Malware Devil

Tuesday, May 25, 2021

Colonial Pipeline attack spurs new rules for critical infrastructure

Following a devastating cyberattack on the Colonial Pipeline, the Transportation Security Administration–which sits within the government’s Department of Homeland Security–will issue its first-ever cybersecurity directive for pipeline companies in the United States, according to exclusive reporting from The Washington Post.

The directives are expected to arrive within the week and will require pipeline companies in the US to report any cyberattacks they suffer to the TSA and the Cybersecurity Infrastructure and Security Agency. Such attacks will be reported by newly designated “cyber officials” to be named by every pipeline company, who will be required to have 24/7 access to the government agencies, The Washington Post reported. Companies that refuse to comply with the directives will face penalties.

The regulations represent a tidal shift in how the TSA has protected pipeline security in the country for more than a decade. Though the government agency has for 20 years been tasked with protecting flight safety in the country, the new cybersecurity directives fall under the agency’s purview following a government restructuring after the attacks on September 11, 2001. More than a decade after the attacks, the agency leaned on voluntary collaboration with private pipeline companies for cybersecurity protection, sometimes offering to perform external reviews of a company’s networks and protocols. Sometimes, the Washington Post reported, those offers were declined.

But after the ransomware group Darkside attacked the East Coast oil and gas supplier Colonial Pipeline, which led to an 11-day shut-down and gas shortages in the Eastern US, it appears that the federal government is no longer satisfied with private industry’s lagging cybersecurity protections. Already, President Joe Biden has signed an Executive Order to place new restrictions on software companies that sell their products to the federal government. Those rules were reportedly refined after the Colonial Pipeline attack, and are expected to become an industry norm as more technology companies vie to include the government as a major customer.

The TSA’s new rules for pipeline companies fall into the same trend.

In speaking with The Washington Post, Department of Homeland Security spokeswoman Sarah Peck said:

“The Biden administration is taking further action to better secure our nation’s critical infrastructure. TSA, in close collaboration with [the Cybersecurity and Infrastructure Security Agency], is coordinating with companies in the pipeline sector to ensure they are taking all necessary steps to increase their resilience to cyber threats and secure their systems.”

Though the first directive from TSA is expected this week, follow-on directives could come later. Those directives are reported to include more detailed rules on how pipeline companies protect their own networks and computers against a potential cyberattack, along with guidance on how to respond to cyberattacks after they’ve happened. Further, pipeline companies will be forced to assess their own cybersecurity against a set of industry standards. These directives, like the one expected this week, will also be mandatory, but one expected, voluntary guidance from TSA will be whether a pipeline company must actually fix any issues it finds from a required cybersecurity assessment.

The new rules will bring the private pipeline industry into a small group of regulated sectors of US infrastructure, including bulk electric power grids and nuclear plants. These sectors are the outliers in US infrastructure, as most components–including water dams and wastewater plants–have no mandatory cybersecurity protections.

Several hurdles remain for the TSA’s rules to be effective, including a dearth of staff at the agency itself. According to The Washington Post, the TSA’s pipeline security division had just one staff member in 2014, and according to testimony in 2019, that number had grown to only five. To assuage the problem, the Department of Homeland Security is expected to hire 16 more employees at TSA and 100 more employees at CISA.

The post Colonial Pipeline attack spurs new rules for critical infrastructure appeared first on Malware Devil.



https://malwaredevil.com/2021/05/25/colonial-pipeline-attack-spurs-new-rules-for-critical-infrastructure-2/?utm_source=rss&utm_medium=rss&utm_campaign=colonial-pipeline-attack-spurs-new-rules-for-critical-infrastructure-2

Colonial Pipeline attack spurs new rules for critical infrastructure

Following a devastating cyberattack on the Colonial Pipeline, the Transportation Security Administration—which sits within the government’s Department of Homeland Security—will issue its first-ever cybersecurity directive for pipeline companies in the United States, according to exclusive reporting from The Washington Post.

The directives are expected to arrive within the week and will require pipeline companies in the US to report any cyberattacks they suffer to the TSA and the Cybersecurity Infrastructure and Security Agency. Such attacks will be reported by newly designated “cyber officials” to be named by every pipeline company, who will be required to have 24/7 access to the government agencies, The Washington Post reported. Companies that refuse to comply with the directives will face penalties.

The regulations represent a tidal shift in how the TSA has protected pipeline security in the country for more than a decade. Though the government agency has for 20 years been tasked with protecting flight safety in the country, the new cybersecurity directives fall under the agency’s purview following a government restructuring after the attacks on September 11, 2001. More than a decade after the attacks, the agency leaned on voluntary collaboration with private pipeline companies for cybersecurity protection, sometimes offering to perform external reviews of a company’s networks and protocols. Sometimes, the Washington Post reported, those offers were declined.

But after the ransomware group Darkside attacked the East Coast oil and gas supplier Colonial Pipeline, which led to an 11-day shut-down and gas shortages in the Eastern US, it appears that the federal government is no longer satisfied with private industry’s lagging cybersecurity protections. Already, President Joe Biden has signed an Executive Order to place new restrictions on software companies that sell their products to the federal government. Those rules were reportedly refined after the Colonial Pipeline attack, and are expected to become an industry norm as more technology companies vie to include the government as a major customer.

The TSA’s new rules for pipeline companies fall into the same trend.

In speaking with The Washington Post, Department of Homeland Security spokeswoman Sarah Peck said:

“The Biden administration is taking further action to better secure our nation’s critical infrastructure. TSA, in close collaboration with [the Cybersecurity and Infrastructure Security Agency], is coordinating with companies in the pipeline sector to ensure they are taking all necessary steps to increase their resilience to cyber threats and secure their systems.”

Though the first directive from TSA is expected this week, follow-on directives could come later. Those directives are reported to include more detailed rules on how pipeline companies protect their own networks and computers against a potential cyberattack, along with guidance on how to respond to cyberattacks after they’ve happened. Further, pipeline companies will be forced to assess their own cybersecurity against a set of industry standards. These directives, like the one expected this week, will also be mandatory, but one expected, voluntary guidance from TSA will be whether a pipeline company must actually fix any issues it finds from a required cybersecurity assessment.

The new rules will bring the private pipeline industry into a small group of regulated sectors of US infrastructure, including bulk electric power grids and nuclear plants. These sectors are the outliers in US infrastructure, as most components—including water dams and wastewater plants—have no mandatory cybersecurity protections.

Several hurdles remain for the TSA’s rules to be effective, including a dearth of staff at the agency itself. According to The Washington Post, the TSA’s pipeline security division had just one staff member in 2014, and according to testimony in 2019, that number had grown to only five. To assuage the problem, the Department of Homeland Security is expected to hire 16 more employees at TSA and 100 more employees at CISA.

The post Colonial Pipeline attack spurs new rules for critical infrastructure appeared first on Malwarebytes Labs.

The post Colonial Pipeline attack spurs new rules for critical infrastructure appeared first on Malware Devil.



https://malwaredevil.com/2021/05/25/colonial-pipeline-attack-spurs-new-rules-for-critical-infrastructure/?utm_source=rss&utm_medium=rss&utm_campaign=colonial-pipeline-attack-spurs-new-rules-for-critical-infrastructure

QUAC-TRNG: High-Throughput True Random Number Generation Using Quadruple Row Activation in Commodity DRAM Chips

Read More

The post QUAC-TRNG: High-Throughput True Random Number Generation Using Quadruple Row Activation in Commodity DRAM Chips appeared first on Malware Devil.



https://malwaredevil.com/2021/05/25/quac-trng-high-throughput-true-random-number-generation-using-quadruple-row-activation-in-commodity-dram-chips-2/?utm_source=rss&utm_medium=rss&utm_campaign=quac-trng-high-throughput-true-random-number-generation-using-quadruple-row-activation-in-commodity-dram-chips-2

Cybercrime Forum Data Set for 2019 and 2021 – Free Direct Download Technical Collection Copy Available! Grab a Copy Today!

Dear blog readers,

This is Dancho. I’ve decided to make my Cybercrime Forum Data Set for 2019 and 2021 exclusively available online for free in order for me to speed the dissemination process and to possibly empower security researchers and vendors with the necessary information to help them stay on the top of their game in terms of current and emerging cyber threats including U.S Law Enforcement on its way to track down and prosecute the cybercriminals behind these campaigns part of my currently ongoing Law Enforcement and OSINT operation called “Uncle George“.

Including the following actual direct download links for the actual cybercrime-friendly forums in question:

evilhack.ru.rar

gerki.pw.rar

ProLogic.rar

SEOForum.rar

c-cracking.org.rar

Whitehat.vn.rar

neadekvat.ru.rar

www.opensc.ws.rar

gofuckbiz.com.rar

Darkode.rar

hackademics.fr.rar

darkmoney.de.rar

xaker.name.rar

Xakep.bg.rar

sysadmins.ru.rar

carders.se.rar

PhreakerPro.rar

Master-X.rar

Chf.rar

Darkmarket.la.rar

Webmasters.ru.rar

reversing.cc.rar

monopoly.ms.rar

Exelab.rar

blacktip.top.rar

red.ug.rar

ghostmarket.net.rar

DomenForum.rar

h0st.pw.rar

crdpro.cc.rar

Antichat.ru.rar

Hack-Port.rar

ProxyBase.rar

replace.org.ua.rar

Eviloctal.rar

Xakepok.rar

verified.bz

WWH-Club.rar

Szuwi.rar

GoFuckBiz.rar

www.forohack.com.rar

Promarket.rar

pay-per-install.org.rar

cardingsite.cc.rar

LinkFeed.rar

TotalBlackhat.rar

procrd.biz.rar

Mr11-11mr.7olm.org.rar

iFud.rar

Piratebuhta.pw.rar

darknetforum.is.rar

BPCForum.rar

ForumSEO.rar

Cracked.to.rar

Forum.Zloy.bz.rar

darknet.kr.rar

ica.su.rar

ProCrd.rar

Crack-Forum.rar

alligator.cash.rar

Mmpg.ru.rar

MaulTalk.rar

ForumSape.rar

SEOCafe.rar

dwh.su.rar

BigFozzy.rar

Gla.vn.rar

hack-academy.ru.rar

Zismo.rar

venera.bz

russiancarder.ru.rar

it-24h.com.rar

Forum-UINSell.rar

carderplanet.rar

4HatDay.rar

Toolbabase.se.rar

ubotstudio.com.rar

aHack.rar

Linuxac.org.rar

crdcrew.cc.rar

imhatimi.org.rar

Svuit.vn.rar

Free-hack.rar

xaknet.org.rar

www.ryan1918.com.rar

Darkmoney.rar

shadowcrew-2.rar

Hackersoft.rar

BlackhatWorld.rar

cardingmafia.ws.rar

Nullnoss.org.rar

365Exe.rar

Aljyyosh.rar

forum.cybsecgroup.com.rar

Hackingboard.rar

Szenebox.rar

Cardvilla.rar

iHonker.rar

SkyFraud.rar

H4kurd.com.rar

moneymaker.hk.rar

CNSec.rar

Cyberizm.rar

Turkhackteam.rar

forum.reverse4you.org.rar

CNHonker.rar

Ashiyane.rar

security-teams.net.rar

itsobr.com.rar

Spyhackerz.rar

ArmadaBoard.rar

iransec.net.rar

xaker26.info.rar

11Wang.rar

Hackings.rar

Stay tuned!

The post Cybercrime Forum Data Set for 2019 and 2021 – Free Direct Download Technical Collection Copy Available! Grab a Copy Today! appeared first on Security Boulevard.

Read More

The post Cybercrime Forum Data Set for 2019 and 2021 – Free Direct Download Technical Collection Copy Available! Grab a Copy Today! appeared first on Malware Devil.



https://malwaredevil.com/2021/05/25/cybercrime-forum-data-set-for-2019-and-2021-free-direct-download-technical-collection-copy-available-grab-a-copy-today/?utm_source=rss&utm_medium=rss&utm_campaign=cybercrime-forum-data-set-for-2019-and-2021-free-direct-download-technical-collection-copy-available-grab-a-copy-today

MacOS Zero-Day Let Attackers Bypass Privacy Preferences

Apple has released security patches for vulnerabilities in macOS and tvOS that reports indicate have been exploited in the wild.

The post MacOS Zero-Day Let Attackers Bypass Privacy Preferences appeared first on Malware Devil.



https://malwaredevil.com/2021/05/25/macos-zero-day-let-attackers-bypass-privacy-preferences/?utm_source=rss&utm_medium=rss&utm_campaign=macos-zero-day-let-attackers-bypass-privacy-preferences

SBOM, Part 2 – Allan Friedman – SCW #74

What is SBOM?
Who needs to think about this?
Is this required today, and what might the future of compliance look like?
What is in the recent EO?

Segment Resources:

ntia.gov/SBOM

Visit https://www.securityweekly.com/scw for all the latest episodes!

Show Notes: https://securityweekly.com/scw74

The post SBOM, Part 2 – Allan Friedman – SCW #74 appeared first on Malware Devil.



https://malwaredevil.com/2021/05/25/sbom-part-2-allan-friedman-scw-74-2/?utm_source=rss&utm_medium=rss&utm_campaign=sbom-part-2-allan-friedman-scw-74-2

SBOM, Part 2 – Allan Friedman – SCW #74

What is SBOM?
Who needs to think about this?
Is this required today, and what might the future of compliance look like?
What is in the recent EO?

Segment Resources:

ntia.gov/SBOM

Visit https://www.securityweekly.com/scw for all the latest episodes!

Show Notes: https://securityweekly.com/scw74

The post SBOM, Part 2 – Allan Friedman – SCW #74 appeared first on Malware Devil.



https://malwaredevil.com/2021/05/25/sbom-part-2-allan-friedman-scw-74/?utm_source=rss&utm_medium=rss&utm_campaign=sbom-part-2-allan-friedman-scw-74

10 astuces essentielles de cybersécurité pour les débutants

Les organisations sont aujourd’hui confrontées à une exposition accrue aux cybermenaces. Les attaquants ciblent souvent les technologies émergentes, car les nouvelles technologies sont souvent mal équipées pour faire face à une attaque. De plus, l’internet regorge de liens malveillants, de …

The post 10 astuces essentielles de cybersécurité pour les débutants appeared first on ManageEngine Blog.

The post 10 astuces essentielles de cybersécurité pour les débutants appeared first on Security Boulevard.

Read More

The post 10 astuces essentielles de cybersécurité pour les débutants appeared first on Malware Devil.



https://malwaredevil.com/2021/05/25/10-astuces-essentielles-de-cybersecurite-pour-les-debutants/?utm_source=rss&utm_medium=rss&utm_campaign=10-astuces-essentielles-de-cybersecurite-pour-les-debutants

Axis Fosters Work-From-Home Momentum with Zero Trust Network Access

SPONSORED: Watch now — VPN and VDI, while still useful, lack the hardened security required to keep users secure. That’s created an opening for Zero Trust network access.

The post Axis Fosters Work-From-Home Momentum with Zero Trust Network Access appeared first on Malware Devil.



https://malwaredevil.com/2021/05/25/axis-fosters-work-from-home-momentum-with-zero-trust-network-access/?utm_source=rss&utm_medium=rss&utm_campaign=axis-fosters-work-from-home-momentum-with-zero-trust-network-access

SBOM, Part 1 – Allan Friedman – SCW #74

What is SBOM?
Who needs to think about this?
Is this required today, and what might the future of compliance look like?
What is in the recent EO?

Segment Resources:

ntia.gov/SBOM
Visit https://www.securityweekly.com/scw for all the latest episodes!
Show Notes: https://securityweekly.com/scw74

The post SBOM, Part 1 – Allan Friedman – SCW #74 appeared first on Malware Devil.



https://malwaredevil.com/2021/05/25/sbom-part-1-allan-friedman-scw-74/?utm_source=rss&utm_medium=rss&utm_campaign=sbom-part-1-allan-friedman-scw-74

Russian Sentenced to 30 Months for Running Criminal Website

FBI says sales from illicit online shop deer.io exceeded $17 million

The post Russian Sentenced to 30 Months for Running Criminal Website appeared first on Malware Devil.



https://malwaredevil.com/2021/05/25/russian-sentenced-to-30-months-for-running-criminal-website/?utm_source=rss&utm_medium=rss&utm_campaign=russian-sentenced-to-30-months-for-running-criminal-website

Find Out What We Learned This Year at DevOps Connect: DevSecOps

Hopefully, you were able to join us this year at DevOps Connect: DevSecOps @RSAC 2021! Even though the theme of this year?…

The post Find Out What We Learned This Year at DevOps Connect: DevSecOps appeared first on ZeroNorth.

The post Find Out What We Learned This Year at DevOps Connect: DevSecOps appeared first on Security Boulevard.

Read More

The post Find Out What We Learned This Year at DevOps Connect: DevSecOps appeared first on Malware Devil.



https://malwaredevil.com/2021/05/25/find-out-what-we-learned-this-year-at-devops-connect-devsecops/?utm_source=rss&utm_medium=rss&utm_campaign=find-out-what-we-learned-this-year-at-devops-connect-devsecops

Automatize atualizações de modelos e nunca mais perca uma atualização de software

Você está bem no meio do rascunho de um e-mail importante quando o vê: um pop-up incômodo pedindo para que atualize seu software. Esse tipo de coisa sempre parece nos momentos mais inoportunos e, na maioria das vezes, você acaba …

The post Automatize atualizações de modelos e nunca mais perca uma atualização de software appeared first on ManageEngine Blog.

The post Automatize atualizações de modelos e nunca mais perca uma atualização de software appeared first on Security Boulevard.

Read More

The post Automatize atualizações de modelos e nunca mais perca uma atualização de software appeared first on Malware Devil.



https://malwaredevil.com/2021/05/25/automatize-atualizacoes-de-modelos-e-nunca-mais-perca-uma-atualizacao-de-software/?utm_source=rss&utm_medium=rss&utm_campaign=automatize-atualizacoes-de-modelos-e-nunca-mais-perca-uma-atualizacao-de-software

Construindo uma lista completa de verificação de segurança de rede

Entender o que auditar em uma rede pode ser caótico e confuso. Construir uma lista de verificação de segurança de rede completa é crucial para organizações com computadores conectados à Internet ou entre si. Pense nisso como uma varredura antivírus …

The post Construindo uma lista completa de verificação de segurança de rede appeared first on ManageEngine Blog.

The post Construindo uma lista completa de verificação de segurança de rede appeared first on Security Boulevard.

Read More

The post Construindo uma lista completa de verificação de segurança de rede appeared first on Malware Devil.



https://malwaredevil.com/2021/05/25/construindo-uma-lista-completa-de-verificacao-de-seguranca-de-rede/?utm_source=rss&utm_medium=rss&utm_campaign=construindo-uma-lista-completa-de-verificacao-de-seguranca-de-rede

Monday, May 24, 2021

2021-05-24 – TA551 (Shathak) Word docs push IcedID (Bokbot)

Read More

The post 2021-05-24 – TA551 (Shathak) Word docs push IcedID (Bokbot) appeared first on Malware Devil.



https://malwaredevil.com/2021/05/24/2021-05-24-ta551-shathak-word-docs-push-icedid-bokbot-2/?utm_source=rss&utm_medium=rss&utm_campaign=2021-05-24-ta551-shathak-word-docs-push-icedid-bokbot-2

Network Security News Summary for Tuesday May 25th, 2021

Apple Patches 0-Days; Bluetooth Vulnerabilities; NAGIOS Patches

Apple Patches 0-Days
https://www.jamf.com/blog/zero-day-tcc-bypass-discovered-in-xcsset-malware/
https://support.apple.com/en-us/HT201222

Bluetooth Vulnerabilities
https://kb.cert.org/vuls/id/799380
https://francozappa.github.io/about-bias/publication/antonioli-20-bias/antonioli-20-bias.pdf

NAGIOS Vulnerabilities
https://skylightcyber.com/2021/05/20/13-nagios-vulnerabilities-7-will-shock-you/

keywords: nagios; bluetooth; ios; macos; apple; 0-day; bigsur; catalina; mojave

The post Network Security News Summary for Tuesday May 25th, 2021 appeared first on Malware Devil.



https://malwaredevil.com/2021/05/24/network-security-news-summary-for-tuesday-may-25th-2021/?utm_source=rss&utm_medium=rss&utm_campaign=network-security-news-summary-for-tuesday-may-25th-2021

Record Setting $40M Ransom Paid to Attackers

CNA, one of the largest U.S. commercial and casualty insurance companies, reportedly met a $40 million ransom demand after suffering a ransomware infection earlier in the year. As of this writing, that’s the largest ransom demand ever reported to have been paid by a company following a ransomware attack.

The post Record Setting $40M Ransom Paid to Attackers appeared first on Security Boulevard.

Read More

The post Record Setting $40M Ransom Paid to Attackers appeared first on Malware Devil.



https://malwaredevil.com/2021/05/24/record-setting-40m-ransom-paid-to-attackers/?utm_source=rss&utm_medium=rss&utm_campaign=record-setting-40m-ransom-paid-to-attackers

CISOs Struggle to Cope, Cybersecurity Metrics, & Security by Design – BSW #218

This week, in the Leadership and Communications section, CISOs Struggle to Cope with Mounting Job Stress, Corporate Compliance Strategies to Protect Data, Cybersecurity Metrics That Matter, and more!

Visit https://www.securityweekly.com/bsw for all the latest episodes!

Show Notes: https://securityweekly.com/bsw218

The post CISOs Struggle to Cope, Cybersecurity Metrics, & Security by Design – BSW #218 appeared first on Malware Devil.



https://malwaredevil.com/2021/05/24/cisos-struggle-to-cope-cybersecurity-metrics-security-by-design-bsw-218-2/?utm_source=rss&utm_medium=rss&utm_campaign=cisos-struggle-to-cope-cybersecurity-metrics-security-by-design-bsw-218-2

CISOs Struggle to Cope, Cybersecurity Metrics, & Security by Design – BSW #218

This week, in the Leadership and Communications section, CISOs Struggle to Cope with Mounting Job Stress, Corporate Compliance Strategies to Protect Data, Cybersecurity Metrics That Matter, and more!

Visit https://www.securityweekly.com/bsw for all the latest episodes!

Show Notes: https://securityweekly.com/bsw218

The post CISOs Struggle to Cope, Cybersecurity Metrics, & Security by Design – BSW #218 appeared first on Malware Devil.



https://malwaredevil.com/2021/05/24/cisos-struggle-to-cope-cybersecurity-metrics-security-by-design-bsw-218/?utm_source=rss&utm_medium=rss&utm_campaign=cisos-struggle-to-cope-cybersecurity-metrics-security-by-design-bsw-218

American Express Fined for Sending Millions of Spam Messages

British regulators ruled that Amex sent 4 million nuisance emails to opted-out customers.
Read More

The post American Express Fined for Sending Millions of Spam Messages appeared first on Malware Devil.



https://malwaredevil.com/2021/05/24/american-express-fined-for-sending-millions-of-spam-messages/?utm_source=rss&utm_medium=rss&utm_campaign=american-express-fined-for-sending-millions-of-spam-messages

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...