Hackers for sale: what we’ve learned from China’s enormous cyber leak
The Guardian: A significant leak from the Chinese cybersecurity company I-Soon has unveiled detailed operations of Beijing-backed hackers, revealing the company’s involvement in hacking government agencies and institutions across Asia and within China itself, including sensitive regions like Xinjiang and Tibet. The data indicates that I-Soon’s primary clients were local and provincial police departments, as well as state security agencies, seeking cybersecurity services for protection and surveillance. The leaked documents exposed the firm’s development of Trojan horses, capabilities for remote computer access, and methods to bypass security measures like two-step authentication. Additionally, the leaks highlighted internal issues within I-Soon, including employee dissatisfaction over low wages, poor management, and the difficulty of securing contracts. This disclosure provides a rare glimpse into the extensive hacking operations linked to the Chinese government, along with the challenges faced by companies operating within this secretive industry.
Feds say AI favors defenders over attackers in cyberspace — so far
CyberScoop: As AI tools become increasingly prevalent, the debate continues among researchers about whether AI will ultimately benefit cyber attackers or defenders more. Currently, U.S. officials at the forefront of cybersecurity assert that AI is favoring the defense. Cynthia Kaiser of the FBI’s cyber division and Rob Silvers of the Department of Homeland Security both highlighted how AI is being utilized effectively for defense, aiding in activities such as detecting malicious network activity and enhancing incident response. Despite concerns that generative AI could aid attackers in finding vulnerabilities and crafting exploits, evidence suggests that defenders are deriving more benefits at the moment. However, advanced hacking groups are experimenting with AI, and while their gains have been modest according to a joint report from Microsoft and OpenAI, the situation could change. The officials cautioned that the advantageous position of defenders is not guaranteed to last, emphasizing the need for continuous vigilance. They also noted the potential for AI to complicate the attribution of cyberattacks, a challenge that had previously seen significant progress but may become more difficult again as attackers adopt AI to conceal their activities and origins.
A Cyberattack on a UnitedHealth Unit Disrupts Prescription Drug Orders
NYTimes ($): A cyberattack targeted Change Healthcare, a division of UnitedHealth Group’s Optum, impacting prescription orders at thousands of pharmacies due to a disruption in the digital network connecting clients. Identified as potentially originating from a foreign country, the attack has left UnitedHealth Group scrambling to restore services without a definite timeline for resolution. Change Healthcare, responsible for processing 15 billion transactions annually, plays a critical role in the U.S. healthcare system, affecting not just prescriptions but also dental, clinical, and other medical services. The incident has highlighted the vulnerability of healthcare data and the potential consequences on patient care and personal information security. Despite the widespread disruption, including challenges faced by U.S. military pharmacies overseas, Change Healthcare claims to have largely mitigated the impact, assuring that most pharmacies have continued filling prescriptions. The motives behind the attack remain unclear, with speculations ranging from ransomware to intentions of causing systemic healthcare disarray.
Update: ALPHV ransomware group, also known as BlackCat, has claimed responsibility for the Change Healthcare attack.
In 2006, a significant data breach incident was reported involving Deloitte & Touche, where an employee accidentally left an unencrypted CD containing the personally identifiable information (PII) of 9,000 McAfee employees in an airline seat pocket. McAfee was notified of the loss 27 days after the incident occurred. (source)
The number of ransomware victims paying ransom demands has dropped to a record low of 29% in the final quarter of 2023. (source)