Welcome to the Winter 2022 CPSC 329/602 blog! Looking forward to some fun and interesting discussions.
Please reserve the topic for your blog post by adding a comment to this post, stating the topic you plan to cover, a short justification, and one or more links to external cites as evidence that your topic has indeed occurred in the last 7 days. We will approve your requests or offer comments if it is not deemed to be suitable. The main criteria for suitability are relevance to the course, whether the topic is sufficiently current, and whether it has already been covered by another student.
Please post your topic reservation requests at most 72 hours before your posting date and at least 24 hours, excluding weekends. For example, if you are posting on a Monday make sure to submit your reservation request by Friday at the latest. I will be sure to approve any outstanding requests by 4:30 PM every Monday through Friday.
When you are ready to make your post, please create a new post as opposed to commenting on this one – comments on this post will be reserved for topic reservations and approvals. Note that you can post any time on the day you reserved.
I intend for my blog post to touch on an article from January 11 published on threatpost.com.
The subject discusses growing concern over malware-infested USB sticks being shipped to government organizations and private businesses, posing as packages originating from federal departments. These heinous attempt to infect and damage critical economic infrastructure is serious as the pandemic has made easy-access to the internet critical. Malware has been a growing issue since the beginning of the pandemic and its instigators seek to exploit and manipulate vulnerable individuals and organizations for their own benefit.
I will post my blog on January 17. The following link leads to the article I will elaborate further on by said date. The following link is the article in question.
https://threatpost.com/fin7-mailing-malicious-usb-sticks-ransomware/177541/
Approved!
I intend for my blog post to elaborate on the article from itpro.co.uk published on January 13 RE:Golang Ransomware Cross-Platform Attacks
The article discusses the means which attackers use Golang to attack multiple platforms (Windows/Linux) for more efficient attacks. These attacks re-use malicious code on multiple platforms which allows for a more efficient/effective attack on a larger base of users. These attackers require bitcoin payment for release of malware (remove ransomware from important files) which also makes it much harder to shut these individuals down as linking payments to the individual becomes complicated. I might reference UofC’s ransomware history alongside some other exmaples to demonstrate the significance/impact/importance/relevance of these security issues.
My blog post will be submitted on January 18 and the reference link to the article is: https://www.itpro.co.uk/security/ransomware/361965/ransomware-rewritten-golang-to-target-windows-linux-users
Approved!
Hey everyone,
I am planning to write about cyberwarfare. More specifically, I want to focus on how some governments had used the internet as a form of warfare thereby avoiding explicit aggression against nation-states, undermining democracy in western countries, and spreading propaganda.
Sources:
https://www.cbsnews.com/news/ukraine-cyber-attack-russia-us-nato-donbas-war-amabssador-markarova/
https://citizenlab.ca/2022/01/project-torogoz-extensive-hacking-media-civil-society-el-salvador-pegasus-spyware/
https://www.theglobeandmail.com/politics/article-spy-agency-briefing-mps-to-beware-of-influence-operations-from-china/
https://www.virusbulletin.com/uploads/pdf/magazine/2021/202112-collector-stealer.pdf
Posting date: January 17th
Approved!
For my blog post I wish to talk about an event that has articles posted on WIRED, Krebson security, and threatpost. These articles were posted on January 14th and discusses how Russian security arrested a ransomware gang called REvil.
The articles talk about how and why the Russian government arrested this group, as the US government had previously asked them to. The articles state that a potential reason they did this was because of the tensions at the Ukraine border. The group REvil has previously been involved in numerous ransomware attacks on large American companies, most notably on the Colonial pipeline attack which caused the price of gasoline to rise on the east coast for a while.
I will post my blog post on January 19, 2022 and the links to the articles above are:
https://threatpost.com/russian-security-revil-ransomware/177660/
https://www.wired.com/story/russia-revil-ransomware-arrests-ukraine/
https://krebsonsecurity.com/2022/01/at-request-of-u-s-russia-rounds-up-14-revil-ransomware-affiliates/
Approved. Note, though that your topic is the same as Daniel’s. This is my error – unfortunately I saw his comment first while yours was stuck in the waiting for approval queue. So, you and Daniel can both post on this topic and going forward I’ll be sure to look for unapproved comments that aren’t yet appearing in the blog before approving topics!
I intend for my blog post to cover an article posted on threatpost.com about a recent EA FIFA Ultimate Team account takeover resulting in valuable accounts being stolen posted on January 12th.
Using some pretty basic social engineering, attackers managed to pressure customer support to change the emails of valuable accounts (worth sometimes in the 1000’s of dollars) without the account holders consent, bypassing normal checks and emails that would normally be sent. This resulted in said accounts being cleared of their resources, and shows a pretty clear example of how humans can be the weakest link in a security system.
My blog post will be submitted on January 18th, and the reference link to the article is: https://threatpost.com/phishers-ea-gamers/177575/ as well as the press release from EA: https://www.ea.com/en-gb/games/fifa/fifa-22/news/pitch-notes-fifa-22-account-takeover-update
Approved!
For my blog post I’d like to discuss Russia’s arrest of numerous members of the “REvil” ransomeware group. This group has been responsible for numerous cyberattacks in the past, as well as one of the arrested individuals supposedly being responsible for the attack on the Colonial Pipeline. This is very relevant, as although some of their attacks happened last year, the attacks were impactful and their arrests are recent (last Friday).
https://www.washingtonpost.com/world/2022/01/14/russia-hacker-revil/
Approved!
Daniel, note that you and Kevin unfortunately both have the same topic, as I missed his topic request while it was held up in the approval queue. Because it was my error you can both post on the same thing.
For my blog post, I plan to provide an overview and explain an article from threatpost.com and forbes.com.
The article investigates a contemporary security model called Zero-trust that emphasizes the importance to “trust no one, verify eveyone.” Given the ever-changing landscape of online access from in-office desktops to mobile phones, it is important now more than ever to develop security protocols that constantly verify users and ensure they aren’t infiltrators. With these systems, cyber attackers will be confined to smaller areas of the network environment allowing security teams to prevent damage earlier.
My blog post will be scheduled for January 18th. The following links are the sources of my information:
https://threatpost.com/zero-trust-future-security-risks/177502/
https://www.forbes.com/sites/forbestechcouncil/2022/01/13/why-you-need-a-zero-trust-cybersecurity-plan/
Approved!
I am planning to write about the future of user’s privacy and security on Web 3, which I came across while searching How-To Geek. More specifically, I will give a brief explanation about Web 3 and how it benefits user’s privacy and security by decentralizing the data storage.
Here is some links about my topic:
https://www.howtogeek.com/779970/what-is-web3%C2%A0/
https://hackernoon.com/exactly-how-secure-is-web-3
Approved!
I would like to rewrite about WordPress’ Plug-in Vulnerabilities. As someone who possesses little computer science knowledge, I would like to “dumb down” this current event so that “anyone” can somewhat become aware of this cybersecurity vulnerability – especially how CPSC 329 is using WordPress. If this focus is not “specific enough”, I would love to hear thoughts on how I can approach this topic.
References:
https://itwire.com/security/warning-over-increasing-flaws-in-third-party-wordpress-plugins.html
https://www.theweek.in/news/biz-tech/2022/01/13/what-the-log4j-vulnerability-is-capable-of-and-why-you-should-be-worried.html
https://itbrief.co.nz/story/wordpress-vulnerabilities-more-than-doubled-in-2021
I would like to rewrite about WordPress’ Plug-in Vulnerabilities.
As someone who possesses little computer science knowledge, I would like to “dumb down” this current event so that “anyone” can somewhat become aware of this cybersecurity vulnerability – especially how CPSC 329 is using WordPress. If this focus is not “specific enough”, I would love to hear thoughts on how I can approach this topic.
References: https://itwire.com/security/warning-over-increasing-flaws-in-third-party-wordpress-plugins.html
https://www.theweek.in/news/biz-tech/2022/01/13/what-the-log4j-vulnerability-is-capable-of-and-why-you-should-be-worried.html
https://itbrief.co.nz/story/wordpress-vulnerabilities-more-than-doubled-in-2021
My attempts to correct my previous comments’ formatting has failed hahaha! My apologies!
No worries – topic approved!
For my blog post, I want to elaborate on a lawsuit that occurred in the UK for £2.3 billion on Facebook. According to the lawsuit, Facebook has set an unfair expectation, by handing over user’s personal data, without giving them adequate compensation for stealing said data, covering the time period from October 1, 2015 to December 31, 2019. I might talk about the importance of privacy regarding social media in general, personal thoughts about the matter, as well as how relevant this lawsuit is about market dominance at the cost of user’s privacy.
Posting Date: January 20, 2022
References:
https://www.theguardian.com/technology/2022/jan/14/meta-sued-for-23bn-over-claim-facebook-users-in-uk-were-exploited
https://www.pymnts.com/legal/2022/uk-lawsuit-claims-facebook-exploited-personal-data-of-44-million-users/
https://www.mirror.co.uk/news/uk-news/every-uk-facebook-user-could-25954863
Approved!
I will be writing about a Chinese cyber hacker group called “Earth Lusca”. They have been spying on government institutions, big organizations, and high-profile targets worldwide potentially for the interest of the Chinese government. They have also been involved with financial attacks for their own gain. I will be going in detail about how these attacks are being orchestrated, what they are gaining out of it, and how these attacks can potentially be minimized/stopped.
Posting Date: Thursday, January 20, 2022
References:
https://therecord.media/earth-lusca-threat-actor-targets-governments-and-cryptocurrency-companies-alike/
https://thehackernews.com/2022/01/earth-lusca-hackers-aimed-at-high-value.html
https://www.trendmicro.com/en_id/research/22/a/earth-lusca-sophisticated-infrastructure-varied-tools-and-techni.html
https://securityaffairs.co/wordpress/126868/hacking/earth-lusca-campaigns.html?utm_source=rss&utm_medium=rss&utm_campaign=earth-lusca-campaigns
Approved!
I am thinking of doing a blog post on a very recent piece of news related to global cybersecurity threats. On January 15th, 2022, Microsoft discovered destructive malware targeting Ukrainian organizations. This malware was found on victim systems in Ukraine, and is being used in cyberattacks against the Ukrainian government. I will also discuss the recent political tensions between the two countries and the ways in which these tensions have led to an increase in cybersecurity threats in the region. My blog post date is Wednesday, January 17th.
Sources:
https://www.microsoft.com/security/blog/2022/01/15/destructive-malware-targeting-ukrainian-organizations/
https://www.nytimes.com/2022/01/16/us/politics/microsoft-ukraine-cyberattack.html
https://www.reuters.com/world/europe/microsoft-says-it-observed-destructive-malware-systems-belonging-several-ukraine-2022-01-16/
It’s a good topic but it looks like Raffay will be covering something similar (https://wpsites.ucalgary.ca/isec-601-f21/2022/01/13/blog-post-reservation/#comment-75). Should be OK, just be sure to cover a different angle on this issue. Your references are different from Raffay’s, and it sounds like you’re already planning to do this.
For my blog, I would like to write about the fictitious cyberattack that the EU used to stress test a Finnish power company. I would elaborate on how disastrous these large scale cyberattacks can be, and why it’s so important to test your systems and create preventative measures. I also plan to discuss how these government run stress tests could positively or negatively affect public perception of their own security and privacy.
Posting Date: January 20, 2022
References:
https://www.bloomberg.com/news/articles/2022-01-15/eu-targets-fictitious-finnish-power-company-in-cyberattack-test
https://www.computerworld.com/article/3647369/uk-government-ignites-debate-over-privacy-vs-safety.html
Approved!
Hi all, For my blog post I would like to cover an article posted on the itworldcanada and techcrunch website. The article’ topic is on open source libraries and how a developer tweaked an open-sourced code as a protest for proper compensation. Besides the security & privacy aspect of tech, I chose the topic to touch on the ethics side and possibly on implications of tech-related subjects being ‘open’.
Reference:
https://www.itworldcanada.com/article/protest-by-open-source-developer-raises-questions-about-compensation-and-ethics/470489
https://techcrunch.com/2022/01/18/open-source-developers-who-work-for-free-are-discovering-they-have-power/
https://www.bleepingcomputer.com/news/security/dev-corrupts-npm-libs-colors-and-faker-breaking-thousands-of-apps/
my blog post’s supposed schedule: Jan 19, 2022
Approved!
For my blog post I intend to talk about a vulnerability in Box’s Multi-Factor Authentication. I will first talk about this instance and a previous instance of a very similar thing happening. Then I will elaborate on the concept of MFA and discuss some benefits and disadvantages of MFA.
https://thehackernews.com/2022/01/researchers-bypass-sms-based-multi.html
https://www.varonis.com/blog/box-mfa-bypass-totp
Post Date: January 21, 2022
Approved!
Hello everyone, the topic I would like to discuss the Log4J exploit. Specifically focusing on the breadth of users affected (this includes personal computers and corporations). I’ll introduce Apache Log4j, its intended uses, and the exploit. There will be code snippets provided from the links.
Links:
https://logging.apache.org/log4j/2.x/security.html
https://threatpost.com/microsoft-rampant-log4j-exploits-testing/177358/
https://security.googleblog.com/2021/12/understanding-impact-of-apache-log4j.html
https://cyber.gc.ca/en/alerts/active-exploitation-apache-log4j-vulnerability
Post Date: January 20, 2021
Approved!
For my blog post I intend to discuss the article on Google Project Zero which discusses some recently addressed issues with zoom and the ability to preform zero click attacks on the app. With the recent extension of online learning, I believe this is extremely current, and also applicable to all of us!
References:
https://googleprojectzero.blogspot.com/2022/01/zooming-in-on-zero-click-exploits.html
Blog Post Date:
Monday Jan 24th (Requesting early to avoid weekend related delays)
Approved!
For my blog post, I wish to write about the vulnerabilities of public Wi-Fi networks and how DNS filtering can prevent threats such as malware, viruses, and other forms of intrusion. I will focus on how this could be implemented so that public Wi-Fi networks can be made safer.
https://thehackernews.com/2022/01/dont-use-public-wi-fi-without-dns.html
Post date: January 21
Approved!
For my blog post, I would like to write about the recently discovered security flaws in China’s mandatory Olympics smarphone application. Specifically, how the app allows for man-in-the-middle attacks, and other key vulnerabilities.
References:
https://citizenlab.ca/2022/01/cross-country-exposure-analysis-my2022-olympics-app/
https://threatpost.com/beijing-olympics-app-flaws-allow-man-in-the-middle-attacks/177748/#:~:text=The%20mobile%20app%20that%20all,user%20information%2C%20researchers%20have%20found.
Blog post date: January 21
Approved!
For my blog post, I plan to write about the vulnerabilities found in medical devices. Given how full hospitals have been recently, I think this is quite a relevant issue.
References:
https://www.zdnet.com/article/more-than-half-of-medical-devices-have-critical-vulnerabilities/
Blog post date: January 21
Approved!
For my blog post, I plan to write about how the white house is now mandating baseline cybersecurity practices across any department that works with national security systems.
https://www.wsj.com/articles/biden-to-expand-national-security-agency-role-in-government-cybersecurity-11642604412?mod=lead_feature_below_a_pos1
I think that this is a interesting topic due to the current nature of US, China & Russia relations.
Blog Post date: Jan 20
Approved!
For my blog post, I plan on writing about a recently discovered bug in apples browsers. Using a function that is designed to let a website know the databases the browser has stored, but only see the name of it. I want to go over how even this small leak can have more then expected consequences for privacy and perhaps give some insight into what the code that caused this may have looked like. https://nakedsecurity.sophos.com/2022/01/18/serious-security-apple-safari-leaks-private-data-via-database-api-what-you-need-to-know/
https://www.macworld.com/article/605562/safari-15-bug-expose-browsing-activity-personal-data.html
Blog Post Date: January 25
Approved!
Hi,
I intend to discuss about QR codes and how although they became increasingly useful during the coronavirus pandemic, it opens up the possibility for scammers to use them too. I will bring up the kinds of scams that are involved with QR codes and how individuals can protect themselves.
https://www.cyberscoop.com/mailicous-qr-codes-fbi-ic3-alert/
Post date: January 24
Approved!
I want to write about fake gift card balance checking websites that have popped up stealing users’ account balances for my blog post. I feel like this is a very relevant issue as being trapped inside due to COVID-19, many users are using credit cards or gift cards to purchase items online and can be caught off guard by these similar-looking fake websites.
Here is the link to the article: https://blog.malwarebytes.com/scams/2022/01/steer-clear-of-gift-card-balance-scams/
Blog Post Date: January 24
Approved!
I plan to write about the recent potential vulnerability of Cisco’s StarOS system and its fixes. It would be interesting to explore why the system was vulnerable in the first place, as well as why it’s important that it gets patched ASAP before anyone can attack it. This incident would also be a good example of how one needs to know how to attack the system with various methods, in order to know how to defend it.
My post is scheduled for January 24th. Here are the initial sources:
https://thehackernews.com/2022/01/cisco-issues-patch-for-critical-rce.html
https://www.bleepingcomputer.com/news/security/cisco-bug-gives-remote-attackers-root-privileges-via-debug-mode/
Approved!
I plan on writing about the growing business of selling illegal credentials, and the possible emergence of businesses charging to scrub people’s information from these sites. I want to touch on with the rise of the information economy, a black market of information is bound to pop up as well, and perhaps well known companies partake in activities that aren’t too far off from these credential chop shops. This is the main article I am basing the post off of, but I plan to add some others as well.
https://krebsonsecurity.com/2022/01/crime-shop-sells-hacked-logins-to-other-crime-shops/
Approved!
I would like to talk about end to end encryption on the internet, and the current campaign that certain charities/organizations have against it. I’d like to discuss the pros/cons of E2EE objectively, common perspectives taken on it, etc. I think it’s a very interesting, somewhat controversial topic, and raises the question of whether too much privacy is necessarily a good thing.
My post is on the 24th, and my source right now is: https://blog.malwarebytes.com/privacy-2/2022/01/campaign-launched-to-delay-social-media-end-to-end-encryption/
Approved!
For my blog post I intend to write about the remote code execution exploit that affects various PC releases of games developed by FromSoftware Inc.. I would like to touch on the severity of RCE exploits, and the controversial nature in which this specific vulnerability was disclosed and publicized (responsible vulnerability disclosure practices).
Blog Post Date: January 25th, 2022.
Source:
https://www.theverge.com/2022/1/22/22896785/dark-souls-3-remote-execution-exploit-rce-exploit-online-hack
Approved!
For my blog post I intend to discuss the recent attacks on crypto wallets and crypto scams. I want to explore how they do these attacks as well as who the intended targets of these attacks are. I also want to talk about how countries like Russia are addressing the emerging cryptocurrency markets and the crypto wallet attacks as well as their implementations to support their local market while cracking down upon hackers.
Sources:
1. https://cyware.com/news/north-korean-hackers-stole-crypto-worth-400-million-in-2021-2a6bc28c
2. https://cyware.com/news/bluenoroff-apt-group-eyeing-crypto-startups-35c36601
3. https://www.scmagazine.com/analysis/policy/will-ransomware-gangs-see-flow-of-cash-throttled-by-russia-cryptocurrency-restrictions?&web_view=true
4. https://www.zdnet.com/article/amazon-fake-crypto-token-investment-scam-steals-bitcoin-from-victims/?&web_view=true
Blog Post Date: Jan 26, 2022
Approved!
I intend to write an post about the cyber security attack on the red cross. With the data of over 500,000 people leaked. This leaked data related to the names, locations and contact information of missing persons. Although the leaked information has not been published yet I feel it is still an important and interesting topic.
Blog Post Date: January 26th, 2022
Source: https://portswigger.net/daily-swig/red-cross-suffers-cyber-attack-data-of-515-000-highly-vulnerable-people-exposed
https://www.theregister.com/2022/01/20/red_cross_hit_by_cyberattack/
https://www.itworldcanada.com/article/cyber-security-today-jan-21-2022-data-theft-from-red-cross-a-us-labor-department-scam-and-a-new-firmware-bootkit-found/471040
Approved!
I plan to write my post about the recent exploit on the popular ‘Dark Souls’ franchise that allows attackers to remotely execute code on the user’s computer. This gives hackers the opportunity to cause lasting damage and take complete control of your PC. I think this is an important topic because this is a serious vulnerability that affects anyone that plays online Dark Souls.
https://threatpost.com/dark-souls-servers-down-rce-bug/177896/
https://nationalcybersecuritynews.today/dark-souls-3-elden-ring-doomsday-scenario-rce-hack-discovered-microsoft-hacking-cybersecurity/
Blog Post Date: January 26, 2022
Sorry, unfortunately Monty Al-Amiri already reserved this topic – you’ll need to pick something else!
For my blog post I would like to talk about the leaking of data through the browser on iOS, iPadOS and Mac. In this post I will talk about the default browser on Apple product and what causes the leak of data and what can you do to reduce the leak of data.
Blog post Date : January 26th, 2022.
Source: https://nakedsecurity.sophos.com/2022/01/18/serious-security-apple-safari-leaks-private-data-via-database-api-what-you-need-to-know/
https://blog.malwarebytes.com/exploits-and-vulnerabilities/2022/01/browsers-on-ios-ipados-and-mac-leak-your-browsing-activity-and-personal-identifiers/
Unfortunately another student (Tyson Hartley) already reserved this topic on Jan 20, so you’ll need to pick a different one – sorry!
I am planning to write about the recent backdoors placed in some wordpress plugins and themes, potentially giving hackers access to the administrative control over the websites that utilize the themes and plugins.
Blog post date: jan 25th, 2022
Source: https://thehackernews.com/2022/01/hackers-planted-secret-backdoor-in.html
Unfortunately another student has already posted on this topic:
https://wpsites.ucalgary.ca/isec-601-f21/2022/01/18/wordpress-plugin-vulnerabilities-more-than-doubled-in-2021-and-77-of-them-are-exploitable/
You’ll need to choose another one – sorry!
For my blog post I would like to talk about Google Chrome’s critical RCE vulnerability in Safe Browsing. I will also explore more about what is safe browsing, how could attackers attack your system, and how could you protect yourself from this vulnerability as this issue has been fixed by Google.
Blog post date: January 26th, 2022
Source:
1) https://blog.malwarebytes.com/exploits-and-vulnerabilities/2022/01/update-now-chrome-patches-critical-rce-vulnerability-in-safe-browsing/
2) https://www.forbes.com/sites/gordonkelly/2022/01/21/google-chrome-warning-security-new-hacks-update-chrome-browser/?sh=7052be351cee
Approved!
Hello,
I intend to write my blog post on the OpenSea (NFT marketplace) exploit that allowed for users to buy any NFT for significantly way below their market price and resell it for a profit. I’m interested in this topic because NFTs are in their relatively early stage right now and I just find it entertaining to follow on all things NFTs.
https://www.zdnet.com/article/opensea-reimbursing-people-affected-by-bug-used-to-purchase-nfts-below-market-value/
Date Posted: January 24, 2022
Approved!
Oh and one thing — sorry for the mix up:
Meant to say the article was posted on January 24, 2022.
My actual blog post date is on January 26, 2022.
For my blog post I intent to write about SIM-Card swapping scam. I’d like to explore how hackers deceive a phone company into swapping a SIM card associated with one cellular phone to a new device, giving the hacker access to all of a person’s phone calls and text messages. Basically, the hacker would be able to steal a person’s cellular phone number, etc.. I’d also like to touch on the consequences of this SIM-Card swapping scam.
Blog post date: jan 27th, 2022
Some references to be used: https://www.idropnews.com/news/sim-swapping-explained-whats-sim-swapping-and-why-is-it-so-dangerous/176490/
Approved!
For my blog post i am willing to write about an analysis about working from home and risk to it’s security and privacy. As everything is pretty much online for Covid19; it think it’s would be great topic where privacy and security plays and important role.
Some reference to be used: https://heimdalsecurity.com/blog/cybersecurity-issues-with-remote-work/
https://link-springer-com.ezproxy.lib.ucalgary.ca/chapter/10.1007%2F978-3-030-78645-8_74
Blog post date: feb 10, thu, 12 am- 1 am
Very timely topic – approved!
For my blog post, I would like to write about the recent Belarus railway ransomware attack. The attack was made by a group of hacktivists, who have given the Belarus government a list of demands, including the release of dozens of political prisoners as well as a commitment that Belarusian Railways will not transport Russian troops. I believe this is an interesting topic to discuss in terms of cybersecurity, due to the nature of the attack, and also politically, due to the increasing tensions between Russia and Ukraine in that region.
Blog post date: Thursday, January 27th.
Sources:
https://www.wired.com/story/belarus-railways-ransomware-hack-cyber-partisans/
https://www.infosecurity-magazine.com/news/belarus-activists-fire-ransomware/
Approved!
For my blog post (jan 27) I would like to write about the recent crypto phishing scam that occured today (Jan 25).
Unknown cyber criminals were able to hijack a discord domain name and dran more than $150,000 worth of crypto currency out of multiple wallet addresses.
The discord group was meant for the deployment of a new NFT collection hosted by Ozzy Osbourne, however things turned gray when a group of attackers created multiple fake domains and groups that fooled users into joining and submitting their information.
Sources:
https://threatpost.com/ozzy-osbourne-nfts-cryptocurrency/177969/
https://threatpost.com/ozzy-osbourne-nfts-cryptocurrency/177969/
https://indianexpress.com/article/technology/crypto/ozzy-osbourne-nft-scam-cryptobatz-followers-duped-off-thousands-of-dollars-7739620/
Approved!
For my blog post, I plan to write about the topic of phishing, more specifically about the relatively new NFT CryptoBatz. As the owner (Ozzy Osbourne) announced his new NFT, they also sent out a discord link to organize members and those who would like to sign-up. Unfortunately, this didn’t go as planned as prior to this announcement they had an old discord URL which was now abandoned. As a result, scammers took notice of this and created a dummy discord server with that same link. With it, they were able to access users’ crypto wallets and drain them as the users thought that it was the official discord server for CryptoBatz. I’d also like to make a little warning about common phishing scams, especially at u of c and at our class’ discord servers.
Blog post date: Jan. 28th, Friday
Sources:
https://threatpost.com/ozzy-osbourne-nfts-cryptocurrency/177969/
https://www.theverge.com/2022/1/21/22895126/ozzy-osbourne-nft-scam-cryptobatz-hack-ethereum
Unfortunately Deliar beat you to this topic by only 3 hours(!), but still claimed it first. You’ll have to pick something else – sorry!
For my blog post, I intend to write about about a recent DDoS attack on an Andorran community of Minecraft gamers that packed enough punch to effectively cripple the country’s only internet service provider. Specifically, I’d like my post to touch on the concept of DDoS attacks and the potential damage it is capable of dealing.
Blog Post Date: January 27
Sources:
https://threatpost.com/cyberattacks-squid-game-minecraft-andorra-internet/177981/
https://today.in-24.com/News/903725.html
https://thedailyguardian.net/cyber-%E2%80%8B%E2%80%8Battacks-targeting-players-in-an-online-minecraft-tournament-leave-a-country-offline/
Approved!
For my blog post, I plan to write about the TrickBot malware which started off as a banking trojan (malware) back in 2016. As time went on, it is now being used for multiple notorious purposes such as downloading infected files onto the local computer, steal accounts info, injections, etc. Recently, TrickBot added an anti-debugging feature that allows it to avoid detection from security systems/analysis. This in turn troubled researchers as their browser would crash when they would try to “beautify” code making the process harder and more frustrating.
Blog post date: Jan. 28, Friday
Sources:
https://thehackernews.com/2022/01/trickbot-malware-using-new-techniques.html
https://threatpost.com/trickbot-crash-security-researchers-browsers/178046/
Approved!
Hey!
Since my blog post submission date draws near, I ask to reserve a topic that we discussed in class recently regarding 2FA and focus on its flaws which led to a $35 million dollar theft in the form of crypto. This also leads me to discuss how 2FA should no longer be the standard for authentication and aim to transition to a multi-factor authentication alongside it’s overwhelming benefits in todays evolving standards.
Blog post date: January 28th, 2022
Cheers, looking forward to the next class!
Sources:
https://nakedsecurity.sophos.com/2022/01/21/cryptocoin-broker-crypto-com-says-2fa-bypass-led-to-35m-theft/
Approved!
I’m planning to write on North Korea’s Lazarus Group’s APT (Advanced Persistent Threat) which utilizes Windows Update and GitHub. I’d like to take a deep dive into how this malware operates, it’s potential impacts, real-world/recorded impacts, and how it avoided detection.
This malware was reported on today (January 27) by MalwareBytes
https://blog.malwarebytes.com/threat-intelligence/2022/01/north-koreas-lazarus-apt-leverages-windows-update-client-github-in-latest-campaign/
Approved!
For my blog post, I would like to discuss how Apple Airtag devices are being exploited to stalk and track people rather than being used for their primary function of locating personal goods. In particular, I would like to discuss how this poses a threat to individual’s privacy, security, and safety. I also want to discuss how individuals can protect themselves, as well as how Apple can improve its protections and safeguards to assure customer safety.
Blog Post Date: Tuesday, February 2nd
Sources:
https://www.fox5ny.com/news/apple-airtags-privacy-group-demands-tech-giant-stop-selling-trackers
https://www.cbsnews.com/news/apple-airtags-stalk-strangers/
https://www.bbc.com/news/technology-60004257
Approved!
Just noticed a mistake!
My blog post date is Tuesday, Feb 1st (not the 2nd)
No worries – still approved!
Sorry that my topic is 8 days old! I’m planning to write about a firmware-level rootkit called “MoonBounce”. I find rootkits very fascinating and feel that they don’t get as much exposure as other malware (like ransomware). I plan on exploring what rootkits are, the dangers of rootkits, and some real-world impacts of rootkits.
Source:
https://securelist.com/moonbounce-the-dark-side-of-uefi-firmware/105468/
Approved!
Hi! I am planning to write a blog on Cyber Terrorism and Security.
Cyber terrorism ranks amongst the highest potential security threats in the world which can result into violence. It is usually politically motivated attacks that pose a threat against a nation. Just 4 hours ago UK firms warned over possible Russian cyber attacks amid Ukraine crisis. But, I plan to explore more about history, threats and definition of cyber terrorism. My date for blog posting is: 8 February, 2022.
Source:
https://www.theguardian.com/uk-news/2022/jan/28/uk-firms-warned-over-possible-russian-cyber-attacks-amid-ukraine-crisis
Approved!
I would like to write a blog about a recently discovered exploit that would have allowed a hacker to gain control of the Safari browser. This exploit was discovered by a researcher and has been patched in exchange for a rather large bug bounty. I would like to go more in-depth on the mechanism for the exploit (UXSS) and touch upon the importance of bug bounties.
Source: https://blog.malwarebytes.com/exploits-and-vulnerabilities/2022/01/apple-fixes-mac-bug-that-could-have-allowed-takeover-of-webcams-and-browser-tabs/
Unfortunately it looks like Tyson already wrote on this (Jan 25), so you’ll need a different topic – sorry!
I would like to write about how hackers use device registration to attack enterprises and lateral phishing. Phishing continues to be the most dominant means for attacking enterprises to gain initial entry and continuous improvement of visibility and protections on managed devices has forced attackers to explore alternative avenues. I would like to go more in-depth about this topic and give an example about microsoft MFA feature has disclosed details of a large-scale, multi-phase phishing campaign that uses stolen credentials to register devices on a victim’s network to further propagate spam emails and widen the infection pool.
source: https://thehackernews.com/2022/01/hackers-using-device-registration-trick.html
my blog post is on Feb 1st 2022, Tuesday
Approved!
Hi! I would be writing about a cyberattack on the foreign ministry of Canada. The incident took place last Wednesday according to sources, causing disruption to many internet-based activities. I would be going in depth about the attack itself as well as explain what a foreign ministry is and why this incident is of importance to us. Furthermore, I will talk about the measures being taken to minimize these types of incidents from happening again.
Sources:
https://news.clearancejobs.com/2022/01/28/oh-canada-foreign-affairs-ministry-gets-hacked/
https://www.cnn.com/2022/01/25/politics/hackers-canada-cyber-attack/index.html
Post Date: 2nd Feb
Approved!
Hi, I would like to write about the dangers of a zero-day exploit on apple devices. The exploit allowed websites to track your browsing activity and reveal your identity in real-time. This exploit was discovered by a researcher and later fixed in the new security updates. I would like to go more in-depth about zero-day exploits and how to protect yourself from it.
Source: https://www.bleepingcomputer.com/news/apple/apple-fixes-new-zero-day-exploited-to-hack-macos-ios-devices/
Posting date: Feb 3rd, 2022
I just realized this topic is 8 days old from my posting date…
This should be OK. I think Tyson (Jan 25) might have talked about this a bit with respect to Safari(?), but if you focus on zero-days more generally it should work – approved!
For my blog post, I would like to talk about an exploit for a Windows local privilege elevation vulnerability that allows anyone to gain admin privileges in Windows 10. The vulnerability affects all supported support versions of Windows 10 before the January 2022 Patch Tuesday updates.
Posting date: Feb 3rd, 2022
Source: https://www.bleepingcomputer.com/news/microsoft/new-windows-zero-day-with-public-exploit-lets-you-become-an-admin/
For my blog post, I would like to talk about an exploit for a Windows local privilege elevation vulnerability that allows anyone to gain admin privileges in Windows 10. The vulnerability affects all supported support versions of Windows 10 before the January 2022 Patch Tuesday updates.
Posting date: Feb 3rd, 2022
New source: https://cyber-reports.com/2022/01/30/windows-vulnerability-with-new-public-exploits-lets-you-become-admin/
Approved!
I would like to create a post in relations to Cybersecurity and their interactions and affects they may or already have on drone technologies. The blog will go into details of the dangers involving drones and their cyber vulnerabilities as well as potential counter measures used to combat this problem.
Posting Date: Feb 1st, 2022
Sources:
https://www.tripwire.com/state-of-security/security-data-protection/cybersecurity-and-drones-how-to-address-the-security-threats/
https://securityboulevard.com/2022/01/from-drone-to-counter-drone-the-shifting-role-of-cybersecurity/
Approved!
For my blog post, I inted to write about the recent Fantasy Premier Leauge cyber attack and plan to introduce 2 Factor authentication after the recent attack to football fans using the Fantasy app. This has occured in 26th January 2022.
Source: https://portswigger.net/daily-swig/fantasy-premier-league-account-hack-surge-prompts-plans-to-introduce-extra-login-checks-for-football-fans
Posting date: Feb 3rd 2022
Approved!
For my blog post, I plan to write about the recent cyber attack on Decentralised Finance Platform Qubit Finance as hackers were able to steal $80 million dollars worth of crypto currency. This occured on 27th January 2022.
Source: https://www.google.com/amp/s/www.ndtv.com/business/cryptocurrency-worth-80-million-stolen-from-defi-platform-qubit-finance-2737888/amp/1
Posting date: 2nd Feb 2022
Approved!
For my blog post I would like to talk about the reported $770 million dollars to social media scams. These scams range from buying items from scam websites that popped up as ads on social media to falling for investments ads. I would like to link back to our discussion in class on how to authenticate and identify if a website is credible to spend money on and give your personal information away on.
Source 1: https://www.itworldcanada.com/post/95000-americans-lost-770-million-to-social-media-scams – Information about what’s happening
Source 2: https://www.ftc.gov/news-events/blogs/data-spotlight/2022/01/social-media-gold-mine-scammers-2021 – Information about what’s happening
Source 3:https://abc7.com/instagram-investment-scam-online-hackers-long-beach-woman/11509192/ – Example of falling for these scams on social media
Blog Post Date: February 2nd, 2022
Approved!
Hey! For my blog post I intend to write about the recent phishing websites launched by the Iranian government. This is an effort to lure former Israeli spies residing in Iran, Lebanon, and Syria into work.
Source (Jan. 29):
https://www.timesofisrael.com/report-iranian-honey-trap-sites-try-to-enlist-spies-to-ostensibly-work-for-israel/
My posting date is Feb. 2.
Hi! For my blog post I intend to write about the recent phishing attacks launched by the Iranian government. This is an effort to lure former Israeli spies residing in Iran, Lebanon, and Syria into work as an attempt to identify them.
Source (Jan 29): https://www.timesofisrael.com/report-iranian-honey-trap-sites-try-to-enlist-spies-to-ostensibly-work-for-israel/
Posting date is Feb. 2
Approved (sorry this is late – somehow missed this yesterday afternoon!).
For my blog date I intend to write about the KONNI remote access tool used by North Korean hackers. Interestingly, despite being rather outdated by now (at least 8 years old) it is still being actively developed. I intend to cover the changes it has undergone and to consider the threat that may be posed by updating older malware that is generally considered to no longer be a threat.
Source: https://blog.malwarebytes.com/threat-intelligence/2022/01/konni-evolves-into-stealthier-rat/
Approved!
For my blog post, I plan to write about the recent cyber attack on Decentralised Finance Platform Qubit Finance as hackers were able to steal $80 million dollars worth of crypto currency. This occured on 27th January 2022.
Source: https://www.google.com/amp/s/www.ndtv.com/business/cryptocurrency-worth-80-million-stolen-from-defi-platform-qubit-finance-2737888/amp/1
Posting date: 2nd February 2022
For my blog post, I would like to talk about a Taiwanese storage and networking equipment provider corporation called QNAP systems, which has been recently hit with a ransomware attack by a new ransomware group called deadbolt. The attack started on January 25th and Over 3600 of the QNAP customer’s network-attached storage (NAS) devices have been affected by this ransomware attack, which forced the corporation to force install a new update.
Post date: Feb 3
Sources:
https://www.bleepingcomputer.com/news/security/new-deadbolt-ransomware-targets-qnap-devices-asks-50-btc-for-master-key/
https://www.bleepingcomputer.com/news/security/qnap-force-installs-update-after-deadbolt-ransomware-hits-3-600-devices/
https://threatpost.com/conti-deadbolt-delta-qnap-ransomware/178083/(this source also talks about a separate ransomware attack on another Taiwanese company which I won’t be talking about in my post)
Approved!
For my blog, I am going to talk about how blackmail/extortion emails effects our privacy, and how Men at higher risk for online blackmail in pandemic than women. My posting date is Feburary 4th, 2022.
Source:
https://www.upi.com/Health_News/2022/01/31/sextortion-online-blackmail-men-pandemic-study/1201643641232/
https://globalnews.ca/news/7777262/sextortion-cybertip-youth-crime-teen-offenders-nudes-blackmail/
Approved!
For my blog post I will be talking about the 2FA app that surfaced on google play and was unsurprisingly called “2FA Authenticator”. This app was equipped with the vulture stealer malware that has the ability to steal banking and financial data like your banking username and password for example. This app was downloaded more than 10,000 times before getting removed from the store. A report was released on the 24th of January 2022 by Pradeo, A French mobile-security firm that first discovered the hidden trojan on this app. I will be going into detail on how this all happened in my blog post.
Sources:
https://threatpost.com/2fa-app-banking-trojan-google-play/178077/
https://securityboulevard.com/2022/01/banking-trojan-in-google-play-app-store-2fa-authenticator-drops-vultur-rat/
https://www.tomsguide.com/news/fake-2fa-app-vultur-android-malware
https://www.bollyinside.com/news/this-android-software-should-be-removed-immediately-according-to-a-security-group-before-it-wipes-your-bank-account
sources: https://threatpost.com/2fa-app-banking-trojan-google-play/178077/
https://securityboulevard.com/2022/01/banking-trojan-in-google-play-app-store-2fa-authenticator-drops-vultur-rat/
https://www.tomsguide.com/news/fake-2fa-app-vultur-android-malware
https://www.bollyinside.com/news/this-android-software-should-be-removed-immediately-according-to-a-security-group-before-it-wipes-your-bank-account
Approved!
For my blog post, I plan to write about Apple paying $100,500 to a guy who has found a bug that can gain unauthorized webcam access. My posting date is Feb. 4
Source: https://threatpost.com/apple-bug-bounty-mac-webcam-hack/178114/
Source 2: https://thehackernews.com/2022/01/apple-pays-100500-bounty-to-hacker-who.html
Approved!
For my blog post, I would like to discuss about the malicious incident regarding Zoom that happened back in April 2020 during the time of the pandemic. Furthermore, I would also like to discuss about the security flaws that Zoom had, the consequences of the attacks and finally how Zoom was able to regain their control.
Blog Post Date:- 3rd February, 2022
sources:-
https://www.csmonitor.com/Technology/2020/0407/Party-crashers-or-tech-terrorists-New-hackers-target-Zoom
https://blog.ariacybersecurity.com/blog/the-top-10-most-significant-data-breaches-of-2020
As per the rules posted on D2L, your topic has to be something that’s appeared in the news or reported on somewhere within 7 days of your posting date. So, unless you’re able to find another source discussing this that’s been posted within that time frame, I’m afraid you’ll need to pick a different more recent topic – sorry!
For my blog post, I would like to talk about online tracking – something that happens when you are shopping in store. I want to explain in what and how many ways can you be tracked when visiting a store in-person. For example, you volunteer your personal information in order to connect the free in-store Wi-Fi, the MAC address of your phone instantly becomes the target that the know-it-better retailers are aiming.
Blog Post Date:- 4th February, 2022
sources :
https://privacyrights.org/consumer-guides/online-privacy-using-internet-safely
https://www.consumer.ftc.gov/articles/how-protect-your-privacy-online
https://cybericus.com/best-anti-tracking-software/
As per the rules posted on D2L, your topic has to be something that’s appeared in the news or reported on somewhere within 7 days of your posting date. I see that your 3rd reference (cybericus) is at least from 2022, but I can’t tell whether it’s within 7 days or not. If you can demonstrate that this topic has appeared somewhere on-line within that time frame then go ahead, but if not I’m afraid you’ll need something different that is more recent – sorry!
For my blog post, I would like to discuss the issues about identity theft, its consequences and what measures could be taken to defend ourselves.
Sources collected about this topic are from the following sites:
https://www.acainternational.org/news/ftc-to-launch-identify-theft-awareness-week-jan-31-feb-4/#:~:text=01%2F26%2F2022%209%3A30%20A.M.&text=The%20Federal%20Trade%20Commission%20will,according%20to%20a%20news%20release
https://www.news4jax.com/money/2022/02/02/identity-theft-awareness-week-how-to-protect-yourself-from-scams/
This topic looks good – approved!
For my blog post, I would like to talk about how hackers are using PowerPoint files to hide exe files that can rewrite windows registry settings. I want to explain how simple and trustworthy-looking file formats can sometimes be used for malicious intent.
Blog post date is Feb. 7th
https://threatpost.com/powerpoint-abused-take-over-computers/178182/
Approved!
I would like to write my blog post on the exploitation of the JavaScript package repository, npm, to perform attacks on users that depend on the support of JavaScript to run their programs.
My blog post date is Feb 7th.
https://threatpost.com/malicious-npm-packages-web-apps/178137/
Approved!
For my blog post, I would like to talk about the severity of cyberattacks aimed at government officials. The incident I would specifically talk about is something that occurred quite recently where the existence of the Pegasus spyware developed by the NSO Group was found in the devices of Finnish diplomats.
Blog post date: 5th February
My sources:
https://threatpost.com/nso-group-pegasus-spyware-finnish-diplomats/178113/
https://www.bleepingcomputer.com/news/security/finnish-diplomats-phones-infected-with-nso-group-pegasus-spyware/
Should be OK but make sure you differentiate from Raffay’s post on Jan 17 (https://wpsites.ucalgary.ca/isec-601-f21/2022/01/19/the-faces-of-cyberwarefare-from-russia-to-china-january-19-2022/) as that discusses a similar topic I don’t think he covered Pegasus specifically, but govererment attacks in more generality.
Hello Professor,
Yes, I will try to deviate from trying to write about the same topic but what aspect should I focus on for my post then? And should I just choose a different topic then professor?
It’s up to you. I think you should be OK with your original topic if you focus more specifically on Pegasus (for example), but you should read Raffay’s post to be sure that you don’t overlap too much (you could also reference Raffay’s post and build off it in a new direction like more details on Pegasus). If you’re more comfortable with a different topic that’s also fine.
In my blog post I intend to expand on and overview on an article cnet.com and 9to5google.com. The articles talk about Google’s privacy controls and what it knows about you and your location with the main goal being to learn to control or delete such data. It goes into detail about developments that have occurred in Google’s access to your information which essentially builds who you are as a person. I.E knows what ads to recommend to you, what is in your area etc. Another perspective is how this effects our workplace life which is covered in the 2nd article.
https://www.cnet.com/tech/services-and-software/theres-a-way-to-delete-the-frightening-amount-of-data-google-has-on-you/
https://9to5google.com/2022/02/02/google-workspace-search-history/
Approved!
For my blog post, I would like to write about a scam involving a well-known Italian art gallery, T293 and the clients of the gallery. Scammers had used a scheme known as the “man in the middle” where they would compromise and intercept emails between a business and clients, rerouting payments made by clients to themselves. The scammers created fake emails, posing as art directors from the gallery and contacted clients of T293 with offers.
Source (published Feb 2nd, 2022) : https://news.artnet.com/art-world/t293-hack-2066827
My blog post date: February 7th
Approved!
For my blog post I would like to talk about the new phishing scam with TurboTax. Since the tax season is up, I think it would be beneficial for everyone to learn more about the scam and how we and our parents can stay safe from such scams. Post date: Feb 8,2022
Reference: https://www.tomsguide.com/news/intuit-turbotax-phishing-scam
Approved!
Posting on Monday, Feb 7th, 2022
Apologies for the late reservation.
The topic I plan to cover: Cybersecurity at the Winter Olympics
A short justification: “Participants and viewers of the Olympics may install applications, such as those required to participate or stay in the country. There is a potential for malicious individuals to steal personal information/install tracking tools, malware, etc.”
Links to external sites:
https://nationalpost.com/sports/olympics/2022-winter-olympics-china-cybersecurity-burner-phones
https://www.marketplace.org/shows/marketplace-tech/cybersecurity-concerns-both-internal-and-external-run-high-at-beijing-olympics/
https://ca.sports.yahoo.com/news/china-is-watching-olympians-go-to-great-lengths-to-avoid-stolen-data-065952595.html
I realized that there is a similar topic on this after writing my post, perhaps I can focus more on how to protect oneself from the cybersecurity dangers of travelling abroad?
Sounds good – approved (the more general “travelling abroad” topic)!
For my blog post I intend to write about the EARN IT act being reintroduced in the USA. This act would require social media companies to allow more government control on their systems. The goal of the act is to limit the amount of exploitative media and to decrease the immunity that tech companies have in allowing such media to remain on their sites.
Post date: Feb 8, 2022
Reference: https://www.protocol.com/bulletins/earn-it-act-back
https://www.nextgov.com/policy/2022/02/earn-it-act-reintroduced-draws-criticism-over-encryption-implications/361437/
Approved!
For my blog post I intend to write about the end of the recent Tor bridge campaign (https://blog.torproject.org/wrapping-up-bridges-campaign/), and why it’s so important that bridges exist in the fight again internet censorship (https://blog.torproject.org/tor-censorship-in-russia/ -> this source is on the older side, but the first, and most recent source draws on information from this post so hopefully its use is okay?). This post would also include an explanation of how Onion browsers work and what exactly a bridge is.
Approved!
Hi
I would like to write about Microsoft recently disabling internet macros by default in some of their office apps. Apparently their have been instances where malicious agents are taking advantage of the widespread use of Office Apps, and more specifically the use of VBA macros.
Planned Post Date: Feb 9, 2022
Sources:
https://thehackernews.com/2022/02/microsoft-disables-internet-macros-in.html
https://therecord.media/microsoft-blocks-internet-macros-by-default-in-five-office-applications/
I’d also like to use this source if possible: https://www.cynet.com/attack-techniques-hands-on/office-macro-attacks/
It is from Feb 1, 2022 (so one day over a week from my post date), could I still use this?
Approved!
For my blog post I intend to write about the rise of malicious npm packages being used. This is important because JavaScript is a commonly used language and it’s widespread use across the internet makes the npm package manager very vulnerable to attacks. I would like to do this topic because I think it will bring awareness to this issue and hopefully help prevent one of my classmates from becoming a target.
https://www.securityweek.com/1300-malicious-packages-found-popular-npm-javascript-package-manager
https://cyware.com/news/the-growing-menace-of-malicious-npm-packages-7684d6c5
My post date is Feb 10th and will also include a brief intro to what npm packages are
My post date is Feb 10th
Unfortunately Anthony Nguyen already posted on npm exploits on Feb 7, so you’ll need a different topic – sorry!
Would I be able to do the topic, how attack surface management can be used to help stop/ reduce cyber attacks? Since many companies have turned to online the amount of cyber attacks have increased and ASM can be used to help stop it.
https://thehackernews.com/2022/02/how-attack-surface-management-preempts.html
That one looks good – approved!
For my blog post, I intend to write about Medusa Malware, which is a mobile banking trojan that can gain near-complete control over a user’s device and how it is abusing Accessibility Services to execute commands on any app that is running on a android device.
Post Date: Feb 9, 2022
Reference: https://threatpost.com/medusa-malware-flubot-android-distribution/178258/
Approved!
For my blog , i intend to write about ” Roaming Mantis Expands Android Backdoor to Europe” topic , which is a scam through android.
I will try my best to explain this , and provide some feedbacks and opinion .
sources : https://threatpost.com/roaming-mantis-android-backdoor-europe/178247/. ,
https://darkrebel.net/roaming-mantis-expands-android-backdoor-to-europe
Date of the post : February the 10th
Approved!
For my post, I intend to write about the encryption ransomware called “Sugar” that is targeting individuals recently because the cause of getting this ransomware is still not known.
Post date: February 10, 2022
Reference:https://blog.malwarebytes.com/ransomware/2022/02/we-absolutely-do-not-care-about-you-sugar-ransomware-targets-individuals/
Approved!
For my post, I will briefly introduce the principle of facial recognition, and where it is currently used. As the technology has matured and become widely used in recent years, some major digital rights issues have been raised. I will also discuss the advantages and disadvantages of facial recognition over traditional information recognition technologies, whether it should be used for authentication, and security issues.
Post date: Feb 15, 2022
Reference : https://www.eff.org/deeplinks/2022/02/victory-irs-wont-require-facial-recognition-idme
https://www.eff.org/deeplinks/2021/10/face-recognition-technology-commonly-used-terms
Approved!
For my post, I want to talk a little bit about the Maze ransomware gang announcing their retirement. The article will mainly review the past behavior of the Maze team, as well as my own thoughts on their retirement behavior.
Post date: February 15,2022
Reference:https://www.cpomagazine.com/cyber-security/maze-ransomware-group-infamous-for-adding-doxxing-threats-to-attacks-announces-it-is-shutting-down-its-cyber-crime-operation/
https://blog.malwarebytes.com/ransomware/2020/11/maze-ransomware-gang-announces-retirement/
https://www.securitymagazine.com/articles/93819-maze-ransomware-gang-retires
Your first reference isn’t loading for me, and the other two date back to November. It is a good topic but unless you have another reference from this week you’ll need to pick a different, more current topic – sorry!
I first saw it here, which was posted on February 10th。https://blog.malwarebytes.com/malwarebytes-news/2022/02/ransomware-author-releases-decryption-keys-says-goodbye-forever/
If my first topic is still not ok, I want to talk about Hackers Planted Digital Evidence on Devices of Indian Activists and Lawyers.
Reference:https://thehackernews.com/2022/02/hackers-planted-fake-digital-evidence.html
The original topic with that recent reference will be fine – approved!
Sorry I am late with my topic proposal. I plan to write about Bill S-210, particularly the problems that arise from the overuse of website blocking and facial recognition.
Post date: Feb 14, 2022
References(So far): https://www.michaelgeist.ca/2022/02/age-verification-requirements-for-twitter-or-website-blocking-for-reddit-my-appearance-on-bill-s-210-at-the-senate-standing-committee-on-legal-and-constitutional-affairs/,
https://www.itpro.com/security/privacy/356882/the-pros-and-cons-of-facial-recognition-technology#:~:text=As%20with%20any%20technology%2C%20there,to%20flaws%20in%20the%20technology.
https://parl.ca/DocumentViewer/en/43-2/bill/S-210/first-reading
don’t know why the hyperlinks didn’t work let me try again
https://www.michaelgeist.ca/2022/02/age-verification-requirements-for-twitter-or-website-blocking-for-reddit-my-appearance-on-bill-s-210-at-the-senate-standing-committee-on-legal-and-constitutional-affairs/
https://www.itpro.com/security/privacy/356882/the-pros-and-cons-of-facial-recognition-technology#:~:text=As%20with%20any%20technology%2C%20there,to%20flaws%20in%20the%20technology.
https://parl.ca/DocumentViewer/en/43-2/bill/S-210/first-reading
Approved, but just make sure you differentiate from Runxuan Li’s post on Feb 11 that also touched on facial recognition. Sounds like it’ll be fine, just be sure to have a look at the other post first.
Realized I got a bit confused and that actually there wasn’t anything on facial recognition so it’ll be fine
I got it confused with age verification
Sounds good!
Apparently my brain was fried for the whole day and I’m gonna be late on the posting too. Also while the article didn’t mention “facial recognition” it did mention “face recognition” so there ya go.
I wanted to talk about the recent SF 49ers ransonware attack by BlackByte and what gangs like this do. My post goes up on Feb 15.
https://www.espn.com/nfl/story/_/id/33283115/san-francisco-49ers-network-hit-gang-ransomware-attack-team-notifies-law-enforcement
Approved!
I’d like to cover the recent IRS decision to back out of partnering with a third party facial recognition software that they were going to use as a form of identity verification for taxpayers, and the ramifications this has on individual privacy and government policy around individuals’ information as a whole.
My post date is Feb 15th.
After looking at a broader span of articles, the very earliest mention from the IRS itself I could find was 8 days ago from the 15th, on Feb 7th, but most were within the 7 day period. Sources:
https://www.eff.org/deeplinks/2022/02/victory-irs-wont-require-facial-recognition-idme
https://www.irs.gov/newsroom/irs-announces-transition-away-from-use-of-third-party-verification-involving-facial-recognition
https://help.id.me/hc/en-us/articles/4402754222615-IRS-What-does-ID-me-do-for-the-IRS- (from the initial consideration of the partnership)
Actually, looking up a bit, it seems the IRS story is already reserved. Instead, I’d like to cover the recent fake Windows 11 installers that infect the users with password grabbing malware such as RedLine, and how that information is being gathered and sold on the dark web.
Sources:
https://www.zdnet.com/article/this-password-stealing-malware-posed-as-a-windows-11-download/
https://www.bleepingcomputer.com/news/security/fake-windows-11-upgrade-installers-infect-you-with-redline-malware/
Approved (the Win 11 installers topic)!
I wanted to talk about how Instagram has failed to act on ID theft.
My post goes up on Feb 14.
https://www.bbc.com/news/uk-wales-60325386
Approved, but make sure you have a look at Harmeen Grewal’s first as that also mentions fraud on Instagram. I’m pretty sure you’ll be fine, but just have a look at that and make sure you differentiate.
For my blog post tomorrow I would like to write on France’s ruling of using Google Analytics as illegal under the European Union’s General Data Protection Regulation.
I will write about why they made this decision and it means for us.
Sources:
https://tribune.com.pk/story/2343292/french-regulator-rules-google-analytics-illegal
https://thehackernews.com/2022/02/france-rules-that-using-google.html
https://www.pymnts.com/news/regulation/2022/french-privacy-regulator-rules-against-use-of-google-analytics/
Approved!
Hi,
For my blog post scheduled for the 16th of this month I’d like to talk about twitter distancing themselves from their 2FA provider, the reason why they did so, as well lightly touch upon the privacy implications of the whole ordeal.
Sources:
https://blog.malwarebytes.com/privacy-2/2022/02/twitter-cans-2fa-service-provider-over-surveillance-claims/
https://www.bloomberg.com/news/articles/2021-12-14/mitto-tells-clients-that-co-founder-departed-after-allegations-of-phone-spying
Approved!
For my blog post, I would like to talk about the malware hidden in some “Cities: Skylines” gaming mods. This topic piqued my interest because it is very relevant to what we are learning in class! My blog will go up on February 17.
https://threatpost.com/cities-skylines-modder-banned-over-hidden-malware/178403/
Approved!
Hi,
I’d like to discuss a criminal group that was arrested in Spain recently for my blog post. They SIM-swapped and impersonated people to steal from their bank accounts, and I wanted to touch on habits that made the victims vulnerable to these attacks. My post is scheduled for Feb 16.
P.s.: I wanted to cite the police report as well, but it’s in Spanish so I wanted to make sure that’s cool first? Sources:
https://thehackernews.com/2022/02/spanish-police-arrest-sim-swappers-who.html
https://www.policia.es/_es/comunicacion_prensa_detalle.php?ID=11102#
Approved!
My blog post is about nefarious software that masquerades as a Windows 11 installer that is hosted on Discord. The website windows-upgraded[dot]com was recently examined by HP’s threat research team, and they discovered it was attempting to distribute RedLine Stealer, a piece of malware designed to steal user information.
Article link : https://www.pcgamer.com/devious-malware-hosted-on-discord-pretends-to-be-windows-11-installer/
Approved, but make sure you check Matt Groeneveldt post (today) that also deals with a Win 11 installer issue. It sounds like your topic is different enough, but make sure you read his first and make sure.
For my blog post on Feb 16th, I’m planning to cover the Adobe Commerce remote execution bug, under CVE-2022-24086. The bug allows arbitrary remote code execution without any sort of user authentication.
Links:
https://helpx.adobe.com/security/products/magento/apsb22-12.html
https://www.zdnet.com/article/patch-now-adobe-releases-emergency-fix-for-exploited-commerce-magento-zero-day/
Approved!
For my blog post, I would like to talk about what are deepfakes, and how deepfakes pose insidious threats to organizations and individuals. Also, I would like to go over ways to mitigate potential deepfake attacks. My post goes up on Feb 18.
Source: https://www.securitymagazine.com/articles/97085-the-two-faces-of-deepfakes-cybersecurity-and-identity-fraud
Approved!
For my blog post I would like to talk about the FritzFrog peer-to-peer botnet/worm. It mainly has targeted high value entities (schools, government agencies, etc), and it utilizes SSH to drop payloads. I mainly want to discuss what it aims to do, who it is attacking, and probably cover a bit of how it conducts itself. My post will go up on the 18th.
References:
https://thehackernews.com/2022/02/fritzfrog-p2p-botnet-attacking.html
https://www.guardicore.com/labs/fritzfrog-a-new-generation-of-peer-to-peer-botnets/
https://www.bleepingcomputer.com/news/security/fritzfrog-malware-attacks-linux-servers-over-ssh-to-mine-monero/
Approved!
For my blog post I would like to talk about NFT hype to hijack your PC and webcam. i would like to share what is NFT. How the hacker make that work. What is the danger of this kind of attack. My post will go up on the 18th.
References:
https://www.zdnet.com/article/hackers-are-using-nft-lures-to-trick-victims-into-downloading-intrusive-trojan-malware/
Approved, but note that there were two earlier posts related to NFTs. Make sure you have a look at those as well and make sure that your post will be sufficiently different.
In my Blog Post I want to write about the Cyclops Blink malware that is being attributed to the Sandworm group.
In the post I want to explain what the malware does and how it does it. Furthermore I want to elaborate on the targeted people and the goal of the malware.
As the malware has been around for some time (at least 2.5 years), I will give a brief timeline of updates since the first news about it.
Date of Post: Feb. 28th
References:
https://blog.malwarebytes.com/threat-spotlight/2022/02/cyclops-blink-malware-us-and-uk-authorities-issue-alert/
https://thehackernews.com/2022/02/us-uk-agencies-warn-of-new-russian.html
https://www.cisa.gov/uscert/ncas/alerts/aa22-054a
Approved!
For my blog post I would like to talk about cyberattacks going on between Russia and Ukraine and in particular the new data wiper malware discovered during the attacks dubbed HermeticWiper
Date of Post: Feb 28
References:
https://threatpost.com/white-house-denies-mulling-massive-cyberattacks-against-russia/178658/
https://twitter.com/ESETresearch/status/1496581903205511181
https://twitter.com/juanandres_gs/status/1496581710368358400
https://www.digitalshadows.com/blog-and-research/russia-invades-ukraine-what-happens-next/
https://www.abc.net.au/news/2022-02-24/ukraine-cyber-attacks-looming-full-scale-russian-invasion/100856586
Approved!
For my blog post, I will talk about the Data wiper deployed in cyber-attacks targeting Ukrainian systems.
Reference:
https://portswigger.net/daily-swig/data-wiper-deployed-in-cyber-attacks-targeting-ukrainian-systems
Unfortunately Adam requested this topic a few hours before you so you’ll need a different one – sorry! If you need a few more days to prepare a different topic please go ahead and choose a new posting date on the Doodle poll.
I’m looking to discuss double/triple ransomeware techniques as they relate in the recent survey from Venafi.
This is for my blog post on March first.
Source of recent survey:
https://www.venafi.com/blog/venafi-survey-ransomware-evolves-double-and-triple-extortion-now-features-over-80-ransom
Double/Triple Ransomeware Definitions Source (older than a week): https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/ransomware-double-extortion-and-beyond-revil-clop-and-conti
Approved!
Hi, for my blog post I would like to talk about how the hacking group “Anonymous” has recently taken down various Russian government websites since the start of the ongoing Ukraine conflict (i.e., via DDoS attacks). I would be posting this on Wednesday, March 2nd.
References:
https://www.abc.net.au/news/science/2022-02-25/hacker-collective-anonymous-declares-cyber-war-against-russia/100861160
https://www.nationalturk.com/en/anonymous-hacks-gazprom-and-russia-ministry-of-defense-websites/
https://www.hstoday.us/featured/anonymous-claims-hits-on-more-than-300-russian-cyber-targets-in-48-hours-including-gas-control-system/
Approved!
Hi Professor.
For my blog post I would like to examine the Ukrainian government’s calls for state sponsored cyberattacks/hacktivism in response to the Russian military action against the Ukraine, and the use of state sponsored cyberattacks in general.
References:
https://www.itsecurityguru.org/2022/02/25/ukraine-calls-for-volunteer-hackers-to-aid-in-cyber-war/
https://www.reuters.com/world/exclusive-ukraine-calls-hacker-underground-defend-against-russia-2022-02-24/
https://www.infosecurity-magazine.com/news/ukraine-asks-for-hackers-help/
https://www.infosecurity-magazine.com/news/anonymous-hacking-group-cyber-war/
Approved, but make sure to look at some of the earlier posts. There are a few other people talking about different aspects of Russia vs. Ukraine – I think your take is different, bust have a look at the other proposals to make sure.
For my blog post, I will talk about the recent malware spreading through mobile games, which can result in the user’s social media accounts to be taken control of without their knowledge.
Reference: https://thehackernews.com/2022/02/social-media-hijacking-malware.html
Approved!
For my blog post, I would be talking about how the Iranian Hacker group “MuddyWater” has been carrying out digital attacks worldwide.
My post would go up on March 1, 2022.
References:
https://www.nextgov.com/cybersecurity/2022/02/iran-linked-hackers-conducting-operations-against-government-networks-intel-agencies-warn/362391/
https://thehackernews.com/2022/02/iranian-hackers-using-new-spying.html
https://www.naveenbharat.in/iranian-hackers-use-new-spy-malware-that-abuses-telegram-messenger-api/
https://www.haaretz.com/israel-news/tech-news/.premium-in-shadow-of-ukraine-russia-cyberwar-iranian-hackers-go-on-the-offensive-1.10638690
https://therecord.media/iran-linked-muddywater-carrying-out-digital-attacks-worldwide-u-s-warns/
Approved!
For my blog post, scheduled for March 02, I would like to talk about the cyber-warfare/anti-disinformation actions taken by corporate, state, and non-state actors against Russia in response to their invasion of Ukraine. Specifically, I would like to cover topics like Meta’s recent restriction of Russian state media, Starlink’s impact on Ukrainian internet infrastructure, the impact of hacker groups like Anonymous, and actions being taken by governmental entities like the NSA.
Resources:
[1] https://www.itsecurityguru.org/2022/02/28/meta-restricts-russian-state-controlled-media/
[2] https://www.itsecurityguru.org/2022/02/28/starlink-activated-to-keep-ukraines-internet-running/
[3] https://www.itsecurityguru.org/2022/02/25/biden-considers-massive-cyber-attack-on-russia/
[4] https://www.itsecurityguru.org/2022/02/25/ukraine-calls-for-volunteer-hackers-to-aid-in-cyber-war/
[5] https://www.infosecurity-magazine.com/news/moscow-exchange-cyber-attack/
There are a few other people already writing about Russia vs. Ukraine, also covering some aspects you mention (eg.Anonymous). I haven’t seen anyone mention Meta’s actions yet, so I approve this – just make sure you look at the earlier posts and reservations to make sure that you write about different things. Sadly, there’s plenty to talk about with this particular topic…
Hi prof, for my blog post scheduled for March 3, I would like to talk about Toyota Motor Company being hit with a ransomware attack which forced them to stops production.
References:
https://www.itsecurityguru.org/2022/03/01/toyota-hit-with-ransomware-attack-stops-production/
https://www.infosecurity-magazine.com/news/toyota-production-japan-ransomware/
https://asia.nikkei.com/Spotlight/Supply-Chain/Toyota-halts-operations-at-all-Japan-plants-due-to-cyberattack
https://www.bloomberg.com/news/articles/2022-02-28/toyota-to-halt-plants-after-cyberattack-on-supplier-nikkei-says
https://www.thestreet.com/investing/cryptocurrency/toyota-shutdown-signals-danger-of-cyber-attacks
Approved!
Hi professor. For my blog post scheduled on March 03, I would like to illustrate the conflict between Nvidia and Ransomware Group Lapsus. I want to cover the process of cyber attacks initiated by Lapsus and how Nvidia hack it back as revenge.
References:
[1]https://metro.co.uk/2022/02/28/nvidia-hit-by-cyberattack-so-they-hack-the-hackers-as-revenge-16187846/
[2]https://hothardware.com/news/lapsus-claims-nvidia-hacked-back-after-its-attack
[3]https://portswigger.net/daily-swig/cyber-attack-on-nvidia-linked-to-lapsus-ransomware-gang
Approved!
I intend for my blog post to touch on an article from February 27 published on http://www.cnbc.com
The subject discusses that person has more than 100 different online accounts requiring passwords, according to online password manager NordPass. But simple passwords can be extremely easy for hackers to figure out, allowing them stress-free access to your personal data and accounts. It mentioned the rate and number of attacks last year and pointed out the potential risk in our daily life.
It might be a timely concern for individual privacy. However, the subject did not discuss the result or protection further. I have searched the common way for hackers to attack and how to protect ourselves.
I will post my blog on Mar. 7th. The first following link leads to the article I will elaborate further on by said date. The rest of the following link is the article as a guide.
References:
https://www.cnbc.com/2022/02/27/most-common-passwords-hackers-leak-on-the-dark-web-lookout-report.html
https://www.cnbc.com/2016/02/24/8-ways-to-protect-your-passwords-from-identity-theft-online.html
Approved!
Hi professor, For my blog post scheduled on march 4th I would like to talk about DDoS attacks that are being amplified using a technique called TCP Middlebox Reflections. I will talk about this technique and DDoSing, and how it is affecting people.
References:
https://thehackernews.com/2022/03/hackers-begin-weaponizing-tcp-middlebox.html
https://www.akamai.com/blog/security/tcp-middlebox-reflection
Approved!
I intend for my blog post to explore the security flaws in Electric Vehicle chargers, and how that impacts users and the growing industry. This is inspired by the attack on a Russian EV chargers amidst the Ukraine conflict. However, since Anonymous has been talked about in depth already, I will focus my blog post on specifically the EV charger hack and it’s implications.
My blog post is scheduled for Friday, March 4th.
References:
https://insideevs.com/news/570958/russia-electric-car-chargers-hacked/
https://www.independent.co.uk/news/world/europe/putin-charging-station-hacked-ukraine-russia-b2026260.html
https://techcrunch.com/2021/08/03/security-flaws-found-in-popular-ev-chargers/
https://finance.yahoo.com/news/hsb-cyber-survey-finds-electric-144100406.html?guccounter=1&guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNhLw&guce_referrer_sig=AQAAAB5oyL1ZaFztjCASBCvJLXgXGxQ0MXlHvhMgmh0LWg7qPZf8T1xs6M3rd4241-TYgNx5_6rin49cLAjydu9jo9UatecCIZMJprxlL16osmGHJ_s0nSY6oXbnbdVGN__GrqcDTiHkXBfZPW6mSSew2bfx-U2fY175znTPrI4jlf8u
https://futurism.com/the-byte/ev-chargers-vulnerable-hacking
Approved!
Hello, for my blog post I would like to talk about a new flaw found with homomorphic encryption. The researchers called it a “first side channel attack”. My blog post will be on the 7th.
Sources: https://thehackernews.com/2022/03/researchers-demonstrate-new-side.html
Approved!
Hello, I would like to talk about the new research and implementation of Google’s Soli Radar to track gesture and body language from distance without the use of camera for privacy concern. My blog post will be on March 7th
Sources:
https://www.wired.com/story/google-soli-atap-research-2022/#intcid=_wired-verso-hp-trending_a075d90f-cb9d-4d46-bcde-f31b98adc77c_popular4-1
https://atap.google.com/soli/
Approved!
Hi professor,
For my blog post, I would like to write about OpenSesame – the device made by Samy Kamkar. It was built from a discontinued Mattel toy called the IM-ME. This child’s toy can wirelessly open any garage door that uses an insecure “fixed code” system in a few seconds. My blog post will be on March 9th.
References:
https://hackaday.com/2015/06/08/hacking-the-im-me-to-open-garages/
https://samy.pl/opensesame/
Approved!
Hello Professor,
For my blog post scheduled on March 10, I would like to write about “SharkBot Banking Malware Spreading via Fake Android Antivirus App on Google Play Store.” This is a very recent incident (just a day ago), and interesting topic to discuss about. Here are my references:
1. https://thehackernews.com/2022/03/sharkbot-banking-malware-spreading-via.html
2. https://www.androidpolice.com/vicious-sharkbot-banking-trojan-discovered-in-play-store-antivirus-app/
3. https://www.bleepingcomputer.com/news/security/sharkbot-malware-hides-as-android-antivirus-in-google-play/
4. https://securityaffairs.co/wordpress/128765/malware/sharkbot-trojan-google-play.html?utm_source=rss&utm_medium=rss&utm_campaign=sharkbot-trojan-google-play
Approved!
My plan for my blog post will be regarding a recent update to Firefox that removed two use-after-free bugs from the browser that had previously allowed for actors to commit RCE attacks on users. This is based primarily on the post from Threatpost.com.
Sources:
https://threatpost.com/firefox-zero-day-bugs-rce-sandbox-escape/178779/
https://encyclopedia.kaspersky.com/glossary/use-after-free/
https://pure.security/introduction-to-use-after-free-vulnerabilities/
others to be added as my research about UAFs continues before my post on march 10th
Approved!
Hello!! I hope this comment finds you well 🙂 For my topic I would like to talk about how Alexa can be taken advantage of by voice commands! This article was written today (March 7th, 2022) and it was found here: https://www.schneier.com/blog/archives/2022/03/hacking-alexa-through-alexas-speech.html
And it is linked to a paper!!
I also hope to use the following:
https://www.tomsguide.com/news/amazon-echo-security-loophole-exploited-to-make-them-hack-themselves
https://arstechnica.com/information-technology/2022/03/attackers-can-force-amazon-echos-to-hack-themselves-with-self-issued-commands/
https://www.zdnet.com/article/in-one-click-amazon-alexa-could-be-exploited-for-theft-of-voice-history-pii-skill-tampering/
https://www.bitdefender.com/blog/hotforsecurity/alexa-hack-yourself-researchers-describe-new-exploit-that-turns-smart-speakers-against-themselves/
Thank you!
Approved!
Hello. My blog post will be on March 10th. I would like to talk about ransomware hit that leads to the security breach of data internal to an organization. I want to explain in what way and how ransomware hit work, and the concerns it causes on cyber security. For one thing, as covered on the media, ransomware gangs and extortionists have breached 52 US critical infrastructure organizations, including those belong to energy, financial services, government, critical manufacturing, and information technology sectors. Even for large, state-of-the-art tech firms such as Samsung is no easy escape of a target of such ransomware hit. The interest in writing this blog is to inform the persisting challenge of this cyber security concern, in terms of the costs caused and large scale of impact across sectors.
References:
https://www.csoonline.com/article/3652335/extortion-group-teases-190gb-of-stolen-data-as-samsung-confirms-security-breach.html
https://cyber.vumetric.com/security-news/2022/03/07/fbi-ransomware-gang-breached-52-us-critical-infrastructure-orgs/
https://threatpost.com/samsung-lapsus-ransomware-source-code/178791/
Approved!
Hello Professor,
For my blog post, I plan to write about the data breach at Samsung that occurred a few days ago. I want to discuss Samsung’s response to the breach along, details of the leaked content, and how it could affect users of Samsung devices.
References:
https://thehackernews.com/2022/03/samsung-confirms-data-breach-after.html
https://www.bleepingcomputer.com/news/security/hackers-leak-190gb-of-alleged-samsung-data-source-code/
Approved!
For my blog post, I will talk about the problems with UEFI firmware vulnerabilities and it’s effects.
Source:
https://thehackernews.com/2022/03/new-16-high-severity-uefi-firmware.html
Approved!
Topic: Conti Ransomware gang hit with data leak
Description: In my blog article, I’ll talk about the Conti ransomware group and how they received a taste of their own medicine. I’ll also go into the specifics of the incident and how it affected organizations.
Links :
Krebs on Security – In-depth security news and investigation
After Declaring Support for Russian Invasion, Conti Ransomware Gang Hit With Data Leak – CPO Magazine
Oh, the irony! Conti ransomware gang, which leaked ransomware victims’ data, has its own data leaked (grahamcluley.com)
Approved!
Hello Professor,
My blog post will be on March 12, and I would like to talk about the extradition of Yaroslav Vasinskyi to the United States on March 3, 2022. I will also talk about the Russian-based hacker group REvil that he was allegedly a part of, and their role in the ransomware attack on the U. S. software company Kaseya that occurred in July 2021.
Links to some resources that I will be using:
https://www.msn.com/en-za/news/world/alleged-ukrainian-hacker-in-us-court-after-extradition-from-poland/ar-AAUR8aP?ocid=BingNewsSearch
https://www.itnews.com.au/news/kaseya-ransomware-attackers-trial-begins-577163
https://www.reuters.com/technology/hackers-demand-70-million-liberate-data-held-by-companies-hit-mass-cyberattack-2021-07-05/
https://en.wikipedia.org/wiki/Kaseya_VSA_ransomware_attack
https://www.cnn.com/2021/07/13/tech/revil-ransomware-disappears/index.html
Sorry I just realized that I made a typo, the blog post is scheduled for March 11, not the 12th as I originally said!
The extradition of Vasinskyi is good, but note that three other people have discussed REvil. Approved, as long as you make sure that you don’t duplicate their material.
In this blog article, I plan to discuss the Russian government sites that were hacked in a supply chain attack. I’d like to do this topic because I believe it will raise awareness about the issue, as websites have been hacked as part of a supply chain attack.
https://www.bleepingcomputer.com/news/security/russian-government-sites-hacked-in-supply-chain-attack/
https://securityaffairs.co/wordpress/128853/breaking-news/russian-government-sites-supply-chain-attack.html
https://www.ft.com/content/a8e7c9a2-5819-424f-b087-c6f2e8f0c7a1
Approved!
For my blogpost I would like to discuss the recent developments regarding the “Iranian state-sponsored” hacker group MuddyWater and their current activities within Middle Eastern and Asian Countries. My blogpost will be on March 14.
Sources:
https://thehackernews.com/2022/03/iranian-hackers-targeting-turkey-and.html
https://www.techrepublic.com/article/muddywater-targets-middle-eastern-and-asian-countries-in-phishing-attacks/
Chirag already discussed MuddyWater on Feb 28. Approved, as long as what you’re discussing is recent developments since then.
For my blog post scheduled on March 16th, I would like to discuss the topic of TLS / SSL with a focus on Russia’s creation of its own TLS certificate authority in an attempt to address the issues with accessing websites due to the sanction imposed over Ukraine invasion.
Sources:
https://www.itworldcanada.com/article/experts-skeptical-new-russian-certificate-authority-will-evade-sanctions/475693
https://en.wikipedia.org/wiki/Transport_Layer_Security
https://www.internetsociety.org/deploy360/tls/basics/
Approved!
I would like to write my blog post on scammers impersonating government officials. My blogpost is on March 14th.
https://blog.malwarebytes.com/scams/2022/03/extortion-fbi/
https://www.ic3.gov/Media/Y2022/PSA220307
Approved!
Sebastien Vachon-Desjardins, a former Canadian government employee, was recently extradited to the US to face charges pertaining to the NetWalker ransomware attacks. In my blog post scheduled for March 16, I intend to cover how the ransomware operated, as well as Vachon-Desjardins’s role in these offenses.
References:
https://www.infosecurity-magazine.com/news/netwalker-suspect-extradited-to-us/
https://techcrunch.com/2022/03/11/netwalker-extradited-bitcoin-seized/
Approved!
For my blog post I would like to talk about google purchasing the cyber security firm Mandiant and the importance of larger companies investing in cyber security to protect users/consumers from online threats.
https://finance.yahoo.com/news/google-buy-cybersecurity-firm-mandiant-113342878.html
https://abcnews.go.com/Business/wireStory/beefing-security-google-buys-mandiant-54-billion-83315471
https://www.theverge.com/2022/3/8/22966907/google-buying-mandiant-cybersecurity-outfit-5-4-billion
Approved!
I plan on writing about War censorship exposes Putin’s leaky internet controls. My blog post will be on March 16.
Source:
https://abcnews.go.com/Business/wireStory/war-censorship-exposes-putins-leaky-internet-controls-83425364
Approved!
I’m planning to write my post on the Linux “Dirty Pipe” vulnerability which gives unprivileged users, root access to a linux system. My post will be on March 15.
References:
https://blog.malwarebytes.com/exploits-and-vulnerabilities/2022/03/linux-dirty-pipe-vulnerability-gives-unprivileged-users-root-access/
https://thehackernews.com/2022/03/researchers-warn-of-linux-kernel-dirty.html
Approved!
My blog post is scheduled on March 16, I would like to talk about SEC (Securities and Exchange Commission) votes to propose new rules for cybersecurity disclosure and incident reporting.
Source:
https://www.jdsupra.com/legalnews/sec-votes-to-propose-new-rules-for-6423326/
Sorry, My blog post is scheduled on March 15 not March 16
Approved!
My blog post on March 17 will be about the possibility of cyber security companies based in Russia being compromised or coerced by the Russian government. Recently, Germany’s cyber security authority, the Federal Office for Information Security (BSI), has warned against using anti-virus software from Russian headquartered company Kaspersky.
Sources:
https://www.bsi.bund.de/DE/Service-Navi/Presse/Pressemitteilungen/Presse2022/220315_Kaspersky-Warnung.html
https://www.bbc.com/news/technology-60738208
https://www.reuters.com/technology/germany-issues-hacking-warning-users-russian-anti-virus-software-kaspersky-2022-03-15/
Approved!
For my blog post on march 18, I would like to talk about the recent email phishing scam on OpenSea(an NFT market place) that lead to 17 users losing their NFTs, and other methods that people have used to steal NFTs in the past.
Source:
https://www.pcrisk.com/removal-guides/23109-opensea-email-scam
https://www.theverge.com/2022/2/20/22943228/opensea-phishing-hack-smart-contract-bug-stolen-nft
https://www.youtube.com/watch?v=TIyNE_QASh8
https://research.checkpoint.com/2021/check-point-research-prevents-theft-of-crypto-wallets-on-opensea-the-worlds-largest-nft-marketplace/
Approved!
Hi, for my blog post I would like to talk about the uptake of cloud services and their lagging security measures. This post would be based on the recent discovery of over 2000 database backends to mobile applications or cloud services found to be exposed by VirusTotal. These exposed databases ranged from dating profiles to hotel reservations and banking information. I would be posting this on Friday, March 18th.
Links:
https://www.darkreading.com/application-security/mobile-app-developers-leave-behind-2-100-open-databases
https://blog.checkpoint.com/2022/03/15/stop-neglecting-your-cloud-security-features-check-point-research-found-thousands-of-open-cloud-databases-exposing-data-in-the-wild/
Approved!
I would like to write my March 17 blog post on the recent attack on the gaming company Ubisoft.
https://thehackernews.com/2022/03/gaming-company-ubisoft-confirms-it-was.html
https://www.zdnet.com/article/ubisoft-reveals-security-incident-forcing-company-wide-password-refresh/
Approved!
I want to make my blog post about the recent attack by a Russian state-sponsored group on a unnamed NGO by exploiting the default settings of Multifactor Authentication Protocols offered by Duo MFA. My blog post is scheduled for March 19 and I will be using information from the following sources:
https://thehackernews.com/2022/03/fbi-cisa-warn-of-russian-hackers.html
https://nakedsecurity.sophos.com/2022/03/16/russian-actors-bypass-2fa-story-what-happened-and-how-to-avoid-it/
https://www.computing.co.uk/news/4046576/law-enforcement-warn-immediate-russian-hacking-threat-mfa
Approved!
I want to discuss about AI-in Drone technology that has been spotted in the Russia-Ukraine war. My blog post will be Friday, MArch 18
https://www.wired.com/story/ai-drones-russia-ukraine/
https://www.wevolver.com/article/artificial-intelligence-in-drone-technology/
https://medium.com/vsinghbisen/how-ai-based-drone-works-artificial-intelligence-drone-use-cases-7f3d44b8abe3
Approved!
For my post, I’d like to write about a cyberattack launched against SATCOM terminals in Europe. SATCOM terminals are used to communicate with and send data using satellites. As a result of this attack, there was a partial outage of residential broadband services in Ukraine and other European countries. My post is scheduled for March 23.
Sources
https://www.reversemode.com/2022/03/satcom-terminals-under-attack-in-europe.html (this source was linked by Schneier On Security, and was updated on the 12th)
https://techcrunch.com/2022/03/18/cisa-fbi-satellite-networks/ (posted on the 18th)
https://www.goincognito.co/info-massive-cyber-attack-in-europe/ (posted on the 14th)
https://www.reuters.com/world/europe/exclusive-us-spy-agency-probes-sabotage-satellite-internet-during-russian-2022-03-11/ (posted on the 11th and updated on the 12th)
Approved!
For my blog post, I plan to write about the CafePress previous owner fined $500,000 for ‘shoddy’ security in which CafePress leaked user’s information and used the less secure SHA-1 hashing algorithm. Blog Post Date: Mar 24, 2022.
Here are the references:
https://www.zdnet.com/article/cafepress-fined-500-million-for-shoddy-security-covering-up-data-breach/
https://it.slashdot.org/story/22/03/20/2351231/cafepresss-previous-owner-fined-500000-for-shoddy-security-covering-up-data-breach
Approved!
For my blog post, I plan to write about Flash loan attack on One Ring protocol which netted the attackers a 1.4 million dollar profit on monday March 21st. Blog Post Date: Mar 28, 2022
References:
https://portswigger.net/daily-swig/flash-loan-attack-on-one-ring-protocol-nets-crypto-thief-1-4-million
Approved!
Hi,
I intend to write my blog post to elaborate on a recently discovered bug that affects Honda vehicles’ keyless remote system. This bug allows an attacker to gain access to the vehicle and allows them to start the engine. This is caused by Honda neglecting to utilize encrypted radio frequencies for their keyless remote systems. This topic concerns me because my own vehicle is among those affected by this bug.
I will post my blog on April 1st
Article links:
https://thehackernews.com/2022/03/hondas-keyless-access-bug-could-let.html
https://www.bleepingcomputer.com/news/security/honda-bug-lets-a-hacker-unlock-and-start-your-car-via-replay-attack/
https://informationsecuritybuzz.com/expert-comments/honda-bug-lets-a-hacker-unlock-and-start-your-car-via-replay-attack/
https://latesthackingnews.com/2022/03/29/researchers-release-car-exploit-that-allows-hackers-to-lock-unlock-and-start-hondas/https://www.itsecuritynews.info/hackers-can-use-a-replay-attack-due-to-a-honda-vulnerability/
Approved!
I wish to write about Ukraine deciding on utilizing Clearview AI and the dangers of allowing government entities having access to such tools, letting them use such tools to make decisions that effect people’s lives without any accountability.
My references:
https://privacyinternational.org/news-analysis/4806/clearviewukraine-partnership-how-surveillance-companies-exploit-war
https://www.moosejawtoday.com/local-news/big-brother-scott-moe-plans-to-reduce-what-little-privacy-we-have-left-5207913
https://www-memurlar-net.translate.goog/haber/1021278/bylock-kullanicisi-feto-sanigina-6-yil-3-ay-hapis-cezasi.html?_x_tr_sl=tr&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp
https://beyazgazete-com.translate.goog/haber/2022/3/29/ankara-da-bylock-operasyonu-evlere-kod-gondermisler-6468101.html?_x_tr_sl=tr&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp
I wish to write about Saskatchewan deciding on utilizing a platform named Digital Identity and the dangers of allowing government entities to use such tools, having free governance over our data without much accountability. My post date is: April 1st at 01:00 AM.
My references:
https://www.moosejawtoday.com/local-news/big-brother-scott-moe-plans-to-reduce-what-little-privacy-we-have-left-5207913
https://privacyinternational.org/news-analysis/4806/clearviewukraine-partnership-how-surveillance-companies-exploit-war
https://www-memurlar-net.translate.goog/haber/1021278/bylock-kullanicisi-feto-sanigina-6-yil-3-ay-hapis-cezasi.html?_x_tr_sl=tr&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp
https://beyazgazete-com.translate.goog/haber/2022/3/29/ankara-da-bylock-operasyonu-evlere-kod-gondermisler-6468101.html?_x_tr_sl=tr&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp
Approved (I assume you’re going with this one as opposed to the previous topic about Clearview in the Ukraine?).
Hello,
For my blog post, I would like to write about Ukraine destroying bot farms that spread misinformation to their citizens.
References:
https://www.zdnet.com/article/ukraine-takes-out-five-bot-farms-spreading-panic-among-citizens/
Approved!
I wanted to talk about those companies who are hit by the okta hack, (Okta is an authentication company and they were hit which has impacted so many different firms). Blog post date: 31st March 2022.
Sources:
https://www.bbc.com/news/technology-60849687
https://www.reuters.com/technology/authentication-services-firm-okta-says-it-is-investigating-report-breach-2022-03-22/
Approved!
For my blog post, I would like to write about the UPS (uninterruptible power supply) vulnerability that was the subject of a CISA alert in this post:
https://threatpost.com/cyberattackers-ups-backup-power-critical-environments/179169/
For my blog post, I would like to write about the Mars Stealer Malware that has been using Google Ads to spread.
References:
https://thehackernews.com/2022/03/researchers-expose-mars-stealer-malware.html
Approved (I assume you’re going with this one and not the UPS topic?)
Hello,
My blog post is April 1st, and I plan to write about Russia’s decision to consider bitcoin payments for oil and gas from “friendly countries.”
The war between Ukraine and Russia caused tension between Russia and NATO countries. As sanctions from western countries stiffen over its invasion of Ukraine, Russia considers accepting bitcoin as payment for oil and gas from allied countries. In my blog post, I will discuss the consequences this decision has on Russia, NATO countries including Russia’s allies.
References:
https://www.google.ca/amp/s/www.bbc.com/news/business-60870100.amp
https://www.google.ca/amp/s/www.marketwatch.com/amp/story/russia-hints-that-it-may-accept-payment-for-oil-in-bitcoin-analysts-say-that-may-not-be-so-easy-11648214344
https://www.google.ca/amp/s/www.cnbctv18.com/cryptocurrency/russia-may-accept-bitcoin-as-oil-and-gas-export-payments-from-friendly-countries-12954772.htm/amp
https://www.google.ca/amp/s/www.forbes.com/advisor/in/investing/what-is-bitcoin-and-how-does-it-work/%3famp=1
Approved!
My blog post is scheduled for April 1st and I would like to discuss the potential threat of cyber attacks on “smart” cars. In particular Honda and Acura vehicles. My blog post will go over how a bug in smart cars can lead to an attacker taking full control over a vehicle.
References:
https://threatpost.com/automaker-cybersecurity-lagging-tech-adoption/179204/
https://github.com/HackingIntoYourHeart/Unoriginal-Rice-Patty
Approved!