F5 SIRT
177 TopicsTSA Drops Shoes, IoT and Roundup
Kyle Fox is back this week with a couple of writeups and the roundup. This week, we look at the current situation with changes to security measures at the TSA and what more needs to change. We also look at some ongoing problems with IoT long-term support. TSA Drops Shoe Removals For years, people in the United States have had to take off their shoes while going through security at the airport. A new policy was announced on July 8th that will no longer require people to take off their shoes. Unless they're me and travel wearing steel toe boots. This surprising reversal comes after 20 years of this policy enacted after shoe bomber Richard Reid attempted to blow up American Airlines Flight 63 in December of 2001 with PETN explosive smuggled in his shoes. Often lambasted as security theatre, we have to remember that the TSA, or something like it, is mandated by Annex 17 to the Chicago Convention on International Civil Aviation, which states "4.4.1 Each Contracting State shall establish measures to ensure that originating passengers of commercial air transport operations and their cabin baggage are screened prior to boarding and aircraft departing from a security restricted area." (the PDF does not allow copying, so I had to type that all up) And we generally don't want explosives on planes or guns and dangerous knives making their way into the passenger cabin. So we still in-part need what the TSA is doing. The original intention of creating the TSA was to standardize what they do, which was also something we were in dire need of at the time. So what measures are security theatre? According to Bruce Schneier, the coiner of the term, his top three are now: Liquid restrictions, body scanners and the Screening Passengers by Observation Techniques (SPOT) program now called Behavior Detection and Analysis (BDA). Lets start by first examining the liquid rule. The group was established after a 2006 plot to blow up planes using liquid explosives. The explosives would be made up using component liquids the plotters would bring onboard in innocuous looking containers. Since then, the ICAO has issued guidance on screening liquids and the results are the liquid restrictions. Since this is an international rule, it may be difficult to completely get rid of it without international cooperation, despite having holes. The next item on the list is body scanners, these do not appear to be required by ICAO regulations and are not used in many countries. These devices, even when working optimally are capable of missing some very large weapon like objects. The scanners have improved. When they first started, they were x-ray backscatter units that would be exposing travelers to unnecessary ionizing radiation. The new ones use millimeter-wave radar technology that should not be a possible health risk. They still take up a lot of floor space and time in screening passengers. Schneier's last item is the Screening Passengers by Observation Techniques (SPOT) program, which since 2016 has been called Behavior Detection and Analysis (BDA). This program is alleged to work by training TSA officers to observe passengers stress levels and behavior to spot passengers that are concealing something or otherwise being deceptive. From that description it seems to be a human lie-detector program. Like the polygraph lie-detector, its efficacy has been disputed quite a bit. With airports and air travel often a high-stress situation for most of the traveling public, it seems to lead to the individual officers' biases showing through. This one seems to be the most ripe for getting rid of, so I expect it to hang on for a long time. Belkin, IKEA and Nest and the Struggle to Find Long Term Support in IoT Several announcements have come through in the last few weeks, first Belkin announced it was discontinuing support for some Smart Home devices that it previously sold. Then IKEA announced that it was transitioning off Zigbee and to Thread, and finally Nest will discontinue support for some older devices. This has all highlighted the issues now surrounding a lot of IoT, mainly that as time goes on, support of these devices becomes an issue. The first issue is that a lot of manufacturers want their IoT enabled appliances to link back to servers that they run. While this helps with allowing users to access the devices from anywhere and allows the manufacturers to push software updates to help improve the devices and deal with security vulnerabilities. However, this also adds ongoing costs to supporting the devices and ties them to the manufacturer's continued support. The next issue is these devices contain software that needs to be updated periodically to resolve security issues. Often that still depends on the manufacturer to maintain the software and push updates. In some cases, this has been sidestepped by projects creating open firmware for discontinued devices. But as a rule, you'll only get updates till the manufacturer decides to shelve maintaining the code. While this would be perfectly fine if these were widgets that would last 5 years, it becomes a concern when your talking stuff installed in a house. For example, my house was built in 1978, my breaker panel is from that era, but I have a Emporia Vue panel monitor. The last issue is that as time goes on, companies may change the basic rules that their devices work with. With IoT, this often means going from Zigbee to Wifi or Bluetooth or some other combination of changes. Once these changes are made, the manufacturer could maintain compatibility, if they use a system with hubs, or they can dump the entire previous ecosystem. The IKEA transition is an example of this issue. It's currently not clear how the future support model for their existing Zigbee devices will work, but I expect some level of support to continue. Roundup: Not really security related but this week's YouTube recommendation is Patrick (H) Willems. From analyzing pop music soundtracks to ranking the most 80's movie, he has you covered in long from cinema analysis. Plague's back in town. AI company leaks McDonald's job applications. Comcast Wifi Motion Detection? Apparently this field grew up. ChatGPT hallucinated features are getting added to software. Because Bluetooth is complicated, another week, another Bluetooth attack.21Views2likes0CommentsCopenhagen, Cisco, Korea, Cybercrime, and Criminals
It's all just a little bit of history repeating - and MegaZone is back in control again. This time we're looking at news from June 29th through July 5th, 2025. For my fellow USians, I hope you had a happy Fourth of July. And I hope you still have all your fingers. It is a bit light this week, as I was out of the office for a few days last week and this week, dealing with a family health crisis, so my time to read and digest the news, and then compile this issue, is a bit compressed. But the show must go on! Anyway, let's jump into it...131Views3likes0CommentsCitrixBleed2 and Cisco Criticals, Action on and by Crooks, Cost of Cyberattacks
Hello! ArvinF is your editor of the F5 SIRT This Week in Security, covering 22 to 28 June 2025. It happens this week's edition has lots of Cs in them - CitrixBleed2 and Cisco Criticals, Action on and by Crooks and the Cost of Cyberattacks. Let's get to it. CitrixBleed2, a high severity cve and plus one more Critical on Citrix Citrix and their customers were very likely busy the past week patching and resetting VDI sessions to remediate 3 CVEs, two were Critical and one High severity. CVE-2025-5349 Improper access control on the NetScaler Management Interface - High CVE-2025-5777 Insufficient input validation leading to memory overread - Critical CVE-2025-6543 Memory overflow vulnerability leading to unintended control flow and Denial of Service - Critical CVE-2025-5777, dubbed CitrixBleed2, described as an "out-of-bounds read flaw" "can be exploited remotely and without any authentication, is due to insufficient input validation. It could allow an attacker to read session tokens or other sensitive information in memory from NetScaler devices that are configured as a Gateway (such as a VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server.". Documented along with CVE-2025-5349 in the same advisory, Citrix customers should reset VDI connections/sessions. kill icaconnection -all kill pcoipConnection -all The other Critical, CVE-2025-6543, a potential RCE based more than a DoS, based on reports, was exploited in the wild as a Zero Day. Citrix published a blog "NetScaler Critical Security Updates for CVE-2025-6543 and CVE-2025-5777" and noted the following: "Some commentators have drawn comparisons between CVE 2025-5777 and CVE 2023-4966. While the vulnerabilities share some characteristics, Cloud Software Group has found no evidence to indicate that they are related. " Nonetheless, Citrix customers should follow the advisories and upgrade to a fix version and ensure to reset VDI connections/sessions. CISAs Known Exploited Vulnerabilities Catalog now lists Citrix NetScaler ADC and Gateway Buffer Overflow Vulnerability CVE-2025-6543 - all the more reason to patch/upgrade and secure Citrix installations. Don't panic, but it's only a matter of time before critical 'CitrixBleed 2' is under attack https://www.theregister.com/2025/06/24/critical_citrix_bug_citrixbleed/ Citrix bleeds again: This time a zero-day exploited - patch now https://www.theregister.com/2025/06/25/citrix_netscaler_critical_bug_exploited/ NetScaler Critical Security Updates for CVE-2025-6543 and CVE-2025-5777 https://www.netscaler.com/blog/news/netscaler-critical-security-updates-for-cve-2025-6543-and-cve-2025-5777/ Known Exploited Vulnerabilities Catalog https://www.cisa.gov/known-exploited-vulnerabilities-catalog Cisco got Criticals too.. two of them on Identity Services Engine API Cisco ISE API has a pair of CVSS Score 10 CVEs with no workarounds. CVE-2025-20281: Cisco ISE API Unauthenticated Remote Code Execution Vulnerability, gaining root access thru unauthenticated crafted API CVE-2025-20282: Cisco ISE API Unauthenticated Remote Code Execution Vulnerability, unauthenticated file upload leading to code execution Affected installations should be upgraded as appropriate. There are some valid use case of exposing this ISE API to the internet - a quick search notes "Cloud-based Guest Access", "Integration with External Systems" and "Remote Administration". Fronting a vulnerable API with a "Web Application and API Protection" product, such as in F5 Application Delivery and Security Platform could help and provide mitigation. As there are potential of undiscovered vulnerabilities in APIs (and software in general), having the protection in place could prevent or slow down the exploitation attempt. Cisco fixes two critical make-me-root bugs on Identity Services Engine components https://www.theregister.com/2025/06/26/patch_up_cisco_fixes_two/ https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-unauth-rce-ZAd2GnJ6 https://www.f5.com/solutions/web-app-and-api-protection Crooks in Action: Educated Manticore Targeted Phishing Iranian APT group Educated Manticore ( activities similar to APT42, Charming Kitten, or Mint Sandstorm ) phishing campaign targeted cyber security experts, computer science professors and journalists. This APT group sends phishing messages through WhatsApp or email. They pretend to be cyber security researchers and get victims to go to a Google Authentication custom phishing site. This site lets MFA relay attacks happen and also has a passive keylogger to record keystrokes from the victim. Another method used by the APT is using a fake Google Meet invite. Checkpoint's research noted IoCs such as IP addresses and domains used in the phishing campaign. That WhatsApp from an Israeli infosec expert could be an Iranian phish https://www.theregister.com/2025/06/26/that_whatsapp_from_an_israeli/ https://research.checkpoint.com/2025/iranian-educated-manticore-targets-leading-tech-academics/ Unmaintained gov't or corporate site? Hijack and sneak in AI slop and unrelated Ads A government website used to campaign against "end to end encryption" was hijacked and a section of the site was modified to advertise on loans. "end to end encryption" (E2EE) is a very important topic as messaging apps implement it "jumbles" the exchanged messages to prevent snooping, however, this could also help abusers to hide their communication from being audited, and may hinder law enforcement investigation. E2EE can also introduce vulnerabilities for users. However, E2EE is not the specific concern, rather, the hijacking of the site to include these loan advertisements. The site was created by a 3rd party advertising firm and as the campaign has ended, the site is abandoned, unmaintained and hijacked. The publicly funded campaign site reportedly was budgeted with 534K. There were other instances of corporate and government sites and pages that were also observed to have been hijacked and hosting AI slop. "AI slop" refers to low-quality, often misleading or inaccurate content generated by artificial intelligence, particularly large language models (LLMs). It's characterized by its tendency to replicate human speech realistically but without regard for truthfulness or accuracy. This can manifest as poorly written articles, fake images, or inaccurate information, often designed to optimize for search engines or engage users without genuine value. UK govt dept website that campaigns against encryption hijacked to advertise ... payday loans https://www.theregister.com/2025/06/25/home_office_antiencryption_campaign_website/ https://heatherburns.tech/2025/06/24/somehow-that-home-office-campaign-got-even-worse/# Action on Crooks: Four REvil ransomware crooks walk free, some, face penal colony This one is a 50-50, 4 of the 8 arrested REvil ransomware group walk away as they were sentenced approximately 3 years after their arrest, pled guilty and already served time in detention in Russian "general regime penal colony". The sentence was for the crime "illegal circulation of funds by an organized group and creation and use of malicious computer programs". Two of the four REvil convicts were only charged with carding offenses. "The term "carding" refers to the illegal use and trafficking of payment card details. Although REvil was primarily known for ransomware attacks, some of its members also moonlighted in the financial fraud space too." The court ordered one of the prisoners to give up two 2020 BMWs. The court will also take a 2019 Mercedes C 200 from another prisoner. The same can't be said for the other four suspected REvil members, though, who were each sentenced in October 2024 to various stints in a general regime penal colony ranging from 4.5 to six years. Following an appeal in March, their sentence was upheld, perhaps due to their refusal to enter into a guilty plea. REvil's ransomware exploits were among the most high-profile in history, and it was arguably the first truly "big" ransomware-as-a-service group. Russian lawmakers say that he ran REvil from 2015 to 2022. During that time, the group attacked US nuclear weapons contractors, fashion houses, and perhaps most famously, IT service provider Kaseya. Although only eight arrests were mentioned as part of the trial, a total of 14 people with alleged ties to REvil were arrested on that day in January 2022. Four REvil ransomware crooks walk free, escape gulag fate, after admitting guilt https://www.theregister.com/2025/06/24/four_revil_ransomware_suspects_time_served/ IntelBroker caught due to bitcoin wallet record and linked accounts Kai West, a 25-year-old British national, has been identified as the infamous hacker "IntelBroker," according to newly unsealed court documents. IntelBroker is said to have accessed the computers of over 40 victims around the world. These victims include well-known companies like Apple, AMD, Europol, Nokia, and the US Army. IntelBroker is said to have caused damages that are more than $25 million. After stealing sensitive data, IntelBroker and his associates reportedly sold it on BreachForums, a notorious cybercrime marketplace where West was also an administrator. West was implicated when FBI agents traced a bitcoin wallet used in the sale of stolen data back to him. The wallet was linked to a Ramp account registered with West’s UK driver’s license, which was also tied to a Coinbase account under his alias "Kyle Northern." Both accounts reportedly used West's personal email address, solidifying the FBI's case against him. In related developments, police in Paris have arrested four other BreachForums administrators using the aliases Hollow, Noct, Depressed, and ShinyHunters. The US is now seeking West's extradition to face charges, two of which carry a maximum sentence of 20 years each. This case underscores how law enforcement leverages cryptocurrency transaction records and other digital breadcrumbs to apprehend cybercriminals. FBI used bitcoin wallet records to peg notorious IntelBroker as UK national https://www.theregister.com/2025/06/26/fbi_used_bitcoin_wallet_id_intelbroker/ https://regmedia.co.uk/2025/06/26/us_kai_west_complaint.pdf Britain's Cyber Monitoring Centre (CMC) on cost of recent UK cyberattacks - £270-440 million The UK's Cyber Monitoring Centre (CMC) estimates that recent cyberattacks crippling major UK retail chains like Marks & Spencer (M&S), the Co-op, and Harrods could cost between £270-440 million ($362-591 million). These attacks, categorized as a "level 2 systemic event" by the CMC, represent a significant impact on both retailers and affected communities. CMC's Cyber Monitoring Matrix ranks cyber incidents on a 0-5 scale based on financial and societal impact. Marks & Spencer suffered substantial losses, with online sales disrupted until July and partially restored afterward. Daily losses from unfulfilled orders were estimated at £1.3 million ($1.74 million). Co-op, while impacted less in terms of financial losses—daily spending dropped by 11% in the first 30 days—had a different kind of impact. The retailer is a crucial provider for remote areas like the Scottish Highlands and surrounding islands, heightening the societal consequences of the cyberattack. Luxury retailer Harrods was also attacked but experienced minimal operational disruption, as both its flagship store and online sales remained active, though detailed data on its attack was limited and excluded from CMC’s analysis. The CMC’s evaluations highlight the critical costs of lost sales, IT restoration, legal fees, and incident response for businesses targeted in cyberattacks. This underscores the importance of cybersecurity preparedness, particularly for organizations core to community supply chains, such as Co-op. The events serve as a stark reminder of the economic and social vulnerabilities posed by increasingly sophisticated cyber threats. Experts count staggering costs incurred by UK retail amid cyber attack hell https://www.theregister.com/2025/06/23/experts_count_the_staggering_costs/ https://www.theregister.com/2025/02/07/uk_cyber_monitoring_centre/ That's it for now This week, we have news on the APT group phishing campaign and targeting cyber security experts. Phishing has become more sophisticated and is getting harder to distinguish. I'll recommend going back to basics, if the emails or messages you receive seem “off” or unusual, be skeptical and don't simply trust the sender. Verify the sender of the message if they are really who they claim to be, though, this is easier said than done. APTs and Malware ransomware groups usually use the same techniques, and spear phishing is at the top of the list of techniques they use. If unsure, do not engage. Follow your organization’s IT Security Policies on suspected phishing attempts. Critical vulnerabilities should be addressed immediately, especially if a fix is available. The effects of cybersecurity attacks on organizations financially are no small matter. For their customers, it could be an erosion of trust and potential exposure of personal information. As defenders, we should implement protections to prevent web-based vulnerabilities - use WAFs, API protections such as BIG-IP ASM/Adv WAF, NGINX App protect and F5 Application Delivery and Security Platform security policies and DoS and Bot Defense features to add layers of defense and mitigations. Having a F5 BIG-IP in the environment opens opportunities to apply protections to applications. Secured sunsetting and decommissioning of web sites used in limited campaigns that are already over should be a process that organizations and governments should follow to prevent leaving unnecessary access or dangling configurations or DNS records open for abuse. I hope the news I picked is informative and educational. Till next time - Stay Safe and Secure! As always, if this is your first TWIS, you can always read past editions. We also encourage you to check out all of the content from the F5 SIRT.222Views3likes1CommentPhysical Security - Starting Points
Introduction If you peruse all of F5 DevCentral, you might see a few mentions of physical security, but not really any dive into it. Today we are going to take a very shallow look into physical security. We will look at its general considerations and concerns, some systems surrounding physical security and some specific considerations with F5 hardware. In this article I am going to lightly touch on a number of points, not comprehensively, and give you some jumping off points for further study. It is important to understand that with most networking hardware, with some specific exceptions, physical access will allow an attacker quite a bit of access to the software environment on the hardware. The one major exception to this is FIPS Hardware Security Modules (HSM). These are specialized hardware that stores crypto keys in a physical package that presents a substantial defense against hardware attacks. I intend to review FIPS HSMs in a later article. A Quick Overview of Physical Attacks on Hardware With physical access to hardware, the attacker has a number of options for accessing the underlying system: There may be a serial console that is not fully protected. A historical example would be routers with no password protection on the basic shell, only having passwords for making changes. Most modern hardware has a number of debug ports that may provide access to the main CPU or other auxiliary processors in the system. The system could be restarted into a maintenance mode or an attacker-provided software environment. This will allow access to extract data or secrets such as private keys or password hashes. It may be possible to compromise the boot chain and inject software into the running environment before the OS loads. Even if the system is protected against these attacks, some subsystems may be susceptible to power glitching or analysis attacks. There are extreme ways to fix this problem. For example, DRAM could be moved outside the system and read quickly after being put in liquid nitrogen. This slows down the depletion of the DRAM cells and allows more time between refreshes. F5 considers many of these attacks in designing BIG-IP hardware. We incorporate protections such as a secure boot chain and platform security modules to prevent the use of unauthorized software, but these only prevent some attacks and would not prevent outright theft of the systems or other attacks. Walls and Ladders Often when discussing physical security a phrase is thrown around: "Walls and Ladders" this is referring to the continual process where a defender constructs a larger wall, and then the attacker will come along with a longer ladder. Physical security, like network security, does not remain static. As defenses are developed, attacks are developed to defeat those defenses. It is important to keep analyzing and improving your physical security posture. My personal model for categorizing physical security aspects is: Assets to be protected. Potential Attacks Physical Deterrence Intrusion Detection Surveillance and Auditing Fire and Disaster Response Training and Continuous Improvement Assets and Attacks - Developing a strategy suitable for the threats. To avoid perfect being the enemy of good, we need to analyze what assets are being protected and from that we can think about what potential attacks would look like. Not every company is going to have assets that attract state-level attacks. So, not every company will need incredibly robust and expensive security in place to defend against the same. Physical Deterrence - Locks and Keys - Where We Started Nothing is more iconically associated with physical security than the lock and key. For hundreds of years, people have been developing locks to keep other people from gaining access to important assets. It’s easy to think of locks as unchanging, not being improved over time, but that is very much not the case. For example, over the last 50 years many innovations have been introduced, like spool pins, serrated pins, angled pins, sidebars, and that's all just enhancements in the interaction between the lock and key. Locks have been enhanced with protections against physical force, either violent, like using a Ramset powder actuated hammer to break the shackle off a padlock to drill the lock or subtle like using magnets to open combination locks. Starting points: LockPicking Lawyer - Saintcon Keynote Deviant Ollam - DEF CON 13 talk, This Key is Your Key, This Key is My Key Physical Deterrence - Elevators - The Inside Barrier Breaker If your buildings have more than one floor, there is most likely one or more elevators into the building. As pentesters have found, these present an opportunity to move around the building once inside, even if effort is made to secure them. Elevators can be hijacked using common keys, some of which are mandated by local authorities for fire service. Deviant Ollam and Howard Payne have created a few talks, linked below, which will help you understand how elevators affect physical security and how they work in general. Starting points: Deviant Ollam - Elevator Hacking: From the Pit to the Penthouse, Elevator Obscura: Hacks and Curios in the Lift Industry Access Control Systems - Bridging Physical Deterrence, Intrusion Detection, Auditing and Surveillance Most modern enterprises use some sort of credential based access control system. The credentials usually take the form of an employee badge, but could be a special key with RFID built into it or a nondescript keyfob. These systems, when configured properly can be an important bridge between many aspects of physical security. However, if built using outdated technology or improperly configured, they could be a potential open door for intruders to exploit. Key aspects of these systems are: Revocable credentials - You should not need to get the credential back from the user to disallow its use. Robust, hard to copy credentials - Modern high-end access control systems use cryptographically secure credentials that make copying hard to do without substantial investments in time, equipment and expertise. Robust auditing - Recording all access attempts and outcomes and unexpected state changes in locked doors and other protected items like key cabinets. Intrusion detection and alerting - If a door were to be picked open instead of a valid credential being used, the system should be able to generate an actionable alert that can be followed up on. Starting points: How to Bypass RFID Badge Readers (w/ Deviant Ollam and Babak Javadi) DEF CON 32 - Unsaflok: Hacking millions of hotel locks - Lennert Wouters, Ian Carroll The Importance of Real Time Intrusion Detection An unoccupied building is more expensive to insure than an occupied building, because of this many facilities employ security guards to monitor for intrusions and also potential disasters like fires or water leaks. While the trope is that these guards are lazy and sit in the security office every day, with proper motivation and training, they can be your first boots on the ground to investigate potential intrusions. Once you have a properly configured access control system, it should be configured to alert when doors are opened without using the card keys or when other issues are detected, like glass being broken, water where it should not, and hot particulate that won’t trigger sprinklers but could be the sign of a potential fire. Surveillance and Auditing - Your Enterprise Flight Data Recorder Surveillance cameras are not really there for a security guard to stare at all day. This is not to discount their value as something that can enhance situational awareness in the security room or other areas, but humans are not very good at maintaining vigilance while watching a static image on a screen. When combined with a robust digital video recording system, surveillance cameras can provide an invaluable tool for figuring out what happened, from break-ins to the building or cars in the parking lot, to major disasters or industrial accidents having a record of what happened can help piece together the information needed to prevent it in the future. One point I always touch on with these systems is often the lack of robust distributed storage of the recorded data. While it may be okay to store massive amounts of video data on site if your a casino and your not expecting to need recordings of blackjack tables after a major fire, the opposite is true if you're perhaps a rocket fuel plant. I believe that all auditing data, logs and recordings should be stored both onsite and replicated offsite. Depending on how critical the data is and concerns about tampering, you may want to consider systems designed to only allow ingestion and storage of the data and are otherwise not connected to the local network or other systems. I have seen these implemented as syslog going through a data diode (one-way data interface) and into a secure system to log it to disk, but the old-fashioned tractor-feed printer in a safe also works. Fire and Disaster Response - Either Salvaged or Burned To The Ground, it's Going to be a Long Day Something that sometimes is inexplicably left off physical security threat models is what happens after the fire alarm sounds. Your multimillion dollar data center might not survive even if the fire sprinklers put the fire out right away... because it just got a whole lot of water dumped into it. This is why threat modeling disaster scenarios is important. What will happen if fire suppression goes off? What happens if it’s not effective? Like a data backup strategy, periodic testing is essential to verify these systems will work as expected. And then, even if these systems are effective, what happens when the fire department shows up? You want to make them want to use the access methods most compatible with surviving the disaster, make sure your KnoxBox has an access credential that can get anywhere without restrictions. Things you may want to turn off on this credential are things like mantraps and anti-passback. Your going to have to put physical keys in that KnoxBox, make sure they open every door and are clearly marked. Make sure your security guards are up on procedures in the event of a fire or other disaster, from simple things like keeping First Aid and AED training up to date to complex training for initial fire response. Has someone trained them on how fire extinguishers work? How about those special clean agent extinguishers you have in your data center? Expired extinguishers are a cheap opportunity to train in the parking lot. Starting points: Deviant Ollam - S**t's on Fire, Yo! All about NFPA Fire Code and One of My Favorite Red Team Cover Identities, Non Destructive Entry for Firefighters, Police Officers & EMS Which Fire Extinguisher Is Best? Training and Continuous Improvement - Evolving Defenses for Evolving Threats The last point I am going to touch on is the importance of recurrent training and continual improvement of defense mechanisms. In many professions, we rely on continual training to keep professionals working at their best. Pilots will get recurrent training and check-rides; lawyers and engineers have to take a certain amount of classes and other training each year to keep their licenses, why shouldn't everyone involved in security do the same? I am a big fan of using a number of different overlapping training methods. Just making everything a web-based training with simple quizzes is not going to cut it. Maybe some of the training can be that, but the more interactive the training is, the more it will be retained, so webinars and classroom training should be a starting point for getting out of a forgettable training rut. As evidenced by the links above, I think there’s real value in interesting videos on YouTube and other sites like it, be it conference talks or other presentation formats. At the very top, hands on exercises should be used to help reinforce everything from standard policies and procedures to exploring potential vulnerabilities. These can range from simple practicing with old fire extinguishers in the parking lot example from above to full-on classroom and field training courses. Lastly, you will want to keep reassessing your physical security posture based on changing conditions, new attacks and new defensive technologies. Maybe there are suddenly protests going past your offices each week, a new bypass method has become popular with burglars, or you have become targeted by larger, and more resourceful attackers than before. Schedule penetration tests to check your defenses and find holes. Schedule periodic reviews of all aspects of the defenses and update training to meet the changing times. Questions? If you have any questions, please leave them below. If you want to see any of these topics covered in more depth or other topics covered, please also let me know by writing below. Thanks!46Views1like0CommentsFraud Graph Structures
In financial networks, fraud is rarely isolated. It operates in patterns, in the way accounts interact, transactions loop, and identities overlap. Graph structures allow analysts to capture and learn these hidden patterns by representing users and transactions as a network. Certain graph formations such as dense communities, star topologies, and high-centrality nodes consistently surface in fraudulent behaviour. In this article we will see how each of these structures reveals fraud, what makes them effective, and how they improve the detection and prevention of unlawful activities.46Views1like0CommentsGPS spoofing, 16 billion passwords exposed, Operation RoundPress, and Active Cyber Defense
Notable news for the week of June 15-21, 2025. This week, your editor is Koichi from F5 Security Incident Response Team. In this edition, I have security news about GPS spoofing, 16 million passwords exposed, Operation RoundPress, and Active Cyber Defense We at F5 SIRT invest a lot of time to understand the frequently changing behavior of bad actors. Bad actors are a threat to your business, your reputation, your livelihood. That’s why we take the security of your business seriously. When you’re under attack, we’ll work quickly to effectively mitigate attacks and vulnerabilities, and get you back up and running. So next time you are under security emergency, please contact F5 SIRT. GPS spoofing is observed on a live map Cyber attacks have intensified in the wake of the armed conflict between Israel and Iran. Israeli hackers cyber-attacked Iran's state-owned Bank Sepah and the Iran-based cryptocurrency exchange Nobitex.Meanwhile, Iran also cyber-attacked Israeli infrastructure. Although those cyber-attacks cannot be seen directly from abroad, there have been forms of cyber-attacks that can be observed via online. Aircraft and ship tracking services can observe strange movements of aircraft and ships around Iran. Aircraft and vessels receive radio signals from GNSS (i.e. GPS) satellites to determine their location/position, and they broadcast their position via the ADS-B (aircraft) and AIS (vessel) systems. Aircraft and vessel tracking services receive those broadcasted signals and can display the positions of aircraft and vessels on a live-map. However, due to the military conflict between Israel and Iran, radio signals from GNSS (i.e. GPS) satellites have been jammed (GPS jamming), making it impossible to display the positions of aircraft and ships. The position information has been changed (GPS spoofing), this causes the positions of ships and aircraft on maps to be shown in locations where they should not be. Around the time of this collision, GPS spoofing, probably of Iranian origin, was observed in the Persian Gulf. As a result, it has been observed that the vessel's position is circular. Source: Phantom Tankers: GPS Interference Roils Gulf Shipping 16 billion login credentials are exposed Cybernews Researchers announced on June 18th that more than 16 billion login credentials had been compromised this year. This is believed to be one of the largest data breaches ever. Ongoing investigations by researchers since earlier this year have suggested that the massive breach was the work of multiple Infostealer (information-stealing) malware. The leaked data also includes credentials for Apple, Facebook, Google, GitHub, Telegram and government services in various countries, which risks enabling access to almost every major online service. According to the researchers, large sets of exposed data are being discovered every few weeks, raising strong concerns about the rapid spread of infostealers. For mitigating this, Google suggests to change their Gmail account passwords as soon as possible, use password managers, and to use passkeys as much as possible. Source: 16 billion passwords exposed in record-breaking data breach, opening access to Facebook, Google, Apple, and any other service imaginable Source: 16 Billion Apple, Facebook, Google And Other Passwords Leaked Operation RoundPress ESET Research has revealed Operation RoundPress, an advanced cyber-espionage operation by the pro-Russian Sednit group, which is known as APT28, targeting high-value targets like the government and major defense companies in Europe, Africa and South America. Operation RoundPress uses variants of the SpyPress malware to attack webmail, including Roundcube and Zimbra. It sends spear-phishing emails to the target web mail servers, which disguises themselves with current news-related text, but a review of the HTML code shows that malicious JavaScript is embedded in the body. When the victim user opens a malicious email, the SpyPress JavaScript payload is reloaded and executed, which steals webmail credentials, body content and contact information from the victim’s email inbox. Source: Surge in XSS Cyberattacks Targets Popular Webmail Platforms, ESET Reports Source: ESET Research uncovers Operation RoundPress: Russia-aligned Sednit targets entities linked to the Ukraine war to steal confidential data "Active Cyber Defense" Part 5 In former TWIS articles (like this and this), I wrote about the “Active Cyber Defense” which is going to be introduced in Japan, and there was another progress at a cabinet meeting on June 20th. Japanese government decided to establish the National Cyber Headquarters (NCH, or National Cyber Office) on July 1st. This will be done as a re-organization of the current National Center of Incident Readiness and Strategy for Cybersecurity (NISC), and the NCH will serve as a command post for “Active Cyber Defense” to prevent cyber attacks before they happen. The ”Active Cyber Defense" bill would allow the Government to get agreements with operators of critical infrastructure and obtain communications information to monitor for the Cyber Attack threat. Source: https://www3.nhk.or.jp/news/html/20250620/k10014839811000.html (Japanese)212Views2likes0CommentsWelcome to Fletch.ai, Fake DeepSeek Downloads, & Operation Secure
This week, your editor is Jordan_Zebor from the F5 Security Incident Response Team, diving into key advances in cybersecurity. From F5’s acquisition of Fletch.ai and its agentic AI, to INTERPOL’s takedown of infostealer malware, and Kaspersky’s discovery of BrowserVenom, the rapidly evolving threat landscape highlights the need for smarter defenses and global collaboration to safeguard the digital world. Let’s jump in! F5 acquires Fletch.ai F5 has acquired Fletch.ai, integrating its agentic AI technology into the F5 Application Delivery and Security Platform (ADSP). Fletch’s AI transforms complex threat intelligence and logs into actionable insights, helping security teams prioritize critical threats, reduce alert fatigue, and act proactively. By delivering real-time recommendations like blocking malicious IPs or mitigating vulnerabilities, this integration equips organizations to manage sophisticated threats more effectively. The acquisition underscores F5’s push toward AI-driven security innovation, enabling faster, smarter responses in an increasingly complex cybersecurity landscape. This integration not only strengthens security teams but also contributes to a better digital world by ensuring safer and more reliable application experiences for businesses and users alike. By combining agentic AI with F5’s expertise in securing apps, APIs, and infrastructure, organizations can mitigate threats before they impact operations, reducing downtime, preventing data breaches, and building trust in their digital services. As cyber threats get more advanced, F5’s improved platform lets businesses deliver faster, smarter, and safer digital solutions. This helps businesses innovate while protecting the global digital ecosystem. Operation Secure Between January and April 2025, INTERPOL spearheaded Operation Secure, a global initiative that dismantled over 20,000 malicious IPs and domains linked to 69 information-stealing malware variants. Collaborating with 26 countries, the operation successfully took down 79% of identified malicious IPs, seized 41 servers and 100GB of data, and arrested 32 individuals across various nations including Vietnam, Sri Lanka, and Nauru. The Hong Kong Police identified 117 command-and-control (C2) servers used for phishing and fraud campaigns. The targeted threats, such as Vidar, Lumma, and MetaStealer, are notorious for exfiltrating credentials, payment data, and cryptocurrency wallets, often sold via Malware-as-a-Service to facilitate ransomware, data breaches, and business email compromise (BEC). Private cybersecurity firms like Group-IB, Trend Micro, and Kaspersky contributed intelligence on compromised data and malware infrastructure. For CISOs and security engineers, this operation underscores the importance of proactive defense strategies. Organizations that prioritize credential protection, implement multi-factor authentication (MFA), and strengthen anti-phishing measures are better equipped to combat infostealer threats. By investing in robust security mechanisms and user awareness initiatives, teams can reduce exposure, block attack vectors, and limit the effectiveness of malware campaigns. Fake DeepSeek Downloads Deliver Proxy Malware Kaspersky discovered a new malware distributed via phishing sites posing as a DeepSeek-R1 installer, promoted through Google Ads targeting LLM users. "BrowserVenom" reroutes browser traffic through an actor-controlled proxy, enabling attackers to monitor, manipulate, and inject content into user sessions. The malware modifies proxy settings in Chromium and Gecko-based browsers for persistence, disguising its delivery with fake CAPTCHA challenges. The attack infrastructure suggests ties to Russian-speaking actors and has infected systems in Brazil, Cuba, India, and more. The campaign underscores the rising use of social engineering and search engine abuse to distribute malware. CISOs should focus on user education, browser security controls, and network traffic monitoring to detect unauthorized changes. Proactively blocking malicious ads, enforcing strict proxy management policies, and investing in tools to identify persistence mechanisms are critical steps to mitigate such threats. That's it for This Week In Security. Thanks for reading and hope you enjoyed the content!259Views4likes0CommentsOWASP 2025 conference, KEV and RCE.
Attending the OWASP 2025 this time something was different, the software has reached a tipping point ! AI is here and once you understand and internalize how AI technology can be used ,you realize that things are going to be very different.131Views2likes0CommentsGoogle Calendar Exploits, Fake AI Packages, Malware Arrests, and a Newly Proposed Exploit Metric
Notable security news for the week of May 25 –June 1. Your editor this week is Chris from the F5 Security Incident Response Team. This week I will highlight Google Calendar exploits by an Advanced Persistent Threat (APT), malware installers disguised as popular AI tools, the arrest of 21 people in Pakistan operating a malware service, and a new exploit equation aimed at aiding KEV and EPSS. Google Calendar Exploits The Chinese state-sponsored threat actor APT41 has been using a malware called TOUGHPROGRESS to leverage Google Calendar for command-and-control (C2) operations. Google discovered this activity in late October of 2024. The malware was hosted on a compromised government website targeting multiple other government entities. The malware consists of three distinct components: PLUSDROP: A DLL used to decrypt and execute the next-stage payload in memory. PLUSINJECT: Performs process hollowing on a legitimate "svchost.exe" process to inject the final payload. TOUGHPROGRESS: The primary malware that uses Google Calendar for C2. The malware reads and writes events with an attacker-controlled Google Calendar, storing harvested data in event descriptions and executing encrypted commands. Google has taken down the malicious Google Calendar and terminated the associated Workspace projects, neutralizing the campaign. https://thehackernews.com/2025/05/chinese-apt41-exploits-google-calendar.html Fake AI Tool Packages Since mid-October 2024, cybercriminals have been using fake installers for popular AI tools like OpenAI ChatGPT and InVideo AI to spread different types of malware. These include CyberLock ransomware, Lucky_Gh0$t ransomware, and a new malware called Numero. Developed using PowerShell, CyberLock encrypts specific files on the victim's system and demands a $50,000 ransom in Monero, claiming the funds will support humanitarian causes. A variant of the Yashma ransomware, Lucky_Gh0$t targets files smaller than 1.2GB for encryption and deletes backups, demanding ransom payments via the Session messaging app. This destructive malware manipulates the graphical user interface components of Windows, rendering the machines unusable. It continuously runs on the victim's machine through an infinite loop. The fake AI tool websites use SEO poisoning techniques to boost their rankings and lure victims into downloading malware-loaded installers. The campaign targets individuals and organizations in the B2B sales and marketing sectors, using the popularity of AI tools to spread malware. There are multiple ways you can reduce the risk of malware threats: Use Security Software: Install reputable antivirus and anti-malware software. Ensure it is regularly updated to protect against the latest threats. Be Cautious with Emails: Avoid clicking on links or opening attachments from unknown or suspicious emails. Phishing emails are a common way to spread malware. Download from Trusted Sources: Only download software from official websites or reputable sources. Avoid third-party platforms that might disguise malware as legitimate software. Keep Software Updated: Regularly update your operating system and all installed software to patch vulnerabilities that could be exploited by malware. Use Strong Passwords: Implement strong, unique passwords for all your accounts and consider using a password manager to keep them secure. Enable Two-Factor Authentication: Add an extra layer of security to your accounts by enabling two-factor authentication wherever possible. These are all good practices to use at any time. It is always a good idea to stay diligent when it comes to security. https://thehackernews.com/2025/05/cybercriminals-target-ai-users-with.html Heartsender Malware Service Arrests Pakistani authorities have arrested 21 individuals accused of operating "Heartsender," a spam and malware dissemination service active for over a decade. The alleged ringleader, Rameez Shahzad, and other core developers were publicly identified in 2021 after making several operational security mistakes, such as inadvertently infecting their own computers with malware, which exposed their identities and operations. Heartsender's tools were linked to over $50 million in losses in the U.S., with European authorities investigating 63 additional cases. Heartsender provided spam and malware dissemination tools, primarily targeting users of various Internet services like Microsoft 365, Yahoo, AOL, Intuit, iCloud, and ID.me. The main clients were organized crime groups that used these tools for business email compromise (BEC) schemes. These schemes tricked companies into making payments to third parties by impersonating legitimate business contacts. The service was marketed under multiple brands, including Heartsender, Fudpage, and Fudtools. "Fud" stands for "Fully Un-Detectable," indicating that the tools were designed to evade detection by security software. The FBI and Dutch Police seized the technical infrastructure for Heartsender in January 2025. https://krebsonsecurity.com/2025/05/pakistan-arrests-21-in-heartsender-malware-service/ Likely Exploited Vulnerabilities (LEV) Researchers from CISA and NIST have proposed a new cybersecurity metric called Likely Exploited Vulnerabilities (LEV). This metric will help us figure out how likely a vulnerability has been used in the wild. LEV aims to enhance existing tools like Known Exploited Vulnerabilities (KEV) lists and the Exploit Prediction Scoring System (EPSS) by providing more accurate prioritization for vulnerability remediation. KEV (Known Exploited Vulnerabilities) Lists: Purpose: Catalog vulnerabilities that have been confirmed to be exploited in the wild. Usage: Helps organizations prioritize patching and remediation efforts by focusing on vulnerabilities that attackers are actively using. EPSS (Exploit Prediction Scoring System): Purpose: Provides a 30-day probability that a vulnerability will be exploited. Usage: Assists in predicting which vulnerabilities are likely to be targeted, helping organizations prioritize their security efforts. Both tools are essential for effective vulnerability management, with KEV lists focusing on known exploits and EPSS providing predictive insights. LEV uses equations that consider variables such as the first date an EPSS score is available, the date of the most recent KEV list update, inclusion in KEV, and the EPSS score measured across multiple days. LEV probabilities can help measure the expected number and proportion of vulnerabilities exploited by threat actors and estimate the comprehensiveness of KEV lists. NIST is seeking industry partners with relevant datasets to empirically measure the performance of LEV probabilities. In vulnerability management, LEV can be used for enhancement in several ways: Prioritization: LEV helps organizations prioritize vulnerabilities that are most likely to be exploited, ensuring that critical patches are applied first. LEV is more accurate because it uses data from KEV lists and EPSS scores. This means it can find vulnerabilities that are not being exploited as often. Resource Allocation: LEV enables better allocation of resources by focusing efforts on vulnerabilities with the highest exploitation probability, optimizing security operations. Risk Management: LEV probabilities help measure the expected number and proportion of vulnerabilities exploited by threat actors, aiding in comprehensive risk management. Collaboration: LEV encourages collaboration between industry partners and researchers to empirically measure and improve vulnerability management practices. The hope is that by integrating LEV into existing tools and processes, organizations can improve their ability to identify, prioritize, and mitigate vulnerabilities effectively. https://www.securityweek.com/vulnerability-exploitation-probability-metric-proposed-by-nist-cisa-researchers/181Views4likes0Comments