• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.701 ■ Fall 2023 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit #1: Understanding an Organization’s Risk Environment
      • Unit #2: Case Study 1 – Snowfall and stolen laptop
      • Unit #2: Data Classification Process and Models
      • Unit #3: Risk Evaluation
      • Unit #4 Case #2: Autopsy of a Data Breach: The Target Case
      • Unit #5: Creating a Security Aware Organization
      • Unit #6: Physical and Environmental Security
    • Second Half of the Semester
      • Unit #8 Case Study 3 – A Hospital Catches the “Millennium Bug”
      • Unit #9: Business Continuity and Disaster Recovery Planning
      • Unit #10: Network Security
      • Unit #11: Cryptography, Public Key Encryption and Digital Signatures
      • Unit #12: Identity Management and Access Control
      • Unit #13: Computer Application Security
  • Deliverables
    • Weekly Deliverables
      • “In the News” Articles
      • Answers to Reading Discussion Questions
      • Comments on Reading Discussion Question and Other Students’ Answers
    • Case Studies
    • Team Project
  • Zoom link

In The News

October 12, 2023 by David Lanter 13 Comments

Filed Under: Unit 08: Case Study 3 - A Hospital Catches the "Millennium Bug" Tagged With:

Reader Interactions

Comments

  1. Chidi Okafor says

    October 14, 2023 at 3:33 pm

    Topic – Researchers Unveil ToddyCat’s New Set of Tools for Data Exfiltration

    This article details the uncovering of a new set of malicious tools used by the Advanced Persistent Threat (APT) actor, ToddyCat. The tools are designed for data exfiltration, revealing insights into ToddyCat’s tactics. Previously linked to attacks on high-profile entities in Europe and Asia, ToddyCat employs the Ninja Trojan and Samurai backdoor. The new tools include loaders for launching the Ninja Trojan, a file-finding tool called LoFiSe, a DropBox uploader for stolen data, and Pcexter for exfiltrating data to Microsoft OneDrive. ToddyCat also uses custom scripts, a passive backdoor, Cobalt Strike, and compromised domain admin credentials for espionage activities. Additionally, Check Point revealed that government and telecom entities in Asia have been targeted by a related campaign using “disposable” malware with infrastructure overlap with ToddyCat.

    Article link – https://thehackernews.com/2023/10/researchers-unveil-toddycats-new-set-of.html?m=1

    Log in to Reply
  2. Ikenna Alajemba says

    October 14, 2023 at 4:10 pm

    This article is about Microsoft’s annual Digital Defense Report, which reveals a Gaza-based hacker-group, Storm-1133, allegedly linked to Hamas, and how the group has been engaging in cyber-attacks on Israeli entities. They employ social engineering, fake LinkedIn profiles, malware, and third-party infiltrations, aiming to establish backdoor access into systems while dodging network-based defenses.
    https://thehackernews.com/2023/10/gaza-linked-cyber-threat-actor-targets.html

    Log in to Reply
  3. Michael Obiukwu says

    October 14, 2023 at 10:14 pm

    New WordPress backdoor creates rogue admin to hijack websites
    The newly discovered backdoor script in WordPress surreptitiously creates a covert administrator account, compromising the integrity of websites. This sophisticated piece of malicious code carries the potential to infiltrate and expropriate control from the legitimate owners of the website. This such way, it signifies a strong threat for website operators, emphasizing the growing need for proactive cyber defense mechanisms in an era of increasing digital vulnerabilities. As the intensity of cyber threats escalates, staying one step ahead is crucial for businesses and individuals operating online and using platforms like WordPress. Maintaining a constant vigil over security aspects becomes imperative in preventing such cunning and destructive interventions. The emergence of such backdoor serves as a critical reminder for web professionals to adopt and implement state-of-the-art security measures to circumvent potential subversion of their digital platforms. While it might seem unassuming at first, the ramifications of such intrusions could be very substantial, ranging from data theft to complete control over site operations. As the digital landscape continues to evolve, cyber-security measures must dynamically adapt to new threats and challenges like this rogue WordPress admin usurpation. Monitoring developments in the cyber-security space and regular updates of existing security infrastructure must become standard operating procedures for any entity operating digitally. By ensuring a consistent approach towards employing best practices in cybersecurity, the potential risks arising from WordPress backdoor threats such as these can be effectively mitigated. Taking the necessary steps now to fortify websites against such camouflaged invasions could save site owners from unprecedented data breaches, financial loss, and reputational damage in the future.
    https://www.bleepingcomputer.com/news/security/new-wordpress-backdoor-creates-rogue-admin-to-hijack-websites/

    Log in to Reply
  4. Jeffrey Sullivan says

    October 15, 2023 at 9:01 am

    Jeff Sullivan
    Mis 5206
    In the news Week 8
    Temple University

    LockBit warns leak of CDW data | SC Media (scmagazine.com)

    https://www.scmagazine.com/brief/lockbit-warns-leak-of-cdw-data

    This article was shared on LinkedIn by one of my connections. A few things stood out to me that intrigued me to read the article. One is that I haven’t heard of CDW in years and LockBit. This article goes over how LockBit, a cybercriminal group that uses double extortion tactics where they encrypt the victim’s data, and they also threaten to leak said data if the demands are not met. LockBit has threatened to expose the stolen data from CDW this past week if their demands are not met. They went on to say, “As soon as the timer runs out you will be able to see all the information, the negotiations are over and are no longer in progress. We have refused the ridiculous amount offered”. The interesting thing is that CDW has provided zero statements on this situation. It also goes on to say that LockBit has used these tactics to force over other victims in their attacks to speed up ransom negotiations to ultimately pay up and with varying success. ESET Global Cybersecurity Advisor Jake Moore stated, “There is always a chance, however, that this is a tactic used to force their victims’ hands to act quickly yet no real substance is in the original claim.” It will be interesting to see what comes out, if any of this report and will keep an eye out on if there is a CDW response.

    Log in to Reply
  5. Marc Greenberg says

    October 15, 2023 at 2:41 pm

    Californians can scrub personal info sold to advertisers with first-in-US law

    https://www.theguardian.com/technology/2023/oct/10/california-delete-act-signed-newsom

    The California governor signed a bill that would enable residents to request that their personal information be deleted from the all the data brokers in the state.

    The bill, SB 362, otherwise known as the Delete Act, was introduced in April 2023 in an attempt to give Californians more control over their privacy. Californians already have a right to request their data be deleted under current state privacy laws, but it requires filing a request with each individual company.
    The new bill reinforces that all data brokers must register with the California privacy protection agency (CPPA), and it requires the CPPA to establish an easy and free way for Californians to request that all data brokers in the state delete their data through a single page, regardless of how they acquired that information. If data brokers don’t comply with these rules, the bill stipulates they be fined or otherwise penalized.
    While proponents of the bill have lauded it as a less tedious and more user-friendly way to reinforce existing California privacy laws, many advertising companies have argued it would undermine their industry.
    Civil liberties and privacy advocates have long called for stronger regulations around the data broker industry, citing concerns about the lack of transparency into when and how consumer data is sold and shared and the ability for law enforcement to skip subpoenas or warrants by simply buying otherwise inaccessible personal information from a private company.
    In the past, agencies like the US Immigration and Customs Enforcement Agency have used data brokers to get around local laws such as sanctuary policies that prohibit state or city agencies from aiding with immigration investigations.

    The state will have until 2026 to implement the Delete Act.

    Log in to Reply
  6. Akintunde Akinmusire says

    October 15, 2023 at 8:02 pm

    https://cybernews.com/security/facebook-copyright-scam-intensifies/
    Facebook copyright scam intensifies, users left stranded
    According to a new report by Cybernews, there have been reports regarding Facebook users being targeted through a phishing scam. Users get fake copyright infringement messages from hackers pretending to be Facebook stating users have violated Facebook’s copyright infringement policies. Through the message, users would be provided with steps to recover their accounts. It was stated that the link provided was intended to steal users’ credentials. To avoid the scam, users are advised to activate MFA, report compromised accounts, and not click on unfamiliar links.

    Log in to Reply
  7. Alyanna Inocentes says

    October 15, 2023 at 9:07 pm

    Microsoft Offers Up to $15,000 in New AI Bug Bounty Program
    https://www.securityweek.com/microsoft-offers-up-to-15000-in-new-ai-bug-bounty-program/

    Microsoft has launched a new bug bounty program focused on artificial intelligence (AI) vulnerabilities. The program offers rewards of up to $15,000 for researchers who uncover and report security flaws in Microsoft’s AI systems. This initiative reflects Microsoft’s commitment to enhancing the security of AI technologies and encourages the research community to identify and help mitigate potential risks in AI systems. The bug bounty program aims to promote responsible disclosure and protect AI systems from potential threats and vulnerabilities.

    Log in to Reply
  8. Andrew Young says

    October 16, 2023 at 1:16 pm

    Article: Bank account numbers & PINs leaked in cybersecurity attack at Charlotte-based AvidXchange

    Around 7,000 customers from a billing and payments tool provider called AvidXchange have had personal info including bank info leaked due to a cybersecurity attack from April, 2023. The group first noticed the breach in April but did not notify customers until October after completing a full review of the data lost and confirming the identities of those impacted. AvidXchange has stated that they have removed the threat and are offering credit monitoring services for those impacted, but the damage done may already be impacting customers.

    This example shows the general process for how companies handle data breaches, as we’ve seen previously in the target case. What I find unusual about this breach, however, is that the notifications sent to customers are going out now, 7 months after the initial breach and impact. Though credit monitoring is being offered, it is concerning that there is a possible 7 month period where customers could have been impacted and had no idea how or why.

    https://www.wsoctv.com/news/local/financial-information-leaked-cybersecurity-attack-charlotte-based-avidxchange/OGHER6JD6ZBTRENMV4DMNCEUXA/

    Log in to Reply
  9. Alex Ruiz says

    October 16, 2023 at 5:59 pm

    Title: Pro-Russian Hackers Exploiting Recent WinRAR Vulnerability in New Campaign
    Link: https://thehackernews.com/2023/10/pro-russian-hackers-exploiting-recent.html
    Summary: Pro-Russian hacking groups have exploited a security vulnerability in the WinRAR archiving utility to launch a phishing campaign, targeting compromised systems. The attack uses archive files exploiting the WinRAR vulnerability to execute a Batch script, enabling remote access for attackers, then a powershell script steals data, including login credentials from Chrome and Edge, which is then exfiltrated via a legitimate web service. This incident is part of a broader increase in cyber threats, particularly from Russian nation-state actors, with evolving tactics observed in phishing operations, notably focusing on Ukraine. Ukrainian cybersecurity agencies reported active threat groups, including Turla and APT29. Despite a decrease in total cyber incidents, the sophistication and intensity of attacks remain concerning.

    Log in to Reply
  10. Kelly Conger says

    October 17, 2023 at 8:15 pm

    Title: Fairfax data breach exposes medical records
    Link: https://cybernews.com/news/fairfax-data-breach-exposes-medical-records

    A data breach at Fairfax Oral and Maxillofacial Surgery, a dental surgery practice with several locations throughout Virginia, has exposed the medical records of over 200,000 patients. The breach was discovered in May 2023, and the company has notified affected patients and offered them a year of free identity protection services. The exposed data includes names, full dates of birth, driver’s licenses, Social Security numbers, health insurance information, and medical history details. Fairfax is investigating the breach and working with law enforcement to apprehend the perpetrators. This is the latest in a series of data breaches at healthcare organizations in recent years. These breaches highlight the importance of healthcare organizations taking steps to protect their patients’ personal and medical information.

    Hospitals may have avoided the Y2k bug, but ransomware and phishing are still a MAJOR problem.

    Log in to Reply
  11. Akiyah says

    October 17, 2023 at 11:13 pm

    MGM is still in the news for the security attack in suffered between September 10 and September 20. It is estimated that the company has lost an estimated 100 million dollars due to it’s services being comprised, limited, and/or shutdown. MGM has yet to confirm whether or not it was the victim of a ransomware attack. If it was a ransomware attack , do you think MGM should have paid the ransom? Do you think companies should have the authority (alone)to risk client /customer data being exposed ?

    Article: https://abcnews.go.com/Business/wireStory/cyberattack-mgm-resorts-expected-cost-casino-giant-100-103784725

    Log in to Reply
  12. Ashley A. Jones says

    October 17, 2023 at 11:55 pm

    Discord as a Medium for Payloads

    Nation-state hacking groups have been using Discord’s CDN to host malware, pull sensitive data from the app and facilitate data exfiltration through webhooks. There was evidence found of an artifact targeting Ukrainian critical infrastructures but this is still speculation. The use of Discord for APT malware campaigns is still in its early stages and is limited to data grabbers that can be bought from online sites. An example of this threat is through a phishing attack via email using MS OneNote and once the file is opened and the link is clicked, VBS is executed extracting and running a PowerShell script then downloading another PowerShell script from a GitHub repository. Ultimately, PowerShell uses a Discord webhook to exfiltrate system metadata. Since the initial file is stored in the GitHub repository, a more advanced malware could be delivered at a later time… persistence

    Article Link: https://thehackernews.com/2023/10/discord-playground-for-nation-state.html

    Log in to Reply
  13. Erskine Payton says

    October 18, 2023 at 2:35 pm

    Erskine Payton
    In the News Article- Week 8
    MIS 5206
    Temple University

    The Fake Browser Update Scam Gets a Makeover

    https://krebsonsecurity.com/2023/10/the-fake-browser-update-scam-gets-a-makeover/

    The scam dubbed ClearFake was used to ack WordPress sites tricking them into thinking they needed to update the browser before viewing content. The fake browser tells the hacker what browser you are using and the malware guides to a fake page informing you of an available update. There has been an updated version showing how the malware has evolved. Once stored on CloudFare, where the malicious code was once stored was blocked. The culprits then started storing file on the Binance Smart Chain (BSC) a technology designed to run decentralized apps and “smart contracts,” or coded agreements that execute actions automatically when certain conditions are met. This is how they were able to circumvent Cloudflare.

    The scripts attached themselves to hacked WordPress sites and created a new smart contact on the BSC and had a starting with a unique, attacker-controlled blockchain address and a set of instructions that defines the contract’s functions and structure. When that contract is queried by a compromised website, it will return an obfuscated and malicious payload.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Unit 01: Understanding an Organization's Risk Environment (5)
  • Unit 02: Case Study 1 – Snowfall and a stolen laptop (2)
  • Unit 02: Data Classification Process and Models (6)
  • Unit 03: Risk Evaluation (6)
  • Unit 04: Case Study 2 – Autopsy of a Data Breach – The Target Case (4)
  • Unit 05: Creating a Security Aware Organization (6)
  • Unit 06: Physical and Environmental Security (6)
  • Unit 08: Case Study 3 – A Hospital Catches the "Millennium Bug" (3)
  • Unit 09: Business Continuity and Disaster Recovery (6)
  • Unit 10: Network Security (6)
  • Unit 11: Cryptography, Public Key Encryption and Digital Signature (6)
  • Unit 12: Identity Management and Access Control (6)
  • Unit 13: Computer Application Security (6)
  • Welcome (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in