Blog Post Reservation

Welcome to the Winter 2022 CPSC 329/602 blog! Looking forward to some fun and interesting discussions.

Please reserve the topic for your blog post by adding a comment to this post, stating the topic you plan to cover, a short justification, and one or more links to external cites as evidence that your topic has indeed occurred in the last 7 days. We will approve your requests or offer comments if it is not deemed to be suitable. The main criteria for suitability are relevance to the course, whether the topic is sufficiently current, and whether it has already been covered by another student.

Please post your topic reservation requests at most 72 hours before your posting date and at least 24 hours, excluding weekends. For example, if you are posting on a Monday make sure to submit your reservation request by Friday at the latest. I will be sure to approve any outstanding requests by 4:30 PM every Monday through Friday.

When you are ready to make your post, please create a new post as opposed to commenting on this one – comments on this post will be reserved for topic reservations and approvals. Note that you can post any time on the day you reserved.

Join the Conversation

321 Comments

  1. I intend for my blog post to touch on an article from January 11 published on threatpost.com.
    The subject discusses growing concern over malware-infested USB sticks being shipped to government organizations and private businesses, posing as packages originating from federal departments. These heinous attempt to infect and damage critical economic infrastructure is serious as the pandemic has made easy-access to the internet critical. Malware has been a growing issue since the beginning of the pandemic and its instigators seek to exploit and manipulate vulnerable individuals and organizations for their own benefit.
    I will post my blog on January 17. The following link leads to the article I will elaborate further on by said date. The following link is the article in question.

    https://threatpost.com/fin7-mailing-malicious-usb-sticks-ransomware/177541/

  2. I intend for my blog post to elaborate on the article from itpro.co.uk published on January 13 RE:Golang Ransomware Cross-Platform Attacks
    The article discusses the means which attackers use Golang to attack multiple platforms (Windows/Linux) for more efficient attacks. These attacks re-use malicious code on multiple platforms which allows for a more efficient/effective attack on a larger base of users. These attackers require bitcoin payment for release of malware (remove ransomware from important files) which also makes it much harder to shut these individuals down as linking payments to the individual becomes complicated. I might reference UofC’s ransomware history alongside some other exmaples to demonstrate the significance/impact/importance/relevance of these security issues.
    My blog post will be submitted on January 18 and the reference link to the article is: https://www.itpro.co.uk/security/ransomware/361965/ransomware-rewritten-golang-to-target-windows-linux-users

  3. Hey everyone,

    I am planning to write about cyberwarfare. More specifically, I want to focus on how some governments had used the internet as a form of warfare thereby avoiding explicit aggression against nation-states, undermining democracy in western countries, and spreading propaganda. 

    Sources:

    https://www.cbsnews.com/news/ukraine-cyber-attack-russia-us-nato-donbas-war-amabssador-markarova/

    https://citizenlab.ca/2022/01/project-torogoz-extensive-hacking-media-civil-society-el-salvador-pegasus-spyware/

    https://www.theglobeandmail.com/politics/article-spy-agency-briefing-mps-to-beware-of-influence-operations-from-china/

    https://www.virusbulletin.com/uploads/pdf/magazine/2021/202112-collector-stealer.pdf

    Posting date: January 17th

  4. For my blog post I wish to talk about an event that has articles posted on WIRED, Krebson security, and threatpost. These articles were posted on January 14th and discusses how Russian security arrested a ransomware gang called REvil.

    The articles talk about how and why the Russian government arrested this group, as the US government had previously asked them to. The articles state that a potential reason they did this was because of the tensions at the Ukraine border. The group REvil has previously been involved in numerous ransomware attacks on large American companies, most notably on the Colonial pipeline attack which caused the price of gasoline to rise on the east coast for a while.

    I will post my blog post on January 19, 2022 and the links to the articles above are:
    https://threatpost.com/russian-security-revil-ransomware/177660/
    https://www.wired.com/story/russia-revil-ransomware-arrests-ukraine/
    https://krebsonsecurity.com/2022/01/at-request-of-u-s-russia-rounds-up-14-revil-ransomware-affiliates/

    1. Approved. Note, though that your topic is the same as Daniel’s. This is my error – unfortunately I saw his comment first while yours was stuck in the waiting for approval queue. So, you and Daniel can both post on this topic and going forward I’ll be sure to look for unapproved comments that aren’t yet appearing in the blog before approving topics!

  5. I intend for my blog post to cover an article posted on threatpost.com about a recent EA FIFA Ultimate Team account takeover resulting in valuable accounts being stolen posted on January 12th.
    Using some pretty basic social engineering, attackers managed to pressure customer support to change the emails of valuable accounts (worth sometimes in the 1000’s of dollars) without the account holders consent, bypassing normal checks and emails that would normally be sent. This resulted in said accounts being cleared of their resources, and shows a pretty clear example of how humans can be the weakest link in a security system.
    My blog post will be submitted on January 18th, and the reference link to the article is: https://threatpost.com/phishers-ea-gamers/177575/ as well as the press release from EA: https://www.ea.com/en-gb/games/fifa/fifa-22/news/pitch-notes-fifa-22-account-takeover-update

  6. For my blog post I’d like to discuss Russia’s arrest of numerous members of the “REvil” ransomeware group. This group has been responsible for numerous cyberattacks in the past, as well as one of the arrested individuals supposedly being responsible for the attack on the Colonial Pipeline. This is very relevant, as although some of their attacks happened last year, the attacks were impactful and their arrests are recent (last Friday).

    https://www.washingtonpost.com/world/2022/01/14/russia-hacker-revil/

  7. For my blog post, I plan to provide an overview and explain an article from threatpost.com and forbes.com.

    The article investigates a contemporary security model called Zero-trust that emphasizes the importance to “trust no one, verify eveyone.” Given the ever-changing landscape of online access from in-office desktops to mobile phones, it is important now more than ever to develop security protocols that constantly verify users and ensure they aren’t infiltrators. With these systems, cyber attackers will be confined to smaller areas of the network environment allowing security teams to prevent damage earlier.

    My blog post will be scheduled for January 18th. The following links are the sources of my information:

    https://threatpost.com/zero-trust-future-security-risks/177502/
    https://www.forbes.com/sites/forbestechcouncil/2022/01/13/why-you-need-a-zero-trust-cybersecurity-plan/

  8. I would like to rewrite about WordPress’ Plug-in Vulnerabilities. As someone who possesses little computer science knowledge, I would like to “dumb down” this current event so that “anyone” can somewhat become aware of this cybersecurity vulnerability – especially how CPSC 329 is using WordPress. If this focus is not “specific enough”, I would love to hear thoughts on how I can approach this topic.

    References: 

    https://itwire.com/security/warning-over-increasing-flaws-in-third-party-wordpress-plugins.html

    https://www.theweek.in/news/biz-tech/2022/01/13/what-the-log4j-vulnerability-is-capable-of-and-why-you-should-be-worried.html

    https://itbrief.co.nz/story/wordpress-vulnerabilities-more-than-doubled-in-2021

    1. I would like to rewrite about WordPress’ Plug-in Vulnerabilities.

      As someone who possesses little computer science knowledge, I would like to “dumb down” this current event so that “anyone” can somewhat become aware of this cybersecurity vulnerability – especially how CPSC 329 is using WordPress. If this focus is not “specific enough”, I would love to hear thoughts on how I can approach this topic.

      References: https://itwire.com/security/warning-over-increasing-flaws-in-third-party-wordpress-plugins.html
      https://www.theweek.in/news/biz-tech/2022/01/13/what-the-log4j-vulnerability-is-capable-of-and-why-you-should-be-worried.html
      https://itbrief.co.nz/story/wordpress-vulnerabilities-more-than-doubled-in-2021

      1. My attempts to correct my previous comments’ formatting has failed hahaha! My apologies!

  9. For my blog post, I want to elaborate on a lawsuit that occurred in the UK for £2.3 billion on Facebook. According to the lawsuit, Facebook has set an unfair expectation, by handing over user’s personal data, without giving them adequate compensation for stealing said data, covering the time period from October 1, 2015 to December 31, 2019. I might talk about the importance of privacy regarding social media in general, personal thoughts about the matter, as well as how relevant this lawsuit is about market dominance at the cost of user’s privacy.

    Posting Date: January 20, 2022

    References:
    https://www.theguardian.com/technology/2022/jan/14/meta-sued-for-23bn-over-claim-facebook-users-in-uk-were-exploited

    https://www.pymnts.com/legal/2022/uk-lawsuit-claims-facebook-exploited-personal-data-of-44-million-users/

    https://www.mirror.co.uk/news/uk-news/every-uk-facebook-user-could-25954863

  10. I will be writing about a Chinese cyber hacker group called “Earth Lusca”. They have been spying on government institutions, big organizations, and high-profile targets worldwide potentially for the interest of the Chinese government. They have also been involved with financial attacks for their own gain. I will be going in detail about how these attacks are being orchestrated, what they are gaining out of it, and how these attacks can potentially be minimized/stopped.

    Posting Date: Thursday, January 20, 2022

    References:
    https://therecord.media/earth-lusca-threat-actor-targets-governments-and-cryptocurrency-companies-alike/
    https://thehackernews.com/2022/01/earth-lusca-hackers-aimed-at-high-value.html
    https://www.trendmicro.com/en_id/research/22/a/earth-lusca-sophisticated-infrastructure-varied-tools-and-techni.html
    https://securityaffairs.co/wordpress/126868/hacking/earth-lusca-campaigns.html?utm_source=rss&utm_medium=rss&utm_campaign=earth-lusca-campaigns

  11. I am thinking of doing a blog post on a very recent piece of news related to global cybersecurity threats. On January 15th, 2022, Microsoft discovered destructive malware targeting Ukrainian organizations. This malware was found on victim systems in Ukraine, and is being used in cyberattacks against the Ukrainian government. I will also discuss the recent political tensions between the two countries and the ways in which these tensions have led to an increase in cybersecurity threats in the region. My blog post date is Wednesday, January 17th. 

    Sources:

    https://www.microsoft.com/security/blog/2022/01/15/destructive-malware-targeting-ukrainian-organizations/

    https://www.nytimes.com/2022/01/16/us/politics/microsoft-ukraine-cyberattack.html

    https://www.reuters.com/world/europe/microsoft-says-it-observed-destructive-malware-systems-belonging-several-ukraine-2022-01-16/

  12. For my blog, I would like to write about the fictitious cyberattack that the EU used to stress test a Finnish power company. I would elaborate on how disastrous these large scale cyberattacks can be, and why it’s so important to test your systems and create preventative measures. I also plan to discuss how these government run stress tests could positively or negatively affect public perception of their own security and privacy.

    Posting Date: January 20, 2022
    References:
    https://www.bloomberg.com/news/articles/2022-01-15/eu-targets-fictitious-finnish-power-company-in-cyberattack-test
    https://www.computerworld.com/article/3647369/uk-government-ignites-debate-over-privacy-vs-safety.html

  13. Hi all, For my blog post I would like to cover an article posted on the itworldcanada and techcrunch website. The article’ topic is on open source libraries and how a developer tweaked an open-sourced code as a protest for proper compensation. Besides the security & privacy aspect of tech, I chose the topic to touch on the ethics side and possibly on implications of tech-related subjects being ‘open’.

    Reference:
    https://www.itworldcanada.com/article/protest-by-open-source-developer-raises-questions-about-compensation-and-ethics/470489

    https://techcrunch.com/2022/01/18/open-source-developers-who-work-for-free-are-discovering-they-have-power/

    https://www.bleepingcomputer.com/news/security/dev-corrupts-npm-libs-colors-and-faker-breaking-thousands-of-apps/

    my blog post’s supposed schedule: Jan 19, 2022

  14. Hello everyone, the topic I would like to discuss the Log4J exploit. Specifically focusing on the breadth of users affected (this includes personal computers and corporations). I’ll introduce Apache Log4j, its intended uses, and the exploit. There will be code snippets provided from the links.

    Links:

    https://logging.apache.org/log4j/2.x/security.html
    https://threatpost.com/microsoft-rampant-log4j-exploits-testing/177358/
    https://security.googleblog.com/2021/12/understanding-impact-of-apache-log4j.html
    https://cyber.gc.ca/en/alerts/active-exploitation-apache-log4j-vulnerability

  15. For my blog post I intend to discuss the article on Google Project Zero which discusses some recently addressed issues with zoom and the ability to preform zero click attacks on the app. With the recent extension of online learning, I believe this is extremely current, and also applicable to all of us!

    References:
    https://googleprojectzero.blogspot.com/2022/01/zooming-in-on-zero-click-exploits.html

    Blog Post Date:
    Monday Jan 24th (Requesting early to avoid weekend related delays)

  16. For my blog post, I would like to write about the recently discovered security flaws in China’s mandatory Olympics smarphone application. Specifically, how the app allows for man-in-the-middle attacks, and other key vulnerabilities.

    References:
    https://citizenlab.ca/2022/01/cross-country-exposure-analysis-my2022-olympics-app/
    https://threatpost.com/beijing-olympics-app-flaws-allow-man-in-the-middle-attacks/177748/#:~:text=The%20mobile%20app%20that%20all,user%20information%2C%20researchers%20have%20found.

    Blog post date: January 21

  17. For my blog post, I plan on writing about a recently discovered bug in apples browsers. Using a function that is designed to let a website know the databases the browser has stored, but only see the name of it. I want to go over how even this small leak can have more then expected consequences for privacy and perhaps give some insight into what the code that caused this may have looked like. https://nakedsecurity.sophos.com/2022/01/18/serious-security-apple-safari-leaks-private-data-via-database-api-what-you-need-to-know/
    https://www.macworld.com/article/605562/safari-15-bug-expose-browsing-activity-personal-data.html
    Blog Post Date: January 25

  18. I want to write about fake gift card balance checking websites that have popped up stealing users’ account balances for my blog post. I feel like this is a very relevant issue as being trapped inside due to COVID-19, many users are using credit cards or gift cards to purchase items online and can be caught off guard by these similar-looking fake websites.
    Here is the link to the article: https://blog.malwarebytes.com/scams/2022/01/steer-clear-of-gift-card-balance-scams/
    Blog Post Date: January 24

  19. I plan to write about the recent potential vulnerability of Cisco’s StarOS system and its fixes. It would be interesting to explore why the system was vulnerable in the first place, as well as why it’s important that it gets patched ASAP before anyone can attack it. This incident would also be a good example of how one needs to know how to attack the system with various methods, in order to know how to defend it.

    My post is scheduled for January 24th. Here are the initial sources:
    https://thehackernews.com/2022/01/cisco-issues-patch-for-critical-rce.html
    https://www.bleepingcomputer.com/news/security/cisco-bug-gives-remote-attackers-root-privileges-via-debug-mode/

  20. I plan on writing about the growing business of selling illegal credentials, and the possible emergence of businesses charging to scrub people’s information from these sites. I want to touch on with the rise of the information economy, a black market of information is bound to pop up as well, and perhaps well known companies partake in activities that aren’t too far off from these credential chop shops. This is the main article I am basing the post off of, but I plan to add some others as well.
    https://krebsonsecurity.com/2022/01/crime-shop-sells-hacked-logins-to-other-crime-shops/

  21. I would like to talk about end to end encryption on the internet, and the current campaign that certain charities/organizations have against it. I’d like to discuss the pros/cons of E2EE objectively, common perspectives taken on it, etc. I think it’s a very interesting, somewhat controversial topic, and raises the question of whether too much privacy is necessarily a good thing.

    My post is on the 24th, and my source right now is: https://blog.malwarebytes.com/privacy-2/2022/01/campaign-launched-to-delay-social-media-end-to-end-encryption/

  22. For my blog post I intend to write about the remote code execution exploit that affects various PC releases of games developed by FromSoftware Inc.. I would like to touch on the severity of RCE exploits, and the controversial nature in which this specific vulnerability was disclosed and publicized (responsible vulnerability disclosure practices).

    Blog Post Date: January 25th, 2022.

    Source:
    https://www.theverge.com/2022/1/22/22896785/dark-souls-3-remote-execution-exploit-rce-exploit-online-hack

  23. For my blog post I intend to discuss the recent attacks on crypto wallets and crypto scams. I want to explore how they do these attacks as well as who the intended targets of these attacks are. I also want to talk about how countries like Russia are addressing the emerging cryptocurrency markets and the crypto wallet attacks as well as their implementations to support their local market while cracking down upon hackers.

    Sources:
    1. https://cyware.com/news/north-korean-hackers-stole-crypto-worth-400-million-in-2021-2a6bc28c
    2. https://cyware.com/news/bluenoroff-apt-group-eyeing-crypto-startups-35c36601
    3. https://www.scmagazine.com/analysis/policy/will-ransomware-gangs-see-flow-of-cash-throttled-by-russia-cryptocurrency-restrictions?&web_view=true
    4. https://www.zdnet.com/article/amazon-fake-crypto-token-investment-scam-steals-bitcoin-from-victims/?&web_view=true

    Blog Post Date: Jan 26, 2022

  24. I intend to write an post about the cyber security attack on the red cross. With the data of over 500,000 people leaked. This leaked data related to the names, locations and contact information of missing persons. Although the leaked information has not been published yet I feel it is still an important and interesting topic.
    Blog Post Date: January 26th, 2022
    Source: https://portswigger.net/daily-swig/red-cross-suffers-cyber-attack-data-of-515-000-highly-vulnerable-people-exposed
    https://www.theregister.com/2022/01/20/red_cross_hit_by_cyberattack/
    https://www.itworldcanada.com/article/cyber-security-today-jan-21-2022-data-theft-from-red-cross-a-us-labor-department-scam-and-a-new-firmware-bootkit-found/471040

  25. I plan to write my post about the recent exploit on the popular ‘Dark Souls’ franchise that allows attackers to remotely execute code on the user’s computer. This gives hackers the opportunity to cause lasting damage and take complete control of your PC. I think this is an important topic because this is a serious vulnerability that affects anyone that plays online Dark Souls.

    https://threatpost.com/dark-souls-servers-down-rce-bug/177896/
    https://nationalcybersecuritynews.today/dark-souls-3-elden-ring-doomsday-scenario-rce-hack-discovered-microsoft-hacking-cybersecurity/
    Blog Post Date: January 26, 2022

  26. For my blog post I would like to talk about the leaking of data through the browser on iOS, iPadOS and Mac. In this post I will talk about the default browser on Apple product and what causes the leak of data and what can you do to reduce the leak of data.

    Blog post Date : January 26th, 2022.
    Source: https://nakedsecurity.sophos.com/2022/01/18/serious-security-apple-safari-leaks-private-data-via-database-api-what-you-need-to-know/
    https://blog.malwarebytes.com/exploits-and-vulnerabilities/2022/01/browsers-on-ios-ipados-and-mac-leak-your-browsing-activity-and-personal-identifiers/

  27. For my blog post I would like to talk about Google Chrome’s critical RCE vulnerability in Safe Browsing. I will also explore more about what is safe browsing, how could attackers attack your system, and how could you protect yourself from this vulnerability as this issue has been fixed by Google.

    Blog post date: January 26th, 2022

    Source:
    1) https://blog.malwarebytes.com/exploits-and-vulnerabilities/2022/01/update-now-chrome-patches-critical-rce-vulnerability-in-safe-browsing/
    2) https://www.forbes.com/sites/gordonkelly/2022/01/21/google-chrome-warning-security-new-hacks-update-chrome-browser/?sh=7052be351cee

  28. Hello,

    I intend to write my blog post on the OpenSea (NFT marketplace) exploit that allowed for users to buy any NFT for significantly way below their market price and resell it for a profit. I’m interested in this topic because NFTs are in their relatively early stage right now and I just find it entertaining to follow on all things NFTs.

    https://www.zdnet.com/article/opensea-reimbursing-people-affected-by-bug-used-to-purchase-nfts-below-market-value/

    Date Posted: January 24, 2022

      1. Oh and one thing — sorry for the mix up:

        Meant to say the article was posted on January 24, 2022.

        My actual blog post date is on January 26, 2022.

  29. For my blog post I intent to write about SIM-Card swapping scam. I’d like to explore how hackers deceive a phone company into swapping a SIM card associated with one cellular phone to a new device, giving the hacker access to all of a person’s phone calls and text messages. Basically, the hacker would be able to steal a person’s cellular phone number, etc.. I’d also like to touch on the consequences of this SIM-Card swapping scam.

    Blog post date: jan 27th, 2022

    Some references to be used: https://www.idropnews.com/news/sim-swapping-explained-whats-sim-swapping-and-why-is-it-so-dangerous/176490/

  30. For my blog post i am willing to write about an analysis about working from home and risk to it’s security and privacy. As everything is pretty much online for Covid19; it think it’s would be great topic where privacy and security plays and important role.
    Some reference to be used: https://heimdalsecurity.com/blog/cybersecurity-issues-with-remote-work/
    https://link-springer-com.ezproxy.lib.ucalgary.ca/chapter/10.1007%2F978-3-030-78645-8_74
    Blog post date: feb 10, thu, 12 am- 1 am

  31. For my blog post, I would like to write about the recent Belarus railway ransomware attack. The attack was made by a group of hacktivists, who have given the Belarus government a list of demands, including the release of dozens of political prisoners as well as a commitment that Belarusian Railways will not transport Russian troops. I believe this is an interesting topic to discuss in terms of cybersecurity, due to the nature of the attack, and also politically, due to the increasing tensions between Russia and Ukraine in that region.
    Blog post date: Thursday, January 27th.
    Sources:
    https://www.wired.com/story/belarus-railways-ransomware-hack-cyber-partisans/
    https://www.infosecurity-magazine.com/news/belarus-activists-fire-ransomware/

  32. For my blog post (jan 27) I would like to write about the recent crypto phishing scam that occured today (Jan 25).
    Unknown cyber criminals were able to hijack a discord domain name and dran more than $150,000 worth of crypto currency out of multiple wallet addresses.
    The discord group was meant for the deployment of a new NFT collection hosted by Ozzy Osbourne, however things turned gray when a group of attackers created multiple fake domains and groups that fooled users into joining and submitting their information.
    Sources:

    https://threatpost.com/ozzy-osbourne-nfts-cryptocurrency/177969/
    https://threatpost.com/ozzy-osbourne-nfts-cryptocurrency/177969/
    https://indianexpress.com/article/technology/crypto/ozzy-osbourne-nft-scam-cryptobatz-followers-duped-off-thousands-of-dollars-7739620/

  33. For my blog post, I plan to write about the topic of phishing, more specifically about the relatively new NFT CryptoBatz. As the owner (Ozzy Osbourne) announced his new NFT, they also sent out a discord link to organize members and those who would like to sign-up. Unfortunately, this didn’t go as planned as prior to this announcement they had an old discord URL which was now abandoned. As a result, scammers took notice of this and created a dummy discord server with that same link. With it, they were able to access users’ crypto wallets and drain them as the users thought that it was the official discord server for CryptoBatz. I’d also like to make a little warning about common phishing scams, especially at u of c and at our class’ discord servers.
    Blog post date: Jan. 28th, Friday
    Sources:
    https://threatpost.com/ozzy-osbourne-nfts-cryptocurrency/177969/
    https://www.theverge.com/2022/1/21/22895126/ozzy-osbourne-nft-scam-cryptobatz-hack-ethereum

  34. For my blog post, I intend to write about about a recent DDoS attack on an Andorran community of Minecraft gamers that packed enough punch to effectively cripple the country’s only internet service provider. Specifically, I’d like my post to touch on the concept of DDoS attacks and the potential damage it is capable of dealing.
    Blog Post Date: January 27
    Sources:
    https://threatpost.com/cyberattacks-squid-game-minecraft-andorra-internet/177981/
    https://today.in-24.com/News/903725.html
    https://thedailyguardian.net/cyber-%E2%80%8B%E2%80%8Battacks-targeting-players-in-an-online-minecraft-tournament-leave-a-country-offline/

  35. For my blog post, I plan to write about the TrickBot malware which started off as a banking trojan (malware) back in 2016. As time went on, it is now being used for multiple notorious purposes such as downloading infected files onto the local computer, steal accounts info, injections, etc. Recently, TrickBot added an anti-debugging feature that allows it to avoid detection from security systems/analysis. This in turn troubled researchers as their browser would crash when they would try to “beautify” code making the process harder and more frustrating.

    Blog post date: Jan. 28, Friday

    Sources:
    https://thehackernews.com/2022/01/trickbot-malware-using-new-techniques.html
    https://threatpost.com/trickbot-crash-security-researchers-browsers/178046/

  36. Hey!
    Since my blog post submission date draws near, I ask to reserve a topic that we discussed in class recently regarding 2FA and focus on its flaws which led to a $35 million dollar theft in the form of crypto. This also leads me to discuss how 2FA should no longer be the standard for authentication and aim to transition to a multi-factor authentication alongside it’s overwhelming benefits in todays evolving standards.
    Blog post date: January 28th, 2022

    Cheers, looking forward to the next class!

    Sources:
    https://nakedsecurity.sophos.com/2022/01/21/cryptocoin-broker-crypto-com-says-2fa-bypass-led-to-35m-theft/

  37. I’m planning to write on North Korea’s Lazarus Group’s APT (Advanced Persistent Threat) which utilizes Windows Update and GitHub. I’d like to take a deep dive into how this malware operates, it’s potential impacts, real-world/recorded impacts, and how it avoided detection.

    This malware was reported on today (January 27) by MalwareBytes
    https://blog.malwarebytes.com/threat-intelligence/2022/01/north-koreas-lazarus-apt-leverages-windows-update-client-github-in-latest-campaign/

  38. For my blog post, I would like to discuss how Apple Airtag devices are being exploited to stalk and track people rather than being used for their primary function of locating personal goods. In particular, I would like to discuss how this poses a threat to individual’s privacy, security, and safety. I also want to discuss how individuals can protect themselves, as well as how Apple can improve its protections and safeguards to assure customer safety.

    Blog Post Date: Tuesday, February 2nd

    Sources:
    https://www.fox5ny.com/news/apple-airtags-privacy-group-demands-tech-giant-stop-selling-trackers
    https://www.cbsnews.com/news/apple-airtags-stalk-strangers/
    https://www.bbc.com/news/technology-60004257

  39. Hi! I am planning to write a blog on Cyber Terrorism and Security.
    Cyber terrorism ranks amongst the highest potential security threats in the world which can result into violence. It is usually politically motivated attacks that pose a threat against a nation. Just 4 hours ago UK firms warned over possible Russian cyber attacks amid Ukraine crisis. But, I plan to explore more about history, threats and definition of cyber terrorism. My date for blog posting is: 8 February, 2022.
    Source:
    https://www.theguardian.com/uk-news/2022/jan/28/uk-firms-warned-over-possible-russian-cyber-attacks-amid-ukraine-crisis

  40. I would like to write a blog about a recently discovered exploit that would have allowed a hacker to gain control of the Safari browser. This exploit was discovered by a researcher and has been patched in exchange for a rather large bug bounty. I would like to go more in-depth on the mechanism for the exploit (UXSS) and touch upon the importance of bug bounties.

    Source: https://blog.malwarebytes.com/exploits-and-vulnerabilities/2022/01/apple-fixes-mac-bug-that-could-have-allowed-takeover-of-webcams-and-browser-tabs/

  41. I would like to write about how hackers use device registration to attack enterprises and lateral phishing. Phishing continues to be the most dominant means for attacking enterprises to gain initial entry and continuous improvement of visibility and protections on managed devices has forced attackers to explore alternative avenues. I would like to go more in-depth about this topic and give an example about microsoft MFA feature has disclosed details of a large-scale, multi-phase phishing campaign that uses stolen credentials to register devices on a victim’s network to further propagate spam emails and widen the infection pool.

    source: https://thehackernews.com/2022/01/hackers-using-device-registration-trick.html
    my blog post is on Feb 1st 2022, Tuesday

  42. Hi! I would be writing about a cyberattack on the foreign ministry of Canada. The incident took place last Wednesday according to sources, causing disruption to many internet-based activities. I would be going in depth about the attack itself as well as explain what a foreign ministry is and why this incident is of importance to us. Furthermore, I will talk about the measures being taken to minimize these types of incidents from happening again.

    Sources:
    https://news.clearancejobs.com/2022/01/28/oh-canada-foreign-affairs-ministry-gets-hacked/
    https://www.cnn.com/2022/01/25/politics/hackers-canada-cyber-attack/index.html

    Post Date: 2nd Feb

  43. Hi, I would like to write about the dangers of a zero-day exploit on apple devices. The exploit allowed websites to track your browsing activity and reveal your identity in real-time. This exploit was discovered by a researcher and later fixed in the new security updates. I would like to go more in-depth about zero-day exploits and how to protect yourself from it.
    Source: https://www.bleepingcomputer.com/news/apple/apple-fixes-new-zero-day-exploited-to-hack-macos-ios-devices/
    Posting date: Feb 3rd, 2022
    I just realized this topic is 8 days old from my posting date…

  44. I would like to create a post in relations to Cybersecurity and their interactions and affects they may or already have on drone technologies. The blog will go into details of the dangers involving drones and their cyber vulnerabilities as well as potential counter measures used to combat this problem.

    Posting Date: Feb 1st, 2022
    Sources:
    https://www.tripwire.com/state-of-security/security-data-protection/cybersecurity-and-drones-how-to-address-the-security-threats/
    https://securityboulevard.com/2022/01/from-drone-to-counter-drone-the-shifting-role-of-cybersecurity/

  45. For my blog post I would like to talk about the reported $770 million dollars to social media scams. These scams range from buying items from scam websites that popped up as ads on social media to falling for investments ads. I would like to link back to our discussion in class on how to authenticate and identify if a website is credible to spend money on and give your personal information away on.

    Source 1: https://www.itworldcanada.com/post/95000-americans-lost-770-million-to-social-media-scams – Information about what’s happening
    Source 2: https://www.ftc.gov/news-events/blogs/data-spotlight/2022/01/social-media-gold-mine-scammers-2021 – Information about what’s happening
    Source 3:https://abc7.com/instagram-investment-scam-online-hackers-long-beach-woman/11509192/ – Example of falling for these scams on social media

    Blog Post Date: February 2nd, 2022

  46. For my blog date I intend to write about the KONNI remote access tool used by North Korean hackers. Interestingly, despite being rather outdated by now (at least 8 years old) it is still being actively developed. I intend to cover the changes it has undergone and to consider the threat that may be posed by updating older malware that is generally considered to no longer be a threat.

    Source: https://blog.malwarebytes.com/threat-intelligence/2022/01/konni-evolves-into-stealthier-rat/

  47. For my blog post, I would like to talk about a Taiwanese storage and networking equipment provider corporation called QNAP systems, which has been recently hit with a ransomware attack by a new ransomware group called deadbolt. The attack started on January 25th and Over 3600 of the QNAP customer’s network-attached storage (NAS) devices have been affected by this ransomware attack, which forced the corporation to force install a new update.

    Post date: Feb 3

    Sources:
    https://www.bleepingcomputer.com/news/security/new-deadbolt-ransomware-targets-qnap-devices-asks-50-btc-for-master-key/
    https://www.bleepingcomputer.com/news/security/qnap-force-installs-update-after-deadbolt-ransomware-hits-3-600-devices/
    https://threatpost.com/conti-deadbolt-delta-qnap-ransomware/178083/(this source also talks about a separate ransomware attack on another Taiwanese company which I won’t be talking about in my post)

  48. For my blog post I will be talking about the 2FA app that surfaced on google play and was unsurprisingly called “2FA Authenticator”. This app was equipped with the vulture stealer malware that has the ability to steal banking and financial data like your banking username and password for example. This app was downloaded more than 10,000 times before getting removed from the store. A report was released on the 24th of January 2022 by Pradeo, A French mobile-security firm that first discovered the hidden trojan on this app. I will be going into detail on how this all happened in my blog post.

    Sources:
    https://threatpost.com/2fa-app-banking-trojan-google-play/178077/
    https://securityboulevard.com/2022/01/banking-trojan-in-google-play-app-store-2fa-authenticator-drops-vultur-rat/
    https://www.tomsguide.com/news/fake-2fa-app-vultur-android-malware
    https://www.bollyinside.com/news/this-android-software-should-be-removed-immediately-according-to-a-security-group-before-it-wipes-your-bank-account

  49. For my blog post, I would like to discuss about the malicious incident regarding Zoom that happened back in April 2020 during the time of the pandemic. Furthermore, I would also like to discuss about the security flaws that Zoom had, the consequences of the attacks and finally how Zoom was able to regain their control.

    Blog Post Date:- 3rd February, 2022

    1. As per the rules posted on D2L, your topic has to be something that’s appeared in the news or reported on somewhere within 7 days of your posting date. So, unless you’re able to find another source discussing this that’s been posted within that time frame, I’m afraid you’ll need to pick a different more recent topic – sorry!

  50. For my blog post, I would like to talk about online tracking – something that happens when you are shopping in store. I want to explain in what and how many ways can you be tracked when visiting a store in-person. For example, you volunteer your personal information in order to connect the free in-store Wi-Fi, the MAC address of your phone instantly becomes the target that the know-it-better retailers are aiming.
    Blog Post Date:- 4th February, 2022
    sources :
    https://privacyrights.org/consumer-guides/online-privacy-using-internet-safely
    https://www.consumer.ftc.gov/articles/how-protect-your-privacy-online
    https://cybericus.com/best-anti-tracking-software/

    1. As per the rules posted on D2L, your topic has to be something that’s appeared in the news or reported on somewhere within 7 days of your posting date. I see that your 3rd reference (cybericus) is at least from 2022, but I can’t tell whether it’s within 7 days or not. If you can demonstrate that this topic has appeared somewhere on-line within that time frame then go ahead, but if not I’m afraid you’ll need something different that is more recent – sorry!

  51. For my blog post, I would like to talk about the severity of cyberattacks aimed at government officials. The incident I would specifically talk about is something that occurred quite recently where the existence of the Pegasus spyware developed by the NSO Group was found in the devices of Finnish diplomats.
    Blog post date: 5th February

    My sources:
    https://threatpost.com/nso-group-pegasus-spyware-finnish-diplomats/178113/

    https://www.bleepingcomputer.com/news/security/finnish-diplomats-phones-infected-with-nso-group-pegasus-spyware/

      1. Hello Professor,
        Yes, I will try to deviate from trying to write about the same topic but what aspect should I focus on for my post then? And should I just choose a different topic then professor?

        1. It’s up to you. I think you should be OK with your original topic if you focus more specifically on Pegasus (for example), but you should read Raffay’s post to be sure that you don’t overlap too much (you could also reference Raffay’s post and build off it in a new direction like more details on Pegasus). If you’re more comfortable with a different topic that’s also fine.

  52. In my blog post I intend to expand on and overview on an article cnet.com and 9to5google.com. The articles talk about Google’s privacy controls and what it knows about you and your location with the main goal being to learn to control or delete such data. It goes into detail about developments that have occurred in Google’s access to your information which essentially builds who you are as a person. I.E knows what ads to recommend to you, what is in your area etc. Another perspective is how this effects our workplace life which is covered in the 2nd article.
    https://www.cnet.com/tech/services-and-software/theres-a-way-to-delete-the-frightening-amount-of-data-google-has-on-you/
    https://9to5google.com/2022/02/02/google-workspace-search-history/

  53. For my blog post, I would like to write about a scam involving a well-known Italian art gallery, T293 and the clients of the gallery. Scammers had used a scheme known as the “man in the middle” where they would compromise and intercept emails between a business and clients, rerouting payments made by clients to themselves. The scammers created fake emails, posing as art directors from the gallery and contacted clients of T293 with offers.
    Source (published Feb 2nd, 2022) : https://news.artnet.com/art-world/t293-hack-2066827
    My blog post date: February 7th

  54. Posting on Monday, Feb 7th, 2022
    Apologies for the late reservation.
    The topic I plan to cover: Cybersecurity at the Winter Olympics
    A short justification: “Participants and viewers of the Olympics may install applications, such as those required to participate or stay in the country. There is a potential for malicious individuals to steal personal information/install tracking tools, malware, etc.”
    Links to external sites:
    https://nationalpost.com/sports/olympics/2022-winter-olympics-china-cybersecurity-burner-phones
    https://www.marketplace.org/shows/marketplace-tech/cybersecurity-concerns-both-internal-and-external-run-high-at-beijing-olympics/
    https://ca.sports.yahoo.com/news/china-is-watching-olympians-go-to-great-lengths-to-avoid-stolen-data-065952595.html

    1. I realized that there is a similar topic on this after writing my post, perhaps I can focus more on how to protect oneself from the cybersecurity dangers of travelling abroad?

  55. For my blog post I intend to write about the EARN IT act being reintroduced in the USA. This act would require social media companies to allow more government control on their systems. The goal of the act is to limit the amount of exploitative media and to decrease the immunity that tech companies have in allowing such media to remain on their sites.
    Post date: Feb 8, 2022
    Reference: https://www.protocol.com/bulletins/earn-it-act-back
    https://www.nextgov.com/policy/2022/02/earn-it-act-reintroduced-draws-criticism-over-encryption-implications/361437/

  56. For my blog post I intend to write about the end of the recent Tor bridge campaign (https://blog.torproject.org/wrapping-up-bridges-campaign/), and why it’s so important that bridges exist in the fight again internet censorship (https://blog.torproject.org/tor-censorship-in-russia/ -> this source is on the older side, but the first, and most recent source draws on information from this post so hopefully its use is okay?). This post would also include an explanation of how Onion browsers work and what exactly a bridge is.

  57. Hi

    I would like to write about Microsoft recently disabling internet macros by default in some of their office apps. Apparently their have been instances where malicious agents are taking advantage of the widespread use of Office Apps, and more specifically the use of VBA macros.

    Planned Post Date: Feb 9, 2022

    Sources:
    https://thehackernews.com/2022/02/microsoft-disables-internet-macros-in.html
    https://therecord.media/microsoft-blocks-internet-macros-by-default-in-five-office-applications/

  58. For my blog post I intend to write about the rise of malicious npm packages being used. This is important because JavaScript is a commonly used language and it’s widespread use across the internet makes the npm package manager very vulnerable to attacks. I would like to do this topic because I think it will bring awareness to this issue and hopefully help prevent one of my classmates from becoming a target.
    https://www.securityweek.com/1300-malicious-packages-found-popular-npm-javascript-package-manager
    https://cyware.com/news/the-growing-menace-of-malicious-npm-packages-7684d6c5

    1. My post date is Feb 10th and will also include a brief intro to what npm packages are

  59. For my post, I will briefly introduce the principle of facial recognition, and where it is currently used. As the technology has matured and become widely used in recent years, some major digital rights issues have been raised. I will also discuss the advantages and disadvantages of facial recognition over traditional information recognition technologies, whether it should be used for authentication, and security issues.
    Post date: Feb 15, 2022
    Reference : https://www.eff.org/deeplinks/2022/02/victory-irs-wont-require-facial-recognition-idme
    https://www.eff.org/deeplinks/2021/10/face-recognition-technology-commonly-used-terms

  60. For my post, I want to talk a little bit about the Maze ransomware gang announcing their retirement. The article will mainly review the past behavior of the Maze team, as well as my own thoughts on their retirement behavior.
    Post date: February 15,2022
    Reference:https://www.cpomagazine.com/cyber-security/maze-ransomware-group-infamous-for-adding-doxxing-threats-to-attacks-announces-it-is-shutting-down-its-cyber-crime-operation/
    https://blog.malwarebytes.com/ransomware/2020/11/maze-ransomware-gang-announces-retirement/
    https://www.securitymagazine.com/articles/93819-maze-ransomware-gang-retires

      1. I first saw it here, which was posted on February 10th。https://blog.malwarebytes.com/malwarebytes-news/2022/02/ransomware-author-releases-decryption-keys-says-goodbye-forever/

        1. Realized I got a bit confused and that actually there wasn’t anything on facial recognition so it’ll be fine
          I got it confused with age verification

          1. Apparently my brain was fried for the whole day and I’m gonna be late on the posting too. Also while the article didn’t mention “facial recognition” it did mention “face recognition” so there ya go.

  61. I’d like to cover the recent IRS decision to back out of partnering with a third party facial recognition software that they were going to use as a form of identity verification for taxpayers, and the ramifications this has on individual privacy and government policy around individuals’ information as a whole.

    My post date is Feb 15th.
    After looking at a broader span of articles, the very earliest mention from the IRS itself I could find was 8 days ago from the 15th, on Feb 7th, but most were within the 7 day period. Sources:
    https://www.eff.org/deeplinks/2022/02/victory-irs-wont-require-facial-recognition-idme
    https://www.irs.gov/newsroom/irs-announces-transition-away-from-use-of-third-party-verification-involving-facial-recognition
    https://help.id.me/hc/en-us/articles/4402754222615-IRS-What-does-ID-me-do-for-the-IRS- (from the initial consideration of the partnership)

    1. Actually, looking up a bit, it seems the IRS story is already reserved. Instead, I’d like to cover the recent fake Windows 11 installers that infect the users with password grabbing malware such as RedLine, and how that information is being gathered and sold on the dark web.
      Sources:
      https://www.zdnet.com/article/this-password-stealing-malware-posed-as-a-windows-11-download/
      https://www.bleepingcomputer.com/news/security/fake-windows-11-upgrade-installers-infect-you-with-redline-malware/

  62. For my blog post tomorrow I would like to write on France’s ruling of using Google Analytics as illegal under the European Union’s General Data Protection Regulation.
    I will write about why they made this decision and it means for us.
    Sources:
    https://tribune.com.pk/story/2343292/french-regulator-rules-google-analytics-illegal
    https://thehackernews.com/2022/02/france-rules-that-using-google.html
    https://www.pymnts.com/news/regulation/2022/french-privacy-regulator-rules-against-use-of-google-analytics/

  63. Hi,
    For my blog post scheduled for the 16th of this month I’d like to talk about twitter distancing themselves from their 2FA provider, the reason why they did so, as well lightly touch upon the privacy implications of the whole ordeal.

    Sources:
    https://blog.malwarebytes.com/privacy-2/2022/02/twitter-cans-2fa-service-provider-over-surveillance-claims/
    https://www.bloomberg.com/news/articles/2021-12-14/mitto-tells-clients-that-co-founder-departed-after-allegations-of-phone-spying

  64. Hi,
    I’d like to discuss a criminal group that was arrested in Spain recently for my blog post. They SIM-swapped and impersonated people to steal from their bank accounts, and I wanted to touch on habits that made the victims vulnerable to these attacks. My post is scheduled for Feb 16.
    P.s.: I wanted to cite the police report as well, but it’s in Spanish so I wanted to make sure that’s cool first? Sources:
    https://thehackernews.com/2022/02/spanish-police-arrest-sim-swappers-who.html
    https://www.policia.es/_es/comunicacion_prensa_detalle.php?ID=11102#

  65. For my blog post I would like to talk about the FritzFrog peer-to-peer botnet/worm. It mainly has targeted high value entities (schools, government agencies, etc), and it utilizes SSH to drop payloads. I mainly want to discuss what it aims to do, who it is attacking, and probably cover a bit of how it conducts itself. My post will go up on the 18th.

    References:
    https://thehackernews.com/2022/02/fritzfrog-p2p-botnet-attacking.html
    https://www.guardicore.com/labs/fritzfrog-a-new-generation-of-peer-to-peer-botnets/
    https://www.bleepingcomputer.com/news/security/fritzfrog-malware-attacks-linux-servers-over-ssh-to-mine-monero/

  66. In my Blog Post I want to write about the Cyclops Blink malware that is being attributed to the Sandworm group.
    In the post I want to explain what the malware does and how it does it. Furthermore I want to elaborate on the targeted people and the goal of the malware.
    As the malware has been around for some time (at least 2.5 years), I will give a brief timeline of updates since the first news about it.
    Date of Post: Feb. 28th
    References:
    https://blog.malwarebytes.com/threat-spotlight/2022/02/cyclops-blink-malware-us-and-uk-authorities-issue-alert/
    https://thehackernews.com/2022/02/us-uk-agencies-warn-of-new-russian.html
    https://www.cisa.gov/uscert/ncas/alerts/aa22-054a

  67. I’m looking to discuss double/triple ransomeware techniques as they relate in the recent survey from Venafi.
    This is for my blog post on March first.
    Source of recent survey:
    https://www.venafi.com/blog/venafi-survey-ransomware-evolves-double-and-triple-extortion-now-features-over-80-ransom
    Double/Triple Ransomeware Definitions Source (older than a week): https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/ransomware-double-extortion-and-beyond-revil-clop-and-conti

  68. Hi, for my blog post I would like to talk about how the hacking group “Anonymous” has recently taken down various Russian government websites since the start of the ongoing Ukraine conflict (i.e., via DDoS attacks). I would be posting this on Wednesday, March 2nd.
    References:
    https://www.abc.net.au/news/science/2022-02-25/hacker-collective-anonymous-declares-cyber-war-against-russia/100861160
    https://www.nationalturk.com/en/anonymous-hacks-gazprom-and-russia-ministry-of-defense-websites/
    https://www.hstoday.us/featured/anonymous-claims-hits-on-more-than-300-russian-cyber-targets-in-48-hours-including-gas-control-system/

  69. Hi Professor.
    For my blog post I would like to examine the Ukrainian government’s calls for state sponsored cyberattacks/hacktivism in response to the Russian military action against the Ukraine, and the use of state sponsored cyberattacks in general.
    References:
    https://www.itsecurityguru.org/2022/02/25/ukraine-calls-for-volunteer-hackers-to-aid-in-cyber-war/
    https://www.reuters.com/world/exclusive-ukraine-calls-hacker-underground-defend-against-russia-2022-02-24/
    https://www.infosecurity-magazine.com/news/ukraine-asks-for-hackers-help/
    https://www.infosecurity-magazine.com/news/anonymous-hacking-group-cyber-war/

    1. Approved, but make sure to look at some of the earlier posts. There are a few other people talking about different aspects of Russia vs. Ukraine – I think your take is different, bust have a look at the other proposals to make sure.

  70. For my blog post, scheduled for March 02, I would like to talk about the cyber-warfare/anti-disinformation actions taken by corporate, state, and non-state actors against Russia in response to their invasion of Ukraine. Specifically, I would like to cover topics like Meta’s recent restriction of Russian state media, Starlink’s impact on Ukrainian internet infrastructure, the impact of hacker groups like Anonymous, and actions being taken by governmental entities like the NSA.

    Resources:
    [1] https://www.itsecurityguru.org/2022/02/28/meta-restricts-russian-state-controlled-media/
    [2] https://www.itsecurityguru.org/2022/02/28/starlink-activated-to-keep-ukraines-internet-running/
    [3] https://www.itsecurityguru.org/2022/02/25/biden-considers-massive-cyber-attack-on-russia/
    [4] https://www.itsecurityguru.org/2022/02/25/ukraine-calls-for-volunteer-hackers-to-aid-in-cyber-war/
    [5] https://www.infosecurity-magazine.com/news/moscow-exchange-cyber-attack/

    1. There are a few other people already writing about Russia vs. Ukraine, also covering some aspects you mention (eg.Anonymous). I haven’t seen anyone mention Meta’s actions yet, so I approve this – just make sure you look at the earlier posts and reservations to make sure that you write about different things. Sadly, there’s plenty to talk about with this particular topic…

  71. Hi professor. For my blog post scheduled on March 03, I would like to illustrate the conflict between Nvidia and Ransomware Group Lapsus. I want to cover the process of cyber attacks initiated by Lapsus and how Nvidia hack it back as revenge.

    References:
    [1]https://metro.co.uk/2022/02/28/nvidia-hit-by-cyberattack-so-they-hack-the-hackers-as-revenge-16187846/
    [2]https://hothardware.com/news/lapsus-claims-nvidia-hacked-back-after-its-attack
    [3]https://portswigger.net/daily-swig/cyber-attack-on-nvidia-linked-to-lapsus-ransomware-gang

  72. I intend for my blog post to touch on an article from February 27 published on http://www.cnbc.com
    The subject discusses that person has more than 100 different online accounts requiring passwords, according to online password manager NordPass. But simple passwords can be extremely easy for hackers to figure out, allowing them stress-free access to your personal data and accounts. It mentioned the rate and number of attacks last year and pointed out the potential risk in our daily life.
    It might be a timely concern for individual privacy. However, the subject did not discuss the result or protection further. I have searched the common way for hackers to attack and how to protect ourselves.
    I will post my blog on Mar. 7th. The first following link leads to the article I will elaborate further on by said date. The rest of the following link is the article as a guide.
    References:
    https://www.cnbc.com/2022/02/27/most-common-passwords-hackers-leak-on-the-dark-web-lookout-report.html
    https://www.cnbc.com/2016/02/24/8-ways-to-protect-your-passwords-from-identity-theft-online.html

  73. I intend for my blog post to explore the security flaws in Electric Vehicle chargers, and how that impacts users and the growing industry. This is inspired by the attack on a Russian EV chargers amidst the Ukraine conflict. However, since Anonymous has been talked about in depth already, I will focus my blog post on specifically the EV charger hack and it’s implications.
    My blog post is scheduled for Friday, March 4th.
    References:
    https://insideevs.com/news/570958/russia-electric-car-chargers-hacked/
    https://www.independent.co.uk/news/world/europe/putin-charging-station-hacked-ukraine-russia-b2026260.html
    https://techcrunch.com/2021/08/03/security-flaws-found-in-popular-ev-chargers/
    https://finance.yahoo.com/news/hsb-cyber-survey-finds-electric-144100406.html?guccounter=1&guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNhLw&guce_referrer_sig=AQAAAB5oyL1ZaFztjCASBCvJLXgXGxQ0MXlHvhMgmh0LWg7qPZf8T1xs6M3rd4241-TYgNx5_6rin49cLAjydu9jo9UatecCIZMJprxlL16osmGHJ_s0nSY6oXbnbdVGN__GrqcDTiHkXBfZPW6mSSew2bfx-U2fY175znTPrI4jlf8u
    https://futurism.com/the-byte/ev-chargers-vulnerable-hacking

  74. Hello Professor,
    For my blog post scheduled on March 10, I would like to write about “SharkBot Banking Malware Spreading via Fake Android Antivirus App on Google Play Store.” This is a very recent incident (just a day ago), and interesting topic to discuss about. Here are my references:
    1. https://thehackernews.com/2022/03/sharkbot-banking-malware-spreading-via.html
    2. https://www.androidpolice.com/vicious-sharkbot-banking-trojan-discovered-in-play-store-antivirus-app/
    3. https://www.bleepingcomputer.com/news/security/sharkbot-malware-hides-as-android-antivirus-in-google-play/
    4. https://securityaffairs.co/wordpress/128765/malware/sharkbot-trojan-google-play.html?utm_source=rss&utm_medium=rss&utm_campaign=sharkbot-trojan-google-play

  75. My plan for my blog post will be regarding a recent update to Firefox that removed two use-after-free bugs from the browser that had previously allowed for actors to commit RCE attacks on users. This is based primarily on the post from Threatpost.com.
    Sources:
    https://threatpost.com/firefox-zero-day-bugs-rce-sandbox-escape/178779/
    https://encyclopedia.kaspersky.com/glossary/use-after-free/
    https://pure.security/introduction-to-use-after-free-vulnerabilities/

    others to be added as my research about UAFs continues before my post on march 10th

  76. Hello. My blog post will be on March 10th. I would like to talk about ransomware hit that leads to the security breach of data internal to an organization. I want to explain in what way and how ransomware hit work, and the concerns it causes on cyber security. For one thing, as covered on the media, ransomware gangs and extortionists have breached 52 US critical infrastructure organizations, including those belong to energy, financial services, government, critical manufacturing, and information technology sectors. Even for large, state-of-the-art tech firms such as Samsung is no easy escape of a target of such ransomware hit. The interest in writing this blog is to inform the persisting challenge of this cyber security concern, in terms of the costs caused and large scale of impact across sectors.
    References:
    https://www.csoonline.com/article/3652335/extortion-group-teases-190gb-of-stolen-data-as-samsung-confirms-security-breach.html
    https://cyber.vumetric.com/security-news/2022/03/07/fbi-ransomware-gang-breached-52-us-critical-infrastructure-orgs/
    https://threatpost.com/samsung-lapsus-ransomware-source-code/178791/

  77. Topic: Conti Ransomware gang hit with data leak
    Description: In my blog article, I’ll talk about the Conti ransomware group and how they received a taste of their own medicine. I’ll also go into the specifics of the incident and how it affected organizations.
    Links :
    Krebs on Security – In-depth security news and investigation
    After Declaring Support for Russian Invasion, Conti Ransomware Gang Hit With Data Leak – CPO Magazine
    Oh, the irony! Conti ransomware gang, which leaked ransomware victims’ data, has its own data leaked (grahamcluley.com)

  78. Hello Professor,

    My blog post will be on March 12, and I would like to talk about the extradition of Yaroslav Vasinskyi to the United States on March 3, 2022. I will also talk about the Russian-based hacker group REvil that he was allegedly a part of, and their role in the ransomware attack on the U. S. software company Kaseya that occurred in July 2021.

    Links to some resources that I will be using:

    https://www.msn.com/en-za/news/world/alleged-ukrainian-hacker-in-us-court-after-extradition-from-poland/ar-AAUR8aP?ocid=BingNewsSearch

    https://www.itnews.com.au/news/kaseya-ransomware-attackers-trial-begins-577163

    https://www.reuters.com/technology/hackers-demand-70-million-liberate-data-held-by-companies-hit-mass-cyberattack-2021-07-05/

    https://en.wikipedia.org/wiki/Kaseya_VSA_ransomware_attack

    https://www.cnn.com/2021/07/13/tech/revil-ransomware-disappears/index.html

    1. Sorry I just realized that I made a typo, the blog post is scheduled for March 11, not the 12th as I originally said!

  79. In this blog article, I plan to discuss the Russian government sites that were hacked in a supply chain attack. I’d like to do this topic because I believe it will raise awareness about the issue, as websites have been hacked as part of a supply chain attack.

    https://www.bleepingcomputer.com/news/security/russian-government-sites-hacked-in-supply-chain-attack/

    https://securityaffairs.co/wordpress/128853/breaking-news/russian-government-sites-supply-chain-attack.html

    https://www.ft.com/content/a8e7c9a2-5819-424f-b087-c6f2e8f0c7a1

  80. For my blog post scheduled on March 16th, I would like to discuss the topic of TLS / SSL with a focus on Russia’s creation of its own TLS certificate authority in an attempt to address the issues with accessing websites due to the sanction imposed over Ukraine invasion.
    Sources:
    https://www.itworldcanada.com/article/experts-skeptical-new-russian-certificate-authority-will-evade-sanctions/475693
    https://en.wikipedia.org/wiki/Transport_Layer_Security
    https://www.internetsociety.org/deploy360/tls/basics/

  81. Sebastien Vachon-Desjardins, a former Canadian government employee, was recently extradited to the US to face charges pertaining to the NetWalker ransomware attacks. In my blog post scheduled for March 16, I intend to cover how the ransomware operated, as well as Vachon-Desjardins’s role in these offenses. 

    References:  
    https://www.infosecurity-magazine.com/news/netwalker-suspect-extradited-to-us/
    https://techcrunch.com/2022/03/11/netwalker-extradited-bitcoin-seized/

  82. For my blog post I would like to talk about google purchasing the cyber security firm Mandiant and the importance of larger companies investing in cyber security to protect users/consumers from online threats.
    https://finance.yahoo.com/news/google-buy-cybersecurity-firm-mandiant-113342878.html
    https://abcnews.go.com/Business/wireStory/beefing-security-google-buys-mandiant-54-billion-83315471
    https://www.theverge.com/2022/3/8/22966907/google-buying-mandiant-cybersecurity-outfit-5-4-billion

  83. My blog post on March 17 will be about the possibility of cyber security companies based in Russia being compromised or coerced by the Russian government. Recently, Germany’s cyber security authority, the Federal Office for Information Security (BSI), has warned against using anti-virus software from Russian headquartered company Kaspersky.

    Sources:
    https://www.bsi.bund.de/DE/Service-Navi/Presse/Pressemitteilungen/Presse2022/220315_Kaspersky-Warnung.html
    https://www.bbc.com/news/technology-60738208
    https://www.reuters.com/technology/germany-issues-hacking-warning-users-russian-anti-virus-software-kaspersky-2022-03-15/

  84. For my blog post on march 18, I would like to talk about the recent email phishing scam on OpenSea(an NFT market place) that lead to 17 users losing their NFTs, and other methods that people have used to steal NFTs in the past.

    Source:
    https://www.pcrisk.com/removal-guides/23109-opensea-email-scam
    https://www.theverge.com/2022/2/20/22943228/opensea-phishing-hack-smart-contract-bug-stolen-nft
    https://www.youtube.com/watch?v=TIyNE_QASh8
    https://research.checkpoint.com/2021/check-point-research-prevents-theft-of-crypto-wallets-on-opensea-the-worlds-largest-nft-marketplace/

  85. Hi, for my blog post I would like to talk about the uptake of cloud services and their lagging security measures. This post would be based on the recent discovery of over 2000 database backends to mobile applications or cloud services found to be exposed by VirusTotal. These exposed databases ranged from dating profiles to hotel reservations and banking information. I would be posting this on Friday, March 18th.
    Links:
    https://www.darkreading.com/application-security/mobile-app-developers-leave-behind-2-100-open-databases
    https://blog.checkpoint.com/2022/03/15/stop-neglecting-your-cloud-security-features-check-point-research-found-thousands-of-open-cloud-databases-exposing-data-in-the-wild/

  86. I want to make my blog post about the recent attack by a Russian state-sponsored group on a unnamed NGO by exploiting the default settings of Multifactor Authentication Protocols offered by Duo MFA. My blog post is scheduled for March 19 and I will be using information from the following sources:
    https://thehackernews.com/2022/03/fbi-cisa-warn-of-russian-hackers.html
    https://nakedsecurity.sophos.com/2022/03/16/russian-actors-bypass-2fa-story-what-happened-and-how-to-avoid-it/
    https://www.computing.co.uk/news/4046576/law-enforcement-warn-immediate-russian-hacking-threat-mfa

  87. For my post, I’d like to write about a cyberattack launched against SATCOM terminals in Europe. SATCOM terminals are used to communicate with and send data using satellites. As a result of this attack, there was a partial outage of residential broadband services in Ukraine and other European countries. My post is scheduled for March 23.

    Sources
    https://www.reversemode.com/2022/03/satcom-terminals-under-attack-in-europe.html (this source was linked by Schneier On Security, and was updated on the 12th)
    https://techcrunch.com/2022/03/18/cisa-fbi-satellite-networks/ (posted on the 18th)
    https://www.goincognito.co/info-massive-cyber-attack-in-europe/ (posted on the 14th)
    https://www.reuters.com/world/europe/exclusive-us-spy-agency-probes-sabotage-satellite-internet-during-russian-2022-03-11/ (posted on the 11th and updated on the 12th)

  88. For my blog post, I plan to write about the CafePress previous owner fined $500,000 for ‘shoddy’ security in which CafePress leaked user’s information and used the less secure SHA-1 hashing algorithm. Blog Post Date: Mar 24, 2022.

    Here are the references:
    https://www.zdnet.com/article/cafepress-fined-500-million-for-shoddy-security-covering-up-data-breach/
    https://it.slashdot.org/story/22/03/20/2351231/cafepresss-previous-owner-fined-500000-for-shoddy-security-covering-up-data-breach

  89. Hi,
    I intend to write my blog post to elaborate on a recently discovered bug that affects Honda vehicles’ keyless remote system. This bug allows an attacker to gain access to the vehicle and allows them to start the engine. This is caused by Honda neglecting to utilize encrypted radio frequencies for their keyless remote systems. This topic concerns me because my own vehicle is among those affected by this bug.
    I will post my blog on April 1st
    Article links:
    https://thehackernews.com/2022/03/hondas-keyless-access-bug-could-let.html
    https://www.bleepingcomputer.com/news/security/honda-bug-lets-a-hacker-unlock-and-start-your-car-via-replay-attack/
    https://informationsecuritybuzz.com/expert-comments/honda-bug-lets-a-hacker-unlock-and-start-your-car-via-replay-attack/
    https://latesthackingnews.com/2022/03/29/researchers-release-car-exploit-that-allows-hackers-to-lock-unlock-and-start-hondas/https://www.itsecuritynews.info/hackers-can-use-a-replay-attack-due-to-a-honda-vulnerability/

  90. Hello,
    My blog post is April 1st, and I plan to write about Russia’s decision to consider bitcoin payments for oil and gas from “friendly countries.”
    The war between Ukraine and Russia caused tension between Russia and NATO countries. As sanctions from western countries stiffen over its invasion of Ukraine, Russia considers accepting bitcoin as payment for oil and gas from allied countries. In my blog post, I will discuss the consequences this decision has on Russia, NATO countries including Russia’s allies.

    References:
    https://www.google.ca/amp/s/www.bbc.com/news/business-60870100.amp
    https://www.google.ca/amp/s/www.marketwatch.com/amp/story/russia-hints-that-it-may-accept-payment-for-oil-in-bitcoin-analysts-say-that-may-not-be-so-easy-11648214344
    https://www.google.ca/amp/s/www.cnbctv18.com/cryptocurrency/russia-may-accept-bitcoin-as-oil-and-gas-export-payments-from-friendly-countries-12954772.htm/amp
    https://www.google.ca/amp/s/www.forbes.com/advisor/in/investing/what-is-bitcoin-and-how-does-it-work/%3famp=1

Leave a comment