Security daily (02-12-2020)

Techniques for writing least privilege IAM policies

In this post, I’m going to share two techniques I’ve used to write least privilege AWS Identity and Access Management (IAM) policies. If you’re not familiar with IAM policy structure, I highly recommend you read understanding how IAM works and policies and permissions. Least privilege is a principle of granting only the permissions required to […] (AWS Security Blog)

China aims its influence operations at incoming Biden administration, top intel official says

China has increased its influence operations targeting incoming Biden administration personnel and their associates since the presidential election, the top U.S. counterintelligence official said Wednesday. “We’re starting to see that now play [out] across the country, to not only the folks who are in the new administration, but those who are around those folks in the new administration,” William Evanina, who heads the National Counterintelligence and Security Center, said at an online event hosted by the Aspen Institute. Evanina did not elaborate on what the Chinese influence activity entailed. But another U.S. intelligence official told CyberScoop it included intelligence collection and efforts to shape U.S. policy. Evanina did say that China had engaged in an “uptick” in influence operations since the Nov. 3 election of Joe Biden that were focused on the president-elect’s advisers. Chinese influence activity in the past has included amplification of state-controlled media outlets and other means of […] The post China aims its influence operations at incoming Biden administration, top intel official says appeared first on CyberScoop. (CyberScoop)

Why the Biden administration needs a National Cyber Director more than ever

As the Biden-Harris administration thinks about cyber appointments and cyber strategy for the first 100 days of the administration, appointing a National Cyber Director role requiring Senate confirmation is critical. The National Cyber Director will coordinate, support, and deconflict efforts on cyber, technology, and related issues led by executive branch agencies, engage the private sector to build trust and advance shared priorities, and represent the administration at home and abroad on cyber. The administration will face a number of cybersecurity and technology challenges upon entering the White House. Effective mobilization and coordination of the government, and engagement with industry and civil society requires a coordinated strategy led by an empowered National Cyber Director who is responsible for the work. That person also must be able to hold federal agencies accountable. The cybersecurity landscape has only grown more complex since President-Elect Biden left office as vice president. Election security, foreign investment […] The post Why the Biden administration needs a National Cyber Director more than ever appeared first on CyberScoop. (CyberScoop)

North Korean hackers ramp up coronavirus vaccine targeting

North Korean hackers have been on a bit of a coronavirus vaccine hacking spree. An espionage shop with suspected ties to the North Korean government has been working to breach multiple pharmaceutical companies working on coronavirus treatments in the U.S. and South Korea over the last several months, according to The Wall Street Journal. Johnson & Johnson and Novavax — both U.S.-based firms working on COVID-19 vaccines — have reportedly been targeted, as have South Korea-based Genexine, Shin Poong Pharmaceutical and Celltrion. It was unclear if the attempts have been successful. The attackers, which are believed to be part of the hacking group known as Kimsuky, have historically targeted South Korean think tanks and targets linked with sanctions and nuclear topics. But in recent months Kimsuky has expanded its targeting and turned its attention to pharmaceutical and research entities focused on the coronavirus, according to research from cybersecurity firm Cybereason. […] The post North Korean hackers ramp up coronavirus vaccine targeting appeared first on CyberScoop. (CyberScoop)

An iOS exploit that enables iPhone takeover is cybersecurity researcher's 'work of art'

If there’s one thing to read this week about Apple security, it’s researcher Ian Beer’s massive, spirited and highly detailed account of how he developed a powerful tool for breaking into nearby iPhones. The piece, “An iOS zero-click radio proximity exploit odyssey,” earned Beer high praise for his persistence in working out the attack, as well as thorough reporting of how he did it. He posted the magnum opus Tuesday on the blog for Google Project Zero, the tech giant’s team of zero-day hunters. Beer — known as one of the most skilled iOS hackers around — makes some things clear, up top: The vulnerability was reported to Apple before the company launched coronavirus contact-tracing technology on iPhones in May. And no one should ever be lulled into a false sense of security, he says, when it comes to mobile devices. “The takeaway from this project should not be: no one will […] The post An iOS exploit that enables iPhone takeover is cybersecurity researcher's 'work of art' appeared first on CyberScoop. (CyberScoop)

US alert urges think tanks to be on guard for foreign hacking activity

Think tanks should be on high alert for nation-state hacking attempts in the coming days, the FBI and Department of Homeland Security warned in a joint report issued Tuesday. The alert, which comes just as President-Elect Joe Biden carves out his national security team — many of whom are currently employed at prominent non-governmental organizations and think tanks in D.C. — notes that foreign state-linked hacking groups are primarily going after think tank employees that focus on national security and foreign policy. “Given the importance that think tanks can have in shaping U.S. policy, CISA and FBI urge individuals and organizations in the international affairs and national security sectors to immediately adopt a heightened state of awareness and implement the critical steps listed in the Mitigations section of this Advisory,” the bulletin states. U.S.-based think tanks and non-profit organizations are a perennial target of nation-state hackers. Foreign espionage groups have long targeted […] The post US alert urges think tanks to be on guard for foreign hacking activity appeared first on CyberScoop. (CyberScoop)

How to steal photos off someone’s iPhone from across the street

The bug at the heart of this is already patched - but there's a lot to learn from this story anyway. (Naked Security)

Cayman Islands Bank Records Exposed In Open Azure Blob

(News ≈ Packet Storm)

Misconfigured Docker Servers Under Attack By Xanthe Malware

(News ≈ Packet Storm)

Taylor Swift Fan Hacks Artist Spotify Pages

(News ≈ Packet Storm)

Watch This Google Hacker Pwn 26 iPhones

(News ≈ Packet Storm)

Spotify Wrapped 2020 Rollout Marred by Pop Star Hacks

Spotify pages for Dua Lipa, Lana Del Rey, Future and others were defaced by an attacker pledging his love for Taylor Swift and Trump. (Threatpost)


/security-daily/ 03-12-2020 23:44:23