Newsflash dinsdag 9 maart 2021
NCSC: 40 procent Nederlandse Exchange-servers kwetsbaar voor aanvallen
(security.nl)

Meer dan veertig procent van de Exchange-servers in Nederland is kwetsbaar voor aanvallen omdat beheerders hebben nagelaten door Microsoft beschikbare beveiligingsupdates te installeren.

Volgens de Amerikaanse overheid worden kwetsbare Exchange-servers inmiddels wereldwijd en op grote schaal aangevallen. De Duitse overheid liet vorige week weten dat alle nog niet gepatcht Exchange-servers als besmet moeten worden beschouwd.

Vorige week dinsdag kwam Microsoft met beveiligingsupdates voor vier kwetsbaarheden in Exchange Server 2013, 2016 en 2019 waardoor een aanvaller kwetsbare servers op afstand kan overnemen, om die vervolgens met malware te infecteren en voor verdere aanvallen te gebruiken.

Kabinet werkt aan coronapaspoort dat houders meer vrijheden geeft
(security.nl)

Het kabinet werkt aan een coronapaspoort dat houders meer vrijheden geeft. Het gaat dan om mensen die zich hebben laten vaccineren, zich hebben laten testen of recentelijk corona hebben gehad. Er wordt nu gewerkt aan de technische vereisten voor het paspoort dat in de zomer technisch mogelijk moet zijn, zo meldt de NOS.

Er zijn echter nog vragen over de invoering, onder andere of gevaccineerden het virus kunnen verspreiden.

"En wat we niet willen, is een vaccinatieplicht, ook niet indirect", stelt demissionair minister De Jonge van Volksgezondheid. "Mensen moeten zich niet gedwongen voelen om zich te laten inenten."

Chinese hackers targeted SolarWinds customers in parallel with Russian op
(arstechnica.com)

By now, most people know that hackers tied to the Russian government compromised the SolarWinds software build system and used it to push a malicious update to some 18,000 of the company’s customers.

On Monday, researchers published evidence that hackers from China also targeted SolarWinds customers in what security analysts have said was a distinctly different operation.

The parallel hack campaigns have been public knowledge since December, when researchers revealed that, in addition to the supply chain attack, hackers exploited a vulnerability in SolarWinds software called Orion.

Microsoft Exchange Server Attack Escalation Prompts Patching Panic
(darkreading.com)

US government officials weigh in on the attacks and malicious activity, which researchers believe may be the work of multiple groups.

The critical Exchange Server vulnerabilities patched last week by Microsoft are being weaponized in widespread attacks against organizations worldwide. Attacks have escalated over the past two weeks, prompting responses from US government and the security community.

News of the four vulnerabilities emerged on March 2, when Microsoft issued patches for CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065.

Alleged Chinese attack on Microsoft Exchange remains an 'active threat,' says US government
(windowscentral.com)

Last week, news emerged that Microsoft's Exchange email server software was hacked. Microsoft blamed a state-sponsored group out of China, but Beijing has denied any involvement.

The company released several security updates to address vulnerabilities, but the hacks remain an "active threat," according to the U.S. government.

Reuters reports that while Microsoft released a patch that addresses the vulnerability, that any server already compromised by the attack can still be accessed through a "back-door."

European banking regulator EBA targeted in Microsoft hacking
(reuters.com)

The European Banking Authority on Monday said it had been targeted by hackers, although no data had been obtained and it was redoubling efforts to shield itself amid a global cyber attack exploiting flaws in Microsoft’s mail server software.

The European Union’s banking regulator, which gathers and stores swathes of sensitive data about banks and their lending, said it believed the cyber attack had struck only its email servers.

It is the latest prominent victim among tens of thousands of organisations in Asia and Europe targeted in a campaign which Microsoft Corp says makes use of previously undetected vulnerabilities in different versions of its mail server software.

5 Cybersecurity Aspects to Consider for Your Organization for a Safer 2021
(hackernoon.com)

Focusing on all how 2020 has been a challenging year is straightforward: the Covid-19 pandemic, a sputtering economy, and an explosion of new and increasingly dangerous cyber threats (cybersecurity professionals).

However, we should not neglect how the changes we have seen in 2020, such as the transition to remote work and how it's driven long-overdue reconsiderations of our connectivity, collaboration, and cybersecurity standards and approaches.

For most of 2020, Covid-19 has been a daily reality, and forward-looking businesses should be seriously thinking about not only how they will navigate the rest of the pandemic, but how they will approach the post-Covid-19 era.

University of the Highlands and Islands shuts down campuses as it deals with 'ongoing cyber incident'
(theregister.com)

The University of the Highlands and Islands (UHI) in Scotland is fending off "an ongoing cyber incident" that has shut down its campuses.

In a message to students and staff yesterday afternoon, the institution, which spans 13 locations across the northernmost part of the UK, warned that "most services" – including its Brightspace virtual learning environment – were affected.

"We are currently working to isolate and minimise impact from this incident with assistance from external partners. We do not believe personal data has been affected," said the university, adding: "The source of the incident is not yet known."

1 in 5 Americans had a healthcare provider affected by cyberattacks, report finds
(beckershospitalreview.com)

With cyberattacks escalating in the healthcare industry, about 20 percent of Americans have a healthcare provider that has been affected by cyberattacks in the last year. Consumers said this could influence them to change providers, a March 3 Morphisec report titled "Consumer Healthcare Cybersecurity: Threat Index" finds.

The report surveyed more than 1,000 consumers across the U.S. in January to gauge how they view cyber threats in the healthcare sector.

Five key takeaways for healthcare providers:

Bad Bot Traffic on Healthcare Websites Rises 372% As Vaccines Become Available Globally
(imperva.com)

Nations around the world are racing to acquire COVID-19 vaccines and assemble digital infrastructure and web applications to enable appointment booking.

As they do this, Imperva Research Labs has monitored a staggering 372% increase in bad bot traffic on healthcare websites globally since September 2020.

In February 2021, bot traffic soared 48.8%, the largest increase over the past year, and reaching an unprecedented level over the 12-month average.

100,000 affected in Texas healthcare provider cyberattack
(beckershospitalreview.com)

Elara Caring, a home-based care provider, began notifying 100,400 patients that an unauthorized party received unauthorized access to corporate email accounts.

Upon discovery of the data breach in mid-December 2020, Elara Caring launched an investigation led by third-party security experts, notified law enforcement and reset passwords for all employees, the Addison, Texas-based organization said in a recent news release.

Elara Caring said it believes patient and employee information may have been viewed, including Social Security numbers, bank account information and driver's license numbers.

Vendor ransomware attack exposes patient information at South Carolina practice
(beckershospitalreview.com)

Sandhills Medical Foundation notified patients that an external cloud vendor underwent a ransomware attack, exposing patients' personal information, according to a news release.

On Jan. 8, the vendor informed the Jefferson, S.C.-based practice that it had experienced a ransomware attack. Cyberattackers used compromised credentials to access the vendor's system Sept. 23, 2020.

The attackers accessed Sandhills' system on Nov. 15 and extracted Sandhills' data before the ransomware attack was launched on Dec. 3.

Only 12% of enterprises have fully embraced SASE
(helpnetsecurity.com)

Although many public and private sector organizations have elements of SASE in their IT stack, only 12% worldwide currently have a comprehensive SASE architecture, according to NetMotion.

As the unexpected growth of remote working greatly accelerated conversations around secure remote access solutions, NetMotion surveyed 750 IT leaders, including CIOs, CTOs, IT and network directors, as well as security analysts across legal, finance, public safety, transportation, healthcare and government sectors in Australia, Germany, Japan, the United Kingdom and the United States.

The goal was to quantify and qualify the hype around SASE while ascertaining the popularity of various network and security solutions deployed by organizations around the world.

A great deal of employees have inappropriate access to sensitive data
(helpnetsecurity.com)

The onset of COVID-19 and resulting distributed workforce have introduced new and complex challenges for businesses, with 45% of IT decision-makers reporting increased pressure from the board around the security of their organization.

These findings highlight an increased concern over identity-based threats and the need for user access visibility across the IT estate as organizations navigate their zero trust journey.

The study highlighted major concerns for the virtual workforce, with 52% of respondents stating that identity-specific threats are keeping them up at night.

UK businesses caught buying five-star Google reviews
(bbc.com)

Google is failing to do enough to combat fake reviews within its business listings, and must be held to account by a UK watchdog, according to Which?

The consumer group set up a fake company and bought bogus five-star reviews as part of an investigation.

In doing so, it was able to tie its sham "customers" to dozens of other highly-rated British firms, including a dentist and a stockbroker.

Remember that day in March 2020 when you were asked to get the business working from home – tomorrow, if possible? Here's how that worked out
(theregister.com)

Brianna Haley was given one day to be ready to roll out Zoom for 13,000 users at over 1,000 sites.

Haley* is a project analyst for a large healthcare provider that, as COVID-19 marched across the world in March 2020, realised imminent lockdowns meant it would soon be unable to consult with patients.

And no consultations meant no revenue. "I got called into a meeting at 7:30 or 8:30 on Monday morning and was told we had to get Zoom done by tomorrow," Haley recalls.

Artificial Intelligence Can Now Learn Which Faces a Person Finds Most Attractive
(techeblog.com)

We have seen the future of dating apps, and they’ll all be AI-powered. Why? Researchers used electroencephalography (EEG) measurements to identify what kind of facial features people found to be attractive, and then uploaded the data to an artificial intelligence program, or a generative adversarial neural network (GAN).

This program then familiarized itself with the types of faces individual people found desirable, and then synthesized new ones tailored exactly to their preferences. Read more for a video and additional information.

The new AI-generated faces were then shown to the 30 volunteers alongside multiple additional faces, which were rated by participants as attractive 80 percent of the time, compared to just 20 percent for the randomized faces.

Google's ex-boss tells the US it's time to take the gloves off on autonomous weapons
(theregister.com)

US government should avoid hastily banning AI-powered autonomous weapons and instead step up its efforts in developing such systems to keep up with foreign enemies, according to the National Security Commission on AI.

The independent group headed by ex-Google CEO Eric Schmidt and funded by the Department of Defense has published its final report advising the White House on how best to advance AI and machine learning to stay ahead of its competitors.

Stretching over 750 pages, the report covers a lot of areas, including retaining talent, the future of warfare, protecting IP, and US semiconductor supply chains.

Flying cats and a burning Banksy: why are digital art prices suddenly rocketing?
(theguardian.com)

A Banksy just fetched $382,000 despite going up in smoke, while a cat cartoon bagged twice that. And it’s all thanks to NFTs, an offshoot of crypto currency bitcoin. But is this a bubble about to burst?

Last week masked men set fire to a Banksy screenprint called Morons (White) at a secret location in Brooklyn, livestreaming the destruction via the Twitter account @BurntBanksy. The men worked for a company called Injective Protocol, which bought the print for $95,000 in order to destroy it and replace it with a unique digital facsimile.

This is called crypto art and, if you want to know the extent to which it’s booming, well, the new work just went for $382,336, more than four times the original price.