Colonial Pipeline CEO told the U.S. Senate that the massive ransomware attack that disrupted fuel shipments was caused by attackers stealing one password.
Colonial Pipeline CEO Joseph Blount told a U.S. Senate committee that the ransomware attack that disrupted fuel distribution to the majority of the eastern United States was caused by attackers stealing a single password that protected the enterprise’s VPN. “In the case of this particular legacy VPN, it only had single-factor authentication,” Blount informed the panel, convened this week in order to examine the attack and other similar threats to U.S. infrastructure.
The single password theft cost the company 75 bitcoins, or $5 million, which it paid to the ransomers believed to be DarkSide, a group that has since shuttered operations. Reuters reported that some senators on the panel suggested Colonial should have consulted with the government before deciding to pay the ransom, as paying ransomers is an act that goes against federal guidelines. Blount responded that he understood the decision to pay or not pay was a private matter to be handled within the company. Even though they received the ransom key, Blount said the company’s IT infrastructure was still in recovery mode. On Monday, the Justice Department announced it had recovered 60 of Colonial’s 75 bitcoins, though the value of the bitcoins has decreased.
Researchers have noticed a ransomware trend developing this year – cybercrime groups are targeting SonicWall devices in order to breach corporate networks and deploy ransomware. According to The Record, this continues a pattern that has been ongoing since 2019, where the angle of approach has been through security equipment itself. In this case, the equipment consists of SonicWall VPNs and network gateways. Companies are urged to apply all the latest patches to their equipment and to add two-factor authentication to all SonicWall systems.
At Apple’s worldwide developer’s conference this week, the company announced that starting with iOS 15 this autumn, Siri will begin processing audio “on device,” meaning that users’ queries will no longer be routed through Apple’s servers. The benefits will be two-fold – more privacy and quicker response time. Apple announced other privacy initiatives as well, including Mail Privacy Protection, which will block email tracking, and iCloud+, which will encrypt all traffic and send it through Apple servers to mask the user’s ID. Read more at The Guardian.
Another feature of iOS 15 is the ability of the FindMy network to locate a user’s iPhone even when that phone is powered off or has been factory reset. 9to5mac posted that with iOS 15, the phone will never really be powered off, but instead remain in a low-power state that acts like an AirTag for the FindMy network. Users will be alerted of the new feature when their battery power runs low for the first time with iOS 15. To make the iPhone actually turn off, users will have to disable the low-power “FindMy” mode in settings.
This week’s Patch Tuesday was a big one across the computer industry, with Microsoft patching 50 flaws, Adobe patching 41, and Intel patching 73. The Microsoft update includes patches for 7 zero-day vulnerabilities, 6 of which have been exploited in the past. The Adobe update includes fixes for bugs found in 10 applications, including Acrobat Reader and Photoshop. The Intel update, amidst its 73 fixes, addresses 5 high-severity vulnerabilities impacting the Intel Virtualization Technology for Directed I/o (VT-d) products, the BIOS firmware for some Intel processors, and the Intel Security Library.
What do security cameras in your neighborhood know about you? And where are they sending it? Find out in this week's installment of What Does the Internet Know About Me?
While the app’s stated intention is good, there are some major potential privacy issues with it. Here’s what Jeff Williams, Avast Global Head of Security, found when he took a closer look at BeReal.
We are witnessing a full-scale cyberwar, in real time, take place in front of our eyes. Cybersecurity and digital freedom are now, quite literally, life and death issues in Europe.
CISA named GootLoader a top malware strain of 2021. Earlier this year, it targeted users searching for plea agreements, but lately, the threat actors are targeting users who are about to be laid off and searching for transition services and other employment-related documents.