It's the beginning of a new week, and that means a new round up of what's been going on in the world of cyber security and data protection over the last 7 days!
Space enthusiasts will need to be careful when viewing images from the James Webb Telescope. A new malicious campaign called “GO#WEBFUSCATOR” is spreading hidden malware through phishing emails, malicious documents and James Webb images. The malware is written in the Golang language, a cross-platform programming language which is particularly resistant to reverse engineering and analysis. The dropped payloads do not flag up as malicious on antivirus engines using the VirusTotal platform. (Bleeping Computer)
Five Google Chrome extensions with 1.4 million downloads have been found stealing tracked browsing activity, according to threat analysts from McAfee. These extensions track e-commerce site visits and disguise the visitors cookie to appear as a referral link, earning the author a fee. As Netflix Party, Netflix Party 2, Full Page Screenshot Capture, FlipShope, and Auto Buy Flash Sales still perform their promised functionality, it is hard to notice the malicious activity. To further avoid detection, the extensions have a 15 day delay before beginning the malicious activities. Users are advised to remove these extensions from their browsers. (Bleeping Computer)
The average professional now has to juggle 100 passwords, which has led to the growth in popularity of password management tools. With 33 million users, LastPass is one of the most successful but a recent breach led to the theft of source code and proprietary information. No master passwords were stolen, meaning that there isn’t currently a direct threat to customer credentials and password vaults, but the theft of source code in particular is cause for concern as in December 2021 a LastPass breach led to master passwords being compromised, and the company has not said exactly what source code was taken. (CPO Magazine)
The recent cyber attack on NHS 111 service providers continues to wreak havoc on the healthcare system. Many services are only now beginning to recover, one month after the attack was first discovered. Doctors are having to switch to pen and paper records, which is creating massive paperwork backlogs and large delays for patients, disrupting hundreds of thousands of medical records. (Computing)
Local authorities in the UK are experiencing over 10,000 attempted or successful cyber attacks every single day, representing a 14% increase year on year according to new research. Phishing attacks, according to 75% of respondents, are the most common attack type and usually lead to ransomware infections. DDoS threats were also the top threat for a further 6% of respondents. Local government authorities have paid out £10 million over the last 5 years as a result of cyber incidents, while 85% of authorities have increased their spending on cyber security to counter the threats. (Computer Weekly)
A new Forrester report has found that 75% of respondents find securing their cloud environments challenging despite a majority agreeing that ensuring safety is vital. Challenges that hinder the development of cloud security within organisations include struggling with centralised security controls across multi-cloud environments and securing both in-office and remote devices, and simply lacking the internal skills and qualifications. Organisations that fail to overcome their security challenges are far more vulnerable to cyber attacks, leading to negative customer experiences, decreased profitability, and losing a competitive edge. (Cyber News)
Google has released updates to fix a zero-day vulnerability that is being exploited in the wild. The CVE-2022-3075 vulnerability involves insufficient data validating in Mojo, a collection of runtime libraries providing the mechanism for inter-process communication. This is the sixth zero-day vulnerability on Chrome to be patched this year, with users highly recommended to update their browsers. (The Hacker News)