Tag Archive for: Assets

Newly Introduced HackerOne Assets Goes Beyond Attack Surface Management To Close Security Gaps


SAN FRANCISCO, October 13, 2022: HackerOne, the leader in Attack Resistance Management, today announced the general availability of its HackerOne Assets product. Assets combines the core capabilities of Attack Surface Management (ASM) with the expertise and reconnaissance skills of ethical hackers to bring visibility, tracking, and risk prioritization to an organization’s digital asset landscape. Research from ESG
revealed that 69% of organizations have experienced a cyberattack through the exploit of an unknown, unmanaged, or poorly managed internet-facing asset. Assets form a key part of HackerOne’s Attack Resistance Management portfolio that aims to discover unknown assets and vulnerabilities and close organizations’ security gaps.

With Assets, customers can manage both the discovery and testing of assets in a single platform. The solution blends security expertise with asset discovery, continuous assessment, and process improvements to reduce risk. HackerOne’s community of ethical hackers enrich the asset and scan data and analyze it themselves, ensuring that newly found assets are tested for risk and mapped according to their metadata. Once the assets have been identified and ranked for risk, security teams can use these insights to initiate pentests on newly discovered assets and add assets to their bug bounty scope.

“HackerOne Assets solves for the inefficiencies in traditional ASM scanning” explained Ashish Warty, SVP of Engineering at HackerOne. “It’s impossible for security teams to see their entire attack surface, while cloud transformation, agile product cycles, and mergers and acquisitions keep the threat landscape growing. By combining attack surface management with the creative power of the ethical hacking community, Assets reduces manual work, increases the accuracy of scanning results, and speeds up time to remediation by prioritizing based on real world risk.”

“Having in-depth visibility of our attack surface is a core part of our security strategy,” said Roy Davis, Lead Security Engineer at Zoom. “With HackerOne Assets and the insights it brings from the hacking community, our security team has been able to effectively prioritize those…

Source…

New parasitic malware found to be stealing digital assets from scammers


Analysts at Trend Micro have uncovered malware that latches onto scam websites belonging to digital asset fraudsters. Called Water Labbu, the malware has been identified to have affected over 45 scam websites, stealing $316,000 in what was described as a thief stealing from thieves.

The modus operandi of the malware is parasitic, as it poses as a decentralized application (DApp) to gain access to digital assets. The report notes that it does this by “injecting malicious JavaScript code” and sending a request after identifying that a wallet has a sizable amount of digital assets.

“The request is disguised to look like it was being sent from a compromised website and asks for permission (token allowance) to transfer a nearly-unlimited amount of USD Tether (USDT),” read the report.

The scammers are misled to believe that a DApp issued the request, often failing to read through the details. In reality, the granted permission belongs to an address controlled by Water Labbu, which is used to drain the funds from the victim’s wallet.

Water Labbu’s method of pilfering digital assets differs from the usual method used by scammers. Scammers are known to use social engineering tactics like building trust over several months to fleece victims of their virtual currencies.

However, the bad actors behind Water Labbu do not have to build fraudulent investment websites. Instead, they inject malicious Javascript code into websites belonging to other scammers.

Malware is the bane of digital assets industry

A Chainalysis report submitted that malware was the sole culprit for 75% of hacks in the industry since 2017, with even low-level cybercriminals employing them in their schemes. Cyble Research Labs drew attention to malware spreading through YouTube known as Pennywise, which was embedded in a free block mining software as part of a free BTC mining tutorial.

The malware was reported to attack wallets holding Zcash (ZEC) and Ethereum (ETH), even targeting cold digital asset wallets. At the start of the year, a pirated copy of “Spider-Man: No Way Home” was revealed to be the primary source of a Monero mining malware responsible for latching onto the personal computers of…

Source…

CIA’s ‘weak’ websites led to capture execution of assets in Iran, China: Report


A flaw in the ‘covert’ websites of the Central Intelligence Agency compromised the US spy agency’s assets in countries like Iran and China, according to a report by security researchers. The researchers claimed that the internet security flaw led to the deaths of more than two dozen US assets in China in 2011 and 2012 while other assets in Iran were either executed or imprisoned by the regime. The research carried out by security experts at the University of Toronto’s Citizen Lab also said that the flaw could have been detected by an amateur sleuth, British website The Guardian reported. The security experts began probe following a tip from a Reuters journalist.

Joel Schectmann, the Reuters journalist had reportedly tipped the research group about a CIA asset in Iran who had been captured and later served seven years in prison after using the ‘fatally insecure network’. In 2018, two Yahoo News reporters first reported that a system used by the agency to communicate with its assets had been compromised by Iran and China.

However, the researchers said it was not publishing the full report as a move to avoid putting more CIA assets at risk. But the revelations have led to the agency’s handling of digital safety measures to come under scanner. According to the report, at least 885 websites were identified to have been used by the CIA. They were purportedly websites concerned with news, healthcare, weather etc.

The researcher group said an amateur sleuth could have mapped the entire CIA network and attributed to the US administration. According the report, these websites were active between 2004 and 2013. They were not used by the agency recently but a subset of these websites were still linked to the active employees or assets.

Calling out the ‘reckless construction’ of the infrastructure of CIA, the Citizen Lan claimed that the loophole led to the identification and the execution of the agency assets, while risking the lives of countless other individuals linked to it.

A spokesperson of the CIA said the agency takes it obligations to protect the people work with it extremely…

Source…

Cybersecurity: Everything You Need to Know to Protect Your Assets


Last Saturday night, a French hospital suffered a ransomware-type cyberattack leading to no or limited access to most of its computers and medical devices. The attack is still ongoing. The criminals are demanding a ransom of $10 million to remove the digital lock from the workstations of the hospital staff. This unfortunate event reminds us that hospitals are not the only ones at risk. Any organization can be a target. Therefore, how can you secure your assets? In this special report, you will find a recap of the most common cyber threats and some recommendations on how to better protect your systems from them.

Lindsay Clark, Eduardo Di Monte and Camille Rustici contributed to this special report.

Cyber attacks are frequent and the healthcare sector is increasingly subject to hacking via ransomware. The hackers did not even stop their attacks during the COVID-19 pandemic.

In 2020, a ransomware attack struck the digital equipment of a major hospital chain in the US. All the hospital’s computers suddenly shut off, medical files were lost and many of the patients had to be sent to other facilities.

Cyberattacks in the healthcare sector are a matter of life and death. A woman even died in Germany from delayed treatment after hackers penetrated the hospital’s computers. It was the first fatality from a ransomware attack.

Most of these attacks have similarities. They are often triggered at night or during weekends when the teams on call are less numerous. But let’s go back in time to know more about ransomware.

1/ Beware of Ransomware

In 2017, nearly 130,000 people in more than 100 countries were victims of a massive worldwide ransomware attack. The WannaCry cyberattack infected U.K. National Health System, Spanish Telcommunication company Telefonica, French Automaker Renault, German railway company Deutsche Bahn. The goal of the attack was to encrypt the target’s data pending payment of a ransom. This attack is one of the first to bring a new cyber threat to the forefront: ransomware.

What is a Ransomware?

During a ransomware attack, malware block access to your data and threaten to delete or disclose it unless you pay a ransom. Your content is…

Source…