12/06/2024 | News release | Archived content
Don't miss the Linux Foundation's deep dive into open source software security. Plus, cyber agencies warn about China-backed cyber espionage campaign targeting telecom data. Meanwhile, a study shows the weight of security considerations in generative AI projects. And get the latest on ransomware trends, financial cybercrime and critical infrastructure security.
Dive into six things that are top of mind for the week ending Dec. 6.
Improperly secured developer accounts. Lack of a standard naming schema for software components. The persistence of legacy software.
Those three issues put the reliability and security of free and open source software (FOSS) at risk, a new Linux Foundation study has found.
Published this week, "Census III of Free and Open Source Software - Application Libraries" is based on about 12 million observations of FOSS at 10,000-plus companies. Its aim: to provide a better understanding of FOSS use and security challenges, given FOSS' widespread adoption globally.
"Our goal is to not only provide an updated list of the most widely used FOSS, but to also provide an example of how the distributed nature of FOSS requires a multi-party effort to fully understand the value and security of the FOSS ecosystem," the study reads.
Data sharing, coordination and investment are keys to preserving the value of FOSS, which has become critical for the digital economy, the authors wrote.
Here are more details about the three key security issues identified in the study:
For more information about open source security:
Security teams in charge of defending networks and communications infrastructure should take steps to prevent attacks from China-affiliated hackers that have recently compromised the networks of major global telecom providers.
So said cyber agencies from Australia, Canada, New Zealand and the U.S. this week in a joint document that offers network and communications-infrastructure engineers recommendations for strengthening network visibility and hardening systems.
The silver lining: The cyberattackers are exploiting known, existing weaknesses in their victims' infrastructure. "No novel activity has been observed," reads the publication, titled "Enhanced Visibility and Hardening Guidance for Communications Infrastructure."
"Patching vulnerable devices and services, as well as generally securing environments, will reduce opportunities for intrusion and mitigate the actors' activity," the document adds.
These are some of the recommendations for defenders of networks and communications systems.
The joint document doesn't name the hacking group. However, The Wall Street Journal identified it as Salt Typhoon when, citing anonymous sources, it reported in September that the group had breached several U.S. telecoms, including Verizon and AT&T.
Salt Typhoon's main goal is reportedly to carry out cyber espionage activities on behalf of the Chinese government. Salt Typhoon's cyber espionage campaign is "ongoing" and authorities feel there is still much to be discovered about it, a Cybersecurity and Infrastructure Security Agency (CISA) official told reporters this week.
"We cannot say with certainty that the adversary has been evicted," CISA official Jeff Greene said during a press call, as quoted by Politico. According to NBC News, Greene also recommended that Americans use encrypted messaging apps to protect themselves from Salt Typhoon.
Last month, CISA and the FBI described the Chinese-government backed cyber espionage campaign as "broad and significant," resulting in the theft of customer call records data; the compromise of private communications of government officials and politicians; and the copying of law enforcement information related to wiretap requests.
For more information about Salt Typhoon and its ongoing cyber espionage campaign:
As organizations deepen their generative AI use, security and data protection considerations feature prominently in their plans - including whether to build their own generative AI infrastructure.
That's according to the Linux Foundation's "Shaping the Future of Generative AI" report, which polled 316 respondents familiar with their organizations' generative AI adoption.
"Security remains a cornerstone of this transformation. As organizations embrace GenAI, safeguarding sensitive data and ensuring compliance with industry standards have become critical imperatives," reads an Open Source Security Foundation blog about the report.
Among organizations deploying their own generative AI infrastructure, security and data control ranked as the top motivation for doing so. Three other data security priorities - data sovereignty; privacy; and intellectual property protection - ranked third, fifth and eighth, respectively.
(Source: Linux Foundation's "Shaping the Future of Generative AI," November 2024)
Meanwhile, respondents, who were based primarily in the Americas, Europe and Asia-Pacific, ranked security as the second most important criteria when choosing a generative AI model or tool, with privacy and regulatory compliance ranking fourth and fifth, respectively.
(Source: Linux Foundation's "Shaping the Future of Generative AI," November 2024)
Furthermore, respondents, who included executives, developers, consultants, data scientists and operations staffers, also ranked security and data protection risks high when asked about their concerns when adopting generative AI models and tools.
(Source: Linux Foundation's "Shaping the Future of Generative AI," November 2024)
For more information about AI security, check out these Tenable blogs:
Here's a report that cyber teams at critical infrastructure organizations will likely find useful and informative.
The topic: How CISA's red team breached a critical infrastructure organization's IT network and then compromised a domain controller and a human machine interface (HMI), which served as an operational technology (OT) dashboard.
The unnamed organization requested that CISA conduct the red team assessment (RTA), in which CISA acted like a cyberattacker to probe the organization's cybersecurity detection and response processes and procedures.
In broad strokes, here are some of the ways in which CISA's red team circumvented the critical infrastructure organization's cyber defenses:
Timeline of CISA's red team cyberthreat activity
(Source: CISA's advisory "Enhancing Cyber Resilience: Insights from CISA Red Team Assessment of a US Critical Infrastructure Sector Organization," November 2024)
Key findings include:
Some of CISA's mitigation recommendations for cybersecurity teams are:
To get all the details, read CISA's advisory "Enhancing Cyber Resilience: Insights from CISA Red Team Assessment of a US Critical Infrastructure Sector Organization."
To learn more about securing OT systems in critical infrastructure environments, check out these Tenable resources:
Here's a stat to remind your organization to make sure its virtual private network (VPN) system is configured correctly, has no vulnerabilities and is up to date: Almost 30% of ransomware attacks in the third quarter compromised insecure VPNs to gain initial access, sharply up from about 5% in the second quarter.
That's according to Corvus Insurance's "Q3 2024 Cyber Threat Report," which said many of the ransomware attacks in Q3 leveraged outdated VPN software and poorly protected VPN gateways.
Specifically, organizations shouldn't allow the use of common usernames and weak passwords in their VPN user accounts, and should protect them with multi-factor authentication.
"The persistence of weak credentials and lack of multi-factor authentication on VPN gateways has facilitated these attacks, making secure access controls crucial for mitigating threats," reads the report.
The Corvus ransomware report also found that five ransomware groups - RansomHub, PLAY, LockBit 3.0, MEOW and Hunters International - accounted for 40% of all attacks. However, the ransomware ecosystem remains diverse, with almost 60 groups active during the third quarter, which makes the threat landscape more complex for cyber teams to manage.
For more information about ransomware prevention:
VIDEO
Ultimate Guide to Ransomware for Businesses (TechTarget)
A five-month Interpol operation led by South Korea has led to the arrest of 5,500-plus suspected financial cybercriminals and to the seizure of more than $400 million in assets.
With Operation HAECHI, Interpol and law enforcement partners from 40 countries went after cyber crooks involved in a variety of financial scams, including:
International collaboration is key to fighting financial cybercrime, which has devastating effects on its victims, Interpol Secretary General Valdecy Urquiza said in a statement.
"It's only through united efforts that we can make the real and digital worlds safer," he said.