat researchers have identified Salt Typhoon as the group behind the massive telecommunications hack revealed last fall but that could have been ongoing for years. Investigators have pointed at Volt Typhoon as a group that has infiltrated critical infrastructure to cause disruptions in the United States if China invades Taiwan and Americans intervene.
Those hacks were stealthier than in the past, and more patient, said Jason Bilnoski, deputy assistant director of the FBIโs cyber division. The Typhoons have focused on persistent access and gotten better at hiding their infiltration by using โliving off the landโ techniques that involve using legitimate tools within systems to camouflage their efforts, he said. That in turn has complicated FBI efforts to share indicators of compromise (IOCs).
โWeโre having to now hunt as if theyโre already on the network, and weโre hunting in ways we hadnโt before,โ he said at the Billington Cybersecurity Summit. โTheyโre not dropping tools and malware that we used to see, and perhaps thereโs not a lot of IOCs that weโd be able to share in certain situations.โ
The hackers used to be โnoisy,โ with an emphasis on hitting a target quickly, stealing data and then escaping, Bilnoski said. But now for nation-backed attackers, โweโre watching exponential leapsโ in tactics, techniques and procedures, he said.
Jermaine Roebuck, associate director for threat hunting at the Cybersecurity and Infrastructure Security Agency, said his agency is also seeing those kinds of changes in the level of stealth from sophisticated hackers, in addition to โa significant changeโ in their intentions and targeting.
โWe saw a lot of espionage over the last several years, but here lately, thereโs been a decided shift into computer network attack, prepositioning or disruption in terms of capabilities,โ he said at the same conference.
The targeting has changed as organizations, including government agencies, have shifted to the cloud. โWell, guess what?โ he asked. โThe actors are going toward the cloudโ in response.
Theyโve also focused on โedge devices,โ like devices that supply virtual private network connections or other services provided by managed service providers, Roebuck said. Organizations have less insight into the attacks those devices and providers are facing than more direct intrusions, he said.
The post Chinaโs โTyphoonsโ changing the way FBI hunts sophisticated threats appeared first on CyberScoop.
Hackers hide behind Tor in exposed Docker API breaches
Signal Rolls Out Encrypted Cloud Backups, Debuts First Subscription Plan at $1.99/Month
Read more of this story at Slashdot.
Three Critical Facts About Cyber Risk Management
SAP To Invest Over 20 Billion Euros In 'Sovereign Cloud'
Read more of this story at Slashdot.
Salesloft Drift attacks hit Cloudflare, Palo Alto Networks, Zscaler
Multiple security and technology companies have been swept up in a far-reaching attack spree originating at Salesloft Drift, including Cloudflare, PagerDuty, Palo Alto Networks, SpyCloud and Zscaler.ย
Victim organizations continue to come forward as customers of the third-party AI chat agent hunt for evidence of compromise or receive notices from Salesloft and other companies involved in response, recovery and ongoing attack investigations.ย
Salesloft initially claimed exposure was limited to customers integrated with Salesforce. Yet, Google Threat Intelligence Group and Mandiant Consulting โ Googleโs incident response firm which is now working with Salesloft โ said any platform integrated with Drift is potentially compromised.ย
The root cause of the attacks, specifically how the threat group that Google tracks as UNC6395 gained initial access to Salesloft Drift, remains unconfirmed. โThere is no evidence of any unusual or malicious activity with the Salesloft platform,โ Salesloft said in an update Saturday.
On Monday, the company said โDrift will be taken offline in the very near future,โ rendering the platform inaccessible and the Drift chatbot unavailable on customer websites. โThis will provide the fastest path forward to comprehensively review the application and build additional resiliency and security in the system to return the application to full functionality,โ the company added.
Salesloft, which acquired Drift in February 2024, has not responded to requests for comment since news of the attacks first surfaced last week.ย
The company announced an agreement to merge with Clari, a competitor in the customer-relationship management space, one day before the attacks started Aug. 8. In the merger announcement, the combined companies said they will serve more than 5,000 organizations globally across all industries.
The exposure caused by the attacks has cast widespread concern, as customers seek clarity about the unfolding disaster. Salesloft customers are assessing if they were impacted, and then sifting through data to determine the extent to which they or their customers were compromised.ย
The attacks did not hit every Salesloft Drift customer. Some Salesloft Drift customers, when contacted by CyberScoop, confirmed they were not implicated by the attacks and found no evidence that corporate or customer data was compromised.ย
Okta said it was not impacted by the incident, but confirmed it was a target based on indicators of compromise Google Threat Intelligence Group shared last week. โThe threat actor attempted to use a compromised token to access our Salesforce instance, but the attack failed because the connection originated from an unauthorized IP address,โ the company said in a blog post Tuesday.
Many other businesses were less fortunate.
Sam Curry, chief information security officer at Zscaler, said the companyโs Salesloft Drift integration with Salesforce was the point of unauthorized access. The company was using Salesloft Drift integrated with other platforms, but they were not impacted, he added.ย
Data on a large number of Zscalerโs customers was exposed, including names, business email addresses, job titles, phone numbers, location details, Zscaler product licensing and commercial information, and plain text content from some support cases.ย
โNo product, service, or infrastructure was affected,โ Curry said. โWe are looking to hear from Salesloft Drift and from Salesforce if there are any other findings since this happened in their infrastructure.โ
Curry said Zscaler was already in the process of ending its relationship with Salesloft Drift for unrelated reasons.ย
Palo Alto Networks on Tuesday confirmed that it, too, was one of hundreds of organizations impacted by the supply chain attack. The companyโs incident response business Unit 42 confirmed the incident was limited to its Salesforce environment, adding that no Palo Alto Networks products or services were impacted.ย
โMost of the exfiltrated data was business contact information,โ a Palo Alto Networks spokesperson told CyberScoop in an email. โHowever, a small number of customers who included sensitive information, such as credentials, in their recent case notes might also have had that data compromised.โ
Cloudflare said any information customers shared with the companyโs support system โ including logs, tokens or passwords โ should be considered compromised. The company said it found 104 Cloudflare API tokens in the compromised data and, while it found no evidence of abuse, rotated the tokens out of an abundance of caution.
The company also maintained that no Cloudflare services or infrastructure were compromised.ย
โWe are responsible for the choice of tools we use in support of our business,โ a group of Cloudflare security leaders said in a blog post Tuesday. โThis breach has let our customers down. For that, we sincerely apologize.โ
Former Salesloft Drift customers were impacted as well. In a blog post announcing some data contained in its Salesforce environment was exposed, SpyCloud said it was previously a customer of Salesloft and Drift, but not currently.
Google previously said the data theft campaign occurred over a 10-day period last month, potentially impacting more than 700 organizations.
The post Salesloft Drift attacks hit Cloudflare, Palo Alto Networks, Zscaler appeared first on CyberScoop.