InfoSec Round-Up Sep 24th
Ministry of Defence Breach, REvil Scam & Mobile Security
This is the Hut Six InfoSec Round-Up, where we look at some of the most pressing matters, latest trends, and industry news from across the world of information security.
REvil Scams Affiliates
The ransomware-as-a-service operation REvil was reportedly using a secret backdoor function to cut affiliates out of ransomware negotiations with victims, thus securing 100% of funds for themselves.
The now defunct ransomware operation, which launched in early 2019 and vanished in July of 2021, worked on the basis of ‘affiliates’ using the software to breach and encrypt victims’ systems, a ransomware being negotiated, then the proceeds being divided between both the affiliates and the software developers.
Though, according to cyber security researchers, as well as users on criminal forums, REvil had in several instances changed its tactics by cutting out the middleman and conducting its own secret negotiations, unbeknownst to affiliates.
With the ransomware gang believed to have stolen over $100 million in 2020 alone, having claimed victims that include Travelex, Acer, Quanta Computer, and meat processing giant JBS, the phrase ‘no honour amongst thieves’ comes to mind.
Yelisey Boguslavskiy, head of research at Advanced Intel stated on this discovery, “This evidence correlates with the underground’s approach to REvil as a talkative and perpetually lying group that should not be trusted by the community or even by its own members.”
Lithuania Urges Cyber Caution
Following a report by Lithuania’s National Cyber Security Centre, the country’s Defence Ministry has warned consumers they should throw away Chinese made phones over serious security concerns.
Having tested Chinese manufactured 5G devices, the report claims that one Xiaomi phone in question, not only transferred encrypted data to a server in Singapore, but also had built-in censorship tools, discovering more than 449 terms (including “Free Tibet”) that could be censored – capabilities, although not active, could be remotely enabled.
As well as this, it was also found that a certain Huawei device “directs users to third-party e-stores where some of the applications have been assessed by anti-virus programs as malicious or infected with viruses”.
The recommendation that citizens dispose of, and not buy new Chinese phones comes at a time of mounting tensions between Lithuania and China following an incident regarding the legitimacy of Taiwan as a nation independent from mainland China.
With both device manufacturers denying such claims, a representative of Xiaomi has stated “[our] devices do not censor communications to or from its users… Xiaomi has never and will never restrict or block any personal behaviours of our smartphone users.”
MoD Data Breach
The UK’s Ministry of Defence (MoD) has reportedly suffered two separate data breaches that have exposed the details of Afghan citizens.
Both incidents involving the accidental copying in of email recipients, the exposed data included the personal information of over 25 Afghan interpreters who worked for British forces, as well as information relating to 55 Afghans who may have been eligible for UK relocation.
Potentially putting people at risk of reprisals from the newly installed Taliban rule, the mistakes were apparently quickly realised with the MoD sending another message asking recipients to delete the first email only 30 minutes hence.
With the MoD having apologised for the breach, one of the individuals affected stated on the incident, “This mistake could cost the life of interpreters, especially for those who are still in Afghanistan.”
Thank you for reading this edition of Infosec Round-Up. Please be sure to subscribe to the Hut Six YouTube Channel to keep up to date with the latest news and see all our latest information security videos.
Security Awareness for your Organisation
Enjoyed our blog? Learn more about how Hut Six can help improve you security awareness with training and simulated phishing. Start a free trial now, or book a meeting with one of our experts.
Featured
Why Organisations Need an Email Security Policy
An email security policy is a document describing how an organisation's email system should, and most importantly, should not be used.
Human Error in Information Security
When Human Error is found in information security, it is often avoidable errors that allow much larger consequential problems to arise.
Investing in Information Security Awareness Training
Investing in Information Security Awareness Training - educating people against cyber threats should be considered essential for any organisation operating in 2021
How Secure is Microsoft Teams?
How Secure is Microsoft Teams? Information Security blog by Information Security Awareness solution provider Hut Six Security
Best Ways To Ensure Enterprise Data Regulation
Best Ways To Ensure Enterprise Data Regulation guest blog by technivorz.com and information security awareness solution Hut Six Security.
Writing a Disaster Recovery Plan
Writing a Disaster Recovery Plan: information security planning blog by information security awareness solution provider Hut Six Security.
What Policies Do I Need for a Security Program?
Security program policies blog by information security awareness training provider Hut Six Security.
Preparing for Cyber Essentials with Information Security Awareness Training
Security awareness training for Cyber Essentials blog by information security awareness training provider Hut Six Security.
Information Security Awareness Training in 2021
Information Security Awareness Training in 2021 blog by information security awareness training platform Hut Six Security
The Five Best VPNs for Work
What are the best VPNs for work? - VPN review blog by security awareness training provider Hut Six Security.